+ All Categories
Home > Documents > 8_Bay - CSIAC Cyber Metrics

8_Bay - CSIAC Cyber Metrics

Date post: 04-Dec-2015
Category:
Upload: john-shu
View: 11 times
Download: 0 times
Share this document with a friend
6
10/19/15 1 Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director Things People Have Asked Me Things People Have Asked Me How much money should I spend this year on cyber defense technologies? How many attacks has your firewall repelled this month? If I only had a dollar to spend on cyber, where should I spend it? Why is cyber research such a slog? 2 11/ 12/ 14 Answers (which did not go over well) Answers (which did not go over well) How much money have you got? We repelled all of them … except that one you read about in the paper Spend your dollar on upgrades Cyber research is a slog because there is no physics theory underlying it all, liker Maxwells’ Equations or Newton’s Laws 3 11/ 12/ 14
Transcript

10/19/15

1

Cyber&Metrics&in&the&DoD

or

How&Do&We&Know&What&We&Don’t&Know?

John S. Bay, Ph.D.Executive Director

Things& People&Have&Asked&MeThings& People&Have&Asked&Me

• How&much&money&should&I&spend&this&year&on&cyber&

defense&technologies?

• How&many&attacks&has&your&firewall&repelled&this&

month?

• If&I&only&had&a&dollar&to&spend&on&cyber,&where&

should&I&spend&it?

• Why&is&cyber&research&such&a&slog?

211/12/14

Answers

(which& did&not& go&over&well)

Answers

(which& did&not& go&over&well)

• How&much&money&have&you&got?

• We&repelled&all&of&them&…&except&that&one&you&read&

about&in&the&paper

• Spend&your&dollar&on&upgrades

• Cyber&research&is&a&slog&because&there&is&no&physics&

theory&underlying&it&all,& liker&Maxwells’&Equations&

or&Newton’s&Laws

311/12/14

10/19/15

2

But&really&…&it&DEPENDSBut&really&…&it&DEPENDS

• The&“threat”&factor&is&common&in&cybersecurity,&

but&mostly&not&elsewhere

• …&&and&it&IS& true&that&there&is&no&useful&PHYSICS&

for&the&problem

411/12/14

DoD&Taxonomy&of& ThreatsDoD&Taxonomy&of& Threats

5

From:.Defense.Science.Board,.Resilient(Military(Systems(and(the(Advanced(Cyber(Threat,.January.2013

Tier Description

I Practitioners . who. rely. on. others . to. develop. the. malicious . code,. delivery. mechanisms,. and. executionstrategy. (use.known. exploits ).

II Practitioners . with. a.greater. depth. of. experience,. with. the. ability. to.develop. their. own. tools . (from.publically. known. vulnerabilities ).

III Practitioners . who. focus . on.the. discovery. and.use. of. unknown. malicious . code,. are. adept. at. installing.user. and. kernel. mode. root. kits ,. frequently. use.data. mining. tools ,. target. corporate. executives . akey.users . (government. and. industry). for. the. purpose. of.s tealing. personal. and. corporate. data. with. the.expressed. purpose. of. selling. the. information. to. other. criminal. elements .

IV Criminal. or. s tate. actors . who. are. organized,. highly. technical,. proficient,. well.funded. profess ionals .working. in.teams. to. discover. new. vulnerabilities . and.develop. exploits .

V State. actors . who. create. vulnerabilities . through. an.active. program. to. “influence”. commercial. products .and. services .during. des ign,. development. or. manufacturing,. or. with. the. ability. to. impactproducts . while. in.the. supply. chain. to. enable. exploitation. of. networks . and. systems.of. interest

VI States . with. the. ability. to. success fully. execute. full. spectrum. (cyber. capabilities . in.combination. withall.of. their. military. and.intelligence. capabilities ). operations . to. achieve. a.specific.outcome. in. political,military,. economic,. etc.. domains . and. apply.at. scale.

11/12/14

And&The& Corresponding& CriticalityAnd&The& Corresponding& Criticality

611/12/14

10/19/15

3

What&Might&the&COSTS& Be?What&Might&the&COSTS& Be?

711/12/14

So&Then,&What&to&Measure?So&Then,&What&to&Measure?

• Qualitative

– Capabilities

– Missions&lost

• Quantitative

– Performance

– Cost

• To&achieve

• Not&achieving

811/12/14

Capabilities&and&MaturityCapabilities&and&Maturity

911/12/14

10/19/15

4

Dashboard&ApproachDashboard&Approach

1011/12/14

“Stoplight&Chart”&Assessments“Stoplight&Chart”&Assessments

1111/12/14

See:. SPIDERS.JCTD

Costs& to&UsCosts& to&Us

• All&vulnerabilities&are&bugs&

• All&code&has&bugs

• Bugs&are&expensive

• Exploits&are&cheap&! the&“asymmetry”&problem

1211/12/14

10/19/15

5

MissionUAssurance& ApproachMissionUAssurance& Approach

• Helps& focus& attention

• Requires& a&“map”& o& the&

mission

• Implies& a&prioritization&

on&missions& (something&

loses)

• Requires& reconfigurable&

systems& and& networks

• Is&not& cheap

13

From:. .DUSD(I&E). Office,. HANDBOOKFor( SELFAASSESSING ( SECURITY( VULNERABILITIES( &(RISKS( of(INDUSTRIAL( CONTROL(SYSTEMSOn(DOD( INSTALLATIONS,.December. 201211/12/14

Just& Good& Enough& (Incremental)

Approach

Just& Good& Enough& (Incremental)

Approach

• How& long&would& our& red&team& take&to&penetrate&the&

system?

– An&empirical&measure,&at&best.

– Implies&a&canonical&red&team

14

prob(first&

vulnerability& is&

discovered)

time

Bad&code

Better&code

Gamma(distribution?

11/12/14

The&Accountability&ApproachThe&Accountability&Approach

• NIST&800U53&guidelines

• The&“did&we&do&everything&we&know&how&to&do”&approach

15

From:.NIST.Special.Publication.800]53,.rev..4,.Security(and(Privacy(Controls(forFederal(Information(Systems(and(Organizations,.April.201311/12/14

10/19/15

6

Conclusions:&Which&is&Best?Conclusions:&Which&is&Best?

• None& of&them.& They& service&somewhat& orthogonal&

purposes.

– But&they&can&provide&applesUtoUapples&comparisons

• Can& they&answer& the&Generals’& questions?

– No

– …&except&maybe&the&one&about&the&firewall

– There& is&CERTAINLY&no&satisfactory&“physics”&to&guide&anybody

• Cyber&Metrics& is&still&an& extremely&important& and& highU

priority&problem& for&OSD!

1611/12/14


Recommended