SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
1DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution14 February 2013
Integrity  Service  Excellence
DR. ROBERT HERKLOTZ
PROGRAM OFFICER
AFOSR/RTC
Air Force Research Laboratory
INFORMATION OPERATIONS
&
SECURITY
Date: 6 MAR 2013
2DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
2013 AFOSR SPRING REVIEW
NAME: DR. ROBERT HERKLOTZ
BRIEF DESCRIPTION OF PORTFOLIO:
Fund science that will enable the AF and DOD to dominate
cyberspace: Science to develop secure information systems for our
warfighters and to deny the enemy such systems.
LIST SUB-AREAS IN PORTFOLIO:
1: SOS-Science of Security
2: Secure Humans
3: Secure Networks
4: Secure Hardware
5: Covert Channels
6: Execute on Insecure Systems
7: Secure Data
8: Secure Systems-Security Policy
3DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
PROGRAM STRATEGY
• FEEDBACK FROM LAST YEAR:
GOOD RESEARCH BUT PROGRAM
LACKING STRATEGY
• THIS YEAR:
WILL FOCUS ON PROGRAM STRATEGY
4DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
INFO OPS AND SECURITY
STRATEGY
• FOLLOW NATIONAL, DOD, AF, AFRL AND AFOSR
STRATEGIES
• ANTICIPATE FUTURE ATTACKS: OFFENSIVE AND
DEFENSIVE ASPECTS OF CYBER SECURITY THE SAME
AT BASIC RESEARCH LEVEL
• TEAM AND LEVERAGE OTHER AGENCY INVESTMENTS:
DOD, NSA, NIST, ARO, ONR, NSF, DARPA, IARPA, DOE
• FIND NICHE FOR LIMITED BUDGET
5DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
CYBER SECURITY
BACKGROUND: PROBLEM
• UNENDING ATTACK-PATCH-ATTACK CYCLE
• INVESTMENT BARELY KEEPS UP WITH NEW ATTACKS AND
IS AFTER THE FACT-RESOURCE CONSTRAINTS
• ASSYMENTRIC ADVANTAGE FOR ATTACKER
• GROWING CYBERSPACE THREATS AND VULNERABILITIES
• INCREASED DEPENDENCY ON CYBER
• CAN CHOOSE TIME AND LOCATION
• MUST DEFEND WHOLE OF NETWORKED SYSTEMS
• MORE AGILE
• NO RULES
• JUST AS SMART AS DEFENDERS
6DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
CYBER SECURITY
BACKGROUND: FIX
• AFTER MANY STUDIES A NEW NATIONAL STRATEGY
• RAISE THE BAR FOR THE ATTACKER
• DISCOVER HOW TO BUILD INHERENTLY SECURE SYSTEMS
• RAISE THE BAR
• INCREASE WORKLOAD TO EXECUTE ATTACK
• INCREASE TIME TO PLAN ATTACK
• INHERENTLY SECURE: SCIENCE OF CYBER SECURITY
• SYSTEM: SOFTWARE, HARDWARE, NETWORK, HUMANS
• FORMALLY DEFINE CYBER SECURITY: DISCOVER
AND DEFINE BASIC SYSTEM PROPERTIES THAT
COMPOSE SYSTEM SECURITY
• DEVELOP SCIENTIFIC FOUNDATIONS
7DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
RAISE THE BAR
• DOD STUDY (PRIORITY STEERING COUNCIL STUDY)
• ASSURING EFFECTIVE MISSIONS
• AGILITY
• RESILIENCY
• AF-CYBER VISION 2025 STUDY
• MISSION ASSURANCE AND EMPOWERMENT
• AGILITY AND RESILIENCY
• OPTIMIZED HUMAN-MACHINE SYSTEMS
• FOUNDATIONAL SCIENCE 4TH BULLET IN BOTH STUDIES
8DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
• Response and Cyber Maneuver
• Visualization and Decision
Support
• Human Factors and Training
• Malware/Forensics Analysis
and Reverse Engineering
• Resilient Infrastructure and Comms
• Scientific Theory and Measures
• Sensing and Data Fusion
• Software Pedigree and Provenance
• Distributed Trust
• Resilient Architectures
• Component Trust
• Detection and Autonomic
Response
• Advanced Cross-Domain Solutions
• Advanced Cryptography
• Quantum Computing, Comms, and
Crypto
• Biometrics
• Code Verification and Compliance
• Correct (Assured) by Construction
Software
• Deception and Information Hiding
• Recovery and Reconstitution
Tier 1:
Tier 2:
Tier 3:
QDR Cyber S&T Study
Top Enabling Technologies
9DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Cyber PSC Research Roadmap
Desired End State
Resiliency Agility
Assuring Effective
Missions
• Missions are difficult to disrupt even
when attacks on cyber infrastructure
are successful
• Hardware, software, and applications
have built-in features and
architectural provisions to withstand
damage and will still operate to carry
out their functions
• Systems and services at all levels of
the cyber infrastructure have the
ability to provide rapid-risk-driven
control, adaptation, and maneuver of
their configurations, interactions, and
mechanisms
• Threats are reduced or countered by
confounding adversary attacks and
assumptions
• Commanders seamlessly orchestrate
the cyber element of both kinetic and
non-kinetic operations
• Commanders maintain full
understanding and control of the
situation in real time, while denying
adversaries the same
• Missions are conducted with well-
informed consideration of options
and tradeoffs for achieving desired
effects, and with a comprehensive
view of how mission outcomes
depend on the cyber components
Cross-Cutting: Foundations of Trust
• Cyber elements are employed with a quantitative and known level of confidence (empirically or theoretically
