Finding needles in needle stacks - or Future aspects of cyber security

56
Finding Needles in Needle Stacks or Future aspects of Cyber Security Peter Cochrane cochrane.org.uk ca-global.biz COCHRANE a s s o c i a t e s Thursday, 21 November 13

description

The big challenge facing cyber security professionals is to think like the enemy, anticipate their next move, and enact measures to combat the exponentially growing number of attacks. Passively monitoring defences in the hope of detecting probes and breaches is insufficient as it is likely that threats are already on the inside in human, machine, or some malware form. And these may be continually active, sporadic, dormant, sleeping, dumb, smart, intelligent, broad or highly focused, and located anywhere in an organisation, machine, device or network. Fortunately, Cloud Technologies and new working practices mitigate agains all this, but only if we leverage new technologies and nurture new behaviours and operating strategies. We are no longer looking for a ‘needle in a haystack’ but bent needles, or even needles prone to bending, in a ‘needle stack’. Layered defences such as multiple firewalls, virus protection, malware scanners, people screening and sporadic checks are insufficient. We have to be more sophisticated and consider the activity traits and sociology of people, machines, networks and malware. Perhaps most importantly this has to be achieved without degrading the performance of systems, networks, individuals and organisations. To achieve effective cyber security solutions we have to migrate to a more organic, globally cooperative, and fully networked model that sees a new detection, reaction and solution sharing regime between companies and countries. And as the technology (good and bad) continues to accelerate and spread the end point will most likely be the realisation of a ‘living cyber immune system’ devoid of human intervention.

Transcript of Finding needles in needle stacks - or Future aspects of cyber security

Page 1: Finding needles in needle stacks  - or  Future aspects of cyber security

Finding

N e e d l e s in

N e e d l e S t a c k sorFuture aspects of Cyber Security

Peter Cochrane cochrane.org.uk

ca-global.biz

COCHRANE a s s o c i a t e s

Thursday, 21 November 13

Page 2: Finding needles in needle stacks  - or  Future aspects of cyber security

C y b e r S e c u r i t y

- Attacks are growing and are increasingly sophisticated- We need to up our game & become more anticipatory

There

are no

simple

or sing

ular s

olutio

ns

Thursday, 21 November 13

Page 3: Finding needles in needle stacks  - or  Future aspects of cyber security

Finding the

B e n t N e e d l e s or

N e e d l e s a b o u t t o b e n dThe good majority

The evil minority

The potentially evil

Thursday, 21 November 13

Page 4: Finding needles in needle stacks  - or  Future aspects of cyber security

C y b e r I N S e c u r i t yWhat we know for sure - There is always a threat

- The threat never sleeps- The threat evolves rapidly

People are by far the biggest risk factor

The perceived threat ⧣ the actual threat

The biggest threat is always on the inside

Security people are never their own customer

The best defenders have been the best attackers

Cracking systems is far more fun than defending them

The biggest threat is in the direction you are not looking

Resources are generally deployed inversely proportional to actual riskThursday, 21 November 13

Page 5: Finding needles in needle stacks  - or  Future aspects of cyber security

Breaking intomost companies and institutionsreally isn’t all that difficult!

Thursday, 21 November 13

Page 6: Finding needles in needle stacks  - or  Future aspects of cyber security

Thebiggestthreatsare

inside

the

FireWall

Rogue:Equipment NetworksChipsCodePortsPeople

Lax:PeopleVisitorsSecurityOperations

Thursday, 21 November 13

Page 7: Finding needles in needle stacks  - or  Future aspects of cyber security

No single solutioncan deal with all forms of attack....

Thursday, 21 November 13

Page 8: Finding needles in needle stacks  - or  Future aspects of cyber security

Fire Walls andmalware protection are certainly not enough...

Thursday, 21 November 13

Page 9: Finding needles in needle stacks  - or  Future aspects of cyber security

Reproduced Courtesy of Akamai 2013

C y b e r A t t a c k sMajor Country Nodes

Thursday, 21 November 13

Page 10: Finding needles in needle stacks  - or  Future aspects of cyber security

Reproduced Courtesy of Akamai 2013

C y b e r A t t a c k sMajor Tra f f i c Po r t s

Thursday, 21 November 13

Page 11: Finding needles in needle stacks  - or  Future aspects of cyber security

Financial 34.4%

Payment Services 32.1%

Gaming 14.7%

ISP 9.5%

Other 6.78%

Social Nets 6.0%Retail 5.12%

Auctions 2.07%Government 1.0%

Classifieds 0.3%

P r i m a r y C y b e r T a r g e t s Q4 2012

Thursday, 21 November 13

Page 12: Finding needles in needle stacks  - or  Future aspects of cyber security

Data Courtesy of Detica 2011

2004 2005 2006 2007 2008 2009 2009 2011 2012

200

150

100

50

0

$Bn

17Bn 21Bn

100Bn

>200Bn

C y b e r C r i m e > > C Y B E R - S E C U R I T YNot clear which side is spending more on software

The cost of cyber crime

Cyber Defence

expenditure

Thursday, 21 November 13

Page 13: Finding needles in needle stacks  - or  Future aspects of cyber security

C y b e r S e c u r i t yImprovements for free ?

