Protect Your Enterprise with Secure and Resilient Information Flow Aviation Week Aerospace and Defense Cybersecurity Forum 31 March 2010 Robert F. Brammer, Ph.D. VP Advanced Technology and CTO Northrop Grumman Information Systems HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Key Points for This Presentation • Enterprise information systems and services are increasing in size, distribution, functionality, and value – Includes both IT networks and infrastructure networks – Rapid develop of new architectures, standards, and products – Increasing business significance but also larger and more valuable targets • Threats are increasing rapidly in sophistication, breadth, and speed – “The Advanced Persistent Threat” is a primary example • Protection of the enterprise requires a multidimensional strategy – Northrop Grumman addresses challenges with significant investments – Layered architecture, facilities, advanced research, education and training, professional activity leadership, … • A strategy, operations and research plans, and significant investments are needed – Passwords and patching are not adequate – Cyber threats and defenses will be continually evolving – Long-term issue HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) THE GROWTH OF ENTERPRISE INFORMATION SYSTEMS AND SERVICES HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Global Information Transformation • Nearly 2B Internet users globally – Internet World Stats • US e-commerce grew 11% in 2009 to $155B, another 11% growth expected in 2010 – Forrester Research • Americans consumed 3.6 zettabytes of information in 2008 -- UCSD HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Cisco Network Traffic Forecasts Global IP traffic will increase by a factor of three from 2010 to 2013, approaching 56 exabytes per month in 2013, compared to approximately 9 exabytes per month in 2008. By 2013, annual global IP traffic will reach two-thirds of a zettabyte (673 exabytes). By 2013, the various forms of video (TV, VoD, Internet Video, and P2P) will exceed 90 percent of global consumer traffic. By 2013, global online video will be 60 percent of consumer Internet traffic (up from 35 percent in 2010). Mobile data traffic will roughly double each year from 2010 through 2013. Cisco Visual Networking Index HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) New Information System Architectures Green IT Optical Networks HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Mobile Computing Critical Infrastructure Enterprises • Infrastructure networks interface directly to 3D world – Nodes – generators, terminals, ports, storage, … – Links – pipelines, transmission lines, tunnels, … – Traffic – objects, material, … • Cyberspace networks are used for control and reporting • Convergence of networks, technologies, and interfaces – Significant performance and cost benefits – SmartGrid initiatives are a significant example – Significant security implications Transportation Water Treatment Chemical Production Oil Refineries Electric Power Generation and Grid Control HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Network Convergence and Integration • “Network Convergence” has multiple industry implications – Data, voice, video in a single network – Cyber and infrastructure networks in a single network – Protocols – moving to IP-based protocols from local protocols – Network interfaces – connecting sensors and control rooms to the Internet and to corporate WANs – “An Internet of things” • Network integration occurs in corporate and government reorganizations, M&A, … • Many operational and security R&D issues arise from immature technology, processes, and management HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) THREATS TO THE ENTERPRISE HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Cybersecurity – “A Severe Threat” “The national security of the United States, our economic prosperity, and the daily functioning of our government are dependent on a dynamic public and private information infrastructure, which includes telecommunications, computer networks and systems, and the information residing within. “ “This critical infrastructure is severely threatened.” Dennis Blair US Intelligence Community Annual Threat Assessment February 2, 2010 NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Cyberespionage and the Theft of Intellectual Property Broad New Hacking Attack Detected Global Offensive Snagged Corporate, Personal Data at nearly 2,500 Companies Wall Street Journal February 18, 2010 “Hackers in Europe and China successfully broke into computers at nearly 2,500 companies and government agencies over the last 18 months in a coordinated global attack that exposed vast amounts of personal and corporate secrets to theft, …” US oil industry hit by cyberattacks: Was China involved? Christian Science Monitor January 25, 2010 “At least three US oil companies were the target of a series of previously undisclosed cyberattacks that may have originated in China and that experts say highlight a new level of sophistication in the growing global war of Internet espionage.” “… the FBI alerted them that year and in early 2009. Federal officials told the companies proprietary information had been flowing out, including to computers overseas, …” “The oil and gas industry breaches, were focused on one of the crown jewels of the industry: valuable “bid data” detailing the quantity, value, and location of oil discoveries worldwide, “Industry estimates of losses from intellectual property to data theft in 2008 range as high as $1 trillion.” Whitehouse Cyberspace Policy Review May 2009 NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I The Growth of Internet Crime “Of the top five categories of offenses reported to law enforcement during 2009, non-delivered merchandise and/or payment ranked 19.9%; identity theft, 14.1%; credit card fraud, 10.4%; auction fraud, 10.3%; and computer fraud (destruction/damage/vandalism of property), 7.9%.” HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Coordinated Cyber and Physical Attacks Coordinated Cyber Attacks • Cyber pre-attack – Targeting, espionage, disinformation, … • Real-time cyber attack – suppression of comms and response • Cyber post-attack – target backup and recovery Banking and Finance Government People Water Physical Attack Transportation Electric Power Communications Oil and Natural Gas Emergency Response Military Before the Russian invasion into Georgia commenced, cyber attacks were already being launched against a large number of Georgian governmental websites, making it among the first cases in which an international political and military conflict was accompanied – or even preceded – by a coordinated cyber offensive. Cooperative Cyber Defence Center Of Excellence Tallinn, Estonia November 2008 HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) New Architectures Lead to New Security Questions and Challenges • New architectures lead to many functionality, performance, and cost advantages • Resulting security issues are far too often underestimated Twitter phishing hack hits BBC, PCC … and Guardian … and cabinet minister … and bank The Guardian Thousands of Twitter users have seen their accounts hijacked after a viral phishing attack which sends out messages saying "this you??