4. 4
4“The global hub for educating, informing, and connecting Information Age leaders.”
Growth of the Asymmetric Cyber Threat
4
High
Low
Sophistication
Sophistication of
Hacking Tools & Elite Hackers
Increasing
1980 1985 1990 1995 2000
Sophistication
Required of Common
Hackers Declining
cross site scripting
password guessing
self‐replicating code
password cracking
exploiting known vulnerabilities
disabling audits
back doors
hijacking
sessions
sweepers
sniffers
packet spoofing
graphic user interface
automated probes/scans
denial of
service
www attacks
“stealth” / advanced
scanning techniques
burglaries
network mgmt. diagnostics
distributed
attack tools
Staging
sophisticated C2
2010 ~ 2015
…next?
“Industry is getting hacked [and]
government is getting hacked.
What we need to do is come
together and form best practices.”
‐Gen. Keith Alexander,
U.S. Cyber Command
27 July 2012
Espionage & Data
Exfiltration
Tools
Elite
Hackers
12/2/2011
5. 5
5“The global hub for educating, informing, and connecting Information Age leaders.”
Threat #1 ‐ “Securing the Cloud”
• Cloud computing provides flexible, cost‐effective delivery of
business or consumer IT services over the Internet.
– Helps businesses improve service delivery, reduce IT management costs
and respond to dynamic business requirements.
– Cloud resources can be rapidly deployed, easily scaled, and respond to
increased demand, regardless of the user location.
• Public and private cloud models, or a hybrid approach using
both models, are now in use.
– Public clouds are acquired as a service and paid for on a per‐usage
basis or by subscription.
– Private clouds are owned and used by a single organization.
– Private clouds offer many of the same benefits as public
clouds, but give the owner greater flexibility and security.
5
IBM Global Technology Services
Thought Leadership White Paper
“Strategies for assessing cloud security,” Nov 2010
6. 6
6“The global hub for educating, informing, and connecting Information Age leaders.”
Risk Concerns with Cloud Computing
• Cloud computing introduces risk because essential services are often
outsourced to 3rd party service providers.
– Inside the cloud, it is difficult to physically locate where data is stored.
– Business data is stored and processed externally in multiple unspecified locations
[sometimes overseas].
• Security processes that were once visible on physical
computer servers are now hidden behind layers of “virtual
machine” servers.
– Harder for users to maintain data integrity, privacy, security, service availability, and
demonstrate compliance with federal & state regulations.
– Users from different corporations and trust levels often share the same set of computing
resources, but with different security requirements.
• This lack of visibility can cause concerns about:
– Data exposure, compromise, and theft [exfiltration].
– Application services & reliability.
– Regulatory compliance.
– Overall security management.
6
IBM Global Technology Services
Thought Leadership White Paper
“Strategies for assessing cloud security,” Nov 2010