In the Crossfire International Cooperation and Computer Crime Stewart Baker.

20
In the Crossfire International Cooperation and Computer Crime Stewart Baker

Transcript of In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Page 1: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

In the CrossfireInternational Cooperation

and Computer Crime

Stewart Baker

Page 2: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

1815 1816Waterloo Mt. Tambora

Page 3: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

1817

Page 4: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

6th century BC

Page 5: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Stability and speed

Stability

Speed

A

B

C

Page 6: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

What Point B Looks Like

Page 7: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Stability and speed

Stability

Speed

A

B

C

Page 8: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

What Point C Looks Like

Page 9: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Summary • Attacks are already

heavy• Adoption of security

measures lags • The many roles of

governments – Regulator– Policeman– Attacker

Page 10: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

1. Attacks are already heavy

• 60% reported theft-of-service cyberattacks– Low: Germany, UK (42%)– High: India (83%), Brazil (77%), France (76%)

• 29% reported multiple large-scale denial of service attacks each month, and nearly two-thirds of those reported an impact on operations– High: France (60%), India (50%)

• 89% report infection with viruses or other malware• 70+% report a wide range of other attacks

– E.g., phishing and pharming.

• More sophisticated attacks like DNS poisoning or SQL injection are less common, but still widespread – more than half of respondents report these attacks

Page 11: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

2. Adoption of security measures lags behind the threat

• Basic, key security measures are not widely adopted

– Fewer than 60% patched and updated software on a regular schedule

– User name and password the most common form of login/authentication

– more than three-quarters of SCADA/ICS systems are connected to an IP network or the Internet

• nearly half of those admitted that these connections create unresolved security issues

• Security measure adoption rates vary widely by country

Page 12: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Security measure adoption rateMore than two dozen different security measures -- technologies,

policies and procedures

•Security Information and Event Management tools•Network access control measures•Intrusion prevention systems•Database security and access controls•Data leak prevention tools•Intrusion detection systems•Firewalls to public network•Firewalls between systems•Application whitelisting•Role and activity anomaly detection•Standardized desktop•Use threat monitoring service

•Encryption for –• Online transmission to network• Laptop hard drives• Individual emails• Data in databases• Data while in network storage• Tapes, portable media

•Authentication by –• User name and password• Token• Biometrics

•Regular patches and updates•Threat information sharing•Restrict or ban USB sticks

Page 13: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

China leads in adopting security measures

Page 14: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

3. The many roles of governments

• Regulators– Regulation seen as generally positive

• 74% have implemented new measures as a result of regulation• 58% say regulation has “sharpened policy and improved security”• 28% say it has “diverted resources from improving security to

recording/reporting incidents or other forms of compliance”

– Audit frequency varies widely

• Policemen– Widespread skepticism about governments’ ability to protect

networks

• Attackers, infiltrators and adversaries

Page 15: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Regulator: auditing to enforce compliance varies widely

Page 16: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Policeman: Little faith in laws against cyber-attack

Page 17: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Attacker: 60% believe governments are already attacking their country

Page 18: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Attacker: Many report government-style attacks

•Half report “stealthy infiltration by high-level adversary … like in Ghostnet”

•Half report DDOS attacks by “high-level adversaries” including governments:

Page 19: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

Attacker: United States and China are most feared; Russia is third

Page 20: In the Crossfire International Cooperation and Computer Crime Stewart Baker.

China the outlier

• Chinese executives report --

– Uniquely close cooperation with officials

– High levels of regulation and auditing

– Very robust confidence in government

– Much higher adoption of security measures

• China is taking concerted steps to bolster its industries’ defenses

• Are the steps effective?

– Chinese companies report low to average levels of attack and damage

– China does appear better protected than other large developing countries, such as India and Brazil