SlideShare a Scribd company logo
1 of 14
*
*
Copyright © 2012, Elsevier Inc. All Rights Reserved
Chapter 1
Introduction
Cyber Attacks
Protecting National Infrastructure, 1st ed.
Copyright © 2012, Elsevier Inc. All Rights Reserved
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
National infrastructureRefers to the complex, underlying
delivery and support systems for all large-scale services
considered absolutely essential to a nationConventional
approach to cyber security not enoughNew approach
neededCombining best elements of existing security techniques
with challenges that face complex, large-scale national services
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Introduction
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.1 – National infrastructure cyber and physical attacks
Copyright © 2012, Elsevier Inc. All rights Reserved
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.2 – Differences between small- and large-scale cyber
security
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Three types of malicious adversariesExternal adversaryInternal
adversarySupplier adversary
National Cyber Threats,
Vulnerabilities, and Attacks
Copyright © 2012, Elsevier Inc. All rights Reserved
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.3 – Adversaries and exploitation points in national
infrastructure
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Three exploitation pointsRemote access System administration
and normal usage Supply chain
National Cyber Threats,
Vulnerabilities, and Attacks
Copyright © 2012, Elsevier Inc. All rights Reserved
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Infrastructure threatened by most common security concerns:
ConfidentialityIntegrityAvailabilityTheft
National Cyber Threats,
Vulnerabilities, and Attacks
Copyright © 2012, Elsevier Inc. All rights Reserved
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Botnet ThreatWhat is a botnet attack?The remote collection of
compromised end-user machines (usually broadband-connected
PCs) is used to attack a target.Sources of attack are scattered
and difficult to identifyFive entities that comprise botnet attack:
botnet operator, botnet controller, collection of bots, botnot
software drop, botnet target
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – IntroductionFive entities that comprise botnet
attack: Botnet operatorBotnet controllerCollection of
botsBotnot software dropBotnet targetDistributed denial of
service (DDOS) attack: bots create “cyber traffic jam”
Botnet Threat
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.4 – Sample DDOS attack from a botnet
*
National Cyber Security
Methodology Components
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Ten basic design and operation principles:Deception –
DiscretionSeparation – CollectionDiversity –
CorrelationCommonality – AwarenessDepth –
Response
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Deliberately introducing misleading functionality or
misinformation for the purpose of tricking an
adversaryComputer scientists call this functionality a honey
potDeception enables forensic analysis of intruder activityThe
acknowledged use of deception may be a deterrent to intruders
(every vulnerability may actually be a trap)
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Deception
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.5 – Components of an interface with deception
*
Separation involves enforced access policy restrictions on users
and resources in a computing environmentMost companies use
enterprise firewalls, which are complemented by the
following:Authentication and identity managementLogical
access controlsLAN controlsFirewalls
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Separation
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Fig. 1.6 – Firewall enhancements for national infrastructure
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
*
Diversity is the principle of using technology and systems that
are intentionally different in substantive ways.Diversity hard to
implementA single software vendor tends to dominate the PC
operating system business landscapeDiversity conflicts with
organizational goals of simplifying supplier and vendor
relationships
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Diversity
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.7 – Introducing diversity to national infrastructure
*
Consistency involves uniform attention to security best
practices across national infrastructure componentsGreatest
challenge involves auditingA national standard is needed
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Commonality
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Depth involves using multiple security layers to protect national
infrastructure assets Defense layers are maximized by using a
combination of functional and procedural controls
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Depth
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.8 – National infrastructure security through defense in
depth
*
Discretion involves individuals and groups making good
decisions to obscure sensitive information about national
infrastructureThis is not the same as “security through
obscurity”
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Discretion
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Collection involves automated gathering of system-related
information about national infrastructure to enable security
analysis Data is processed by a security information
management system.Operational challengesWhat type of
information should be collected?How much information should
be collected?
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Collection
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.9 – Collecting national infrastructure-related security
information
*
Correlation involves a specific type of analysis that can be
performed on factors related to national infrastructure
protectionThis type of comparison-oriented analysis is
indispensablePast initiatives included real-time correlation of
data at fusion centerDifficult to implement
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Correlation
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Fig. 1.10 – National infrastructure high-level correlation
approach
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
*
Awareness involves an organization understanding the
differences between observed and normal status in national
infrastructureMost agree on the need for awareness, but how can
awareness be achieved?
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Awareness
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.11 – Real-time situation awareness process flow
*
Response involves the assurance that processes are in place to
react to any security-related indicatorIndicators should flow
from the awareness layerCurrent practice in smaller corporate
environments of reducing “false positives” by waiting to
confirm disaster is not acceptable for national infrastructure
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Response
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer
*
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Fig. 1.12 – National infrastructure security response approach
*
Commissions and groupsInformation sharingInternational
cooperationTechnical and operational costs
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 1 – Introduction
Implementing the Principles Nationally
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
*
Chapter 2 — Instructions: Language of the Computer
*
Chapter 2 — Instructions: Language of the Computer

