SlideShare a Scribd company logo
@codenomicon
CYBER SECURITY FOR CRITICAL
INFRASTRUCTURE
Mohit Rampal - Regional Manager South Asia
10/9/2015© 2014 All Rights Reserved
2
• Cyber Attacks: Internet-based incidents involving
politically or financially motivated attacks on
information and information systems.
• Zero-day Vulnerabilities, Or Unknown Vulnerabilities:
Software flaws that make exploitation and other
illegal activities towards information systems possible
• Proactive Cyber Defense: acting in anticipation to
oppose an attack against computers and networks.
CYBER THREATS : MORE PROFESSIONAL &
SOPHISTICATED
10/9/2015© 2014 All Rights Reserved
3
• Zero-day exploits, the biggest
threat to security as there are no
defenses against them and the
attacks can go unnoticed.
• Security landscape is changing:
Governments, critical
infrastructure providers and
defense organizations increasingly
rely on the Internet to perform
mission-critical operations
• India , a soft state , 7500 km’s of
coastline running through 9 states
and 4 union territories
• Proactive Cyber Defence or active
cyber defence (ACD) Is the Key
way forward
• US, China etc. Spending on Cyber
Security for Homeland defense &
increase of Cyber Units & Cyber
Warriors
• Cybercrime costs the United
States approximately $100 billion
annually
• Vulnerable Verticals : Energy &
Utilities, Financial Organizations,
Telecom, Defense & Paramilitary
Forces, Manufacturing etc
WHY CYBER DEFENSE
10/9/2015© 2014 All Rights Reserved
4
LESSONS FROM PAST CYBER ATTACKS
• Cyber attacks accompany physical
attacks
• Cyber attacks are increasing in volume,
sophistication, and coordination
• Cyber attacks are attracted to high-
value targets
4
10/9/2015© 2014 All Rights Reserved
5
CHANGING LANDSCAPE IN ICS THREATS…
10/9/2015© 2014 All Rights Reserved
6
BRAVE NEW WORLD
WHAT WE HAD THEN WHAT WE HAVE NOW
Corporate private servers and data
storage
Distributed data processing and storage
Controlled access: Corporate issued
laptops, closed ecosystem handsets…
Ubiquitous access: BYOD, open platforms
Isolated domains: Industrial Control
Systems, Healthcare devices, Mil/Gov
Networks
Previously isolated domains getting
interconnected: Remote connections to
ICS systems, robots for remote surgery
Proprietary protocols for communication
and custom made HW/SW
IP protocols, COTS HW, Open Source and
commercial libraries for SW
What about our defenses
Antivirus, Firewall, IPS ???
10/9/2015© 2014 All Rights Reserved
7
INDIA AND APAC ABUSE
09-10-2015 ©Copyright Codenomicon 7
10/9/2015© 2014 All Rights Reserved
8
SECURITY IN ICS
Designed to be isolated
Connectivity over serial
analogue circuits =
Attacker needed to gain
physical access to carry out
attack
Protocol designed for
communication between
trusted devices
Protocols contain very
little security features,
such as encryption
10/9/2015© 2014 All Rights Reserved
9
SECURITY IN ICS
• ICS systems interconnected with outside world using IP-based
communications and control networks were integrated into larger corporate
networks…
• Reducing costs
• Improve efficiency
• Exposure to external attacks
• Almost all ICS devices are either directly or indirectly connected to internet
• New Attack Surfaces
• The need to separate the corporate and production network is well known
– Often leads to ignorance of other equally critical interfaces
• Trusted third parties still having access to ICS network…
– Vendors?, System integrators?, Control engineers?
• Not forgetting, WebHMI, Wireless connection exposure
• Compromising security through end points
10/9/2015 9
10/9/2015© 2014 All Rights Reserved
10
THE KNOWN AND THE UNKNOWN
Known Vulnerability ManagementKnown Vulnerability Management
Unknown Vulnerability Management (UVM)Unknown Vulnerability Management (UVM)
Vulnerability
Management
Total
Vulnerability
Management
SAST Approach
1980-
PC Lint, OSS,
Coverity, Fortify,
IBM, Microsoft ...
Whitebox testing
DAST Approach
2000-
Fuzzing:
Codenomicon
Defensics, Peach,
Sulley
Blackbox testing
1995-2000
Satan/Saint
1999-
Nessus, ISS
2000-
Qualys, HP, IBM, Symantec ...
2013: Codenomicon AppCheck
ReactiveProactive
Bottom line: All systems have vulnerabilities.
- Both complimentary categories needs to be covered.
10/9/2015© 2014 All Rights Reserved
11
11
UNKNOWN VULNERABILITY MANAGEMENT
(UVM)
• Another name:
Zero-Day Vulnerability
Management
• Process of:
• Detecting attack vectors
• Finding zero-day vulnerabilities
• Building defenses
• Performing patch verification
• Deployment in one big security
push
10/9/2015© 2014 All Rights Reserved
12
• A testing technique where purposefully unexpected and/or
invalid input data is fed to tested system in hope to find
robustness and security problems
• Mutation/Template-Based Fuzzing
• Quality of tests is based on the used template (seed) and mutation
technique
• Slow to execute, least bugs found
• Generational/Specification-Based Fuzzing
• Full test coverage, as the model
is built from specification
• Fast to execute, most bugs found
WHAT IS FUZZING & TYPES OF FUZZING
TECHNOLOGIES
10/9/2015© 2014 All Rights Reserved
13
FUZZ TESTING MATURITY MODEL (FTMM)
• Based on ISO/IEC 15504 framework
• Has 5 maturity levels (+ zero level for immature)
• Created to help in understanding the FTMM of a computer system or
software
• Differentiates system and interface level
• Does NOT address organizational or process maturity (BSIMM, Microsoft SDLC, Cisco
SDLC, etc. should be used for this)
• Each level defines
• Types of fuzz that needs to be performed
• Time that has to be spent fuzzing
• Amount of fuzz tests needed
• Additional metrics required to reach the level
10/9/2015© 2014 All Rights Reserved
14
FTMM MATURITY LEVELS
0 – Immature
1 – Initial
2 - Defined
3 - Integrated
4 – Managed
TypesofFuzzing
required
5 - Optimized
Fuzztestsrequired
Fuzztimerequired
Attacksurface
analysisrequired
Typesof
instrumentation
required
Typesoffailures
allowedtoremain
Fuzzingneedstobepartof
organizationsSDLC
Testharnessintegration
Manualexecution
Otherrequirements
Testreportmustgenerated
G (T)
O,A,DG, T, R
G and T
G, T, R
G) Generational, model based fuzzer
T) Template/Mutational Fuzzer
R) Random Fuzzer
1) Must use two different fuzzers
2) For each type of fuzzing
Infinite (2
1 hour
1000000
1000000 (G)
5000000 (T)
Infinite (2
100000
8 hours
8 hours
30 days
7 days
AS) non-DsS assertions, must be noted
M) Must be mandatorily done
Y) It is required that tests are also manually executed
U) Must use two different fuzzers for each type
B) Baseline test configuration must be documented
T or G O AS, TR
A
A
O
B
none M
X, C none
XTR
O) Human observation
A) Automated instrumentation required
D) Debugger integrated monitoring
X) Required
C) Code coverage/binary analysis required
TR) Transient errors allowed, must be noted
TR
X
M
X
Y
X
X
X
X
X
B, U
X
X
X B
THANK YOU – QUESTIONS?

