+ All Categories
Home > Documents > Francesca Bosco, Le nuove sfide della cyber security

Francesca Bosco, Le nuove sfide della cyber security

Date post: 08-May-2015
Category:
Upload: andrea-rossetti
View: 1,350 times
Download: 0 times
Share this document with a friend
60
Le nuove sfide della cybersecurity: Internet for peace...o for war? Ms. Francesca Bosco Project Officer Interregional Crime and Justice Research Institute (UNICRI) 01 Aprile 2011 Università degli Studi di Milano Bicocca
Transcript
Page 1: Francesca Bosco, Le nuove sfide della cyber security

Le nuove sfide della cybersecurity: Internet for peace...o for war?

Ms. Francesca BoscoProject Officer

Interregional Crime and Justice Research Institute (UNICRI)

01 Aprile 2011Università degli Studi di Milano Bicocca

Page 2: Francesca Bosco, Le nuove sfide della cyber security

Yesterday news…30/03/2011

Page 3: Francesca Bosco, Le nuove sfide della cyber security

Yesterday news…30/03/2011 tbc

Page 4: Francesca Bosco, Le nuove sfide della cyber security

Technological expected trends up to 2030

Page 5: Francesca Bosco, Le nuove sfide della cyber security

Vulnerability:root causes• A highly interconnected system of general

purpose computers, not designed with security in mind– vulnerable software provides “launch pads” for easy

propagation of attacks– erosion of the traditional perimeter (access systems

and data “anytime, anywhere”)• Shift from“attacks against networks”

to “attacks against (web) applications” and “attacks against users and data”

• Insufficient security awareness of (some) application developers and end users

Page 6: Francesca Bosco, Le nuove sfide della cyber security

Example: How Vulnerable are UN Systems ?

-which system?– publicly accessible websites– central internal applications (IMIS, email, etc.)– end user systems (desktops, laptops, BB, etc.)

-which threat?– denial of service– “defacement”– abuse / threat to third parties – “APT” type attacks

Page 7: Francesca Bosco, Le nuove sfide della cyber security

State of PlayUN systems are frequently attacked

– defacements (political, “commercial”)– abuse of web sites to disseminate “malware”– abuse of email systems to send spam/fraudulent email– forging of UN email addresses to commit fraud

Several known examples of “APT” type attacks– very credible email messages– attachments deemed safe by Anti-Virus software– successful compromise of a single computer leads to

further compromises on internal networks

Page 8: Francesca Bosco, Le nuove sfide della cyber security

Current situation:general• All systems are “compromisable”; perfect

security is unattainable • Objective is to continue safe operation in a

compromised environment, to have systems that are defensible, rather than perfectly secure

• Cybersecurity is an adversarial science

Page 9: Francesca Bosco, Le nuove sfide della cyber security

Evolution of the threat landscape Mobile threats – voracious malware targeting mobile devices and the proliferation of mobile banking.

(More) Web 2.0 malware – Attackers leveraging Social Networks.

Attackers exploiting the erosion of network boundaries after the adoption of cloud computing.

Highly-motivated attackers with strong logistic or financial support.

Page 10: Francesca Bosco, Le nuove sfide della cyber security

VIDEO

Predicting 2011...

Page 11: Francesca Bosco, Le nuove sfide della cyber security

Top 5 security threats for 2011

1) Traditional malwareTraditional malware will remain the primary mechanism of distributing software to computers on theinternet. Recent numbers indicate roughly 55,000 new malware pieces identified every day, whichcontinues the exponential growth pattern into 2010. This trend will only continue.

2) Shift to advanced persistent threat (APT) Attacks will be more advanced, targeted at a specific institution with a goal to acquire specific data.Often described as Advanced Persistent Threat (APT), these attacks are designed to infiltrate anorganisation, hop the firewall and acquire a target. Once the software gets behind the firewall, it hopsaround the organisation investigating and gathering information about the internal system. It then usesthis information to gain privileged access to critical information (e.g., transactions processing,customer lists or HR records) and begins stealing sensitive data. Without proper monitoring in place, itcan be weeks or months before an organisation detects that it is under attack.

3) Focus on finance, hospitality and retail Financial services, hospitality and retail industries will face an increased number of threats. As datafrom the 2010 data breach report issued by the Verizon RISK team and the U.S. Secret Serviceshows, these three industries combined currently represent 71% of all data breaches.

4) Mobile devices increase vulnerabilities Seven out of ten companies still don’t have explicit policies outlining which devices can be logged onto the network or on working in public places. As more people work and access information remotely,the threat levels from existing vulnerabilities will increase and new ones will appear.

5) Hactivism as a new type of threat The most visible example of hactivism were the recent attacks by Anonymous, a group that targetedMasterCard, Visa and PayPal after those companies cut off financial services to WikiLeaks. We maysee more of these types of attack by groups representing political and environmental organisations.

Page 12: Francesca Bosco, Le nuove sfide della cyber security

Cyber security refers to measures for protecting computer systems, networks, andinformation systems from disruption or unauthorized access, use, disclosure,modification, or destruction.

The basic objectives of Cyber Security are to ensure the Confidentiality, Integrity, and Availability of data.

What is Cyber Security?

