Cyber Storm Findings

2006-09-14 Thread Michael . Dillon

A quote from the DHS's recently released report about their Cyberstorm 
exercise in Feb:
http://www.dhs.gov/interweb/assetlibrary/prep_cyberstormreport_sep06.pdf

Finding 3: Correlation of Multiple Incidents between Public and Private 
Sectors. Correlation of multiple incidents across multiple infrastructures 
and between the public and private sectors remains a major challenge. The 
cyber incident response community was generally effective in addressing 
single threats/attacks, and to some extent multiple threats/attack. 
However, most incidents were treated as individual and discrete events. 
Players were challenged when attempting to develop an integrated 
situational awareness picture and cohesive impact assessment across 
sectors and attack vectors.

And a question:
Do network operators have something to learn from these DHS activities
or do we have best practices that the DHS should be copying?

--Michael Dillon



Re: Cyber Storm Findings

2006-09-14 Thread Gadi Evron

On Thu, 14 Sep 2006 [EMAIL PROTECTED] wrote:
 
 A quote from the DHS's recently released report about their Cyberstorm 
 exercise in Feb:
 http://www.dhs.gov/interweb/assetlibrary/prep_cyberstormreport_sep06.pdf
 
 Finding 3: Correlation of Multiple Incidents between Public and Private 
 Sectors. Correlation of multiple incidents across multiple infrastructures 
 and between the public and private sectors remains a major challenge. The 
 cyber incident response community was generally effective in addressing 
 single threats/attacks, and to some extent multiple threats/attack. 
 However, most incidents were treated as individual and discrete events. 
 Players were challenged when attempting to develop an integrated 
 situational awareness picture and cohesive impact assessment across 
 sectors and attack vectors.
 
 And a question:
 Do network operators have something to learn from these DHS activities
 or do we have best practices that the DHS should be copying?

On the level of response and mitigation on networks, they have a lot to
learn. On coordinated response and strategic view of situations across
networks, we all definitely can learn from them, only that I don't believe
such issues affect the work of individual network operators to that level.

Is my network up and running?

Is the Internet up and running or is my competitor up and running is
secondary until the point where it affects you.

I don't see it as a bad thing, as that's the job description, but that
will become more apparent in the future.

 
 --Michael Dillon
 



Re: Cyber Storm Findings

2006-09-14 Thread Travis Hassloch

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[EMAIL PROTECTED] wrote:
 Finding 3: Correlation of Multiple Incidents between Public and Private 
 Sectors. Correlation of multiple incidents across multiple infrastructures 
 and between the public and private sectors remains a major challenge...
 And a question:
 Do network operators have something to learn from these DHS activities
 or do we have best practices that the DHS should be copying?

First impressions;

The point here relates specifically to awareness across organizational
lines, and I'd say that both public and private industries have issues
with sharing information with anyone outside their organization,
especially with competitors (ideological, national, or financial).

It doesn't really matter whether you're public or private; what matters
is how broad your scope is.  I'm sure that backbone providers have a
broader view than a leaf node, and that the networking unit in a
particular government department is equally situated when compared to
an individual remote site.

I think that with cryptography we could alleviate some of the concerns
with information sharing between enterprises; that allows us to
establish a larger, shared view of things.  This has a few benefits;
we see the problems earlier than the average leaf, and we have more
data to analyze trends than the average leaf.  However, I think that
nobody has made a proper business case for expending the effort, or
if someone has that they have not communicated it widely enough.
It's not enough for technicians to know, you have to have simple
slogans or tragedies large enough that you can point to them and
say that's what this would have avoided.

I would say that large banks have the best combination of bigness
and resources that they can employ, and IIRC have some sort of
exclusive information-sharing arrangement about security
incidents; they are not allowed to share that information, even
with the government, except perhaps under subpoena.  Well, that
was true in the pre-PATRIOT act days.  I know that they are big enough
to see malware on occasion before the anti-virus companies see it.

Sadly, governments almost always seem to be preparing for the last
war, or avoiding yesterday's problem.  I believe that this is a
direct consequence of the fact that they attract the most risk-averse
employees.  In the clearance world, being a risk-taker is considered a
disqualifying factor.  There's a lot of competitiveness for the
limelight, and a lot of decisions are made based on trying to make
others appear foolish, or to cover up your own mistakes, not only
because they desire job security, but also because a lot of the
attention is negative.  It seems like the government's failures
are usually public, and their successes unquantifiable.  How many
intrusions did you stop?  Who knows?  When it can't be quantified,
or it's really technical, it's subject to internal spin or
scapegoating or... well, politics.

Also, government agencies have an inherent limitation on efficiency.
An unregulated corporation can choose not to enter an unprofitable
market.  Governments are not allowed this luxury, in general.
They also have to balance the desires of different constituents;
privacy advocates complaining about any intelligence-gathering,
lassez-faire libertarians who think the private sector would do
a better job at everything, jingoists and politicians who want to
score a point by blaming them for not stopping every bad possibility
for every citizen everywhere, all the time, and so on.

Personally, I'm not worried about terrorism.  Not that long ago,
we were worried about the entire planet being made uninhabitable
and humanity quickly extinct by mutually assured destruction.
Now we only have to worry about a cause of death with roughly
the same probability of being killed by a snake bite.  I didn't
hear anyone calling for a war on snakes (not even on planes).
I consider this excellent progress.

PS: This is an excellent blog on security, technology, and
homeland security: http://www.schneier.com/blog/
- --
The whole point of the Internet is that different kinds of computers
can interoperate.  Every time you see a web site that only supports
certain browsers or operating systems, they clearly don't get it.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFCixYPlSPhv5tocwRAisUAJ479RRbCOGTvhxPye3hxYkdTz1jVQCfc7Vq
bGsuq5FuT+srq7usqQaN8Tw=
=h775
-END PGP SIGNATURE-