Securing SCADA Systems
Total Page:16
File Type:pdf, Size:1020Kb
Cybersecurity and How it Has Transformed The World Prof. Steve Foster, CISSP Cybersecurity Project Director November 7th 2017 Cybersecurity Take-Aways today Develop a new (serious) cybersecurity attitude Backup and Encrypt your important personal data Operate your PC in the “Standard User” mode Develop a Password management process Do not open, respond and or take action to unexpected emails Do not download anything from an unknown (un-trusted) web site Generally your on-line transactions will be safe if you use the HTTPS protocol It is highly recommended that you do not conduct financial transactions using your iPhone or iPad Ensure that your home WiFi Router is properly secured Regional Population and Military Concentration The Virginia Greater Peninsula is home to 1,699,925 people living in eleven cities/counties TNCC Cybersecurity Program Designated a Center of Academic Excellence in Cyber Defense CAE2y-CD by NSA/DHS Designed two year Associate of Applied Science Degree with focus in Cybersecurity Designed Academic Cybersecurity Career Studies Certificates Developed Cybersecurity Articulation Agreement with ODU Developed Workforce Cybersecurity Certificates Host annual Hampton Roads Cybersecurity Workforce Conferences Keynote Speaker Rear Admiral Karen Jackson Danelle Barrett Virginia Secretary of Navy Cyber Security Technology Division Director/ DeputyDepartment of the Navy Chief Information Officer Cyber Jobs Gov. Terry McAuliffe noted that there are currently 36,000 open cyber security jobs in Virginia, paying an average annual salary of $88,000. There are currently 1 Million Cybersecurity related open positions Nation wide It is expected that number will go up to 1.4 M open positions by 2020 Cybersecurity Positions Security Awareness Manager Cybersecurity Analyst Network Engineer Router, Switch, Firewall Digital Forensic Analyst Server and Database Admin. Admin. (ISC)2 Certified Information Systems Security Professional (CISSP) . International Gold Standard for the Cybersecurity Engineering Professionals . At least five years of cumulative, full-time work experience in two or more of the eight domains of the (ISC)2 CISSP Common Body of Knowledge (CBK) Pass a comprehensive exam covering the following Cyber subject Domains: New Domains Old Domains Security and Risk Management Access Control Telecommunications & Network Security Asset Security Information Security Governance & Risk Managements Security Engineering Software Development Security Communication and Network Security Cryptography Identity and Access Management Security Architecture & Design Security Assessment and Testing Operations Security Security Operations Business Continuity & Disaster Recovery Planning Software Development Security Legal, Regulations, Investigations & Compliance Physical & Environment Security International Information System Security Certification Consortium Lets Get Started Did You Know That? VA Beach a Hub for (2) new undersea transatlantic fiber optic cables from Spain and Brazil The Military has conceded a portion of their own networks to Hackers Verizon is beginning to offer upstream Cybersecurity service options to its customers China wants to become the next Cisco, Ha, Ha (Lenova PC’s and Kaspersky Lab) UAV’s will be a major threat to our Homeland and National Security We do not have any National Cybersecurity Defense Policy or Plan to define a Cyberwar and or a response to it Do I have your attention yet? How Many of You Want to Sign Up for This Deal By Anna Werner CBS News October 25, 2017, 7:41 PM "The biggest risk is the hackers": Cybersecurity expert weighs in on “Amazon Key” “Here's how it works: for $249 you buy a special smart door lock, along with an in-home wireless camera aimed at the door. When the delivery driver arrives, Amazon gets a notification. The company then activates the camera and unlocks the door remotely, so the driver can open your door and put your package inside. He then steps outside and asks Amazon to relock the door.” "The biggest risk is the hackers who get a hold of the database of door codes. You know, quite literally, if they can hack the NSA, they can hack a database of entry codes into an entire block's worth of homes," Sileo said. "That part is what scares me, not how Amazon will use it, how the hackers will use it." The Insider Threat Tech Nov 3 2017, 7:03 am ET Twitter Employee Shuts Down Trump’s Account on Last Day of Work for 11 Minutes by Alyssa Newcomb “The social-media giant revealed the controlled alt- delete was done by a departing employee who was trying to go out with a virtual bang. “ Today Be Thinking About Risk and Developing a New Cybersecurity Attitude Nineteen Eighty-Four, Novel by George Orwell, Witten in 1949 Superstate