Research Overview 05/20/21

Research Overview 05/20/21

Markowsky Research Overview 05/20/21 Research Overview Dr. George Markowsky Department of Computer Science Missouri University of Science & Technology 1 Research Overview • Two main areas • CS Theory & Mathematics • Algorithms • Combinatorics • Foundations of Computing • Quantum Computing • Cyber Society Lab – The Impact of Computing on Society • Voting – a series of talks in 2019 and 2020, worked with Missouri County Clerks • Modeling – Covid-19 • Cybersecurity – many topics, each worthy of a talk 2 High-level Cybersecurity 1 Markowsky Research Overview 05/20/21 Cybersecurity A High-Level Perspective Dr. George Markowsky Missouri University of Science & Technology 3 https://www.statista.com/statistics/615450/cybersecurity-spending-in-the-us/ 4 High-level Cybersecurity 2 Markowsky Research Overview 05/20/21 5 The loss is 7.5 times what we spend on cybersecurity! 6 High-level Cybersecurity 3 Markowsky Research Overview 05/20/21 7 8 High-level Cybersecurity 4 Markowsky Research Overview 05/20/21 9 What is Going On Here? • We spend ever more money for cybersecurity • Our losses continue to mount and grow annually • There is no end in sight • What can we do? 10 High-level Cybersecurity 5 Markowsky Research Overview 05/20/21 Return to First Principles 1. Know Your Enemy a. Who Is Attacking You and Why? 2. Know Yourself a. What are Your Vulnerabilities? b. The Internet of Things 3. Making the Abstract Concrete 11 Know Your Enemy 12 High-level Cybersecurity 6 Markowsky Research Overview 05/20/21 Multi-Level Cyber Struggle INSIDER THREATS! The levels are not independent! 13 Watch for Insiders and Trickery 14 High-level Cybersecurity 7 Markowsky Research Overview 05/20/21 15 Cyberwar • I would argue that we are currently engaged is a rather active cyberwar – I have a talk available on the concept of cyberwar • Do you think that criminal gangs can operate in Russia and China without the government knowing all about them? 16 High-level Cybersecurity 8 Markowsky Research Overview 05/20/21 17 Know Yourself 18 High-level Cybersecurity 9 Markowsky Research Overview 05/20/21 Most Common Causes of Data Breach • Weak and Stolen Credentials, a.k.a. Passwords • Back Doors, Application Vulnerabilities • Malware • Social Engineering • Too Many Permissions • Insider Threats • Improper Configuration and User Error 19 The Main Problem • Your own people! • Security is a bother • Security is too abstract • Complacency • Hopelessness • Do you think that the annual "cybersecurity training" at S&T is sufficient? • This is not to say, that there not technological problems – will return to this later 20 High-level Cybersecurity 10 Markowsky Research Overview 05/20/21 Making the Abstract Concrete 21 Cybersecurity is Too Abstract • Most people do not have a good intuitive grasp of cybersecurity • I believe that it is helpful to offer people physical models, so they better understand the issues • As we know, people respond emotionally to the concept of a "wall" and believe that walls offer security • It is actually quite instructive to look at some famous examples of walls and see what the benefits and drawbacks are 22 High-level Cybersecurity 11 Markowsky Research Overview 05/20/21 How Would You Attack This Wall? https://commons.wikimedia.org/wiki/File:GreatWall_2004_Summer_1A.jpg 23 https://en.wikipedia.org/wiki/Maginot_Line#/media/File:Maginot_Line_ln-en.svg 24 High-level Cybersecurity 12 Markowsky Research Overview 05/20/21 Castles • Castles provide another metaphor for security • Unfortunately, people think that they understand castles, but many people have the most simplistic ideas of castles • Castles were the logical product of hundreds of years experience in defense and incorporated a large number of useful defensive concepts that can be adapted to cybersecurity • I have a number of papers written on the subject of the cybercastle and how one can build better cyberdefenses based on historical ideas of security 25 26 High-level Cybersecurity 13 Markowsky Research Overview 05/20/21 RIVER Inner Wall Outer Wall Town Wall Outer Ward Inner Start with an Ward overall plan Moat Drawbridge Gate Fortified Town Gate Gate Unfortified Town 27 Clever Use of Topography Srebrenik Fortress in Srebrenik, Bosnia, inaccessibility of location with only a narrow bridge traversing deep canyon provides excellent protection. https://commons.wikimedia.org/wiki/File:Let_vrtulnikem11_-_hrad_Srebrenik_(13.-18._stol.)_jeste_lepe.jpg 28 High-level Cybersecurity 14 Markowsky Research Overview 05/20/21 Notice the Inner Walls Are Taller! Beaumaris Castle with curtain walls between the lower outer towers and higher inner curtain walls between the higher inner towers. https://commons.wikimedia.org/wiki/File:Beaumaris_aerial.jpg 29 Defending the Entrance 30 High-level Cybersecurity 15 Markowsky Research Overview 05/20/21 Castle Quiz – How Many of the Following Terms Can You Define? • arrow loop • embrasure • outer ward • bailey • flanking tower • palisade • barbican • footbridge • parapet walk • • bartizan foundation • pinnacle • batter • garderobe • battlement • great hall • portcullis • brattice • hoarding • postern • chapel • inner curtain • postern gate • chemise • inner ward • putlog hole • corbel • keep • rampart • corner tower • lists • stockade • covered parapet walk • machicolation • truss • crenelation • merlon • turret • • curtain wall moat • wall walk • drawbridge • outer curtain See also http://www.castlesontheweb.com/glossary.html 31 Lessons From The Cyber-Castle • Have a good plan for entire "city" and not just for the castle – secure network topology • Defense must be active • Concentric defenses • Inner defenses should support outer defenses • Plan good foundations • Have removable bridges, pathways • Use guile and deceit where possible • Direct your attackers where you want them to go • Know your attackers 32 High-level Cybersecurity 16 Markowsky Research Overview 05/20/21 Common Sense Defenses • Lock your doors (gates)! Bar your windows! • How many doors or windows does your cybercastle have? • More importantly, what constitutes a door or a window in a cybercastle? • How can you lock or bar it, if you don't know what it is? 33 High-level Cybersecurity 17.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us