SlideShare a Scribd company logo
1 of 34
Trustworthy CIP: The International Data Issues

              Jim Clarke & Neeraj Suri
    Telecommunications Software and Systems Group
      Waterford Institute of Technology, Ireland

                    Dept. of Computer Science
                     TU Darmstadt, Germany




  OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   1
James Clarke

                      19 years EU R&D projects experience
                      8 years systems and software engineering
                       experience
                      Strategic Liaison Manager, TSSG research group,
                       Waterford IT, Ireland




                      www.tssg.org



                BIC Project coordinator www.bic-trust.eu


OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   2
CIP: Monitoring, Communication, Notification, Control...




                                         Internet
                                       Technologies




      OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   3
Critical Infrastructure (CI)  CI Data Ecosystems

 CI ecosystem has transcended beyond the classical notions of CI
  (power, transportation, water etc)
     Telcos, financial networks, data centers are all CI’s…

 CI’s are no longer – by design or intent – “closed” systems.
     Users dictate functionality of CI, eg. Mobile-commerce, cost models
      for Smart-Grid, Smart-Highways…


 CI’s are inter-connected via ICT (& with shared susceptibilities)!
     Telcos/Internet/Cloud increasingly as the CI data conduit (Stuxnet,
      Flame, SASoon…)

 ICT resilience (or lack of it) =‘s CI’s resilience levels!!!

        OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   4
Fundamental CIP Issues (EC CoMiFIN, INSPIRE)

 Detection: Can we detect/identify an anomaly, intrusion or attack
  either as a run-time perturbation or as prior-attack pattern database
  matches? What are the detectors - their composition, location and
  functionality?
 Notification: Can we (in a responsive -timely + reliably- manner)
  aggregate & communicate detection to a response entity? What are the
  mechanisms to facilitate notification?
 Metrics: Can we quantify what we need to protect and also the value
  of the achieved protection?
 Response: Can we conduct mitigation & recovery actions? Can we
  quantify what we need to protect and also the value of the achieved
  protection?


  Economics, as much as technical drivers, dictates CIP

        OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   5
Goal: Basing Secure Communications on Insecure ICT
 Overlays
    Adds filters, routes & functionality
    Buffer to ICT threats  Decouples ICT and CI associations
    Provides monitoring of ICT <-> CI

 P2P Overlays : Adaptive redundant paths
    Handle resource, routes changes
    Handle attacks changes




 Can we enhance ICT-centric overlay communication to provide
  technical and economically viable levels of resilience?


       OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   6
CIP ICT Overlay Models (Intrusive, Non-Intrusive)




                                                                    www.comifin.eu


                                                Non-intrusive Overlays … e.g. P2P: self
 Intrusive Overlays: Dedicated                  standing properties - secure,
  probes, routers, channels …                    dependable - & decoupled from the CI!
 Distributed control systems                   CI handled as black-box
  (SCADA)                                       Non-intrusive approach to realize an
                                                 additional defense line/layer that
                                                 implements further/new (usually
                                                 collaborative) security mechanisms
          OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)         7
Monitoring, Dissemination & Response Issues

 Drivers                        „Epidemic“ spreading of                 Intra & Inter-CI
     Security/trust support          Undesired information                  To monitor the
     Responsiveness                   (worms etc.)                            defined metrics
     Scalability                     Counter-measures                       To predict
                                      Desired information                     future patterns
 Base techniques
                                       (warnings, trust etc.)                 To evaluate
     Connection overlays
                                      Higher reachability,                    infrastructure
     Semantic overlays                                                        dependability
                                       lower latency
 Configuration,                                                               levels
                             Spreading speed
  management                                                            Use of the overlays
                              tunability
                                                                         to collect
                             Adaptive topology control
 Assess security of overlays                                            measurements and
                              of P2P overlays
    Threat models                                                       monitor metrics –
    Reliable data delivery  Intra- and inter-CIs                       technical and
     (data and path           forwarding/isolation                       economic
     replication..)          Prediction & early warning

            OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)             8
Notification Issues: CoMiFin FIP Approach
Institutions
 Financial




                        Network                   Network                     Network
                       Management                Management                  Management
                         System                    System                      System


Msg/Event                                     Msg/Event Processing        Msg/Event Processing
                   Msg/Event Processing
Processing




                                                                                                  Trust
Msg/Event bus




                                                                                                 Control
                                                                                                 Access


                                                                                                                   Security
    Semantic Overlay




                                                                                                  Authentication
      Connectivity Overlay

                                               Internet
                   OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)                                   9
Trust Attributes for Infrastructure Protection

 App          Users                Businesses                 FI/Govt
Level                                                                              Impact



                                    Tech/Info
                                     Conduits

                          Public                   Custom                       • Operational
                                                                                • Financial
 Sys                                                                            • Confidence
             UI Servers                Telcos                DB Servers
Level

                 Transactional & Data Confidentiality - Liability Driver
                 Transactional & Data Integrity       - Liability Driver
                 Transactional & Data Availability    - Usage Driver



    The Financial Infrastructure Protection (FIP) challenge is not just at a favorite
    (national) level or element(s) within the FI landscape, but the consolidated, coherent
    and consistent coverage of the overall environment – the technological, usage and user
    elements – on a global scale.


        OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)                10
Technology Specific Intl. Cooperation Elements

   Providing/Regulating access across proprietary CI Silos!!!
   Overlay technologies: architectures, algorithms, …
   Reliable, secure information delivery techniques
   Intra and Inter-CIP Architectures, threat models,…
     mobile & telco  CIP coupling models
 Intrusion detection (international repository of threat patterns –
  monitoring, responsiveness, governance, liability)
…

    Cooperation opportunities at technology levels or at the more
    abstract CI data levels of monitoring, dissemination, storage and
    management (over next slides)


         OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   11
The BIGGER Data Trust Chain Picture on CIP

                                    CIP is about enhancing “trust” in a CI
                                    Trust (for any system of CIP) is
                                     fundamentally multi-layered – one needs
     Trusted People
                                     to address all aspects of it for a solution to
                                     be meaningful!
    Trusted Data                    Trust is an end-to-end attribute …and the
                                     trust data chain is global!
   Trusted Policies                  -Trust is NOT a piecemeal property. Cyber
                                     attacks target the entire trust chain (the
    Trusted Networks                 blocks, the interfaces, the technology
                                     changes and users!!!) for the “weakest
                                     link” vulnerabilities on the overall attack
     Trusted HW/SW
                                     surface.
                                     - Cloud & Mobile computing makes the
                                     data/trust chain all the more global!
                                    Trust needs a global collaborative effort!

  OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)        12
CIP  Data Management


                                         The “Data” Elements
                                                Data   Acquisition
                                                Data   Dissemination
                                                Data   Storage
                                                Data   Management/Usage


                                      Large scale systems (architectures,
                                       infrastructures) invariably evolve to
                                       incorporate unstructured/open
                                       operational elements (including
                                       users!): The issue is to identify the
                                       underlying “structures” such as
                                       building block/interfaces to develop
                                       coherent, domain + technologically
                                       invariant solutions.

OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)       13
FIP Data Acquisition: Devices & Users



 Places your credit card is used?
 Integrity of point of sale terminal
  and backend network?
 Inter-bank conduits over domestic
  and intl. transactions?

 Online services
     Any knowledge or control where they
      are hosted?
     Knowledge or control over threats –
      intrusions, attacks - as use or
      infrastructure levels?

 Global monitoring & response
  entities?

         OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   14
FIP/CIP Data Dissemination

 Data Dissemination
   • Does one know or control which network is being used?
   • What are the Security Level Agreements – Domestic/Intl?
   • Mobile device interfacing to networks? Domestic/Intl?
   • Networks might be diverse & changing though the common
     monitoring/control elements of pricing/account tracking often
     form the weak point

 Data Storage (Data Centers)
 Data Access (Networks, SLA interfaces…..)
 Common Interest Themes: Metrics, Accountability, Mobile TSD




   OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   15
Data Access, Dissemination, Storage & Control?




 OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   16
Data Servers, Storage & The Human Element
 Services and servers are no longer monolithic – collaborative
  computing, P2P, Cloud…
 Data Servers are located worldwide - Google Data Centers
    For a security breach on the data, who is liable? The data center
     locale? The owner of the data center? The network?




       OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   17
The Big Issue: Info/Data Accountability

                                                -   Data Acquisition
 Accountability?                               -   Data Dissemination
      Appropriate use                          -   Data Storage
      Access control                           -   Data Access
      Traceability
      Governance                                At what level & by what “trusted”
                                                  authority ?
      Liability
                                                 For services?
      Compliance
                                                 For applications?
      …
                                                 Inter-resource?
                                                 Data ownership – digital rights?
                                                    Browsing data?
                                                    Financial data?
                                                    Legal?

         OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   18
Privacy & Security Interplay


 Multi-cultural/national nuances! The role of technology in trust is
  also often cultural – what to monitor, how to monitor etc

 Localized Approaches: Smart spaces - ID’s & authentication?

 E2E Trust-Privacy-Security Envelope: Measures of privacy?
  Quantification of Trust-Privacy-Security? Tradeoffs? Governance
  on an international scale?


  Social Requirements               Economic Basis                   Policies/Political




        OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)          19
Data Perspective: Collaboration Avenues


 While one can come up with many many many innovative
  solutions (routing overlays, replication, negotiation, “your
  favorite approach here” etc) , can we collaborate together on:

    What constitutes (globally conformal) data ownership and data
     accountability – individual and institutional?
    What to monitor, at what level and where? Regulation?
     Governance?
    What are the quantifiers/metrics of trust and security (technological
     and economic) based on which one should develop solutions?




       OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   20
Trust and Security Profile (note: not exhaustive list)


 Biometrics


Privacy, identity




  Network




  Services


   Secure
Implementation

   Trusted
  Computing

                                                                        EffectsPlus   GINI-SA
   CA/SA’s          SecurIST            ESFORS
                                                                         ACTOR
           OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)             21
Priority areas for Trust and Security for Call 10 (d’line: 01/2013)

      a) Security and Privacy                                c) Security and Privacy
        in cloud computing                                      in mobile services
   •scalable, portable and robust;                      •efficiency, robustness and performance in
   •improve the security components, in                 particular for system security (e.g.
   particular for identification,                       malware detection), data management and
   authentication and encryption;                       identification/authentication;
   •long-term privacy and security                      •Address specificities of the mobile
   •new models and tools for inter-domain               devices (smart phone, tablet…) compared
   security breaches.                                   to traditional PCs;
                                                        •include privacy-by-design (user control)
b) Development, demonstration and                       •scalable, inter-operable and applicability.
    innovation in cyber security
•application of technologies to increase the level   d) Technologies and methodologies to
of cyber security;                                    support EU trust and security policies
•development and demonstration of technologies,
methodologies and processes to prevent, detect,      •Develop an EU cyber security research agenda;
manage and react to cyber incidents;                 •Analyse the innovation process in privacy and
•improving the situational awareness and             cyber security technologies;
supporting the decision making process;              • Facilitate the application of privacy and
•develop and demonstrate advanced technologies       security by design practices in the development
and tools that will empower users, notably           and implementation of products and services.
individuals and SMEs, in handling security
incidents and protecting their privacy.                          … and others

             OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)                  22
Building International cooperation




OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   23
BIC: Building International Co-operation for Trustworthy ICT

                                  Identify EU & international t&s challenges
                                  Identify global trust and security challenges
                                  Facilitate collaboration fora
                                     -Raising awareness of funding calls/EU
                                     mechanisms
                                     - people/partner/organisations linkages
                                     - guidance on developing sustained
                                       longer-term EU – international
                                     collaborations
                                  fostering bi-lateral (tactical) and multi-
                                 lateral (strategic) co-operations.

                                   European Commission
                            DG-CONNECT Unit H.4: Trust and Security
                                    Coordination Action
                                    Jan 2011-Dec. 2013
                                      http://www.bic-trust.eu/
   OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)    24
European Commission Home for BIC

 BIC is in the portfolio of Unit H.4 Trust and Security EC DG CONNECT
  (Communications Networks, Content and Technology)
 Directorate H "Sustainable and Secure Society".
     Main goals are to address selected ICT challenges for a sustainable,
      healthy and secure society, and to develop a full-cycle roadmap to get the
      output into the EU economy, through innovation tools such as pilot-lines,
      pre-commercial procurement, and standards.
     Directorate H is the leader for Horizon 2020/Societal Challenges.
 The Trust & Security (H.4) priorities are the following:
     Elaborate a European strategy on Internet security and remove Cyber
      security related obstacles to the proper functioning of the Internal Market.
     Eanage implementation of the e-privacy Directive and follow-up of all
      issues related to the protection of privacy on-line.
     Manage the various financial programmes (FP7, CIP, H2020) supporting
      the Internet and ICT security.
     Promote a better coordinated and coherent approach on cyber incident
      management worldwide.
 To find out more information about the transition to DG CONNECT,
  please visit
       http://ec.europa.eu/dgs/information_society/connect_en.htm
         OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)    25
BIC: Overall Structure

                         BIC countries & programmes



                             European Commission




                                                                      External
                                   International Advisory Group
              BIC                                                     relations
                                              (IAG)
             Project                                                     e.g.,
              core                                                     ENISA,
                         communication via BIC secretariat function   W3C, …

                              WG1. Human/User WG2. Network info-
                               trust & security & cyber-security

                                WG3. Programme and funding focus




OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)          26
Bi-Lateral Approach: Tactical


*          *           *




OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   27
Multi-Lateral Approach: Strategic




OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   28
Moving Towards a Strategic Approach




                                  How do we
                                  achieve it?




                                     IAG
                                  Visitations
                              Contacts/Exchange
                                  Workshops
                                     WG’s


OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   29
International Advisory Group (IAG) - Roles
 The IAG will be the forum bringing together the countries
  representatives from the earlier INCO-Trust countries (U.S.,
  Canada, …) and the BIC countries (India, Brazil and S. Africa) in a
  more strategic way;
 To facilitate collaborations between national ICT Trust and Security
  constituencies and related ICT trust and security related
  constituencies from other countries;
 To review the situation on International collaboration strategy in
  ICT trust and security on a regular basis providing advice on the
  priorities for international cooperation between the respective
  research communities, providing directions to the project and
  recommendations for improvement;
 Assist in the building of the working groups to enable BIC to
  structure relationships and linkages and facilitate contacts for
  theme based workshops or other networking events.




     OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   30
IAG & Working Groups Structure

                      EWG
IAG

  EWG                CWG                EWG




                      EWG




      OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   31
International Advisory Group

Country                                                         IAG Members
India                      * Dr. Gulshan Rai, Director General, Government of India, Ministry of Communication
                                 & IT, Department of Information Technology (DIT), STQC Directorate.
                           * Mr. Abhishek Sharma, Beyond Evolution Tech Solution Pvt. Ltd.
Brazil                     Dr. Leal de Andrade, INCO Unit, CNPQ
                           Lisandro Granville, Director, CTIC (Research and Development Centre for ICT),
                           Prof. Priscila Solis Barreto, University of Brasilia
South Africa               Mr. Isaac Maredi, Director: Information and Communication Technology, Department
                                 of Science and Technology
                           Prof. Dr. Jan Eloff, SAP Meraka UTD & University of Pretoria, South Africa (by appt. of
                                 DST)
                           Dr. Barend Taute, The Council for Scientific and Industrial Research (CSIR), Meraka
                                 Institute, Pretoria, South Africa;
Australia                  Mr. Gary Morgan, Commonwealth Scientific and Industrial Research Organisation
                            (CSIRO)
United States              Dr. Sam Weber, National Science Foundation (NSF);
                           Prof. Karl Levitt, University of California, Davis and former NSF;
                           Prof. John C. Mallery, Massachusetts Institute of Technology.
Canada                     Dr. Pamela Moss, Director of the MCT Division of Natural Sciences and Engineering
                                Research Council of Canada (NSERC). (TBC)
                           Andrew Reddick, University of New Brunswick.
Japan                      Mr Yasutaka Sakurai, Chief, Dept of International Affairs, Japan Science and
                               Technology Agency (JST)
Korea                      Dr. Young Tae Cha, Program director for Ministry of Knowledge Economy (MKE)
                           Prof. Dr. Souhwan Jung, , Soongsil University
                           Prof. Dr. Heung Youl Youm, Soonchunhyang (SCH) University, Korea.

            OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)                                 32
Priority areas for Trust and Security for Call 10 (d’line: 01/2013)

      a) Security and Privacy                                c) Security and Privacy
        in cloud computing                                      in mobile services
   •scalable, portable and robust;                      •efficiency, robustness and performance in
   •improve the security components, in                 particular for system security (e.g.
   particular for identification,                       malware detection), data management and
   authentication and encryption;                       identification/authentication;
   •long-term privacy and security                      •Address specificities of the mobile
   •new models and tools for inter-domain               devices (smart phone, tablet…) compared
   security breaches.                                   to traditional PCs;
                                                        •include privacy-by-design (user control)
b) Development, demonstration and                       •scalable, inter-operable and applicability.
    innovation in cyber security
•application of technologies to increase the level   d) Technologies and methodologies to
of cyber security;                                    support EU trust and security policies
•development and demonstration of technologies,
methodologies and processes to prevent, detect,      •Develop an EU cyber security research agenda;
manage and react to cyber incidents;                 •Analyse the innovation process in privacy and
•improving the situational awareness and             cyber security technologies;
supporting the decision making process;              • Facilitate the application of privacy and
•develop and demonstrate advanced technologies       security by design practices in the development
and tools that will empower users, notably           and implementation of products and services.
individuals and SMEs, in handling security
incidents and protecting their privacy.                          … and others

             OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)                  33
http://www.bic-trust.eu/




OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India)   34

More Related Content

What's hot

Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011IBM Sverige
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psAccenture
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Avensus Corporate Presentation
Avensus Corporate PresentationAvensus Corporate Presentation
Avensus Corporate PresentationParth Agrawal
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsMuhammad FAHAD
 
Removing the Cloud of Insecurity
Removing the Cloud of InsecurityRemoving the Cloud of Insecurity
Removing the Cloud of InsecurityRackspace
 

What's hot (20)

Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
Jeffrey Nick
Jeffrey NickJeffrey Nick
Jeffrey Nick
 
Stone gate ips
Stone gate ipsStone gate ips
Stone gate ips
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
 
Bi cloud saa_s
Bi cloud saa_sBi cloud saa_s
Bi cloud saa_s
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
cyber
cybercyber
cyber
 
CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_psNet motion wireless-and_frost-sullivan_a-new-mobilty_ps
Net motion wireless-and_frost-sullivan_a-new-mobilty_ps
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Avensus Corporate Presentation
Avensus Corporate PresentationAvensus Corporate Presentation
Avensus Corporate Presentation
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Removing the Cloud of Insecurity
Removing the Cloud of InsecurityRemoving the Cloud of Insecurity
Removing the Cloud of Insecurity
 

Viewers also liked

Sinus And Other Troubles Dr. Shriniwas Kashalikar
Sinus And Other Troubles     Dr. Shriniwas KashalikarSinus And Other Troubles     Dr. Shriniwas Kashalikar
Sinus And Other Troubles Dr. Shriniwas Kashalikarshivsr5
 
Agosto
AgostoAgosto
AgostoMarlou
 
Fanzine 7 taller 7 no. 7 enpeg comic
Fanzine 7 taller 7 no. 7 enpeg comicFanzine 7 taller 7 no. 7 enpeg comic
Fanzine 7 taller 7 no. 7 enpeg comicmanual comic
 
Curtas.gal
Curtas.galCurtas.gal
Curtas.galMarlou
 
Pour décrire au passé
Pour décrire au passéPour décrire au passé
Pour décrire au passéMayssa Jibai
 
Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016Gary Marshall
 
Getting the end point security right! - k. k. mookhey
Getting the end point security right! - k. k. mookheyGetting the end point security right! - k. k. mookhey
Getting the end point security right! - k. k. mookheyowaspindia
 
Gerard Genette Figuras v
Gerard Genette Figuras vGerard Genette Figuras v
Gerard Genette Figuras vmanual comic
 
Φθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαΦθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαPopi Magaliou
 
Ita b2 ms 02 12-15
Ita b2 ms 02 12-15Ita b2 ms 02 12-15
Ita b2 ms 02 12-15SpaanIt
 
La casa de los simpsons
La casa de los simpsonsLa casa de los simpsons
La casa de los simpsonsliandola
 
Herdeiros da Crus
Herdeiros da CrusHerdeiros da Crus
Herdeiros da CrusMarlou
 
30 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 130 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 1SpaanIt
 

Viewers also liked (20)

Sinus And Other Troubles Dr. Shriniwas Kashalikar
Sinus And Other Troubles     Dr. Shriniwas KashalikarSinus And Other Troubles     Dr. Shriniwas Kashalikar
Sinus And Other Troubles Dr. Shriniwas Kashalikar
 
Agosto
AgostoAgosto
Agosto
 
Fanzine 7 taller 7 no. 7 enpeg comic
Fanzine 7 taller 7 no. 7 enpeg comicFanzine 7 taller 7 no. 7 enpeg comic
Fanzine 7 taller 7 no. 7 enpeg comic
 
