SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Copyright © 2015 Raytheon Company. All rights reserved.
Customer Success Is Our Mission is a registered trademark of Raytheon Company.
Michael K. Daly
Chief Technology Officer
Cybersecurity and Special Missions
Daly has more than 29 years in security and
information systems, in both the federal
government and private sector. As CTO of
Raytheon’s CSM division, he provides cyber
solutions to domestic and international government
and commercial customers, delivers quick-reaction
mission solutions, and provides support to high
consequence special missions. He is a principle
engineering fellow, and provides leadership in
Raytheon's cyber technologies for our global
customers. Additionally, Daly supports the National
Security Telecommunications Advisory Committee
to the President of the United States.
SECURE YOUR SPACE: THE INTERNET OF THINGS
SECURE YOUR SPACE: THE INTERNET OF THINGS
People Connecting with People.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Machines, Machines and Sometimes People.
SECURE YOUR SPACE: THE INTERNET OF THINGS
That’s a lot of stuff talking to other stuff.
In 2014 there were:
SECURE YOUR SPACE: THE INTERNET OF THINGS
And there is so much more coming.
6.8B today 12.5B today
SECURE YOUR SPACE: THE INTERNET OF THINGS
IoT has its roots in Net-Centric Warfare.
SECURE YOUR SPACE: THE INTERNET OF THINGS
IoT has its roots in Net-Centric Warfare.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Sensors. Effectors. Data. Lots of Data.
SECURE YOUR SPACE: THE INTERNET OF THINGS
… vulnerable to everything and everyone else.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Trusted, Innovative Solutions to Make the World a Safer Place
SECURE YOUR SPACE: THE INTERNET OF THINGS
Understand the impacts of IoT devices before we implement.
Data proliferation impact
What controls are in place to protect the data and the systems that transmit,
process and store the data (e.g., encryption, authentication, monitoring)?
Physical impact and harm introduced by
effectors and actuators
What controls are in place to limit the physical impact in the event of
a compromise?
Risk of diminished interoperability amongst
government systems
What would happen to adjacent and reliant systems if this IoT set
should fail to provide trustworthy information or to operate properly?
Opportunities for adversaries to implement new
covert communications methods
What mechanisms do we have to identify and control unwanted
communications?
Opportunities for an adversary to conduct large scale PsyOps,
creating events or complicating emergency response
What measures can be implemented to identify and constrain unwanted social engineering?
Attack surface impact
What controls are in place to limit the exposure of the attack
surface and to contain a threat in the event of a compromise?
SECURE YOUR SPACE: THE INTERNET OF THINGS
Raytheon | Websense Addressing the Commercial Market
29MAY2015
Raytheon announced the
completion of a joint venture
transaction with leading
private equity firm, Vista
Equity Partners, to create a
first-of-its-kind commercial
company specifically designed
to meet the needs of the
evolving cybersecurity
environment. The joint venture
combines Websense, a
leading provider of Data Theft
Prevention solutions, with
Raytheon Cyber Products, the
products-focused portion of
Raytheon’s overall cyber
business.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Maintaining Trust in Time & Space
SECURE YOUR SPACE: THE INTERNET OF THINGS
Platform Hardening & Resilience
Electronic Armor and UAVs
At this year’s Association of
the United States Army annual
meeting and exposition in
Washington, D.C., Raytheon’s
cyber team demonstrated how
an adversary could hack and
crash a drone not protected
by Raytheon’s Electronic
Armor, and how a protected
drone could persist through
the commands.
“We’re trying to illustrate the