based) that their identity, functionality, and content are as expected
• High confidence components can be created from mixed confidence elements
• Measurable and predictable levels of trust enable a quantitative approach to design, tradeoff analysis, and
risk mitigation
10DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
• Mission at risk: Interdependency growth driving
cost and risk; Insider threat, supply chain
threat, Advanced Persistent Threat (APT)
• Cyber S&T enables: assurance, resilience,
affordability, empowerment
• Need to integrate across authorities and domains
Air Force Cyber Vision 2025
Findings
11DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
DEVELOP SCIENTIFIC FOUNDATIONS
Developing Scientific Foundations – Developing an organized,
cohesive scientific foundation to the body of knowledge that
informs the field of cybersecurity through adoption of a systematic,
rigorous, and disciplined scientific approach. Promotes the
discovery of laws, hypothesis testing, repeatable
experimental designs, standardized data-gathering methods,
metrics, common terminology, and critical analysis that
engenders reproducible results and rationally based
conclusions.
12DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
• Mission assurance and empowerment
• Survivability and freedom of action in contested and denied environments
• Enhanced cyber situational awareness for air, space, and cyber commanders enabled by
automated network and mission mapping
• Ability to detect and operate through cyber attacks enabled by threat warning, integrated
Intelligence (e.g., SIGINT, HUMINT, IMINT), and real-time forensics/attribution
• Early vulnerability detection and enemy behavior forecasting enabled by advanced cyber
ranges, including high fidelity, real-time modeling and simulation
• Cross domain integrated effects and cross domain measures of effectiveness (MOEs),
including cyber battle damage assessment
• Agility and resiliency
• Effective mix of redundancy, diversity, and fractionation for survivability
• Reduction of attack surface, critical mission segregation, and attack containment
• Autonomous compromise detection and repair (self healing) and real-time response to threats
• Transition from signature based cyber sensors to behavior understanding to enhance high
performance attack detection
• Active defense requires rapid maneuver enabled by dynamic, reconfigurable architectures
(e.g., IP hoping, multilevel polymorphism)
CV25 S&T Themes (1/2)
13DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
CV25 S&T Themes (2/2)
• Optimized human-machine systems
• Measurement of physiological, perceptual, and cognitive states to enable personnel
selection, customized training, and (user, mission, and environment) tailored
augmented cognition.
• High performance visualization and analytic tools to enhance situational awareness,
accelerate threat discovery, and empower task performance.
• Autonomy appropriately distributed between operators and machines, enabled by
increased transparency of autonomy and increased human “on the loop” or
supervisory control.
• Software and hardware foundations of trust
• Operator trust in systems (e.g., sensors, communications, navigation, C2) enabled
by trusted foundries, anti-tamper technologies, and supply chain assurance, as
well as effective mixes of government, commercial off the shelf, and open
source software
• Formal verification and validation of complex, large scale interdependent systems
• Advanced vulnerability analysis, automated reverse engineering, real-time
forensics tools
• High speed encryption, quantum communication, and quantum encryption for
confidentiality and integrity
14DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
INFO OPS AND SECURITY
NICHE
• DEVELOP SCIENCE OF CYBER SECURITY
• DEVELOP METHODS TO EXECUTE MISSION SECURELY
ON INSECURE SYSTEMS
• INVENT THEORY AND METHODS TO DISCOVER
COVERT CHANNELS, SIDE CHANNELS, HIDDEN
SOFTWARE, HIDDEN CIRCUITS IN HARDWARE
15DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
A body of laws that are predictive…
• Transcend specific systems, attacks, and defenses.
• Applicable in real settings.
• Provide explanatory value.
• Abstractions and models
• Connections and relationships. E.g.,
• Cannot enforce policy P with mechanism M
• Interface can leak b bits/sec
A Science Of Security?
16DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Kinds of Laws
• Analysis: Given an artifact, predict its properties…
• Qualitative properties: What it does.
• Quantitative properties: How well it works.
• Synthesis: Compose artifacts with given properties
to obtain a new one with predictable properties.
17DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Laws About What?
Attacks
Defenses Policies
ACL, capabilities