Curtas.gal
Curtas.galCurtas.gal
Curtas.gal
 
Pour décrire au passé
Pour décrire au passéPour décrire au passé
Pour décrire au passé
 
Co-Working Presentation April 2016
Co-Working Presentation April 2016Co-Working Presentation April 2016
Co-Working Presentation April 2016
 
Getting the end point security right! - k. k. mookhey
Getting the end point security right! - k. k. mookheyGetting the end point security right! - k. k. mookhey
Getting the end point security right! - k. k. mookhey
 
Xuño
XuñoXuño
Xuño
 
Gerard Genette Figuras v
Gerard Genette Figuras vGerard Genette Figuras v
Gerard Genette Figuras v
 
Eca 14 (1)
Eca 14 (1)Eca 14 (1)
Eca 14 (1)
 
Φθινόπωρο στα Τρίκαλα
Φθινόπωρο στα ΤρίκαλαΦθινόπωρο στα Τρίκαλα
Φθινόπωρο στα Τρίκαλα
 
Evaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajasEvaluación del aprendizaje leyva barajas
Evaluación del aprendizaje leyva barajas
 
Ita b2 ms 02 12-15
Ita b2 ms 02 12-15Ita b2 ms 02 12-15
Ita b2 ms 02 12-15
 
Teoria macros
Teoria macrosTeoria macros
Teoria macros
 
La casa de los simpsons
La casa de los simpsonsLa casa de los simpsons
La casa de los simpsons
 
Nmr Spwla Carbonates
Nmr  Spwla CarbonatesNmr  Spwla Carbonates
Nmr Spwla Carbonates
 
Herdeiros da Crus
Herdeiros da CrusHerdeiros da Crus
Herdeiros da Crus
 
30 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 130 días de bilingüismo: Episodio 1
30 días de bilingüismo: Episodio 1
 
Juegos de Logica de Ingenio
Juegos de Logica de IngenioJuegos de Logica de Ingenio
Juegos de Logica de Ingenio
 
Formation Damage Test.
Formation Damage Test.Formation Damage Test.
Formation Damage Test.
 

Similar to International approaches to critical information infrastructure protection jim clarke

Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1CloudExpoEurope
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's nextDuffy Fron
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecuritySBGC
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution ServiceAngelo Corsaro
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...SBGC
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 

Similar to International approaches to critical information infrastructure protection jim clarke (20)

Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1Cloud security and cyber security v 3.1
Cloud security and cyber security v 3.1
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
SmartConnect-Mobility
SmartConnect-MobilitySmartConnect-Mobility
SmartConnect-Mobility
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Ibm rational day-france_what's next
Ibm rational day-france_what's nextIbm rational day-france_what's next
Ibm rational day-france_what's next
 
C2MS
C2MSC2MS
C2MS
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 
The Data Distribution Service
The Data Distribution ServiceThe Data Distribution Service
The Data Distribution Service
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 

More from owaspindia

Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...owaspindia
 
Public exploit held private – penetration testing the researcher’s way tama...
Public exploit held private – penetration testing the researcher’s way   tama...Public exploit held private – penetration testing the researcher’s way   tama...
Public exploit held private – penetration testing the researcher’s way tama...owaspindia
 
New and improved hacking oracle from web apps sumit sidharth
New and improved hacking oracle from web apps   sumit sidharthNew and improved hacking oracle from web apps   sumit sidharth
New and improved hacking oracle from web apps sumit sidharthowaspindia
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...owaspindia
 
From app sec to malsec malware hooked, criminal crooked alok gupta
From app sec to malsec malware hooked, criminal crooked   alok guptaFrom app sec to malsec malware hooked, criminal crooked   alok gupta
From app sec to malsec malware hooked, criminal crooked alok guptaowaspindia
 
Find me if you can – smart fuzzing and discovery! shreeraj shah
Find me if you can – smart fuzzing and discovery!   shreeraj shahFind me if you can – smart fuzzing and discovery!   shreeraj shah
Find me if you can – smart fuzzing and discovery! shreeraj shahowaspindia
 
The magic of passive web vulnerability analysis lava kumar
The magic of passive web vulnerability analysis   lava kumarThe magic of passive web vulnerability analysis   lava kumar
The magic of passive web vulnerability analysis lava kumarowaspindia
 

More from owaspindia (7)

Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...Real time evaluation of national network exposure to emerging threats - fyodo...
Real time evaluation of national network exposure to emerging threats - fyodo...
 
Public exploit held private – penetration testing the researcher’s way tama...
Public exploit held private – penetration testing the researcher’s way   tama...Public exploit held private – penetration testing the researcher’s way   tama...
Public exploit held private – penetration testing the researcher’s way tama...
 
New and improved hacking oracle from web apps sumit sidharth
New and improved hacking oracle from web apps   sumit sidharthNew and improved hacking oracle from web apps   sumit sidharth
New and improved hacking oracle from web apps sumit sidharth
 
Mobile application security – effective methodology, efficient testing! hem...
Mobile application security – effective methodology, efficient testing!   hem...Mobile application security – effective methodology, efficient testing!   hem...
Mobile application security – effective methodology, efficient testing! hem...
 