“ How to Plan for Smartphone Security in the Enterprise eWeek 2009-07-13 One of the major challenges CIOs face is the deployment and security of smartphones in the enterprise. February 26, 2010 Web 2.0 a Top Security Threat in 2010, Survey Finds eWeek February 22, 2010 Internet security provider Webroot reports IT managers in small to midsize businesses believe malware spread through social networks, Web 2.0 applications and other Web-based vectors will pose the most serious risk to information security in 2010. HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Addressing the Threats • Many plans by government and industry are creating rapid growth in cybersecurity markets Power Up on Smart Grid Cyber Security Wall Street Journal February 25, 2010 “The M&A world is on fire right now when it comes to cyber-security issues relating to utility infrastructure,” Pike Research expects the global smart grid cyber security market to grow to $4.1 billion in 2013 at a compound annual growth rate of 35%.” “That squares against Morgan Stanley estimates…” NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I NORTHROP GRUMMAN CYBERSECURITY OPERATIONS HEADER / FOOTER INFORMATION (SUCH AS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I) Northrop Grumman Cybersecurity Operations Center Computer Network Defense Monitoring • Monitors the NGGN and related devices for signs of malicious activity Vulnerability Mgmt • Security risks and ensuring appropriate remediation Patch Management • Rapid deployment of vendor provided fixes to identified vulnerabilities Forensics • Information security postincident analysis Incident Response • Rapid response to malicious activity on the NGGN and related environments Cyber Threat • Analysis of emerging threats to the NGGN and related environments Sector • Sector-specific computer network defense requirements NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Security Includes Identity Management Multi-Layer Security Architecture Multi-Layered approach to security across our networks, systems, facilities, data, intellectual property, and other information assets Policies, architecture, processes, technology Access and configuration management NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Cybersecurity Awareness and Training Regular company-wide communications are strategic NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Northrop Grumman Cybersecurity Thought Leadership • Example – Paper on APT defense • Presented at the 13th Colloquium for Information Systems Security Education – University of Alaska, Fairbanks Seattle, WA June 1 - 3, 2009 • This paper describes some relevant Northrop Grumman security processes – Communicate APT risks – To increase awareness of situations that should alarm – To define the actions that employees should take to minimize these risks NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Northrop Grumman Cybersecurity Industry Leadership • Defense Security Information Exchange (DSIE) • National Security Information Exchange (NSIE) • • Corporate Executive Board - Information Risk Executive Council (IREC) Alliance for Enterprise Security Risk Management • Research Board - Digital Security Board (DSB) • US NATO delegate • TransGlobal Secure Collaboration (TSCP)/CertiPath • DoD – Defense Information Base (DIB) • FAA InfoSec Advisory Board • Internet Security Alliance (ISA) Board • Honeynet Project • Customer Advisory Councils – Microsoft, Oracle, ISS (IBM), EMC • Forum of Incident Response and Security Teams (FIRST) – Chairing, Future of First Task Force • US Computer Emergency Readiness Team (CERT) Portal Member • Formal Agreements with Intel & Law Enforcement • IT ISAC/NCC (Homeland Security) • Critical Warning Infrastructure Network (CWIN) member • National Infrastructure Advisory Council (NIAC) • Smart Card Alliance • National Security Telecommunications Advisory Council (NSTAC) • Partnership for Critical Infrastructure Security • Network Centric Operations Industry Consortium Robert F. Brammer Northrop Grumman NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I ADVANCED CYBERSECURITY RESEARCH NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Federal Cybersecurity Research • Growing recognition that the US has underinvested in cybersecurity • Requirements for cybersecurity research have been assessed many times by organizations like the National Academies, the National Science and Technology Council, the Federal Networking and Information Technology R&D Program, OSTP, DHS, and others • The 2010 Federal budget for cybersecurity research is $372M (DARPA, DOD services, NSA, NIST, NSF) – NITRD Presentation (March 2010) NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Northrop Grumman Cybersecurity Research Consortium Northrop links to academics to boost cyber defense Dec 1 2009 Northrop Joins With Academics For Cybersecurity Work December 1, 2009 • “Northrop Grumman Corp is joining with several U.S. universities in a consortium to address near and long-term Internet security.” • “…to find ways to secure computer hardware, software and systems that support information sharing around the globe.” NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I WASHINGTON (Reuters) - Northrop Grumman Corp unveiled Tuesday an industry-academic research group to tackle growing cyber threats to U.S. computer networks and to networked infrastructure. Labs for R&D in Cyber Assessment, Modeling, Simulation and Testing VASCIC Millersville, MD Range Operations Rapid Development Cyber Warfare Integration Network (CWIN) Superior Technology Assessment, Development & Transition, and Modeling & Simulation NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I CONCLUDING REMARKS NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Concluding Remarks • Protecting the enterprise is an increasingly difficult challenge – – – Many dimensions of enterprise growth Dynamic threat environment Protection requires multifaceted approach • Overall, cybersecurity problems will become worse before the status improves • Near-term progress is certainly possible – – • 90%+ of security problems arise from situations for which there are known solutions Need for improved implementations Cybersecurity is a long-term strategic issue for government and industry – – 22 Banking Breaches So Far in 2010 Report: Hacking, Insider Theft Continue to be Top Trends BankInfoSecurity March 23, 2010 There have been 173 reported data breaches so far in 2010, and 22 of these involve financial services companies. Case Study: Bank Defeats Attempted Zeus Malware Raids of Business Accounts Gartner Patching poorly designed systems is clearly not working Solutions will require sustained and multidisciplinary R&D and broad implementation NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I March 24, 2010