access control
matrices
HRU undecidability
Bell & LaPadula
Biba
Leakage + Suppression = …
EM enforceability
Obfuscation vs
type checking
Classes of policies
Classes of attacks
Classes of defenses
Relationships:
“Defense class D enforces
policy class P despite attacks
from class A.”
“Defense D + Defense D’ = …”
18DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
HONORS AND TRANSITIONS
ACM Special Interest Group on
Security, Audit and Control (SIGSAC)
SIGSAC Outstanding Contribution Award: This award is given for significant
contribution to the field of computer and communication security through
fostering research and development activities, educating students, or providing
professional services such as the running of professional
societies and conferences.
2012 SIGSAC Outstanding Contribution Award: Robert Herklotz, U.S. Air Force
Office of Scientific Research, for contributions to Air Force information systems
security. His efforts provided the science foundation to enable development of
advanced cyber security methods, models, and algorithms to support future
Air Force systems.
19DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
HONORS AND TRANSITIONS
Latifur Khan, UTD: Technical Achievement Award presented jointly by the IEEE
Systems, Man and Cybernetics Society and IEEE Transportation Systems Society.
Joe Halpern, Cornell: awarded the Ray Reiter Best Paper award at KR 2012
(Conference on Principles of Knowledge Representation and Reasoning).
Kevin Hamlen and Zhiqiang Lin, UTD: best paper award at the ACSAC, also got
the AT&T second prize among all the applied cyber security research papers
published in 2012.
Eunice Santos, UTEP: Elected to Fellow for AAAS
Judea Pearl, UCLA: ACM A.M. Turing Award for Contributions to AI
Eugene Santos Jr, Dartmouth: Elected Fellow by IEEE
20DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
R. R. Brooks, Clemson:
Detect use of tunneled communications protocols and infer their current
internal state
• Private communications often tunneled through virtual private networks (VPNs)
• Mix networks tunnel connections for anonymity
• Tunneling tools (ex. ssh, ssl, TOR) have timing vulnerabilities
• Hidden Markov models (HMM) and probabilistic grammars to detect protocol use,
infer network flows, partially decipher content
Transitions:
• Technology results used in operational classified programs and integrated into
US Navy and NATO operations
• Dept of State Internet Freedom project for West Africa
• AFRL SBIR with Sentar Inc.
• BMW Manufacturing Corp DLP
HONORS AND TRANSITIONS
21DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Keesook Han, AFRL/RIGA: started two CRADAs with MITRE
1. AFRL/MITRE CRADA: AFOSR in-house Botnet Research
2. AFRL/MITRE CRADA: AFOSR in-house Cloud Auditing and Android Smartphone Security
Nadia Heninger, UCSD: A flaw has been found in the encryption system used to conceal from
cybercriminals data passed between parties in online shopping, banking, e-mail and other
Internet services. The flaw is in the way the public-key cryptography system generates random
numbers to prevent others from deciphering digital messages.
The flawed keys mainly affected various types of embedded devices, such as routers
and virtual private networks, not "full-blown Web servers." "There's no need to panic," she said.
However, Heninger said she and several colleagues in a separate study were able to remotely
compromise about 0.4 percent of all the public keys used in SSL Web site security. SSL, or
Secure Sockets Layer, is the cryptographic protocol for securing communications over the Internet.
"We've found vulnerable devices from nearly every major manufacturer," Heninger said. The team
plans to release their report after contacting all the manufacturers with products that may be affected.
HONORS AND TRANSITIONS
Cyber Trust and Suspicion
Eunice E. Santos
Institute of Defense & Security
University of Texas
El Paso, TX
eesantos@utep.edu
Eunice E. Santos
DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
23DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Objectives
• Developing a model of insider behavior that accounts for and explains
the social, cultural, and emotional basis for trust and suspicion
especially its impacts on insider threat.
• Research and identify biomarkers of cyber trust for the selection of
targeted training and interface/alert interventions.
• Systematically demonstrate and examine how human performance
affects cyber security operations with humans in the loop, and
explore how such effects can be mitigated or exploited in order to
achieve a higher-level of security.
• Conduct human subject studies (where subjects are equipped with
non-invasive sensors) to provide real-time predictions about the
changing level of trust and suspicion experienced by subjects while
they conduct tasks that are designed specifically to test hypotheses
stemming from the other team members’ research.
• Assess, attribute, and manipulate operator suspicion through cyber
means and demonstrating formal models of suspicion.
Eunice E. Santos
24DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Suspicion Detection-Keystroke
Dynamics
 Correlation has been found between keystroke timings and
changes to mental state, such as cognitive workload and
deception under the Deny and Disrupt (DnD) effort
o Traditional Timing Features
o Key Hold Time (KHT) – Keystroke duration (aka dwell time)
o Key Interval Time (KIT) – Time between the release of one key and
the press of another (aka flight time)
o Key Press Latency (KPL)
o Key Release Latency (KRL)
o User Features
o Frequency of errors
o Use of numpad
o Use of shift keys (order and which shift key)
o Use of shortcut keys
25DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
o Ahmed & Traore (2007) used mouse movement,
drag & drop, point & click, and silence (non-
movement) for a histogram.
• Calculated traveled distance, action type, movement
direction, average movement speed, movement
speed versus travelled distance, and time elapsed
during movement
o Feher, et al. (2012) created hierarchy from
individual mouse movements to elaborate
sequences and calculated “trajectory center of
mass” and “third and fourth” moment.
Pusara & Brodley (2004) classify mouse data into
a hierarchy of mouse events. Non-client
movement refers to movement within an
applications title and menu bars.
 Investigate features from past mouse dynamics research for
applicability to mental state
o Pusara & Brodley (2004) calculated: distance, angle, and speed for selected pairs of
points within temporal windows of data.
o Schulz (2006) examined features of curves within mouse movement (e.g. curve
length, number of points within curvature area, and inflection points) and computed a
histogram of typical mouse movement curves for each user.
Suspicion Detection-Mouse
Dynamics
26DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
 Investigate other potential Cyber Sensors
o User Preferences Sensor
• Application usage profile
• Usage time
• Login times
• Perform anomaly detection
o System Call Monitors
• Monitor system calls/other low-level system APIs
• Monitor registry access
• Determine users behavior in response to a change in mental state or the
occurrence of a D5 effect
• Profile user: level of knowledge, technical sophistication, etc.
o Application-specific Sensors
• Determine which buttons are pressed in a GUI
• Identify specific menu options utilized
• Popular and technically informative applications
 Windows Task Manager
 Microsoft Word
Suspicion Detection-Other Cyber
Sensors
Towards a Science Base
for Cybersecurity
Fred B. Schneider
fbs@cs.cornell.edu
CS Department
Cornell University
DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
28DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Cornell University
VALUE OF INFORMATION
Thesis: A science base for cybersecurity must
include a expressive account of information
flow.
– Approaches to quantifying the value of
information that flows.
– Means for specifying and enforcing re-
classification of information.
29DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Cornell University
Adding Value to Information
Classical view of information [Shannon]
• Unit of information: bit
• All bits have equal value.
– Over-simplification:
• High-order vs low-order digits of a salary.
• Alternative representations for a location:
– Lat / Lon coordinates -versus-
– House number, street name, city name, country
30DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Cornell University
Scaling Defenses to Protect
Value
Classical view of defense:
• Assign a value to each asset.
• Choose defenses based on those values:
– Cost of circumventing a defense should be proportional to
value of asset being protected.
… Requires knowing the value of the information
that some defense allows to leak or be
corrupted?
31DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Cornell University
A Valued Information Theory
(Joint work with Mario Alvim and Andre Scedrov, Univ of Penn)
• Extended Shannon’s information theory to assign
values to information (rather than to bits).
• Developed measures analogous to entropy for
information that is leaked / transmitted / corrupted /
suppressed by attacks:
– expected value learned in a single attack,
– probability of learning specified value in single attack,
– expected number of attack steps to learn a specified value.
• Proved “reasonableness” properties for measures.
Understanding and Quantifying the
Impact of Moving Target Defenses on
Computer Networks
Scott A. DeLoach and Xinming Ou
Computing & Information Sciences
Kansas State University
October 3, 2012
DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
33DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
High-level Intuition of MT Network
Defense
Current Systems Hardened Systems
Adaptive
MTD
Systems
Adaptive
Hardened
Systems
MTD
Systems
Exploration
Surface
Attack
Surface
Velocity &
Direction
• Current approaches
shrink and harden
attack surface
• MTDs move attack
surface and expand
exploration surface
• Adaptive MTDs move
and modify attack
surface
34DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
Our Research Objectives
• Understand and quantify the potential and
limitations of MTDs for computer networks
• Our approach
– Develop analytical models to quantify MTD
effectiveness
– Conduct scientific experimentation to examine
the cost/benefit of MTD on computer networks
– Design a proof-of-concept MTD system to
demonstrate concepts and validate models

