首页> 外文会议>Simulation Innovation Workshop >Survey of Cyber Security Framework across Industries
【24h】

Survey of Cyber Security Framework across Industries

机译:跨行业网络安全框架调查

获取原文

摘要

For many years, cyber security in both Department of Defense (DoD) and civilian industries has been a compliance driven process. Respective organizations define rules or best practices that direct their Information Technology (IT) systems to comply to. Success is often measured by how well these static rules are followed, and how many security incidents have been discovered compared to historical data. There is a multitude of problems associated with this simplistic approach. First, cyber threats are constantly evolving; it was previously estimated that as many as 400,000 new malware are being introduced each day. Most of these threats are specifically targeting a given system and/or designed to succeed in certain attack vector. Adapting a cookie-cutting, one-size-fits-all cyber security policy that only gets reviewed/updated periodically might not be adequate. From the technical standpoint, even the best commercial-off-the-shelf (COTS) anti-virus/anti-malware software relies on regular database updates of known threats. Hence, by definition, these forms of protection can only provide remediation for existing threats; systems are basically defenseless against specific zero-day threats that are specifically designed to attack these systems. A more comprehensive approach toward cyber security should be adapted to defend against these evolving threats. With the pervasive nature of the Internet, previously disparate industries are now more interwoven together than ever before. In the United States, if a cyber attack is to happen in the power grid infrastructure, it is conceivable the impacts could be spread to public safety, health, national defense, banking and finance sectors. Not only might impacts be felt across industries, but the threat profiles of these attacks may hold similarities as well due to common vulnerabilities across IT and Operation Technology (OT) systems. Hence, it is crucial to determine how different industries are addressing the cyber security challenges they are each facing. This paper will provide a brief survey of best practices in cyber security in several industries, including DoD, oil/gas industries and banking/financial institutions. There are many similarities in the way these industries are each approaching the cyber security challenges. At the same time, there are significant differences in the specific threats they are facing. For example, the DoD is beginning to shift its focus from generic penetration tests and risk management framework evaluations to using cyber range testing and simulation-based threat assessment that systematically evaluate military systems and platforms under a variety of operational conditions. The oil/gas energy companies are also starting to identify their most vulnerable systems and subsystem components. For example, they work with industrial control system (ICS) vendors and suppliers to improve their products' cyber security performance - both at the individual unit level as well as the network protocol layer. The banking and financial institutions are facing cyber attackers with different motivations than those targeting the DoD systems. Instead of crippling or destroying the targeted systems, the cyber criminals in the banking/financial industries are often more focusing on deception and data exfiltration, even though they also use similar tactics, techniques, procedures (TTP) such as phishing, waterhole attack, etc. like the cyber attackers in other industries. Although the aforementioned industries are facing cyber attackers with different motivations, many of the threat vectors and methodologies are actually very similar. Hence, it would be beneficial if cyber experts in these industries could share threat information, and collaborate to define cyber best practices. A complementary approach is to establish a cyber simulation environment that allows individual organizations to provide their threat models, and that these models can be shared across multiple industrie
机译:多年来,国防部(国防部)和民用行业的网络安全是一项合规驱动过程。各个组织定义指导其信息技术(IT)系统遵守信息技术的规则或最佳实践。成功通常通过这些静态规则遵循的程度来衡量,以及与历史数据相比已经发现了多少安全事件。与这种简单的方法有多种问题。首先,网络威胁正在不断发展;之前估计每天介绍多达400,000个新的恶意软件。这些威胁中的大多数专门针对给定的系统和/或旨在在某些攻击向量中取得成功。调整饼干切割,单尺寸适合所有网络安全政策,只会定期审查/更新可能不足。从技术角度来看,即使是最好的商业现货(COTS)反病毒/反恶意软件软件也依赖于已知威胁的常规数据库更新。因此,根据定义,这些形式的保护只能为现有威胁提供修复;系统基本上无法针对专门设计用于攻击这些系统的特定零日威胁。应该适应一个更全面的网络安全方法,以防止这些不断发展的威胁。随着互联网的普遍性,现在比以往任何时候都更加偏离行业。在美国,如果在电网基础设施中发生网络攻击,则可以想到,影响可能会蔓延到公共安全,健康,国防,银行和金融部门。不仅可能在行业中感受到影响,而且这些攻击的威胁概况可能会持有相似之处,而且由于跨IT和操作技术(OT)系统的常见漏洞。因此,确定不同的行业如何解决网络安全挑战,这是至关重要的。本文将在包括国防部,石油/天然气行业和银行/金融机构在内的几个行业中简要介绍网络安全最佳实践。这些行业各自接近网络安全挑战的方式存在许多相似之处。与此同时,他们面临的特定威胁存在显着差异。例如,国防部开始将其焦点从通用渗透测试和风险管理框架评估转移到使用网络范围测试和基于模拟的威胁评估,以系统地评估各种操作条件下的军事系统和平台。石油/天然气能源公司也开始识别其最脆弱的系统和子系统组件。例如,他们与工业控制系统(IC)供应商和供应商合作,以改善其产品的网络安全性能 - 无论是在各个单位级别以及网络协议层。银行和金融机构正面临着不同动机的网络攻击者,而不是瞄准国防部系统的动机。银行/金融行业的网络罪犯而不是瘫痪或摧毁目标系统,而是更加注重欺骗和数据exfiltration,即使它们也使用类似的策略,技术,程序(TTP),如网络钓鱼,水孔攻击等。就像其他行业的网络攻击者一样。虽然上述行业面临着不同动机的网络攻击者,但许多威胁向量和方法实际上非常相似。因此,如果这些行业中的网络专家可以共享威胁信息,并合作以定义网络最佳实践,这将是有益的。互补方法是建立一个网络仿真环境,允许各个组织提供其威胁模型,并且这些模型可以在多个工业中共享

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号