More Related Content

What's hot

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
manoharparakh
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
SlideTeam
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
neoalt
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
Sounil Yu
 
Information security
Information securityInformation security
Information security
Sina Bagherinezhad
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
Eryk Budi Pratama
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
mohamed nasri
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Information security
Information security Information security
Information security
razendar79
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
DelforChacnCornejo
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
Deepak Kumar (D3)
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 

What's hot (20)

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Introduction to SIEM.pptx
Introduction to SIEM.pptxIntroduction to SIEM.pptx
Introduction to SIEM.pptx
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Cyber Defense Matrix: Revolutions
Cyber Defense Matrix: RevolutionsCyber Defense Matrix: Revolutions
Cyber Defense Matrix: Revolutions
 
Information security
Information securityInformation security
Information security
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Information security
Information security Information security
Information security
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 

Viewers also liked

ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
G. Jane Louise Cook
 
sebis research profile
sebis research profilesebis research profile
sebis research profile
sebistum
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
Aditya K Sood
 
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
viaForensics
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
Ange Albertini
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
Aditya K Sood
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
viaForensics
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxviaForensics
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
OpenDNS
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
Itex Solutions
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
James Nesbitt
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
OpenDNS
 
M.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident ResponseM.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident Response
Nilay Mistry ACE, ISMS LA, OSFCE
 
Shodan- That Device Search Engine
Shodan- That Device Search EngineShodan- That Device Search Engine
Shodan- That Device Search Engine
InMobi Technology
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Aditya K Sood
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
anupriti
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
Aditya K Sood
 

Viewers also liked (20)

ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
sebis research profile
sebis research profilesebis research profile
sebis research profile
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
Beginners guide-to-reverse-engineering-android-apps-pau-oliva-fora-viaforensi...
 