destructive nature of what can
happen in an operational
environment,” said Brian
Stites, portfolio manager for
the Cyber and Special
Missions. “We believe the
next few decades will be
dominated by advancements
in cyber and hardware like
drones and robotics.”
http://web.onertn.ray.com/news/2014/10/201
41024_DQC8YQ46MG.html
SECURE YOUR SPACE: THE INTERNET OF THINGS
Wearable Situational Awareness
Wearables
Raytheon’s Distributed
Common Ground System –
Army Lite software integrated
with its Wearable Situational
Awareness capabilities
(DCGS-A Lite) is an “all
source” intelligence analysis
software suite that provides
the ability to discover and
visualize enterprise data from
the Department of Defense
and Intelligence Community,
and disseminate hostile force
locations down to the
network’s edge.
DCGS-A Lite addresses
intelligence gaps with the
ability to operate in
connected, disconnected and
limited bandwidth modes.
http://web.onertn.ray.com/news/2014/10/201
41024_DQC8YQ46MG.html
SECURE YOUR SPACE: THE INTERNET OF THINGS
Bringing Situational Awareness to the Battlefield
SECURE YOUR SPACE: THE INTERNET OF THINGS
 Rapid 3-D Prototyping and Manufacturing of Slow-Wave
Structures for mmW and THz High-Power Electronic Devices
 3-D Printing of Radomes
 3-D Printed Radomes for UAV-Based Wideband Comms
 3-D Printed Rocket Motor for Small Munitions
Advances in Additive Manufacturing
SECURE YOUR SPACE: THE INTERNET OF THINGS
Self-Healing: Fully Automated Computer Security
“… a new generation of fully automated cyber defense
systems … automated Cyber Reasoning Systems will
compete against each other in real time.”
SECURE YOUR SPACE: THE INTERNET OF THINGS
Quantum Computing
Quantum Information Research Company, Raytheon BBN, Honored for Sustained Innovation
2FEB2013
Raytheon BBN Technologies
has been awarded the
National Medal of
Technology and Innovation
for "sustained innovation
through the engineering of
first-of-a kind, practical
systems in acoustics, signal
processing, and information
technology." President Barack
Obama presented the medal
in a White House ceremony
Friday.
“Superconducting artificial
atoms offer fast and reliable
processing, and light offers
fast and reliable transmission
over long distances.
Combining light and
superconducting artificial
atoms offers the best of
both and is a promising
development for building a
large-scale quantum
computer.” –Will Kelly,
Raytheon BBN, 2010
http://arxiv.org/pdf/0912.3291v3.pdf
SECURE YOUR SPACE: THE INTERNET OF THINGS
Questions?
SECURE YOUR SPACE: THE INTERNET OF THINGS
Know Your Data.
With the large amount of data
generated by the IoT, a key question
is “How can I ensure the data
used by this system remains
reliable?” The answer can actually
be found within existing government
strategies for information assurance
for FOUO and classified systems
interoperability.
Data can be encrypted with simple
tools like S/MIME or more complex
systems like Information Rights
Management solutions. Data
separation and risk containment can
be provided through virtual machine
technology, database containers,
and cross-domain solutions brought
over from the military domain.
Systems must be hardened, not just
patched; unnecessary services and
applications must be removed and
remaining software configured
appropriately. (So many systems
built for the IoT either on the device
side or the cloud side are based on
multi-purpose operating systems
and are left with many features
running that unnecessarily expose
risk.) And, critically, the use of the
data should be monitored with a
privileged user monitoring and
insider threat tool.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Know The Device.
General Keith Alexander, the
National Security Agency’s director,
said “The cyber domain is a
dynamic domain that changes every
time you power on a device.” With
each new device that enters this
domain, new vulnerabilities and
threats are introduced. In military