From app sec to malsec malware hooked, criminal crooked alok gupta
From app sec to malsec malware hooked, criminal crooked   alok guptaFrom app sec to malsec malware hooked, criminal crooked   alok gupta
From app sec to malsec malware hooked, criminal crooked alok gupta
 
Find me if you can – smart fuzzing and discovery! shreeraj shah
Find me if you can – smart fuzzing and discovery!   shreeraj shahFind me if you can – smart fuzzing and discovery!   shreeraj shah
Find me if you can – smart fuzzing and discovery! shreeraj shah
 
The magic of passive web vulnerability analysis lava kumar
The magic of passive web vulnerability analysis   lava kumarThe magic of passive web vulnerability analysis   lava kumar
The magic of passive web vulnerability analysis lava kumar
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

International approaches to critical information infrastructure protection jim clarke

  • 1. Trustworthy CIP: The International Data Issues Jim Clarke & Neeraj Suri Telecommunications Software and Systems Group Waterford Institute of Technology, Ireland Dept. of Computer Science TU Darmstadt, Germany OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 1
  • 2. James Clarke  19 years EU R&D projects experience  8 years systems and software engineering experience  Strategic Liaison Manager, TSSG research group, Waterford IT, Ireland  www.tssg.org  BIC Project coordinator www.bic-trust.eu OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 2
  • 3. CIP: Monitoring, Communication, Notification, Control... Internet Technologies OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 3
  • 4. Critical Infrastructure (CI)  CI Data Ecosystems  CI ecosystem has transcended beyond the classical notions of CI (power, transportation, water etc)  Telcos, financial networks, data centers are all CI’s…  CI’s are no longer – by design or intent – “closed” systems.  Users dictate functionality of CI, eg. Mobile-commerce, cost models for Smart-Grid, Smart-Highways…  CI’s are inter-connected via ICT (& with shared susceptibilities)!  Telcos/Internet/Cloud increasingly as the CI data conduit (Stuxnet, Flame, SASoon…)  ICT resilience (or lack of it) =‘s CI’s resilience levels!!! OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 4
  • 5. Fundamental CIP Issues (EC CoMiFIN, INSPIRE)  Detection: Can we detect/identify an anomaly, intrusion or attack either as a run-time perturbation or as prior-attack pattern database matches? What are the detectors - their composition, location and functionality?  Notification: Can we (in a responsive -timely + reliably- manner) aggregate & communicate detection to a response entity? What are the mechanisms to facilitate notification?  Metrics: Can we quantify what we need to protect and also the value of the achieved protection?  Response: Can we conduct mitigation & recovery actions? Can we quantify what we need to protect and also the value of the achieved protection? Economics, as much as technical drivers, dictates CIP OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 5
  • 6. Goal: Basing Secure Communications on Insecure ICT  Overlays  Adds filters, routes & functionality  Buffer to ICT threats  Decouples ICT and CI associations  Provides monitoring of ICT <-> CI  P2P Overlays : Adaptive redundant paths  Handle resource, routes changes  Handle attacks changes  Can we enhance ICT-centric overlay communication to provide technical and economically viable levels of resilience? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 6
  • 7. CIP ICT Overlay Models (Intrusive, Non-Intrusive) www.comifin.eu  Non-intrusive Overlays … e.g. P2P: self  Intrusive Overlays: Dedicated standing properties - secure, probes, routers, channels … dependable - & decoupled from the CI!  Distributed control systems  CI handled as black-box (SCADA)  Non-intrusive approach to realize an additional defense line/layer that implements further/new (usually collaborative) security mechanisms OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 7
  • 8. Monitoring, Dissemination & Response Issues  Drivers  „Epidemic“ spreading of  Intra & Inter-CI  Security/trust support  Undesired information  To monitor the  Responsiveness (worms etc.) defined metrics  Scalability  Counter-measures  To predict  Desired information future patterns  Base techniques (warnings, trust etc.)  To evaluate  Connection overlays  Higher reachability, infrastructure  Semantic overlays dependability lower latency  Configuration, levels  Spreading speed management  Use of the overlays tunability to collect  Adaptive topology control  Assess security of overlays measurements and of P2P overlays  Threat models monitor metrics –  Reliable data delivery  Intra- and inter-CIs technical and (data and path forwarding/isolation economic replication..)  Prediction & early warning OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 8
  • 9. Notification Issues: CoMiFin FIP Approach Institutions Financial Network Network Network Management Management Management System System System Msg/Event Msg/Event Processing Msg/Event Processing Msg/Event Processing Processing Trust Msg/Event bus Control Access Security Semantic Overlay Authentication Connectivity Overlay Internet OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 9
  • 10. Trust Attributes for Infrastructure Protection App Users Businesses FI/Govt Level Impact Tech/Info Conduits Public Custom • Operational • Financial Sys • Confidence UI Servers Telcos DB Servers Level Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver The Financial Infrastructure Protection (FIP) challenge is not just at a favorite (national) level or element(s) within the FI landscape, but the consolidated, coherent and consistent coverage of the overall environment – the technological, usage and user elements – on a global scale. OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 10
  • 11. Technology Specific Intl. Cooperation Elements  Providing/Regulating access across proprietary CI Silos!!!  Overlay technologies: architectures, algorithms, …  Reliable, secure information delivery techniques  Intra and Inter-CIP Architectures, threat models,…  mobile & telco  CIP coupling models  Intrusion detection (international repository of threat patterns – monitoring, responsiveness, governance, liability) … Cooperation opportunities at technology levels or at the more abstract CI data levels of monitoring, dissemination, storage and management (over next slides) OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 11
