SlideShare a Scribd company logo
1 of 28
Cyber(in)security:
systemic risks and
responses
Dr Ian Brown
Oxford University
Non-systemic risks
 Cyber graffiti: defacement of Web sites for
propaganda and bragging
 Cyber fraud: so far largely containable within
financial system (low $bns)
 “Terrorists get better returns from much
simpler methods such as car bombs. Cyber
terror is too low key: not enough dead bodies
result, and attacks are too complex to plan
and execute.” (Dr Juliette Bird, NATO)
Cybercriminals and “patriots”
 Market participants -
custom virus writers,
bot herders, mafias
 Nation state attacks
(Estonia, Georgia) –
how far were “patriotic
hackers” coordinated
by state?
“Pure” cyber war
“The ‘Korean’ cyber incidents … were annoying and for some
agencies, embarrassing, but there was no violence or
destruction... Cybercrime does not rise to the level of an act of
war, even when there is state complicity, nor does espionage –
[which] are the activities that currently dominate cyber
conflict... Estonia and Georgia … came under limited cyber attack
as part of larger conflicts with Russia, but in neither case were
there casualties, loss of territory, destruction, or serious
disruption of critical services. ” (Lewis, 2009: 2—3).
“At best, these operations can confuse and frustrate operators of
military systems, and then only temporarily. Thus, cyberwar can
only be a support function for other elements of warfare” (Libicki,
2009: xiv—xv)
Cyber espionage/sabotage
 TITAN RAIN: Incursions into DoD,
German chancellory, Whitehall,
NASA, Lockheed Martin…
 Google attack aimed at “high-tech
information to jump-start China's
economy and the political
information to ensure the survival of
the regime” –James Lewis
 “[I] listened and lip-synced to Lady
Gaga’s ‘Telephone’ while exfiltrating
possibly the largest data spillage in
American history” -SPC Bradley
Manning
 Stuxnet/Flame/DuQu
US offensive operations
 231 offensive ops in 2011 – “to manipulate,
disrupt, deny, degrade, or destroy information
resident in computers or computer networks, or
the computers and networks themselves”
 $652m project GENIE to place tens of thousands
of “covert implants” each year in computers,
routers & firewalls – through equipment
interception, access, and hacking (TAO)
 TURBINE can manage millions of implants for
intelligence gathering and active attack
Implants in the supply chain
NSA/CIA/FBI/DoD Trusted
Partners
 Bloomberg 14/6/13: “Thousands of technology,
finance and manufacturing companies are
working closely with U.S. national security
agencies, providing sensitive information and in
return receiving benefits that include access to
classified intelligence”
 “Some U.S. telecommunications companies
willingly provide intelligence agencies with access
to facilities and data offshore that would require a
judge’s order if it were done in the U.S.”
NSA partners
How can the democracies…
 Design and execute strategic responses
that carefully target threats, avoiding
where possible tactical arms races?
 Get the best return on their security
investment?
 Enhance the soft power potential of the
Internet as a platform for democracy?
Strategic goals
 Availability & integrity of critical services (CNI)
 Protection of confidential information
 Manageable levels of fraud
 …all in cost-effective form, where costs include
inconvenience, enhancement of fear, negative
economic impacts & reduction of liberties (John
Mueller, The quixotic quest for invulnerability,
2008)
Counter-terrorism and mass
surveillance
 ~5000 Americans surveilled under Presidential Surveillance
Programme 2001-2005; led to <10 warrants per year
 “[T]here is not a consensus within the relevant scientific
community nor on the committee regarding whether any
behavioral surveillance … techniques are ready for use at all
in the counterterrorist context”; –US National Research
Council (2008) p.4
 “Fifty-four times this and the other program stopped and
thwarted terrorist attacks both here and in Europe—saving
real lives” -Rep. Mike Rogers
 Bulk phone record access “has not played a significant role
in preventing any terrorist attacks to this point” -Former
Acting CIA Director Mike Morrell to US Senate Judiciary
Committee
Reducing systemic risk
 Isolate critical systems from public
Internet and each other, and set much
higher security standards
 Enhance risk management, robustness
and continuity planning in Critical
National Infrastructure systems
 Use Content Distribution Networks and
other load balancing systems to increase
performance and resilience of public-
facing systems
Redistributing liability
 ENISA and UK House of Lords S&T Committee:
should liability be shifted to some combination
of software vendors, ISPs and financial
institutions?
 Most software licences disclaim all liability
 Intended to incentivise much more secure
system engineering (e.g. least-privilege
processes, enforced by formally verified security
kernel)
Conclusions
 Security interventions need to be carefully
targeted to minimise costs and maximise long-
term RoI
 Reducing vulnerabilities and increasing
availability is key long-term security response
 Liability redistribution is mechanism to force key
actors to internalise external costs
 New mechanisms needed for verification of
security properties of systems
Better security engineering
 Least-privilege processes, enforced by formally
verified security kernel
 Verification of device security before providing
network connectivity
 Two-factor authentication
 Full Disk Encryption esp. for removable media
 Perimeter controls to block sensitive data
exfiltration
 Air-gap most sensitive systems eg SCADA;
separate public-facing websites from internal
systems
Cross-government action
 Fund security R&D with INFOSEC agency
participation
 Use procurement, licensing and standardisation
power to require significantly higher security
standards in systems and services
 Use diplomacy to pressure state actors behind
Russian Business Network, DDoS attacks,
classified network incursions etc.
Costs of
cybercrime
Ross Anderson, Chris Barton, Rainer
Bohme, Richard Clayton, Michel J.G.̈
van Eeten, Michael Levi, Tyler
Moore, Stefan Savage (2012)
Measuring the Cost of Cybercrime,
Workshop on the Economics of
Information Security:
•“while terrorists try to be annoying as
possible, fraudsters are quite the opposite
and try to minimise the probability that they
will be the targets of effective enforcement
action.” (p.26)
•“we should perhaps spend less in
anticipation of computer crime (on antivirus,
firewalls etc.) but we should certainly spend
an awful lot more on catching and punishing
the perpetrators.” (p.26)
•“cybercrime is now the typical volume
property crime in the UK, and the case for
more vigorous policing is stronger than
ever.” (p.26)
Strategic impact
 Do security systems support or subvert the emergence of
democracy in authoritarian states?
 Do systems damage the values the “war on terror” is supposed
to be defending, e.g. by censoring websites or undertaking
warrantless wiretaps?
 “Techniques that look at people's behavior to predict terrorist
intent are so far from reaching the level of accuracy that's
necessary that I see them as nothing but civil liberty infringement
engines.” –Jeff Jonas, Chief Scientist, IBM Entity Analytics
Techie mumbo-jumbo
 Distributed Denial of Service (DDoS)
 Botnets (Secure Computing estimated
150k new zombies per day Q2 2008)
 Phishing (spear, rock), pharming
 … generally we already see a strong
response from CERTS, vendors, ISPs
EU Charter of Fundamental Rights
 Art. 7: Everyone has the right to respect for his or
her private and family life, home and
communications.
 Art. 8: Everyone has the right to the protection of
personal data concerning him or her.
 Art. 10: Everyone has the right to freedom of
thought, conscience and religion.
 Art. 11: Everyone has the right to … receive and
impart information and ideas
 Art. 12: Everyone has the right to freedom of
peaceful assembly and to freedom of association
Trapping the bot herders?
 Extremely difficult to track and successfully
prosecute bot herders
 Do we need Louis Freeh’s packet license-
plates?
 Better alternatives?
 Arrest when extortion demands are paid?
 Increase bandwidth to and globally replicate key
services using Akamai, anycast and related
technologies?
 Crowdsourced security (StopBadware)?
Phishing
 Symantec alone
blocking 8m e-mails
daily in 2006
 Similar criminal
ecology to DDoS -
custom virus writers,
botnet herders, site
operators,
spammers, mules
 96.6% of attacks are
on financial services
insitutions
Source: Anti-Phishing Working Group May 2007 report
Taking down the phishers?
 Targeted financial
services
institutions can
ask hosts to take
down sites
 Some hosts still
unresponsive
 Phishers moving
to botnet hosts
and more
sophisticated
frauds (escrow,
“sales reps”)
Source: R. Clayton & T. Moore (2007)