called Oceania Omnipresent government surveillance Thought police Big Brother Ministry of Truth Today 2017 Super Corporate Databases: Google Twitter Facebook Youtube Yahoo Microsoft Snapchat Early Data Management Before the 1980’s , we relied on typewriters. If we needed copies of a document, we likely used a mimeograph machine or carbon paper. When completed we typically stored our information (data) in folders, on shelves, in filing cabinets or safes. Cyber 101 Alan M. Turning Father of Computers and Artificial Intelligence Kings College University of Cambridge British Mathematician WW II Enigma Code Breaker Homosexual In 1952 convicted of The Gross Indecency Act at a time when homosexuality was considered a threat to National Security In 1954 committed suicide In 2009 the U.K. offered Turning a public apology and QE II gave him a Royal Pardon The hypothesis that the human brain is in large part a digital computing machine. He theorized that the cortex at birth is an “unorganized machine” and that through “training” it becomes organized “into a universal machine or something like it.” Alan Turning Cont. Turning defined how modern day computers use a CPU’s to process and translate 1’s and 0’s into a computer language thereafter resulting in useable data Computers can only recognize one form of information: When there is an electrical signal present we have an (ON) state or a (1), or there is no signal present we have an (OFF) state or an (0). This binary condition is called a BIT. A "BIT" is an acronym, it stands for: BINARY DIGIT 1960’s Therefore 1’s and 0’s are Binary Digits Transistor WW II – Prototype – Computer ENIAC, which stood for Electronic Numerical Integrator and Calculator. ENIAC was built at the University of Pennsylvania between 1943 and 1945 to replace all the "computers", meaning the computing women who were employed by the Pentagon to manually calculate the firing tables for artillery guns. Oxford Dictionary – “Computer once meant a person who performed computations” WW II women Eventually women became the “Were Manual Calculators or Computers” “Programmers” for the ENIAC Machine. On July 20, 1969 Apollo 11 Guidance Computer (AGC) Apple 5 iPhone Designed and built by Apple Inc. it has 32 GB of memory and operates at a speed of 1 GHz. # of transistors - iPhone has 130,000 times more than Apollo clock frequency - iPhone is 32,600 times faster than Apollo instructions per second - iPhone is 80,800,000 times faster than Apollo overall performance - iPhone is 120,000,000 times faster than Apollo Designed at MIT and built by Raytheon it had 1 iPhone 6 could theoretically guide 120 million Apollo rockets at the 64Kbytes of memory and operated at a speed same time of 0.043MHz. Birth of the Internet 1969 IBM 1960’s Mainframe computer DARPA was created in 1958 as the Advanced Research Projects Agency (ARPA) by the Dept. of Defense (DoD) to execute R&D projects and survive a Nuclear attack during the “Cold War”. DARPA’s involvement in the creation of the Internet began with an idea to link time-sharing computers into a National system.. The first Node (using TCP/IP protocol) was connected in 1969. Desktop PC’s Arrive 1981 1984 1994 2017 Companies like IBM, Xerox, Tandy, Commodore, Compaq, Apple, Dell and HP entered the market Miniaturization is Driving The IoT 1960’s 2000 Today HDD vs SSD Cheaper Faster Larger capacity, but not for long Less noise Low heat Low failure rate Safe from Magnetism affect Physically smaller Hard Disk Drives vs. Solid State Drives No moving parts Internet Growth 1969 1980 - 2000 IoT 2017 Complexity of the Internet of Things 25 Risk Exposure Home Government Internet Bad Guys Business Military The World Cost & Mode of Warfare $ Cost of Capability Mode of Capability 21st 1940 1960 1970 1975 1985 1995 1950 Century Precision Cruise Missile Guided Invasion Bomber w/Nuke Munitions Missiles Computers ICBM & SLBM What’s at Stake America’s Critical Infrastructure Industrial 1. Production 2. Refining 3. Manufacturing Utilities 1. Nuclear 2. Electrical Grid 3. Chemical Plants 4. Gas & Oil 5. Water 6. Waste Facilities 1. Airports 2. Ship Yards / Ports 3. Distribution Centers 4. Space Stations 5. Military Approx. 85-90% of America’s Critical Infrastructure is Under Private Control What Corporations Seek: Deregulation Cost Savings Efficiency Ease of Maintenance Security not a priority Should we be concerned? Emerging Cybersecurity Risks “The term Smart Grid refers to a distribution system that allows for flow of information from a customer’s meter in two directions: both inside the house to thermostats and appliances and other devices, and back to the utility by IP addressable means.” White House Report National Security Risks and Concerns of Smart Grid by Stephen Spoonamore and Ronald L. Krutz, Ph.D., PE, CISSP, ISSEP