Mais conteúdo relacionado

Mais procurados

Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationInfocyte
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
 
Cybersecurity R&D briefing
Cybersecurity R&D briefingCybersecurity R&D briefing
Cybersecurity R&D briefingNaba Barkakati
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceTieu Luu
 
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Infocyte
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 

Mais procurados (19)

Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
Cybersecurity R&D briefing
Cybersecurity R&D briefingCybersecurity R&D briefing
Cybersecurity R&D briefing
 
Importance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To CorporationsImportance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To Corporations
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution Demo
 
The Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber IntelligenceThe Sweet Spot of Cyber Intelligence
The Sweet Spot of Cyber Intelligence
 
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
2015 ERII-CCISM
2015 ERII-CCISM2015 ERII-CCISM
2015 ERII-CCISM
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 

Destaque

Top 8 security operations manager resume samples
Top 8 security operations manager resume samplesTop 8 security operations manager resume samples
Top 8 security operations manager resume samplesdavikeler
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011Retired
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
NGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxNGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxLouison Malu-Malu
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Responsexband
 
Paginas de matematicas
Paginas de matematicasPaginas de matematicas
Paginas de matematicasespanol
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldSean Si
 

Destaque (11)

Top 8 security operations manager resume samples
Top 8 security operations manager resume samplesTop 8 security operations manager resume samples
Top 8 security operations manager resume samples
 
Handbook emergencies
Handbook emergenciesHandbook emergencies
Handbook emergencies
 
Webinar 20111011
Webinar 20111011Webinar 20111011
Webinar 20111011
 
8. operations security
8. operations security8. operations security
8. operations security
 
Security Tree
Security TreeSecurity Tree
Security Tree
 
NGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptxNGOs Field Security Management Approach & Systems 2.pptx
NGOs Field Security Management Approach & Systems 2.pptx
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Security Operations and Response
Security Operations and ResponseSecurity Operations and Response
Security Operations and Response
 
Risk management
Risk managementRisk management
Risk management
 
Paginas de matematicas
Paginas de matematicasPaginas de matematicas
Paginas de matematicas
 
How to Use Social Media to Influence the World
How to Use Social Media to Influence the WorldHow to Use Social Media to Influence the World
How to Use Social Media to Influence the World
 

Semelhante a Herklotz - Information Operations and Security - Spring Review 2013

5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management ProgramTripwire
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfTuan Yang
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettGovLoop
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security BreakfastRackspace
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 