More Related Content

What's hot

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Down the Rabbit Hole
Down the Rabbit HoleDown the Rabbit Hole
Down the Rabbit Holejenniwheller
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
 
Why Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of SpeechWhy Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of SpeechThomas Lohninger
 
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...Table-ronde : Big data, partage des données et communs à l'échelle régionale ...
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...Fund for Democratic Culture
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conferenceJames Nesbitt
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenPaul van Heel
 
Underwater Communication Cable Network of South America
 Underwater Communication Cable Network of South America Underwater Communication Cable Network of South America
Underwater Communication Cable Network of South AmericaAlexis Soto-Colorado, AICP
 
Mediation, technology and mixed reality
Mediation, technology and mixed realityMediation, technology and mixed reality
Mediation, technology and mixed realityEl No
 
Mass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and ChoicesMass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and ChoicesMike Linksvayer
 
Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Mike Linksvayer
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse BrandaoPaul van Heel
 

What's hot (20)

net neutrality
net neutralitynet neutrality
net neutrality
 
General Elder- Homeland Security Presentation
General Elder- Homeland Security PresentationGeneral Elder- Homeland Security Presentation
General Elder- Homeland Security Presentation
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Down the Rabbit Hole
Down the Rabbit HoleDown the Rabbit Hole
Down the Rabbit Hole
 
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...
 