Hide Android applications in images
Hide Android applications in imagesHide Android applications in images
Hide Android applications in images
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linuxVia forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
 
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got StolenOne Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
One Phish, Two Phish, Red Phish, Your Account Details Just Got Stolen
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Blackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream PresentationBlackhat USA 2015: BGP Stream Presentation
Blackhat USA 2015: BGP Stream Presentation
 
M.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident ResponseM.Tech. Cyber Security & Incident Response
M.Tech. Cyber Security & Incident Response
 
Shodan- That Device Search Engine
Shodan- That Device Search EngineShodan- That Device Search Engine
Shodan- That Device Search Engine
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
 

Similar to Cyber Security for Critical Infrastrucutre-ppt

IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
team-WIBU
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM Security
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
TI Safe
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
Kenny Huang Ph.D.
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Unisys Corporation
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
lior mazor
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
Precisely
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
Christopher Gerritz
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
APNIC
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
APNIC
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
Francisco González Jiménez
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 

Similar to Cyber Security for Critical Infrastrucutre-ppt (20)

IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please, by Eric Vyncke [APNI...
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 

Cyber Security for Critical Infrastrucutre-ppt

  • 1. @codenomicon CYBER SECURITY FOR CRITICAL INFRASTRUCTURE Mohit Rampal - Regional Manager South Asia
  • 2. 10/9/2015© 2014 All Rights Reserved 2 • Cyber Attacks: Internet-based incidents involving politically or financially motivated attacks on information and information systems. • Zero-day Vulnerabilities, Or Unknown Vulnerabilities: Software flaws that make exploitation and other illegal activities towards information systems possible • Proactive Cyber Defense: acting in anticipation to oppose an attack against computers and networks. CYBER THREATS : MORE PROFESSIONAL & SOPHISTICATED
  • 3. 10/9/2015© 2014 All Rights Reserved 3 • Zero-day exploits, the biggest threat to security as there are no defenses against them and the attacks can go unnoticed. • Security landscape is changing: Governments, critical infrastructure providers and defense organizations increasingly rely on the Internet to perform mission-critical operations • India , a soft state , 7500 km’s of coastline running through 9 states and 4 union territories • Proactive Cyber Defence or active cyber defence (ACD) Is the Key way forward • US, China etc. Spending on Cyber Security for Homeland defense & increase of Cyber Units & Cyber Warriors • Cybercrime costs the United States approximately $100 billion annually • Vulnerable Verticals : Energy & Utilities, Financial Organizations, Telecom, Defense & Paramilitary Forces, Manufacturing etc WHY CYBER DEFENSE
  • 4. 10/9/2015© 2014 All Rights Reserved 4 LESSONS FROM PAST CYBER ATTACKS • Cyber attacks accompany physical attacks • Cyber attacks are increasing in volume, sophistication, and coordination • Cyber attacks are attracted to high- value targets 4
  • 5. 10/9/2015© 2014 All Rights Reserved 5 CHANGING LANDSCAPE IN ICS THREATS…
  • 6. 10/9/2015© 2014 All Rights Reserved 6 BRAVE NEW WORLD WHAT WE HAD THEN WHAT WE HAVE NOW Corporate private servers and data storage Distributed data processing and storage Controlled access: Corporate issued laptops, closed ecosystem handsets… Ubiquitous access: BYOD, open platforms Isolated domains: Industrial Control Systems, Healthcare devices, Mil/Gov Networks Previously isolated domains getting interconnected: Remote connections to ICS systems, robots for remote surgery Proprietary protocols for communication and custom made HW/SW IP protocols, COTS HW, Open Source and commercial libraries for SW What about our defenses Antivirus, Firewall, IPS ???