What will we benefit from if we don nothing ?

Thursday, 21 November 13

Page 14: Finding needles in needle stacks  - or  Future aspects of cyber security

A multi-device, multi-screen,mobile world, of rapidly

renewed and replaced devices,new and updated apps

With built-in security features

automatically updated

Connectingon the

move via wifi, 3G, 4G, LTE,

BlueTooth AnyNetAny

where

BYOD = Fewer corporate constrains and greater variabilitiesBMOB = Be My Own Boss - shorter assignment periods

Increasinglytransientpeople &machinebehaviour

Thursday, 21 November 13

Page 15: Finding needles in needle stacks  - or  Future aspects of cyber security

Many networksto attack not just one

3,4,5G,LTE, WiFiWiFi WiMaxBlueTooth ++

Thursday, 21 November 13

Page 16: Finding needles in needle stacks  - or  Future aspects of cyber security

Many OS typesto attack not just one

Thursday, 21 November 13

Page 17: Finding needles in needle stacks  - or  Future aspects of cyber security

Many applicationsto attack not just one

Thursday, 21 November 13

Page 18: Finding needles in needle stacks  - or  Future aspects of cyber security

InterfaceBoardsChips

ConfigFirmware

Huge devicevariance

Thursday, 21 November 13

Page 19: Finding needles in needle stacks  - or  Future aspects of cyber security

CircuitryLayout

AntennasAnalogue

DesignFacilities

Huge hardwareand circuitvariance

Thursday, 21 November 13

Page 20: Finding needles in needle stacks  - or  Future aspects of cyber security

On Grid

On & Off Grid

Off Grid

Far more variable human and device connection

behaviours

Thursday, 21 November 13

Page 21: Finding needles in needle stacks  - or  Future aspects of cyber security

A fast spreading realisation that this really isn’t good enough!

Thursday, 21 November 13

Page 22: Finding needles in needle stacks  - or  Future aspects of cyber security

is sufficient

No One

security

technique

The concatenation of multiple low cost methods rapidly

delivers a very high level of protection

HabitsPersonal

LocationsNetworks BiometricsKnowledge++++++++

Thursday, 21 November 13

Page 23: Finding needles in needle stacks  - or  Future aspects of cyber security

S O M E T H I N G S Unique to you a loneWhat you:

arewereknowdrove

work onwearownuseeatdo+

Who you: work with

live withmanagementordislike

+++

Why you:like

dislikeprefer

thoughtimaginedmigratedassumed

helpedfailedwon

++

How you:talk

type stand

appearwritewalk

++

Thursday, 21 November 13

Page 24: Finding needles in needle stacks  - or  Future aspects of cyber security

But whatabout the cloud ?

Thursday, 21 November 13

Page 25: Finding needles in needle stacks  - or  Future aspects of cyber security

çF U T U R E N E T W O R K I N GThe Internet wil l not Scalefunctionally or economically

9Bn People and >> 50Bn Things on line

2013 2025

But Clouds/Cloud working will !

<5Bn People on (and off) line

Thursday, 21 November 13

Page 26: Finding needles in needle stacks  - or  Future aspects of cyber security

Thursday, 21 November 13

Page 27: Finding needles in needle stacks  - or  Future aspects of cyber security

Data courtesy of Cisco.

R E C E N T H E A D L I N E

Thursday, 21 November 13

Page 28: Finding needles in needle stacks  - or  Future aspects of cyber security

Mobile networksbut a minor

player !

Thursday, 21 November 13

Page 29: Finding needles in needle stacks  - or  Future aspects of cyber security

ç

More degrees of freedom to exploit that make it all inherently more secure than anything we have seen before

C y b e r S e c u r i t yClouds change everything

Thursday, 21 November 13

Page 30: Finding needles in needle stacks  - or  Future aspects of cyber security

Axiom..

1,000,000s

of Clouds

and not 1Thursday, 21 November 13

Page 31: Finding needles in needle stacks  - or  Future aspects of cyber security

And they come in many forms

- Corporate- Government- Private- Personal- Long term- Sporadic

- Visible- Invisible- Dynamic- Fixed- Mobile- Wireless- Wired

- Open- Closed- Secure- Insecure- Regular- Unknown- Unquantified- Experimental

Thursday, 21 November 13

Page 32: Finding needles in needle stacks  - or  Future aspects of cyber security

ç

Diverse routing and increasingly hidden and disguised data storage in depth

C y b e r S e c u r i t yHidden by multi-hop depth

InvisibleC l o u d

Corporate/Private/Government

C l o u d

P u b l i c/ O p e nC l o u d

InvisibleC l o u d

InvisibleC l o u d

InvisibleC l o u d

Corporate/Private/Government

C l o u d

Thursday, 21 November 13

Page 33: Finding needles in needle stacks  - or  Future aspects of cyber security

ç

Every Cloud demands a key and all routings are hidden - data parsed/coded

C y b e r S e c u r i t yIn Cloud Gating/Encryption

Thursday, 21 November 13

Page 34: Finding needles in needle stacks  - or  Future aspects of cyber security

T h e B i g g e s t R i s k

Service providers do not guarantee your data!