Why Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of SpeechWhy Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of Speech
 
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...Table-ronde : Big data, partage des données et communs à l'échelle régionale ...
Table-ronde : Big data, partage des données et communs à l'échelle régionale ...
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van HoogstratenI4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
I4ADA 2019 - presentation Catherine Garcia-van Hoogstraten
 
Underwater Communication Cable Network of South America
 Underwater Communication Cable Network of South America Underwater Communication Cable Network of South America
Underwater Communication Cable Network of South America
 
Mediation, technology and mixed reality
Mediation, technology and mixed realityMediation, technology and mixed reality
Mediation, technology and mixed reality
 
Event Based Social Networks
Event Based Social NetworksEvent Based Social Networks
Event Based Social Networks
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
 
Mass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and ChoicesMass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and Choices
 
cscw
cscwcscw
cscw
 
Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 

Similar to Systemic cybersecurity risk

Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityAndrea Rossetti
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Cristian Driga
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 

Similar to Systemic cybersecurity risk (20)

Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Systemic cybersecurity risk

  • 2.
  • 3. Non-systemic risks  Cyber graffiti: defacement of Web sites for propaganda and bragging  Cyber fraud: so far largely containable within financial system (low $bns)  “Terrorists get better returns from much simpler methods such as car bombs. Cyber terror is too low key: not enough dead bodies result, and attacks are too complex to plan and execute.” (Dr Juliette Bird, NATO)
  • 4. Cybercriminals and “patriots”  Market participants - custom virus writers, bot herders, mafias  Nation state attacks (Estonia, Georgia) – how far were “patriotic hackers” coordinated by state?
  • 5. “Pure” cyber war “The ‘Korean’ cyber incidents … were annoying and for some agencies, embarrassing, but there was no violence or destruction... Cybercrime does not rise to the level of an act of war, even when there is state complicity, nor does espionage – [which] are the activities that currently dominate cyber conflict... Estonia and Georgia … came under limited cyber attack as part of larger conflicts with Russia, but in neither case were there casualties, loss of territory, destruction, or serious disruption of critical services. ” (Lewis, 2009: 2—3). “At best, these operations can confuse and frustrate operators of military systems, and then only temporarily. Thus, cyberwar can only be a support function for other elements of warfare” (Libicki, 2009: xiv—xv)
  • 6. Cyber espionage/sabotage  TITAN RAIN: Incursions into DoD, German chancellory, Whitehall, NASA, Lockheed Martin…  Google attack aimed at “high-tech information to jump-start China's economy and the political information to ensure the survival of the regime” –James Lewis  “[I] listened and lip-synced to Lady Gaga’s ‘Telephone’ while exfiltrating possibly the largest data spillage in American history” -SPC Bradley Manning  Stuxnet/Flame/DuQu
  • 7. US offensive operations  231 offensive ops in 2011 – “to manipulate, disrupt, deny, degrade, or destroy information resident in computers or computer networks, or the computers and networks themselves”  $652m project GENIE to place tens of thousands of “covert implants” each year in computers, routers & firewalls – through equipment interception, access, and hacking (TAO)  TURBINE can manage millions of implants for intelligence gathering and active attack
  • 8. Implants in the supply chain
  • 9. NSA/CIA/FBI/DoD Trusted Partners  Bloomberg 14/6/13: “Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence”  “Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S.”
  • 11. How can the democracies…  Design and execute strategic responses that carefully target threats, avoiding where possible tactical arms races?  Get the best return on their security investment?  Enhance the soft power potential of the Internet as a platform for democracy?
  • 12. Strategic goals  Availability & integrity of critical services (CNI)  Protection of confidential information  Manageable levels of fraud  …all in cost-effective form, where costs include inconvenience, enhancement of fear, negative economic impacts & reduction of liberties (John Mueller, The quixotic quest for invulnerability, 2008)
  • 13.
  • 14.
  • 15.
  • 16. Counter-terrorism and mass surveillance  ~5000 Americans surveilled under Presidential Surveillance Programme 2001-2005; led to <10 warrants per year  “[T]here is not a consensus within the relevant scientific community nor on the committee regarding whether any behavioral surveillance … techniques are ready for use at all in the counterterrorist context”; –US National Research Council (2008) p.4  “Fifty-four times this and the other program stopped and thwarted terrorist attacks both here and in Europe—saving real lives” -Rep. Mike Rogers  Bulk phone record access “has not played a significant role in preventing any terrorist attacks to this point” -Former Acting CIA Director Mike Morrell to US Senate Judiciary Committee