parlance, we say that we have an
increased attack surface.
A good security organization must
do solid research on new devices to
understand what is embedded in the
devices entering their business
ecosystem:
 what data is generated and what
data is being transmitted;
 where does the device transmit
its data;
 what connections will it accept
from other devices in your
environment;
 does the device have on-board
storage that an adversary could
use to store software and data;
 does the device try to do
automatic updates; and most
importantly,
 if an adversary had access to
the sensors and data generated
by this device (including the
personal devices your users are
bringing into the building), what
advantage would it give them?
SECURE YOUR SPACE: THE INTERNET OF THINGS
Know The Insider.
The IoT brings its benefits through
the analysis of changes, based on
the collection of vast amounts of
data that are often personal and
sensitive. This information,
particularly in the aggregate, is
extremely valuable not only to the
society but to our potential
adversaries. Protecting sensitive
data from external threats has been
the focus of cybersecurity
investments since the first
computers were used. But that’s
only half the story.
It’s critical for companies to have
insider-focused security and
continuous monitoring that can
detect anomalies, inappropriate
privileged user activity, and
determine when information has
been accessed inappropriately.
These strategies must include
behavioral analytics, not just simple
rules and policies. Episodes such
as the Target, Wikileaks and the
Snowden breaches have shown that
the most significant risk of damage
to customer trust and to our
missions is posed by internal system
access. This can come from the
disgruntled employee, or the
unaware supplier, or an advanced
nation-state adversary using a
sophisticated chain to operate from
the inside.
SECURE YOUR SPACE: THE INTERNET OF THINGS
Privacy
Decentralizing Privacy:
Using Blockchain to Protect
Personal Data (Enigma)
Users can own and control
their data without
compromising security or
limiting personalized services
by combining a blockchain,
re-purposed as an access-
control moderator, with an off-
blockchain storage solution.
Users are not required to trust
any third-party and are always
aware of the data that is being
collected about them and how
it is used.
Moreover, laws and
regulations could be
programmed into the
blockchain itself, so that they
are enforced automatically. In
other situations, the ledger
can act as legal evidence for
accessing (or storing) data,
since it is (computationally)
tamper-proof.
http://web.media.mit.edu/~guyzys/data/ZNP1
5.pdf
Not Raytheon, but interesting …
SECURE YOUR SPACE: THE INTERNET OF THINGS
Intel and Micron have new class of non-volatile memory that is 1000 times
faster and 10 times denser than NAND Flash memory
Next Big Future, 28JUL2015
3D XPoint™ technology is a non-volatile memory that has the potential to
revolutionize any device, application or service that benefits from fast access to
large sets of data. Now in production, 3D XPoint technology is a major breakthrough
in memory process technology and the first new memory category since the
introduction of NAND flash in 1989.
As the digital world quickly grows – from 4.4 zettabytes
of digital data created in 2013 to an expected 44
zettabytes by 2020 – 3D XPoint technology can turn
this immense amount of data into valuable information
in nanoseconds. For example, retailers may use 3D
XPoint technology to more quickly identify fraud
detection patterns in financial transactions; healthcare
researchers could process and analyze larger data
sets in real time, accelerating complex tasks such as
genetic analysis and disease tracking.
Cybersecurity of Big Data Requires Faster Storage
http://nextbigfuture.com/2015/07/intel-and-micron-have-new-class-of-non.html
Not Raytheon, but interesting …