Semelhante a Herklotz - Information Operations and Security - Spring Review 2013 (20)

CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Internet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy Garrett
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
Skybox security
Skybox security Skybox security
Skybox security
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 

Mais de The Air Force Office of Scientific Research

Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...The Air Force Office of Scientific Research
 

Mais de The Air Force Office of Scientific Research (20)

Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
Schmisseur - Aerothermodynamics & Turbulence - Spring Review 2013
 
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013Li - Energy Conversion and Combustion Sciences - Spring Review 2013
Li - Energy Conversion and Combustion Sciences - Spring Review 2013
 
Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013Birkan - Space Propulsion and Power - Spring Review 2013
Birkan - Space Propulsion and Power - Spring Review 2013
 
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
Berman - Molecular Dynamics & Theoretical Chemistry - Spring review 2013
 
Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013Bradshaw - Sensory Information Systems - Spring Review 2013
Bradshaw - Sensory Information Systems - Spring Review 2013
 
Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013Bradshaw - Human Performance and Biosystems - Spring Review 2013
Bradshaw - Human Performance and Biosystems - Spring Review 2013
 
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
Schmisseur - Energy, Power and Propulsion Sciences - Spring Review 2013
 
DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013DeLong - Natural Materials and Systems - Spring Review 2013
DeLong - Natural Materials and Systems - Spring Review 2013
 
Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013Harrison - Low Density Materials - Spring Review 2013
Harrison - Low Density Materials - Spring Review 2013
 
Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013Lee - Organic Materials Chemistry - Spring Review 2013
Lee - Organic Materials Chemistry - Spring Review 2013
 
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
Sayir - Aerospace Materials for Extreme Environments - Spring Review 2013
 
Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013Weinstock - Quantum Electronic Solids - Spring Review 2013
Weinstock - Quantum Electronic Solids - Spring Review 2013
 
Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013Hwang - Adaptive Multimode Sensing - Spring Review 2013
Hwang - Adaptive Multimode Sensing - Spring Review 2013
 
Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013Hwang - GHz-THz Electronics - Spring Review 2013
Hwang - GHz-THz Electronics - Spring Review 2013
 
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013Pomrenke - Photonics and Optoelectronics - Spring Review 2013
Pomrenke - Photonics and Optoelectronics - Spring Review 2013
 
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
Les Lee - Mechanics of Multifunctional Materials and Microsystems - Spring Re...
 
DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013DeLong - Complex Materials and Devices - Spring Review 2013
DeLong - Complex Materials and Devices - Spring Review 2013
 
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
Myung - Computational Cognition and Robust Decision Making - Spring Review 2013
 
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
Darema - Dynamic Data Driven Applications Systems (DDDAS) - Spring Review 2013
 
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
Nguyen - Sensing, Surveillance and Navigation - Spring Review 2013
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Herklotz - Information Operations and Security - Spring Review 2013

