Nation-A Cyber Security Strategy Developed by Joshua Fatehnia 4Th May 2018 Version 1 Ref 113524
Total Page:16
File Type:pdf, Size:1020Kb
q Nation-A Cyber Security Strategy Developed by Joshua Fatehnia 4th May 2018 Version 1 ref 113524 Contents 1. Introduction ............................................................................................................................ 2 1.1. Cyber Warfare ................................................................................................................ 3 2. Vision ....................................................................................................................................... 5 2.1. Threats ............................................................................................................................ 5 2.2. Vulnerabilities ................................................................................................................ 7 3. Response ............................................................................................................................... 13 3.1. Cooperative Involvement ........................................................................................... 13 3.2. Prosecution and Forensic Computing ....................................................................... 13 3.3. Training and Education ............................................................................................... 15 3.4. Government Assurance ............................................................................................... 15 3.5. Redundancy Options ................................................................................................... 16 4. Defence Plan Implementation ........................................................................................... 17 4.1. Banking and Finance ................................................................................................... 17 4.1.1. Attack Types and Recommendations ............................................................... 20 4.2. Public Transportation ................................................................................................. 22 4.2.1. Recommendations & Mitigations ....................................................................... 24 4.3. National Health Services ............................................................................................ 26 4.3.1. Mitigations ............................................................................................................ 27 4.4. Public Utilities ............................................................................................................. 29 4.4.1. Mitigations ............................................................................................................ 31 4.5. Government Services .................................................................................................. 32 4.5.1. Recommendations ............................................................................................... 33 5. The Tallinn Manual .............................................................................................................. 36 6. Development ........................................................................................................................ 37 6.1. Further Documents ...................................................................................................... 38 7. References ............................................................................................................................ 40 1 | Page 1. Introduction Nation-A Cyberspace breaks down all physical communication barriers, allowing users to share information over a network no matter the distances between them, this type of virtual environment was not designed with security as it’s forefront in the early stages, as the growing capabilities of cyber developed no one could possibly have imagined that this method of data transportation could be used for negative impacts. With the increasingly popular use of digital infrastructures in today’s society for the convenience of day to day operations, security is becoming a top priority for citizens and organizations, managing the risks involved in the development of new products and services improves the confidentiality, integrity, and accessibility of data, which is one of the top goals for many organizations operating on the internet. This Cyber strategy has been published to outline and protect the functioning of national and international foundations, promoting a secure, resilient, and sustainable pathway for the economic values of this nation, whilst doing so, ensure the Confidentiality, Integrity and Accessibility of all user data ensuring the social well- being of the public. National security and resiliency is not just the protection of government intellectual property but the protection of organizations operating within the nation, this plan will also act as a guidance paper for private originations to better protect themselves against an attack. The UK Government has recently stated that organizations who control critical computer system infrastructures shall be fined up to £17m if they do not have efficient and sufficient cyber security defences, within the strategy, critical sectors have been identified and shall ensure organizations operating within these sectors have the relevant information sustainably to secure themselves. (HMGOV-B, 2018) 2 | Page 1.1. Cyber Warfare Cyber Warfare is a new term that has been established prior to the actual credited use of this type of warfare, it involves the utilisation of offensive and defence operations targeting opponent information systems and networks. There are many different motives that are behind cyber-attacks, but typically these are placed into 3 different categories, Espionage, Sabotage and Propaganda, and although there are plenty of more motivations that can be identified for a cyber-attack, these are the 3 that are defined for international and political movements against a whole nation state. (LILY HAY NEWMAN 2018) Using online visitation tools such as Norsecorp and FireEye [Fig 1], it can be seen that there are multiple Cyber-attacks happening simultaneously in real-time all around the world, the image below also represents the top 5 targeted industries within the last 30 days. [Figure 1] Visualizing the amount of attacks that take place on a daily basis, demonstrates the threat that cyber-attacks can have on an infrastructure, it also becomes very challenging to differentiate what constitutes as an ‘act of war’ under within ‘Cyber- Warfare’ territory, attacks that are politically motivated by another state may indicate hostile activity but, with cases like Stuxnet, if no responsibility it taken by the 3 | Page actuating party then it becomes difficult to shift the blame onto another state, this is where documents like the Tallinn Manual come in to un-blur the lines between the two. 4 | Page 2. Vision Our overall objective is to support national security and enable a well-functioning, self-sustaining society. The outcome from this strategy is to have a viable plan and solution for those who wish to compromise national security within the next 4 years, protection of the fundamental pillars responsible for the functioning of society need to be protected to protect the nation dynamically, the number of organizations that reported they have suffered a security breach in the past year had risen from 25%, where 7/10 of these attacks involved a virus, spyware or malware. (DR REBECCA KLAHR, 2016) The primary missions are to - Defend all critical network, system, and information infrastructures - Prepare the nation’s capabilities to be able to defend against a sizable cyber- attack from foreign actuators. - Provide support and training to civilian personal to bolster awareness and to provide early learners program for the development of future generation. 2.1. Threats There are many potential threats that have proved to have different dynamics for attack, therefore certain groups and individuals need to be identified in order to prepare for effective defence against them. (HMGOV, 2016) - Cyber Criminals, one of the most common and broadest threat identities to have, the main objective or desired outcome for this group is to develop types of malware or viruses to hack and steal sensitive data for financial gain or to deliberately cause damage to systems in aid of their personal goals. Certain security defence mechanisms have been devised to mitigate some of the within [4] the defence implantation section of this report. - State and State Sponsored attacks, this involves the penetration of a network with motives for political, diplomatic, technological, commercial, and strategic advantage, with primary focuses on government, defence, finance, energy and telecommunication sectors (HMGOV, 2016) . This type of threat is highly regarded as ‘cyber-warfare’, due to the initiation of the attack commonly 5 | Page belonging to foreign sources. Typically, attacks with this motive have been state sponsored, examples such as the Stuxnet worm, which managed to infiltrate Iran’s nuclear infrastructure and sabotage their Nuclear operations, was suspected to be carried out by US and Isreali operatives, however it has not been confirmed by either party so cannot be regarded as an ‘act of war’. (Schmitt, 2013) (Caso, 2014) - Terrorists, the war against terrorism is nothing new, expectedly, terrorism is become more sophisticated and advanced retrospective with new developments in technology, although traditional terror methods still need to be addressed,