Weitere ähnliche Inhalte

Was ist angesagt?

PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Yokogawa
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Quarles & Brady
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Tammy Clark
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornEric Andresen
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control SystemsEric Andresen
 

Was ist angesagt? (19)

PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...Legal Risks of Operating in the World of Connected Technologies (Internet of ...
Legal Risks of Operating in the World of Connected Technologies (Internet of ...
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
 
Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
 

Ähnlich wie Secure your Space: The Internet of Things

Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxinfosec train
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptxInfosectrain3
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 

Ähnlich wie Secure your Space: The Internet of Things (20)

Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Secure your Space: The Internet of Things

  • 1. Copyright © 2015 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a registered trademark of Raytheon Company. Michael K. Daly Chief Technology Officer Cybersecurity and Special Missions Daly has more than 29 years in security and information systems, in both the federal government and private sector. As CTO of Raytheon’s CSM division, he provides cyber solutions to domestic and international government and commercial customers, delivers quick-reaction mission solutions, and provides support to high consequence special missions. He is a principle engineering fellow, and provides leadership in Raytheon's cyber technologies for our global customers. Additionally, Daly supports the National Security Telecommunications Advisory Committee to the President of the United States. SECURE YOUR SPACE: THE INTERNET OF THINGS
  • 2. SECURE YOUR SPACE: THE INTERNET OF THINGS People Connecting with People.
  • 3. SECURE YOUR SPACE: THE INTERNET OF THINGS Machines, Machines and Sometimes People.
  • 4. SECURE YOUR SPACE: THE INTERNET OF THINGS That’s a lot of stuff talking to other stuff. In 2014 there were:
  • 5. SECURE YOUR SPACE: THE INTERNET OF THINGS And there is so much more coming. 6.8B today 12.5B today
  • 6. SECURE YOUR SPACE: THE INTERNET OF THINGS IoT has its roots in Net-Centric Warfare.
  • 7. SECURE YOUR SPACE: THE INTERNET OF THINGS IoT has its roots in Net-Centric Warfare.
  • 8. SECURE YOUR SPACE: THE INTERNET OF THINGS Sensors. Effectors. Data. Lots of Data.
  • 9. SECURE YOUR SPACE: THE INTERNET OF THINGS … vulnerable to everything and everyone else.
  • 10. SECURE YOUR SPACE: THE INTERNET OF THINGS Trusted, Innovative Solutions to Make the World a Safer Place
  • 11. SECURE YOUR SPACE: THE INTERNET OF THINGS Understand the impacts of IoT devices before we implement. Data proliferation impact What controls are in place to protect the data and the systems that transmit, process and store the data (e.g., encryption, authentication, monitoring)? Physical impact and harm introduced by effectors and actuators What controls are in place to limit the physical impact in the event of a compromise? Risk of diminished interoperability amongst government systems What would happen to adjacent and reliant systems if this IoT set should fail to provide trustworthy information or to operate properly? Opportunities for adversaries to implement new covert communications methods What mechanisms do we have to identify and control unwanted communications? Opportunities for an adversary to conduct large scale PsyOps, creating events or complicating emergency response What measures can be implemented to identify and constrain unwanted social engineering? Attack surface impact What controls are in place to limit the exposure of the attack surface and to contain a threat in the event of a compromise?
  • 12. SECURE YOUR SPACE: THE INTERNET OF THINGS Raytheon | Websense Addressing the Commercial Market 29MAY2015 Raytheon announced the completion of a joint venture transaction with leading private equity firm, Vista Equity Partners, to create a first-of-its-kind commercial company specifically designed to meet the needs of the evolving cybersecurity environment. The joint venture combines Websense, a leading provider of Data Theft Prevention solutions, with Raytheon Cyber Products, the products-focused portion of Raytheon’s overall cyber business.