  • 1. 1DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution14 February 2013 Integrity  Service  Excellence DR. ROBERT HERKLOTZ PROGRAM OFFICER AFOSR/RTC Air Force Research Laboratory INFORMATION OPERATIONS & SECURITY Date: 6 MAR 2013
  • 2. 2DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution 2013 AFOSR SPRING REVIEW NAME: DR. ROBERT HERKLOTZ BRIEF DESCRIPTION OF PORTFOLIO: Fund science that will enable the AF and DOD to dominate cyberspace: Science to develop secure information systems for our warfighters and to deny the enemy such systems. LIST SUB-AREAS IN PORTFOLIO: 1: SOS-Science of Security 2: Secure Humans 3: Secure Networks 4: Secure Hardware 5: Covert Channels 6: Execute on Insecure Systems 7: Secure Data 8: Secure Systems-Security Policy
  • 3. 3DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution PROGRAM STRATEGY • FEEDBACK FROM LAST YEAR: GOOD RESEARCH BUT PROGRAM LACKING STRATEGY • THIS YEAR: WILL FOCUS ON PROGRAM STRATEGY
  • 4. 4DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution INFO OPS AND SECURITY STRATEGY • FOLLOW NATIONAL, DOD, AF, AFRL AND AFOSR STRATEGIES • ANTICIPATE FUTURE ATTACKS: OFFENSIVE AND DEFENSIVE ASPECTS OF CYBER SECURITY THE SAME AT BASIC RESEARCH LEVEL • TEAM AND LEVERAGE OTHER AGENCY INVESTMENTS: DOD, NSA, NIST, ARO, ONR, NSF, DARPA, IARPA, DOE • FIND NICHE FOR LIMITED BUDGET
  • 5. 5DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution CYBER SECURITY BACKGROUND: PROBLEM • UNENDING ATTACK-PATCH-ATTACK CYCLE • INVESTMENT BARELY KEEPS UP WITH NEW ATTACKS AND IS AFTER THE FACT-RESOURCE CONSTRAINTS • ASSYMENTRIC ADVANTAGE FOR ATTACKER • GROWING CYBERSPACE THREATS AND VULNERABILITIES • INCREASED DEPENDENCY ON CYBER • CAN CHOOSE TIME AND LOCATION • MUST DEFEND WHOLE OF NETWORKED SYSTEMS • MORE AGILE • NO RULES • JUST AS SMART AS DEFENDERS
  • 6. 6DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution CYBER SECURITY BACKGROUND: FIX • AFTER MANY STUDIES A NEW NATIONAL STRATEGY • RAISE THE BAR FOR THE ATTACKER • DISCOVER HOW TO BUILD INHERENTLY SECURE SYSTEMS • RAISE THE BAR • INCREASE WORKLOAD TO EXECUTE ATTACK • INCREASE TIME TO PLAN ATTACK • INHERENTLY SECURE: SCIENCE OF CYBER SECURITY • SYSTEM: SOFTWARE, HARDWARE, NETWORK, HUMANS • FORMALLY DEFINE CYBER SECURITY: DISCOVER AND DEFINE BASIC SYSTEM PROPERTIES THAT COMPOSE SYSTEM SECURITY • DEVELOP SCIENTIFIC FOUNDATIONS
  • 7. 7DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution RAISE THE BAR • DOD STUDY (PRIORITY STEERING COUNCIL STUDY) • ASSURING EFFECTIVE MISSIONS • AGILITY • RESILIENCY • AF-CYBER VISION 2025 STUDY • MISSION ASSURANCE AND EMPOWERMENT • AGILITY AND RESILIENCY • OPTIMIZED HUMAN-MACHINE SYSTEMS • FOUNDATIONAL SCIENCE 4TH BULLET IN BOTH STUDIES
  • 8. 8DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution • Response and Cyber Maneuver • Visualization and Decision Support • Human Factors and Training • Malware/Forensics Analysis and Reverse Engineering • Resilient Infrastructure and Comms • Scientific Theory and Measures • Sensing and Data Fusion • Software Pedigree and Provenance • Distributed Trust • Resilient Architectures • Component Trust • Detection and Autonomic Response • Advanced Cross-Domain Solutions • Advanced Cryptography • Quantum Computing, Comms, and Crypto • Biometrics • Code Verification and Compliance • Correct (Assured) by Construction Software • Deception and Information Hiding • Recovery and Reconstitution Tier 1: Tier 2: Tier 3: QDR Cyber S&T Study Top Enabling Technologies
  • 9. 9DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Cyber PSC Research Roadmap Desired End State Resiliency Agility Assuring Effective Missions • Missions are difficult to disrupt even when attacks on cyber infrastructure are successful • Hardware, software, and applications have built-in features and architectural provisions to withstand damage and will still operate to carry out their functions • Systems and services at all levels of the cyber infrastructure have the ability to provide rapid-risk-driven control, adaptation, and maneuver of their configurations, interactions, and mechanisms • Threats are reduced or countered by confounding adversary attacks and assumptions • Commanders seamlessly orchestrate the cyber element of both kinetic and non-kinetic operations • Commanders maintain full understanding and control of the situation in real time, while denying adversaries the same • Missions are conducted with well- informed consideration of options and tradeoffs for achieving desired effects, and with a comprehensive view of how mission outcomes depend on the cyber components Cross-Cutting: Foundations of Trust • Cyber elements are employed with a quantitative and known level of confidence (empirically or theoretically based) that their identity, functionality, and content are as expected • High confidence components can be created from mixed confidence elements • Measurable and predictable levels of trust enable a quantitative approach to design, tradeoff analysis, and risk mitigation
  • 10. 10DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution • Mission at risk: Interdependency growth driving cost and risk; Insider threat, supply chain threat, Advanced Persistent Threat (APT) • Cyber S&T enables: assurance, resilience, affordability, empowerment • Need to integrate across authorities and domains Air Force Cyber Vision 2025 Findings
  • 11. 11DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution DEVELOP SCIENTIFIC FOUNDATIONS Developing Scientific Foundations – Developing an organized, cohesive scientific foundation to the body of knowledge that informs the field of cybersecurity through adoption of a systematic, rigorous, and disciplined scientific approach. Promotes the discovery of laws, hypothesis testing, repeatable experimental designs, standardized data-gathering methods, metrics, common terminology, and critical analysis that engenders reproducible results and rationally based conclusions.
  • 12. 12DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution • Mission assurance and empowerment • Survivability and freedom of action in contested and denied environments • Enhanced cyber situational awareness for air, space, and cyber commanders enabled by automated network and mission mapping • Ability to detect and operate through cyber attacks enabled by threat warning, integrated Intelligence (e.g., SIGINT, HUMINT, IMINT), and real-time forensics/attribution • Early vulnerability detection and enemy behavior forecasting enabled by advanced cyber ranges, including high fidelity, real-time modeling and simulation • Cross domain integrated effects and cross domain measures of effectiveness (MOEs), including cyber battle damage assessment • Agility and resiliency • Effective mix of redundancy, diversity, and fractionation for survivability • Reduction of attack surface, critical mission segregation, and attack containment • Autonomous compromise detection and repair (self healing) and real-time response to threats • Transition from signature based cyber sensors to behavior understanding to enhance high performance attack detection • Active defense requires rapid maneuver enabled by dynamic, reconfigurable architectures (e.g., IP hoping, multilevel polymorphism) CV25 S&T Themes (1/2)