  • 12. The BIGGER Data Trust Chain Picture on CIP  CIP is about enhancing “trust” in a CI  Trust (for any system of CIP) is fundamentally multi-layered – one needs Trusted People to address all aspects of it for a solution to be meaningful! Trusted Data  Trust is an end-to-end attribute …and the trust data chain is global! Trusted Policies -Trust is NOT a piecemeal property. Cyber attacks target the entire trust chain (the Trusted Networks blocks, the interfaces, the technology changes and users!!!) for the “weakest link” vulnerabilities on the overall attack Trusted HW/SW surface. - Cloud & Mobile computing makes the data/trust chain all the more global!  Trust needs a global collaborative effort! OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 12
  • 13. CIP  Data Management  The “Data” Elements  Data Acquisition  Data Dissemination  Data Storage  Data Management/Usage  Large scale systems (architectures, infrastructures) invariably evolve to incorporate unstructured/open operational elements (including users!): The issue is to identify the underlying “structures” such as building block/interfaces to develop coherent, domain + technologically invariant solutions. OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 13
  • 14. FIP Data Acquisition: Devices & Users  Places your credit card is used?  Integrity of point of sale terminal and backend network?  Inter-bank conduits over domestic and intl. transactions?  Online services  Any knowledge or control where they are hosted?  Knowledge or control over threats – intrusions, attacks - as use or infrastructure levels?  Global monitoring & response entities? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 14
  • 15. FIP/CIP Data Dissemination  Data Dissemination • Does one know or control which network is being used? • What are the Security Level Agreements – Domestic/Intl? • Mobile device interfacing to networks? Domestic/Intl? • Networks might be diverse & changing though the common monitoring/control elements of pricing/account tracking often form the weak point  Data Storage (Data Centers)  Data Access (Networks, SLA interfaces…..)  Common Interest Themes: Metrics, Accountability, Mobile TSD OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 15
  • 16. Data Access, Dissemination, Storage & Control? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 16
  • 17. Data Servers, Storage & The Human Element  Services and servers are no longer monolithic – collaborative computing, P2P, Cloud…  Data Servers are located worldwide - Google Data Centers  For a security breach on the data, who is liable? The data center locale? The owner of the data center? The network? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 17
  • 18. The Big Issue: Info/Data Accountability - Data Acquisition  Accountability? - Data Dissemination  Appropriate use - Data Storage  Access control - Data Access  Traceability  Governance  At what level & by what “trusted” authority ?  Liability  For services?  Compliance  For applications?  …  Inter-resource?  Data ownership – digital rights?  Browsing data?  Financial data?  Legal? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 18
  • 19. Privacy & Security Interplay  Multi-cultural/national nuances! The role of technology in trust is also often cultural – what to monitor, how to monitor etc  Localized Approaches: Smart spaces - ID’s & authentication?  E2E Trust-Privacy-Security Envelope: Measures of privacy? Quantification of Trust-Privacy-Security? Tradeoffs? Governance on an international scale? Social Requirements Economic Basis Policies/Political OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 19
  • 20. Data Perspective: Collaboration Avenues  While one can come up with many many many innovative solutions (routing overlays, replication, negotiation, “your favorite approach here” etc) , can we collaborate together on:  What constitutes (globally conformal) data ownership and data accountability – individual and institutional?  What to monitor, at what level and where? Regulation? Governance?  What are the quantifiers/metrics of trust and security (technological and economic) based on which one should develop solutions? OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 20
  • 21. Trust and Security Profile (note: not exhaustive list) Biometrics Privacy, identity Network Services Secure Implementation Trusted Computing EffectsPlus GINI-SA CA/SA’s SecurIST ESFORS ACTOR OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 21
  • 22. Priority areas for Trust and Security for Call 10 (d’line: 01/2013) a) Security and Privacy c) Security and Privacy in cloud computing in mobile services •scalable, portable and robust; •efficiency, robustness and performance in •improve the security components, in particular for system security (e.g. particular for identification, malware detection), data management and authentication and encryption; identification/authentication; •long-term privacy and security •Address specificities of the mobile •new models and tools for inter-domain devices (smart phone, tablet…) compared security breaches. to traditional PCs; •include privacy-by-design (user control) b) Development, demonstration and •scalable, inter-operable and applicability. innovation in cyber security •application of technologies to increase the level d) Technologies and methodologies to of cyber security; support EU trust and security policies •development and demonstration of technologies, methodologies and processes to prevent, detect, •Develop an EU cyber security research agenda; manage and react to cyber incidents; •Analyse the innovation process in privacy and •improving the situational awareness and cyber security technologies; supporting the decision making process; • Facilitate the application of privacy and •develop and demonstrate advanced technologies security by design practices in the development and tools that will empower users, notably and implementation of products and services. individuals and SMEs, in handling security incidents and protecting their privacy. … and others OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 22
  • 23. Building International cooperation OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 23
  • 24. BIC: Building International Co-operation for Trustworthy ICT  Identify EU & international t&s challenges  Identify global trust and security challenges Facilitate collaboration fora -Raising awareness of funding calls/EU mechanisms - people/partner/organisations linkages - guidance on developing sustained longer-term EU – international collaborations  fostering bi-lateral (tactical) and multi- lateral (strategic) co-operations. European Commission DG-CONNECT Unit H.4: Trust and Security Coordination Action Jan 2011-Dec. 2013 http://www.bic-trust.eu/ OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 24