  • 7. 10/9/2015© 2014 All Rights Reserved 7 INDIA AND APAC ABUSE 09-10-2015 ©Copyright Codenomicon 7
  • 8. 10/9/2015© 2014 All Rights Reserved 8 SECURITY IN ICS Designed to be isolated Connectivity over serial analogue circuits = Attacker needed to gain physical access to carry out attack Protocol designed for communication between trusted devices Protocols contain very little security features, such as encryption
  • 9. 10/9/2015© 2014 All Rights Reserved 9 SECURITY IN ICS • ICS systems interconnected with outside world using IP-based communications and control networks were integrated into larger corporate networks… • Reducing costs • Improve efficiency • Exposure to external attacks • Almost all ICS devices are either directly or indirectly connected to internet • New Attack Surfaces • The need to separate the corporate and production network is well known – Often leads to ignorance of other equally critical interfaces • Trusted third parties still having access to ICS network… – Vendors?, System integrators?, Control engineers? • Not forgetting, WebHMI, Wireless connection exposure • Compromising security through end points 10/9/2015 9
  • 10. 10/9/2015© 2014 All Rights Reserved 10 THE KNOWN AND THE UNKNOWN Known Vulnerability ManagementKnown Vulnerability Management Unknown Vulnerability Management (UVM)Unknown Vulnerability Management (UVM) Vulnerability Management Total Vulnerability Management SAST Approach 1980- PC Lint, OSS, Coverity, Fortify, IBM, Microsoft ... Whitebox testing DAST Approach 2000- Fuzzing: Codenomicon Defensics, Peach, Sulley Blackbox testing 1995-2000 Satan/Saint 1999- Nessus, ISS 2000- Qualys, HP, IBM, Symantec ... 2013: Codenomicon AppCheck ReactiveProactive Bottom line: All systems have vulnerabilities. - Both complimentary categories needs to be covered.
  • 11. 10/9/2015© 2014 All Rights Reserved 11 11 UNKNOWN VULNERABILITY MANAGEMENT (UVM) • Another name: Zero-Day Vulnerability Management • Process of: • Detecting attack vectors • Finding zero-day vulnerabilities • Building defenses • Performing patch verification • Deployment in one big security push
  • 12. 10/9/2015© 2014 All Rights Reserved 12 • A testing technique where purposefully unexpected and/or invalid input data is fed to tested system in hope to find robustness and security problems • Mutation/Template-Based Fuzzing • Quality of tests is based on the used template (seed) and mutation technique • Slow to execute, least bugs found • Generational/Specification-Based Fuzzing • Full test coverage, as the model is built from specification • Fast to execute, most bugs found WHAT IS FUZZING & TYPES OF FUZZING TECHNOLOGIES
  • 13. 10/9/2015© 2014 All Rights Reserved 13 FUZZ TESTING MATURITY MODEL (FTMM) • Based on ISO/IEC 15504 framework • Has 5 maturity levels (+ zero level for immature) • Created to help in understanding the FTMM of a computer system or software • Differentiates system and interface level • Does NOT address organizational or process maturity (BSIMM, Microsoft SDLC, Cisco SDLC, etc. should be used for this) • Each level defines • Types of fuzz that needs to be performed • Time that has to be spent fuzzing • Amount of fuzz tests needed • Additional metrics required to reach the level
  • 14. 10/9/2015© 2014 All Rights Reserved 14 FTMM MATURITY LEVELS 0 – Immature 1 – Initial 2 - Defined 3 - Integrated 4 – Managed TypesofFuzzing required 5 - Optimized Fuzztestsrequired Fuzztimerequired Attacksurface analysisrequired Typesof instrumentation required Typesoffailures allowedtoremain Fuzzingneedstobepartof organizationsSDLC Testharnessintegration Manualexecution Otherrequirements Testreportmustgenerated G (T) O,A,DG, T, R G and T G, T, R G) Generational, model based fuzzer T) Template/Mutational Fuzzer R) Random Fuzzer 1) Must use two different fuzzers 2) For each type of fuzzing Infinite (2 1 hour 1000000 1000000 (G) 5000000 (T) Infinite (2 100000 8 hours 8 hours 30 days 7 days AS) non-DsS assertions, must be noted M) Must be mandatorily done Y) It is required that tests are also manually executed U) Must use two different fuzzers for each type B) Baseline test configuration must be documented T or G O AS, TR A A O B none M X, C none XTR O) Human observation A) Automated instrumentation required D) Debugger integrated monitoring X) Required C) Code coverage/binary analysis required TR) Transient errors allowed, must be noted TR X M X Y X X X X X B, U X X X B
  • 15. THANK YOU – QUESTIONS?