  • 17. Reducing systemic risk  Isolate critical systems from public Internet and each other, and set much higher security standards  Enhance risk management, robustness and continuity planning in Critical National Infrastructure systems  Use Content Distribution Networks and other load balancing systems to increase performance and resilience of public- facing systems
  • 18. Redistributing liability  ENISA and UK House of Lords S&T Committee: should liability be shifted to some combination of software vendors, ISPs and financial institutions?  Most software licences disclaim all liability  Intended to incentivise much more secure system engineering (e.g. least-privilege processes, enforced by formally verified security kernel)
  • 19. Conclusions  Security interventions need to be carefully targeted to minimise costs and maximise long- term RoI  Reducing vulnerabilities and increasing availability is key long-term security response  Liability redistribution is mechanism to force key actors to internalise external costs  New mechanisms needed for verification of security properties of systems
  • 20. Better security engineering  Least-privilege processes, enforced by formally verified security kernel  Verification of device security before providing network connectivity  Two-factor authentication  Full Disk Encryption esp. for removable media  Perimeter controls to block sensitive data exfiltration  Air-gap most sensitive systems eg SCADA; separate public-facing websites from internal systems
  • 21. Cross-government action  Fund security R&D with INFOSEC agency participation  Use procurement, licensing and standardisation power to require significantly higher security standards in systems and services  Use diplomacy to pressure state actors behind Russian Business Network, DDoS attacks, classified network incursions etc.
  • 22. Costs of cybercrime Ross Anderson, Chris Barton, Rainer Bohme, Richard Clayton, Michel J.G.̈ van Eeten, Michael Levi, Tyler Moore, Stefan Savage (2012) Measuring the Cost of Cybercrime, Workshop on the Economics of Information Security: •“while terrorists try to be annoying as possible, fraudsters are quite the opposite and try to minimise the probability that they will be the targets of effective enforcement action.” (p.26) •“we should perhaps spend less in anticipation of computer crime (on antivirus, firewalls etc.) but we should certainly spend an awful lot more on catching and punishing the perpetrators.” (p.26) •“cybercrime is now the typical volume property crime in the UK, and the case for more vigorous policing is stronger than ever.” (p.26)
  • 23. Strategic impact  Do security systems support or subvert the emergence of democracy in authoritarian states?  Do systems damage the values the “war on terror” is supposed to be defending, e.g. by censoring websites or undertaking warrantless wiretaps?  “Techniques that look at people's behavior to predict terrorist intent are so far from reaching the level of accuracy that's necessary that I see them as nothing but civil liberty infringement engines.” –Jeff Jonas, Chief Scientist, IBM Entity Analytics
  • 24. Techie mumbo-jumbo  Distributed Denial of Service (DDoS)  Botnets (Secure Computing estimated 150k new zombies per day Q2 2008)  Phishing (spear, rock), pharming  … generally we already see a strong response from CERTS, vendors, ISPs
  • 25. EU Charter of Fundamental Rights  Art. 7: Everyone has the right to respect for his or her private and family life, home and communications.  Art. 8: Everyone has the right to the protection of personal data concerning him or her.  Art. 10: Everyone has the right to freedom of thought, conscience and religion.  Art. 11: Everyone has the right to … receive and impart information and ideas  Art. 12: Everyone has the right to freedom of peaceful assembly and to freedom of association
  • 26. Trapping the bot herders?  Extremely difficult to track and successfully prosecute bot herders  Do we need Louis Freeh’s packet license- plates?  Better alternatives?  Arrest when extortion demands are paid?  Increase bandwidth to and globally replicate key services using Akamai, anycast and related technologies?  Crowdsourced security (StopBadware)?
  • 27. Phishing  Symantec alone blocking 8m e-mails daily in 2006  Similar criminal ecology to DDoS - custom virus writers, botnet herders, site operators, spammers, mules  96.6% of attacks are on financial services insitutions Source: Anti-Phishing Working Group May 2007 report
  • 28. Taking down the phishers?  Targeted financial services institutions can ask hosts to take down sites  Some hosts still unresponsive  Phishers moving to botnet hosts and more sophisticated frauds (escrow, “sales reps”) Source: R. Clayton & T. Moore (2007)

Editor's Notes

  1. http://www.arbornetworks.com/asert/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/
  2. http://www.washingtonpost.com/wp-dyn/content/article/2010/01/13/AR2010011300359.html http://www.wired.com/threatlevel/2010/06/leak/ http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet
  3. http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html
  4. http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
  5. Reduce systemic fraud risks
  6. Commission work - LAP. ENISA &amp; telecoms consultation.
  7. Top 20 Security Risks from SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI
  8. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.pdf
  9. Fundamental limit on the powers of the state and protection of autonomy, dignity and minority groups
  10. 900-1000 unique phishes
  11. http://www.lightbluetouchpaper.org/2007/08/24/phishing-website-removal-comparing-banks/