  • 25. European Commission Home for BIC  BIC is in the portfolio of Unit H.4 Trust and Security EC DG CONNECT (Communications Networks, Content and Technology)  Directorate H "Sustainable and Secure Society".  Main goals are to address selected ICT challenges for a sustainable, healthy and secure society, and to develop a full-cycle roadmap to get the output into the EU economy, through innovation tools such as pilot-lines, pre-commercial procurement, and standards.  Directorate H is the leader for Horizon 2020/Societal Challenges.  The Trust & Security (H.4) priorities are the following:  Elaborate a European strategy on Internet security and remove Cyber security related obstacles to the proper functioning of the Internal Market.  Eanage implementation of the e-privacy Directive and follow-up of all issues related to the protection of privacy on-line.  Manage the various financial programmes (FP7, CIP, H2020) supporting the Internet and ICT security.  Promote a better coordinated and coherent approach on cyber incident management worldwide.  To find out more information about the transition to DG CONNECT, please visit http://ec.europa.eu/dgs/information_society/connect_en.htm OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 25
  • 26. BIC: Overall Structure BIC countries & programmes European Commission External International Advisory Group BIC relations (IAG) Project e.g., core ENISA, communication via BIC secretariat function W3C, … WG1. Human/User WG2. Network info- trust & security & cyber-security WG3. Programme and funding focus OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 26
  • 27. Bi-Lateral Approach: Tactical * * * OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 27
  • 28. Multi-Lateral Approach: Strategic OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 28
  • 29. Moving Towards a Strategic Approach How do we achieve it? IAG Visitations Contacts/Exchange Workshops WG’s OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 29
  • 30. International Advisory Group (IAG) - Roles  The IAG will be the forum bringing together the countries representatives from the earlier INCO-Trust countries (U.S., Canada, …) and the BIC countries (India, Brazil and S. Africa) in a more strategic way;  To facilitate collaborations between national ICT Trust and Security constituencies and related ICT trust and security related constituencies from other countries;  To review the situation on International collaboration strategy in ICT trust and security on a regular basis providing advice on the priorities for international cooperation between the respective research communities, providing directions to the project and recommendations for improvement;  Assist in the building of the working groups to enable BIC to structure relationships and linkages and facilitate contacts for theme based workshops or other networking events. OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 30
  • 31. IAG & Working Groups Structure EWG IAG EWG CWG EWG EWG OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 31
  • 32. International Advisory Group Country IAG Members India * Dr. Gulshan Rai, Director General, Government of India, Ministry of Communication & IT, Department of Information Technology (DIT), STQC Directorate. * Mr. Abhishek Sharma, Beyond Evolution Tech Solution Pvt. Ltd. Brazil Dr. Leal de Andrade, INCO Unit, CNPQ Lisandro Granville, Director, CTIC (Research and Development Centre for ICT), Prof. Priscila Solis Barreto, University of Brasilia South Africa Mr. Isaac Maredi, Director: Information and Communication Technology, Department of Science and Technology Prof. Dr. Jan Eloff, SAP Meraka UTD & University of Pretoria, South Africa (by appt. of DST) Dr. Barend Taute, The Council for Scientific and Industrial Research (CSIR), Meraka Institute, Pretoria, South Africa; Australia Mr. Gary Morgan, Commonwealth Scientific and Industrial Research Organisation (CSIRO) United States Dr. Sam Weber, National Science Foundation (NSF); Prof. Karl Levitt, University of California, Davis and former NSF; Prof. John C. Mallery, Massachusetts Institute of Technology. Canada Dr. Pamela Moss, Director of the MCT Division of Natural Sciences and Engineering Research Council of Canada (NSERC). (TBC) Andrew Reddick, University of New Brunswick. Japan Mr Yasutaka Sakurai, Chief, Dept of International Affairs, Japan Science and Technology Agency (JST) Korea Dr. Young Tae Cha, Program director for Ministry of Knowledge Economy (MKE) Prof. Dr. Souhwan Jung, , Soongsil University Prof. Dr. Heung Youl Youm, Soonchunhyang (SCH) University, Korea. OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 32
  • 33. Priority areas for Trust and Security for Call 10 (d’line: 01/2013) a) Security and Privacy c) Security and Privacy in cloud computing in mobile services •scalable, portable and robust; •efficiency, robustness and performance in •improve the security components, in particular for system security (e.g. particular for identification, malware detection), data management and authentication and encryption; identification/authentication; •long-term privacy and security •Address specificities of the mobile •new models and tools for inter-domain devices (smart phone, tablet…) compared security breaches. to traditional PCs; •include privacy-by-design (user control) b) Development, demonstration and •scalable, inter-operable and applicability. innovation in cyber security •application of technologies to increase the level d) Technologies and methodologies to of cyber security; support EU trust and security policies •development and demonstration of technologies, methodologies and processes to prevent, detect, •Develop an EU cyber security research agenda; manage and react to cyber incidents; •Analyse the innovation process in privacy and •improving the situational awareness and cyber security technologies; supporting the decision making process; • Facilitate the application of privacy and •develop and demonstrate advanced technologies security by design practices in the development and tools that will empower users, notably and implementation of products and services. individuals and SMEs, in handling security incidents and protecting their privacy. … and others OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 33
  • 34. http://www.bic-trust.eu/ OWASP InfoSec India Conference 2012. Hotel Crowne Plaza, Gurgaon (India) 34