  • 13. 13DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution CV25 S&T Themes (2/2) • Optimized human-machine systems • Measurement of physiological, perceptual, and cognitive states to enable personnel selection, customized training, and (user, mission, and environment) tailored augmented cognition. • High performance visualization and analytic tools to enhance situational awareness, accelerate threat discovery, and empower task performance. • Autonomy appropriately distributed between operators and machines, enabled by increased transparency of autonomy and increased human “on the loop” or supervisory control. • Software and hardware foundations of trust • Operator trust in systems (e.g., sensors, communications, navigation, C2) enabled by trusted foundries, anti-tamper technologies, and supply chain assurance, as well as effective mixes of government, commercial off the shelf, and open source software • Formal verification and validation of complex, large scale interdependent systems • Advanced vulnerability analysis, automated reverse engineering, real-time forensics tools • High speed encryption, quantum communication, and quantum encryption for confidentiality and integrity
  • 14. 14DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution INFO OPS AND SECURITY NICHE • DEVELOP SCIENCE OF CYBER SECURITY • DEVELOP METHODS TO EXECUTE MISSION SECURELY ON INSECURE SYSTEMS • INVENT THEORY AND METHODS TO DISCOVER COVERT CHANNELS, SIDE CHANNELS, HIDDEN SOFTWARE, HIDDEN CIRCUITS IN HARDWARE
  • 15. 15DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution A body of laws that are predictive… • Transcend specific systems, attacks, and defenses. • Applicable in real settings. • Provide explanatory value. • Abstractions and models • Connections and relationships. E.g., • Cannot enforce policy P with mechanism M • Interface can leak b bits/sec A Science Of Security?
  • 16. 16DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Kinds of Laws • Analysis: Given an artifact, predict its properties… • Qualitative properties: What it does. • Quantitative properties: How well it works. • Synthesis: Compose artifacts with given properties to obtain a new one with predictable properties.
  • 17. 17DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Laws About What? Attacks Defenses Policies ACL, capabilities  access control matrices HRU undecidability Bell & LaPadula Biba Leakage + Suppression = … EM enforceability Obfuscation vs type checking Classes of policies Classes of attacks Classes of defenses Relationships: “Defense class D enforces policy class P despite attacks from class A.” “Defense D + Defense D’ = …”
  • 18. 18DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution HONORS AND TRANSITIONS ACM Special Interest Group on Security, Audit and Control (SIGSAC) SIGSAC Outstanding Contribution Award: This award is given for significant contribution to the field of computer and communication security through fostering research and development activities, educating students, or providing professional services such as the running of professional societies and conferences. 2012 SIGSAC Outstanding Contribution Award: Robert Herklotz, U.S. Air Force Office of Scientific Research, for contributions to Air Force information systems security. His efforts provided the science foundation to enable development of advanced cyber security methods, models, and algorithms to support future Air Force systems.
  • 19. 19DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution HONORS AND TRANSITIONS Latifur Khan, UTD: Technical Achievement Award presented jointly by the IEEE Systems, Man and Cybernetics Society and IEEE Transportation Systems Society. Joe Halpern, Cornell: awarded the Ray Reiter Best Paper award at KR 2012 (Conference on Principles of Knowledge Representation and Reasoning). Kevin Hamlen and Zhiqiang Lin, UTD: best paper award at the ACSAC, also got the AT&T second prize among all the applied cyber security research papers published in 2012. Eunice Santos, UTEP: Elected to Fellow for AAAS Judea Pearl, UCLA: ACM A.M. Turing Award for Contributions to AI Eugene Santos Jr, Dartmouth: Elected Fellow by IEEE
  • 20. 20DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution R. R. Brooks, Clemson: Detect use of tunneled communications protocols and infer their current internal state • Private communications often tunneled through virtual private networks (VPNs) • Mix networks tunnel connections for anonymity • Tunneling tools (ex. ssh, ssl, TOR) have timing vulnerabilities • Hidden Markov models (HMM) and probabilistic grammars to detect protocol use, infer network flows, partially decipher content Transitions: • Technology results used in operational classified programs and integrated into US Navy and NATO operations • Dept of State Internet Freedom project for West Africa • AFRL SBIR with Sentar Inc. • BMW Manufacturing Corp DLP HONORS AND TRANSITIONS
  • 21. 21DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Keesook Han, AFRL/RIGA: started two CRADAs with MITRE 1. AFRL/MITRE CRADA: AFOSR in-house Botnet Research 2. AFRL/MITRE CRADA: AFOSR in-house Cloud Auditing and Android Smartphone Security Nadia Heninger, UCSD: A flaw has been found in the encryption system used to conceal from cybercriminals data passed between parties in online shopping, banking, e-mail and other Internet services. The flaw is in the way the public-key cryptography system generates random numbers to prevent others from deciphering digital messages. The flawed keys mainly affected various types of embedded devices, such as routers and virtual private networks, not "full-blown Web servers." "There's no need to panic," she said. However, Heninger said she and several colleagues in a separate study were able to remotely compromise about 0.4 percent of all the public keys used in SSL Web site security. SSL, or Secure Sockets Layer, is the cryptographic protocol for securing communications over the Internet. "We've found vulnerable devices from nearly every major manufacturer," Heninger said. The team plans to release their report after contacting all the manufacturers with products that may be affected. HONORS AND TRANSITIONS