Thursday, 21 November 13

Page 35: Finding needles in needle stacks  - or  Future aspects of cyber security

we need SCAlable

networkSolut ions

Thursday, 21 November 13

Page 36: Finding needles in needle stacks  - or  Future aspects of cyber security

This isn’t tenable...

Thursday, 21 November 13

Page 37: Finding needles in needle stacks  - or  Future aspects of cyber security

This is...

Thursday, 21 November 13

Page 38: Finding needles in needle stacks  - or  Future aspects of cyber security

Smart car...Smart gas...Smart net...

Thursday, 21 November 13

Page 39: Finding needles in needle stacks  - or  Future aspects of cyber security

C l o u d s c o n n e c t dynamically, driven by need, location, work, groups and associations...

Thursday, 21 November 13

Page 40: Finding needles in needle stacks  - or  Future aspects of cyber security

T H E S e c u r i t y P r o b l e mEven deeper protection required

Thursday, 21 November 13

Page 41: Finding needles in needle stacks  - or  Future aspects of cyber security

DETECTIONBUILT INTO

EVERY ELEMENT

OF A DEVICE

Thursday, 21 November 13

Page 42: Finding needles in needle stacks  - or  Future aspects of cyber security

On Server

On Device

In Network

In Individual Apps

In Hardware

Thursday, 21 November 13

Page 43: Finding needles in needle stacks  - or  Future aspects of cyber security

H o n e y p o t , a n d m a l w a r e t r a p s , distributed across the cloud spectrum

Thursday, 21 November 13

Page 44: Finding needles in needle stacks  - or  Future aspects of cyber security

Data decimation and distribution with individual encryption

Thursday, 21 November 13

Page 45: Finding needles in needle stacks  - or  Future aspects of cyber security

Dynamic Addressing

url hopping

Thursday, 21 November 13

Page 46: Finding needles in needle stacks  - or  Future aspects of cyber security

Ghost Cloud

Ghost Device

Have an alias, be invisible, don’t be what you appear, be there but absent...

Thursday, 21 November 13

Page 47: Finding needles in needle stacks  - or  Future aspects of cyber security

Distributed Attacks demand aDistributed Defence

Dynamic Attackers necessitateDynamic Defenders

We can act a lone or we can uniteand a c t toge the r

Thursday, 21 November 13

Page 48: Finding needles in needle stacks  - or  Future aspects of cyber security

M O R E C Y B E R - B E N E F I T S Going for free in the default future

Thursday, 21 November 13

Page 49: Finding needles in needle stacks  - or  Future aspects of cyber security

Fewer full time people

and less predictablecorporate/network/device/

behavior

Thursday, 21 November 13

Page 50: Finding needles in needle stacks  - or  Future aspects of cyber security

People job and location Half Lifegetting shorter

Thursday, 21 November 13

Page 51: Finding needles in needle stacks  - or  Future aspects of cyber security

Data Half Lifegetting shorter

and shorter

Mean Time to Destruction

unknown!

Thursday, 21 November 13

Page 52: Finding needles in needle stacks  - or  Future aspects of cyber security

The Ace in theHole

Global CooperationDevice, App, Network

Thursday, 21 November 13

Page 53: Finding needles in needle stacks  - or  Future aspects of cyber security

Finding Those NeedlesThe sociology and habits of

ApplicationsNetworksMachinesSoftwareMalware

PeopleBugs

++

Thursday, 21 November 13

Page 54: Finding needles in needle stacks  - or  Future aspects of cyber security

T H E E N D G A M E

We all own multiple

clouds

Things cooperateinter and extra community to

defeat attacks

AI systems monitoractivities and identify trends to thenanticipate andfend off allattacks

Auto-immune response systems emerge aspart of the overallevolving behaviours

Thursday, 21 November 13

Page 55: Finding needles in needle stacks  - or  Future aspects of cyber security

The Art of War by Sun Tzu, 600 BC

“Speed is the essence of war. Take advantage of the enemy's unpreparedness ; t rave l by unexpected routes and strike him where he has taken no precautions”

Thursday, 21 November 13

Page 56: Finding needles in needle stacks  - or  Future aspects of cyber security

Thank You

cochrane.org.ukca-global.org

COCHRANE a s s o c i a t e s

Thursday, 21 November 13