More Related Content

Similar to Copyright © 2012, Elsevier Inc. All Rights Reserved.docx

Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
dorishigh
 
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
RAJU852744
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
priestmanmable
 
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docxCopyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
bobbywlane695641
 
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
Lab #1 - Assessment Worksheet Configuring an Active Direct.docxLab #1 - Assessment Worksheet Configuring an Active Direct.docx
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
manningchassidy
 
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docxWeek 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
helzerpatrina
 

Similar to Copyright © 2012, Elsevier Inc. All Rights Reserved.docx (20)

Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
 
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
11Copyright © 2012, Elsevier Inc. All Rights Reserved.docx
 
ISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docxISYS 2394 Business Globalisation and Business IT.docx
ISYS 2394 Business Globalisation and Business IT.docx
 
ccna1_v5_capitulo1
ccna1_v5_capitulo1ccna1_v5_capitulo1
ccna1_v5_capitulo1
 
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docxCopyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
Copyright © 2012, Elsevier Inc. All Rights ReservedChapter 11.docx
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
Lab #1 - Assessment Worksheet Configuring an Active Direct.docxLab #1 - Assessment Worksheet Configuring an Active Direct.docx
Lab #1 - Assessment Worksheet Configuring an Active Direct.docx
 
CCNA Icnd110 s01l02
CCNA Icnd110 s01l02CCNA Icnd110 s01l02
CCNA Icnd110 s01l02
 
OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention Methods
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
IT Essentials Chapter 9
IT Essentials Chapter 9IT Essentials Chapter 9
IT Essentials Chapter 9
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
File-Based Deception Technology for Impeding Malicious Users
File-Based Deception Technology for Impeding Malicious UsersFile-Based Deception Technology for Impeding Malicious Users
File-Based Deception Technology for Impeding Malicious Users
 
OMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submissionOMG DDS Security, 3rd revised submission
OMG DDS Security, 3rd revised submission
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docxWeek 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
Week 5Read Chapter 7- DiscretionListen to Week 5 LecturePa.docx
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 

More from dickonsondorris

Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docxCopyright © eContent Management Pty Ltd. Health Sociology Revi.docx
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
dickonsondorris
 
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
Copyright © Pearson Education 2010 Digital Tools in Toda.docxCopyright © Pearson Education 2010 Digital Tools in Toda.docx
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
dickonsondorris
 
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
Copyright © Jen-Wen Lin 2018   1 STA457 Time series .docxCopyright © Jen-Wen Lin 2018   1 STA457 Time series .docx
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
dickonsondorris
 
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
Copyright © John Wiley & Sons, Inc. All rights reserved..docxCopyright © John Wiley & Sons, Inc. All rights reserved..docx
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
dickonsondorris
 
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docxCopyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
dickonsondorris
 
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
Copyright © Cengage Learning.  All rights reserved. CHAPTE.docxCopyright © Cengage Learning.  All rights reserved. CHAPTE.docx
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
dickonsondorris
 
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
Copyright © by Holt, Rinehart and Winston. All rights reserved.docxCopyright © by Holt, Rinehart and Winston. All rights reserved.docx
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
dickonsondorris
 
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docxCopyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
dickonsondorris
 
Copyright © 2019, American Institute of Certified Public Accou.docx
Copyright © 2019, American Institute of Certified Public Accou.docxCopyright © 2019, American Institute of Certified Public Accou.docx
Copyright © 2019, American Institute of Certified Public Accou.docx
dickonsondorris
 
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docxCopyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
dickonsondorris
 
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
Copyright © 2018 Pearson Education, Inc. C H A P T E R  6.docxCopyright © 2018 Pearson Education, Inc. C H A P T E R  6.docx
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
dickonsondorris
 
Copyright © 2018 Capella University. Copy and distribution o.docx
Copyright © 2018 Capella University. Copy and distribution o.docxCopyright © 2018 Capella University. Copy and distribution o.docx
Copyright © 2018 Capella University. Copy and distribution o.docx
dickonsondorris
 
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
Copyright © 2018 Pearson Education, Inc.C H A P T E R  3.docxCopyright © 2018 Pearson Education, Inc.C H A P T E R  3.docx
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
dickonsondorris
 