  • 13. SECURE YOUR SPACE: THE INTERNET OF THINGS Maintaining Trust in Time & Space
  • 14. SECURE YOUR SPACE: THE INTERNET OF THINGS Platform Hardening & Resilience Electronic Armor and UAVs At this year’s Association of the United States Army annual meeting and exposition in Washington, D.C., Raytheon’s cyber team demonstrated how an adversary could hack and crash a drone not protected by Raytheon’s Electronic Armor, and how a protected drone could persist through the commands. “We’re trying to illustrate the destructive nature of what can happen in an operational environment,” said Brian Stites, portfolio manager for the Cyber and Special Missions. “We believe the next few decades will be dominated by advancements in cyber and hardware like drones and robotics.” http://web.onertn.ray.com/news/2014/10/201 41024_DQC8YQ46MG.html
  • 15. SECURE YOUR SPACE: THE INTERNET OF THINGS Wearable Situational Awareness Wearables Raytheon’s Distributed Common Ground System – Army Lite software integrated with its Wearable Situational Awareness capabilities (DCGS-A Lite) is an “all source” intelligence analysis software suite that provides the ability to discover and visualize enterprise data from the Department of Defense and Intelligence Community, and disseminate hostile force locations down to the network’s edge. DCGS-A Lite addresses intelligence gaps with the ability to operate in connected, disconnected and limited bandwidth modes. http://web.onertn.ray.com/news/2014/10/201 41024_DQC8YQ46MG.html
  • 16. SECURE YOUR SPACE: THE INTERNET OF THINGS Bringing Situational Awareness to the Battlefield
  • 17. SECURE YOUR SPACE: THE INTERNET OF THINGS  Rapid 3-D Prototyping and Manufacturing of Slow-Wave Structures for mmW and THz High-Power Electronic Devices  3-D Printing of Radomes  3-D Printed Radomes for UAV-Based Wideband Comms  3-D Printed Rocket Motor for Small Munitions Advances in Additive Manufacturing
  • 18. SECURE YOUR SPACE: THE INTERNET OF THINGS Self-Healing: Fully Automated Computer Security “… a new generation of fully automated cyber defense systems … automated Cyber Reasoning Systems will compete against each other in real time.”
  • 19. SECURE YOUR SPACE: THE INTERNET OF THINGS Quantum Computing Quantum Information Research Company, Raytheon BBN, Honored for Sustained Innovation 2FEB2013 Raytheon BBN Technologies has been awarded the National Medal of Technology and Innovation for "sustained innovation through the engineering of first-of-a kind, practical systems in acoustics, signal processing, and information technology." President Barack Obama presented the medal in a White House ceremony Friday. “Superconducting artificial atoms offer fast and reliable processing, and light offers fast and reliable transmission over long distances. Combining light and superconducting artificial atoms offers the best of both and is a promising development for building a large-scale quantum computer.” –Will Kelly, Raytheon BBN, 2010 http://arxiv.org/pdf/0912.3291v3.pdf
  • 20.
  • 21. SECURE YOUR SPACE: THE INTERNET OF THINGS Questions?
  • 22. SECURE YOUR SPACE: THE INTERNET OF THINGS Know Your Data. With the large amount of data generated by the IoT, a key question is “How can I ensure the data used by this system remains reliable?” The answer can actually be found within existing government strategies for information assurance for FOUO and classified systems interoperability. Data can be encrypted with simple tools like S/MIME or more complex systems like Information Rights Management solutions. Data separation and risk containment can be provided through virtual machine technology, database containers, and cross-domain solutions brought over from the military domain. Systems must be hardened, not just patched; unnecessary services and applications must be removed and remaining software configured appropriately. (So many systems built for the IoT either on the device side or the cloud side are based on multi-purpose operating systems and are left with many features running that unnecessarily expose risk.) And, critically, the use of the data should be monitored with a privileged user monitoring and insider threat tool.