  • 22. Cyber Trust and Suspicion Eunice E. Santos Institute of Defense & Security University of Texas El Paso, TX eesantos@utep.edu Eunice E. Santos DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
  • 23. 23DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Objectives • Developing a model of insider behavior that accounts for and explains the social, cultural, and emotional basis for trust and suspicion especially its impacts on insider threat. • Research and identify biomarkers of cyber trust for the selection of targeted training and interface/alert interventions. • Systematically demonstrate and examine how human performance affects cyber security operations with humans in the loop, and explore how such effects can be mitigated or exploited in order to achieve a higher-level of security. • Conduct human subject studies (where subjects are equipped with non-invasive sensors) to provide real-time predictions about the changing level of trust and suspicion experienced by subjects while they conduct tasks that are designed specifically to test hypotheses stemming from the other team members’ research. • Assess, attribute, and manipulate operator suspicion through cyber means and demonstrating formal models of suspicion. Eunice E. Santos
  • 24. 24DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Suspicion Detection-Keystroke Dynamics  Correlation has been found between keystroke timings and changes to mental state, such as cognitive workload and deception under the Deny and Disrupt (DnD) effort o Traditional Timing Features o Key Hold Time (KHT) – Keystroke duration (aka dwell time) o Key Interval Time (KIT) – Time between the release of one key and the press of another (aka flight time) o Key Press Latency (KPL) o Key Release Latency (KRL) o User Features o Frequency of errors o Use of numpad o Use of shift keys (order and which shift key) o Use of shortcut keys
  • 25. 25DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution o Ahmed & Traore (2007) used mouse movement, drag & drop, point & click, and silence (non- movement) for a histogram. • Calculated traveled distance, action type, movement direction, average movement speed, movement speed versus travelled distance, and time elapsed during movement o Feher, et al. (2012) created hierarchy from individual mouse movements to elaborate sequences and calculated “trajectory center of mass” and “third and fourth” moment. Pusara & Brodley (2004) classify mouse data into a hierarchy of mouse events. Non-client movement refers to movement within an applications title and menu bars.  Investigate features from past mouse dynamics research for applicability to mental state o Pusara & Brodley (2004) calculated: distance, angle, and speed for selected pairs of points within temporal windows of data. o Schulz (2006) examined features of curves within mouse movement (e.g. curve length, number of points within curvature area, and inflection points) and computed a histogram of typical mouse movement curves for each user. Suspicion Detection-Mouse Dynamics
  • 26. 26DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution  Investigate other potential Cyber Sensors o User Preferences Sensor • Application usage profile • Usage time • Login times • Perform anomaly detection o System Call Monitors • Monitor system calls/other low-level system APIs • Monitor registry access • Determine users behavior in response to a change in mental state or the occurrence of a D5 effect • Profile user: level of knowledge, technical sophistication, etc. o Application-specific Sensors • Determine which buttons are pressed in a GUI • Identify specific menu options utilized • Popular and technically informative applications  Windows Task Manager  Microsoft Word Suspicion Detection-Other Cyber Sensors
  • 27. Towards a Science Base for Cybersecurity Fred B. Schneider fbs@cs.cornell.edu CS Department Cornell University DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
  • 28. 28DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Cornell University VALUE OF INFORMATION Thesis: A science base for cybersecurity must include a expressive account of information flow. – Approaches to quantifying the value of information that flows. – Means for specifying and enforcing re- classification of information.
  • 29. 29DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Cornell University Adding Value to Information Classical view of information [Shannon] • Unit of information: bit • All bits have equal value. – Over-simplification: • High-order vs low-order digits of a salary. • Alternative representations for a location: – Lat / Lon coordinates -versus- – House number, street name, city name, country
  • 30. 30DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Cornell University Scaling Defenses to Protect Value Classical view of defense: • Assign a value to each asset. • Choose defenses based on those values: – Cost of circumventing a defense should be proportional to value of asset being protected. … Requires knowing the value of the information that some defense allows to leak or be corrupted?
  • 31. 31DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Cornell University A Valued Information Theory (Joint work with Mario Alvim and Andre Scedrov, Univ of Penn) • Extended Shannon’s information theory to assign values to information (rather than to bits). • Developed measures analogous to entropy for information that is leaked / transmitted / corrupted / suppressed by attacks: – expected value learned in a single attack, – probability of learning specified value in single attack, – expected number of attack steps to learn a specified value. • Proved “reasonableness” properties for measures.
  • 32. Understanding and Quantifying the Impact of Moving Target Defenses on Computer Networks Scott A. DeLoach and Xinming Ou Computing & Information Sciences Kansas State University October 3, 2012 DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution
  • 33. 33DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution High-level Intuition of MT Network Defense Current Systems Hardened Systems Adaptive MTD Systems Adaptive Hardened Systems MTD Systems Exploration Surface Attack Surface Velocity & Direction • Current approaches shrink and harden attack surface • MTDs move attack surface and expand exploration surface • Adaptive MTDs move and modify attack surface
  • 34. 34DISTRIBUTION STATEMENT A – Unclassified, Unlimited Distribution Our Research Objectives • Understand and quantify the potential and limitations of MTDs for computer networks • Our approach – Develop analytical models to quantify MTD effectiveness – Conduct scientific experimentation to examine the cost/benefit of MTD on computer networks – Design a proof-of-concept MTD system to demonstrate concepts and validate models