Copyright © 2018 by Steven Levitsky and Daniel.docx
Copyright © 2018 by Steven Levitsky and Daniel.docxCopyright © 2018 by Steven Levitsky and Daniel.docx
Copyright © 2018 by Steven Levitsky and Daniel.docx
dickonsondorris
 
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docxCopyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
dickonsondorris
 
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
Copyright © 2017 Wolters Kluwer Health  Lippincott Williams.docxCopyright © 2017 Wolters Kluwer Health  Lippincott Williams.docx
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
dickonsondorris
 
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docxCopyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
dickonsondorris
 
Copyright © 2017 by University of Phoenix. All rights rese.docx
Copyright © 2017 by University of Phoenix. All rights rese.docxCopyright © 2017 by University of Phoenix. All rights rese.docx
Copyright © 2017 by University of Phoenix. All rights rese.docx
dickonsondorris
 
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docxCopyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
dickonsondorris
 
Copyright © 2016 Pearson Education, Inc. .docx
Copyright © 2016 Pearson Education, Inc.                    .docxCopyright © 2016 Pearson Education, Inc.                    .docx
Copyright © 2016 Pearson Education, Inc. .docx
dickonsondorris
 

More from dickonsondorris (20)

Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docxCopyright © eContent Management Pty Ltd. Health Sociology Revi.docx
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
 
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
Copyright © Pearson Education 2010 Digital Tools in Toda.docxCopyright © Pearson Education 2010 Digital Tools in Toda.docx
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
 
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
Copyright © Jen-Wen Lin 2018   1 STA457 Time series .docxCopyright © Jen-Wen Lin 2018   1 STA457 Time series .docx
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
 
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
Copyright © John Wiley & Sons, Inc. All rights reserved..docxCopyright © John Wiley & Sons, Inc. All rights reserved..docx
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
 
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docxCopyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
 
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
Copyright © Cengage Learning.  All rights reserved. CHAPTE.docxCopyright © Cengage Learning.  All rights reserved. CHAPTE.docx
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
 
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
Copyright © by Holt, Rinehart and Winston. All rights reserved.docxCopyright © by Holt, Rinehart and Winston. All rights reserved.docx
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
 
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docxCopyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
 
Copyright © 2019, American Institute of Certified Public Accou.docx
Copyright © 2019, American Institute of Certified Public Accou.docxCopyright © 2019, American Institute of Certified Public Accou.docx
Copyright © 2019, American Institute of Certified Public Accou.docx
 
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docxCopyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
 
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
Copyright © 2018 Pearson Education, Inc. C H A P T E R  6.docxCopyright © 2018 Pearson Education, Inc. C H A P T E R  6.docx
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
 
Copyright © 2018 Capella University. Copy and distribution o.docx
Copyright © 2018 Capella University. Copy and distribution o.docxCopyright © 2018 Capella University. Copy and distribution o.docx
Copyright © 2018 Capella University. Copy and distribution o.docx
 
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
Copyright © 2018 Pearson Education, Inc.C H A P T E R  3.docxCopyright © 2018 Pearson Education, Inc.C H A P T E R  3.docx
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
 
Copyright © 2018 by Steven Levitsky and Daniel.docx
Copyright © 2018 by Steven Levitsky and Daniel.docxCopyright © 2018 by Steven Levitsky and Daniel.docx
Copyright © 2018 by Steven Levitsky and Daniel.docx
 
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docxCopyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
 
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
Copyright © 2017 Wolters Kluwer Health  Lippincott Williams.docxCopyright © 2017 Wolters Kluwer Health  Lippincott Williams.docx
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
 
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docxCopyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
 
Copyright © 2017 by University of Phoenix. All rights rese.docx
Copyright © 2017 by University of Phoenix. All rights rese.docxCopyright © 2017 by University of Phoenix. All rights rese.docx
Copyright © 2017 by University of Phoenix. All rights rese.docx
 
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docxCopyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
 
Copyright © 2016 Pearson Education, Inc. .docx
Copyright © 2016 Pearson Education, Inc.                    .docxCopyright © 2016 Pearson Education, Inc.                    .docx
Copyright © 2016 Pearson Education, Inc. .docx
 

Recently uploaded

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Copyright © 2012, Elsevier Inc. All Rights Reserved.docx