  • 23. SECURE YOUR SPACE: THE INTERNET OF THINGS Know The Device. General Keith Alexander, the National Security Agency’s director, said “The cyber domain is a dynamic domain that changes every time you power on a device.” With each new device that enters this domain, new vulnerabilities and threats are introduced. In military parlance, we say that we have an increased attack surface. A good security organization must do solid research on new devices to understand what is embedded in the devices entering their business ecosystem:  what data is generated and what data is being transmitted;  where does the device transmit its data;  what connections will it accept from other devices in your environment;  does the device have on-board storage that an adversary could use to store software and data;  does the device try to do automatic updates; and most importantly,  if an adversary had access to the sensors and data generated by this device (including the personal devices your users are bringing into the building), what advantage would it give them?
  • 24. SECURE YOUR SPACE: THE INTERNET OF THINGS Know The Insider. The IoT brings its benefits through the analysis of changes, based on the collection of vast amounts of data that are often personal and sensitive. This information, particularly in the aggregate, is extremely valuable not only to the society but to our potential adversaries. Protecting sensitive data from external threats has been the focus of cybersecurity investments since the first computers were used. But that’s only half the story. It’s critical for companies to have insider-focused security and continuous monitoring that can detect anomalies, inappropriate privileged user activity, and determine when information has been accessed inappropriately. These strategies must include behavioral analytics, not just simple rules and policies. Episodes such as the Target, Wikileaks and the Snowden breaches have shown that the most significant risk of damage to customer trust and to our missions is posed by internal system access. This can come from the disgruntled employee, or the unaware supplier, or an advanced nation-state adversary using a sophisticated chain to operate from the inside.
  • 25. SECURE YOUR SPACE: THE INTERNET OF THINGS Privacy Decentralizing Privacy: Using Blockchain to Protect Personal Data (Enigma) Users can own and control their data without compromising security or limiting personalized services by combining a blockchain, re-purposed as an access- control moderator, with an off- blockchain storage solution. Users are not required to trust any third-party and are always aware of the data that is being collected about them and how it is used. Moreover, laws and regulations could be programmed into the blockchain itself, so that they are enforced automatically. In other situations, the ledger can act as legal evidence for accessing (or storing) data, since it is (computationally) tamper-proof. http://web.media.mit.edu/~guyzys/data/ZNP1 5.pdf Not Raytheon, but interesting …
  • 26. SECURE YOUR SPACE: THE INTERNET OF THINGS Intel and Micron have new class of non-volatile memory that is 1000 times faster and 10 times denser than NAND Flash memory Next Big Future, 28JUL2015 3D XPoint™ technology is a non-volatile memory that has the potential to revolutionize any device, application or service that benefits from fast access to large sets of data. Now in production, 3D XPoint technology is a major breakthrough in memory process technology and the first new memory category since the introduction of NAND flash in 1989. As the digital world quickly grows – from 4.4 zettabytes of digital data created in 2013 to an expected 44 zettabytes by 2020 – 3D XPoint technology can turn this immense amount of data into valuable information in nanoseconds. For example, retailers may use 3D XPoint technology to more quickly identify fraud detection patterns in financial transactions; healthcare researchers could process and analyze larger data sets in real time, accelerating complex tasks such as genetic analysis and disease tracking. Cybersecurity of Big Data Requires Faster Storage http://nextbigfuture.com/2015/07/intel-and-micron-have-new-class-of-non.html Not Raytheon, but interesting …

