CERT Overview

CERT Overview

CERT Overview Jeffrey J. Carpenter <[email protected]> © 2008 Carnegie Mellon University Software Engineering Institute Department of Defense R&D Laboratory FFRDC Created in 1984 Administered by Carnegie Mellon University Headquartered in Pittsburgh, PA; offices and support worldwide 2 Strategy Create usable technologies Apply them to real problems Amplify their impact by accelerating broad adoption 3 SEI Technical Programs Networked Systems Survivability Software Engineering Process • Survivable Systems Engineering Management • Survivable Enterprise Management • Capability Maturity Model Integration • CERT Coordination Center • Team Software Process • Network Situational Awareness • Software Engineering Measurement • Practices Development and Training and Analysis Research, Technology, Acquisition Support and Systems Solutions* • Product Line Practice Other Research • Software Architecture Technology • Independent R&D • Predictable Assembly from • Mission Success in Complex Certifiable Code Environments • Integration of Software-Intensive • Ultra-Large-Scale Systems Systems • Software Assurance • Performance-Critical Systems • Software Assurance * In 2008, the Research, Technology, and Systems Solutions was formed by the merger or the Product Line Systems and Dynamic Systems programs. 4 The Morris Worm, November 1988 1988 Internet • 60,000 computers • 6,000 hosts affected by worm • NSFNET backbone upgraded to T1 (1.544Mbps) • research and education oriented • commercial use just beginning • CERT/CC created Robert Morris, Jr.; photo courtesy Computerworld. 5 In the beginning… The SEI established, with DARPA sponsorship, the Computer Emergency Response Team Coordination Center in 1988. The CERT/CC’s mission: • respond to security emergencies on the Internet • serve as a focal point for reporting & remediation of security vulnerabilities • serve as a model to help others establish incident response teams • raise awareness of security issues. 6 The original model 7 The Model Was Adopted and Evolved 8 And we evolved too Today’s Mission: To identify, develop, mature, and broadly transition new • system development practices . • management practices • system monitoring practices • incident investigation practices And technologies to protect the Nation’s critical systems and ensure they provide critical functionality and protect sensitive data, even in the face of attacks, accidents, and failures 9 Portfolio of Work Protect Detect Respond -- Vulnerability Discovery, -- Network Situational Awareness: -- Security Incident Response: Remediation & Alerts technologies, methods, studies, direct support, practices, services services -- Security Requirements -- International response team -- Malicious code: analysis Engineering development & coordination methods & tools, studies, -- Secure Development & services -- Forensics: method & Coding Practices tool development, --Threat identification: public -- Function Extraction support to investigators and private source for Software Assurance monitoring, alerts -- Improved Systems & -- Insider Threat: studies, Security Management mitigation practices, Practices detection technology Workforce Development Courses, curriculum materials, reference library, virtual training environment & lab, exercise network 10 CERT/CC Focus 11 Services over Time 12 CERT/CC Principles Principles 13 CERT/CC Relationships 14 Vulnerability Analysis Scope: Provide the primary analytical capability for analyzing vulnerabilities and disseminating information through the National Cyber Alert System. Areas: • Technical analysis - Perform technical analysis of vulnerabilities reported to gain insight into preconditions, impacts and scope. • Coordination - Work with vulnerability reporters and vendors to understand, resolve and disclose vulnerabilities as appropriate. • Publication - Develop and produce content for the National Cyber Alert System, which includes Technical Security Alerts, Security Alerts, and Vulnerability Notes • Rapid communication channels - Cultivate vendor relationships to ensure secure and rapid communication channels • Vulnerability Discovery – Take knowledge we learn from vulnerability analysis and apply it to help vendors reduce vulnerabilities in their products 15 .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us