  • 1. * * Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 1 Introduction Cyber Attacks Protecting National Infrastructure, 1st ed. Copyright © 2012, Elsevier Inc. All Rights Reserved The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * National infrastructureRefers to the complex, underlying delivery and support systems for all large-scale services considered absolutely essential to a nationConventional approach to cyber security not enoughNew approach neededCombining best elements of existing security techniques with challenges that face complex, large-scale national services Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Introduction
  • 2. The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.1 – National infrastructure cyber and physical attacks Copyright © 2012, Elsevier Inc. All rights Reserved * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.2 – Differences between small- and large-scale cyber security * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Three types of malicious adversariesExternal adversaryInternal adversarySupplier adversary National Cyber Threats, Vulnerabilities, and Attacks Copyright © 2012, Elsevier Inc. All rights Reserved
  • 3. The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.3 – Adversaries and exploitation points in national infrastructure * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Three exploitation pointsRemote access System administration and normal usage Supply chain National Cyber Threats, Vulnerabilities, and Attacks Copyright © 2012, Elsevier Inc. All rights Reserved The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer
  • 4. * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Infrastructure threatened by most common security concerns: ConfidentialityIntegrityAvailabilityTheft National Cyber Threats, Vulnerabilities, and Attacks Copyright © 2012, Elsevier Inc. All rights Reserved The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Botnet ThreatWhat is a botnet attack?The remote collection of compromised end-user machines (usually broadband-connected PCs) is used to attack a target.Sources of attack are scattered and difficult to identifyFive entities that comprise botnet attack: botnet operator, botnet controller, collection of bots, botnot software drop, botnet target The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science
  • 5. * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – IntroductionFive entities that comprise botnet attack: Botnet operatorBotnet controllerCollection of botsBotnot software dropBotnet targetDistributed denial of service (DDOS) attack: bots create “cyber traffic jam” Botnet Threat The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.4 – Sample DDOS attack from a botnet * National Cyber Security
  • 6. Methodology Components Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Ten basic design and operation principles:Deception – DiscretionSeparation – CollectionDiversity – CorrelationCommonality – AwarenessDepth – Response The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Deliberately introducing misleading functionality or misinformation for the purpose of tricking an adversaryComputer scientists call this functionality a honey potDeception enables forensic analysis of intruder activityThe acknowledged use of deception may be a deterrent to intruders (every vulnerability may actually be a trap) Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Deception The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer *
  • 7. Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.5 – Components of an interface with deception * Separation involves enforced access policy restrictions on users and resources in a computing environmentMost companies use enterprise firewalls, which are complemented by the following:Authentication and identity managementLogical access controlsLAN controlsFirewalls Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Separation The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Fig. 1.6 – Firewall enhancements for national infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction
  • 8. * Diversity is the principle of using technology and systems that are intentionally different in substantive ways.Diversity hard to implementA single software vendor tends to dominate the PC operating system business landscapeDiversity conflicts with organizational goals of simplifying supplier and vendor relationships Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Diversity The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.7 – Introducing diversity to national infrastructure * Consistency involves uniform attention to security best practices across national infrastructure componentsGreatest challenge involves auditingA national standard is needed
  • 9. Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Commonality The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Depth involves using multiple security layers to protect national infrastructure assets Defense layers are maximized by using a combination of functional and procedural controls Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Depth The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved
  • 10. Chapter 1 – Introduction Fig. 1.8 – National infrastructure security through defense in depth * Discretion involves individuals and groups making good decisions to obscure sensitive information about national infrastructureThis is not the same as “security through obscurity” Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Discretion The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Collection involves automated gathering of system-related information about national infrastructure to enable security analysis Data is processed by a security information management system.Operational challengesWhat type of information should be collected?How much information should be collected? Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Collection
  • 11. The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.9 – Collecting national infrastructure-related security information * Correlation involves a specific type of analysis that can be performed on factors related to national infrastructure protectionThis type of comparison-oriented analysis is indispensablePast initiatives included real-time correlation of data at fusion centerDifficult to implement Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Correlation The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer *
  • 12. Chapter 2 — Instructions: Language of the Computer * Fig. 1.10 – National infrastructure high-level correlation approach Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction * Awareness involves an organization understanding the differences between observed and normal status in national infrastructureMost agree on the need for awareness, but how can awareness be achieved? Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Awareness The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.11 – Real-time situation awareness process flow
  • 13. * Response involves the assurance that processes are in place to react to any security-related indicatorIndicators should flow from the awareness layerCurrent practice in smaller corporate environments of reducing “false positives” by waiting to confirm disaster is not acceptable for national infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Response The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer * Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction Fig. 1.12 – National infrastructure security response approach * Commissions and groupsInformation sharingInternational cooperationTechnical and operational costs Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 1 – Introduction
  • 14. Implementing the Principles Nationally The University of Adelaide, School of Computer Science The University of Adelaide, School of Computer Science * Chapter 2 — Instructions: Language of the Computer * Chapter 2 — Instructions: Language of the Computer