Hinweis der Redaktion

  1. 1) Data proliferation impact: IoT devices generate significant volumes of interesting and often sensitive information; including telemetry data, voice, video, human health, critical infrastructure component status, agriculture and livestock data, etc. [What controls are in place to protect the data and the systems that transmit, process and store the data (e.g., encryption, authentication, monitoring)?] a) The information from all these sensors can give adversaries broad situational awareness of the US posture; this includes a wide range of cognizance using both government data sources as well as personal IoT data sources: i) Location, health and status of government and critical officials ii) Status of critical infrastructure iii) Movement of goods and people under both ordinary circumstances and emergency response events iv) Relationships between people, and amongst systems v) Critical infrastructure utilization patterns vi) Human patterns of life vii) Supply chain fragility viii) Battle damage assessment b) The same information could be used to enable better emergency preparedness and response; c) Data proliferation from IoT shares the same issues posed by cloud technologies, and is actually directly tied to cloud infrastructures, as much IoT data is processed and stored in cloud services; please see NSTAC Report on Cloud Computing (https://www.dhs.gov/sites/default/files/publications/2012-05-15-NSTAC-Cloud-Computing.pdf) d) The IoT data can also enable new crimes, from fraud to sensitive information loss, to social-engineering facilitated theft, and also including new attacks by current and emerging APT actors. 2) Attack surface impact (What controls are in place to limit the exposure of the attack surface and to contain a threat in the event of a compromise?) a) Breadth of access is increased to a much wider set of systems, previously inaccessible; b) Depth of access increased to include elements of systems previously not instrumented; c) The attack surface is also expanded within systems by the complexity of establishing and maintaining defenses; from architecture, to design, to operations and maintenance, and even asset disposition (physical and information assets). 3) Elevation in the risk of physical impact and harm introduced by effectors and actuators (What controls are in place to limit the physical impact in the event of a compromise?) a) Healthcare devices such as drug administration and eletro-stimuli; b) Agricultural systems, from general farming, to fertilizer and pesticide application, to cleaning and preparation; c) Water management and distribution; d) Energy management and distribution; e) Traffic management 4) Risk of diminished interoperability amongst government systems (What would happen to adjacent and reliant systems if this IoT set should fail to provide trustworthy information or to operate properly?) a) IoT sensors, systems and data from many disparate systems built to different standards or in the absence of standards (analogous issue is radio communications interoperability) 5) Opportunities for adversaries to implement new covert communications methods (What mechanisms do we have to identify and control unwanted communications?) a) How might adversaries use these new systems to communicate into, out of, or across the networks of interest 6) Opportunities for an adversary to conduct large scale PsyOps, creating events or complicating emergency response, also considering other social engineering impacts (What measures can be implemented to identify and constrain unwanted social engineering?)
  2. To help protect the GPS system, the U.S. Department of Defense (DoD) has made a special effort to beef up cyber defense in the new GPS ground segment. The Next Generation Operational Control System or OCX is a complete replacement of the old AEP or Architecture Evolution Plan control system with new software and hardware all around. “We are not reusing any of AEP with the exception, maybe, of the ground antennas — and we’re even having to upgrade the ground antennas to meet security requirements,” said Steve Moran, director of GPS Mission Solutions at OCX contractor Raytheon. Those antennas, at 17 monitoring stations scattered around the globe, will have their electronics updated. All of the equipment at the GPS Master Control Station (MCS) at Schriever Air Force Base near Colorado Springs, Colorado, and at the Alternate Master Control Station at Vandenberg Air Force Base in Lompoc, California, will be refreshed. The entire system is set to come on line in 2016. The OCX program is using commercial and open-source software like Linux, to keep costs in line, said Matthew Gilligan, OCX program manager and vice president in the Raytheon Intelligence, Information and Services business. The coding team, however, is refactoring — that is, editing and updating this software as necessary to address the latest threats and erase the imprint of old, less-than-secure coding habits. “Our security engineers go back and check the code as part of fulfilling the IA requirements,” said Worden, “because what we found is that software that’s two or three years old doesn’t keep up with all the great hacking ideas that are happening around cyberspace. So, what we’re doing is taking lessons learned and applying them to our software baseline on an ongoing basis. Right now, that’s turning into re-factoring well over two million lines of code so it’s more secure and demonstrably secure.”
  3. Securing data from tomorrow’s supercomputers Science Daily, 18AUG2015 Transport Layer Security (TLS) Internet encryption protocol uses a variety of mathematical techniques to protect information, some of which would need to be updated to be resistant to quantum computers. Researchers in Australia have developed and tested a new quantumproof version of TLS that incorporates a mathematical technique called the ‘ring learning with errors problem’, a fairly recent technique that mathematicians think has the potential to resist quantum attacks. http://eprint.iacr.org/2014/599 A team of Scottish scientists has made light travel slower than the speed of light 14NOV2014 They sent photons - individual particles of light - through a special mask. It changed the photons' shape - and slowed them to less than light speed. The photons remained travelling at the lower speed even when they returned to free space. http://arxiv.org/ftp/arxiv/papers/1411/1411.3987.pdf Experimental device-independent verification of quantum steering 7AUG2014 Quantum encryption enabling secure communications that is more tolerant of loss and does not require pre-existing trust. http://arxiv.org/pdf/1408.0563v2.pdf
  4. September 16, 2015