Page 13: Francesca Bosco, Le nuove sfide della cyber security

Confidentiality has been defined by the International Organization for Standardization (ISO) as "ensuring that information is accessible only to those authorized to have access" and is one of the cornerstones of information security. Confidentiality is one of the design goals for many cryptosystems, made possible in practice by the techniques of modern cryptography.

Integrity of the information implies that the data in question has not been tampered with through accidental or malicious activity. Source integrity also plays into this - ensuring that any piece of data actually came from the source claimed and not a "man-in-the-middle" or third party.

Availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed = timely, reliable access to data and information services for authorized users.

What is Cyber Security?

Page 14: Francesca Bosco, Le nuove sfide della cyber security

Information security incidents

• Information Security Incident:– an attempted or successful unauthorized access, use,

disclosure, modification or destruction of information; – interference with the operation of ICT resources; or – violation of explicit or implied acceptable usage policy

(as defined in ST/SGB/2004/15)• Classification by common observable elements:

§ - Agent (internal/external)- Action § - Asset - Attribute

• does not include “motive” or “attributable source”

Page 15: Francesca Bosco, Le nuove sfide della cyber security

Investigative readiness vs. PrivacyAvailability vs. SecurityRegulation vs. InnovationEnterprise vs. Protection

How can we make the Internet and our “Cyber -Assets” safer without sacrificing simplicity, privacy or availability?

Cybersecurity as a Balancing Act

Page 16: Francesca Bosco, Le nuove sfide della cyber security

Government agencies constantly face cyber attacksBusinesses are losing revenue to cybercriminalsUsers are being targeted for their Personal Identifiable

Information (PII)Cybersecurity is a global issue, which can only be solved

with global solutions Need for increased cooperation and coordination at the global

level International community must work together to ensure a

coordinated response.

Why do we need to talk about it?

Page 17: Francesca Bosco, Le nuove sfide della cyber security

HOW MANY CYBER-DO YOU KNOW?

Page 18: Francesca Bosco, Le nuove sfide della cyber security

Information technology...for war?• Military history scholars argue that warfare has shifted towards a

Fourth Generation of Warfare• Technology not only enables asymmetry in power relations, but can

also be used to overcome it, undermining the enemy from within• Information Age, military operations have been impacted and

transformed. Likewise no civil society sector has remained immune from the information revolution. The ―national information infrastructure- (NII) is defined as the set of information systems and networks on which a nation depends to function

• In net-wars the confrontation takes place between “states and non-state actors, non-state actors that use states as arenas, or states that use non-state actors as their proxies”

Page 19: Francesca Bosco, Le nuove sfide della cyber security

What’s cyberwarThe United Nations Institute of Training and Research

defines cyberwar as: ―The deliberate use of information warfare by a state,

using weapons such as electro-magnetic pulse waves, viruses, worms, Trojan horses, etc., which target the electronic devices and networks of an enemy state-

Richard Clarke, a U.S. government security expert, defines cyberwar as:

―Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption.

Page 20: Francesca Bosco, Le nuove sfide della cyber security

Cyber Warfare & Cyber Terrorism

Cyber Warfare and Terrorism is one of the fifteen modalities of UnRestricted Warfare (URW) also called asymmetric warfare.

Cyber Warfare & Terrorism“The premeditated use of disruptive activities,

or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.”

Source: U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02

Page 21: Francesca Bosco, Le nuove sfide della cyber security

CyberterrorismCyberterrorism is a phrase used to describe theuse of Internet based attacks in terrorist activities,including acts of deliberate, large-scale disruptionof computer networks, especially of personalcomputers attached to the Internet, by the meansof tools such as computer viruses.

Cyber terrorism is generally understood as the crossing over ofterrorism and cyberspace. This leads to unlawful attacks and threats ofattacks against computer, networks and the info stored therein.

Page 22: Francesca Bosco, Le nuove sfide della cyber security

What’s cyberterrorismControversial term !!!!!

First we need to clarify:

Terrorist use of the Internet v

Cyber Terrorism

Page 23: Francesca Bosco, Le nuove sfide della cyber security

FocusTHE INTERNET: AN ATTRACTIVE

ARENA FOR TERRORIST PUBLICITY

The internet is an ‘informational weapon’ for terrorists, as it provides:Easy accessA decentralised structureLittle or no regulation, censorship, or other forms of government

controlPotentially huge audiences spread throughout the worldAnonymity of communicationFast flow of informationInexpensive development and maintenance of web presenceA multimedia environment (the ability to combine text, graphics, audio,

video, and allow users to download films, songs, books, posters etc)The ability to shape coverage in the traditional mass media

Source: “www.terror.net: How Modern Terrorism Uses the Internet” by Prof. Gabriel Weimann

Page 24: Francesca Bosco, Le nuove sfide della cyber security

TERRORIST PURPOSES IN USING THE INTERNET

Data Mining (using the internet to collect intelligence)

TrainingFundraisingNetworkingRecruitment and Radicalisation

The internet is an important source for discovering and grooming potential jihadists

Publicity

Focus

Page 25: Francesca Bosco, Le nuove sfide della cyber security

MAIN AREAS OF CYBER PRESENCE

Mass mediaOfficial ‘jihadist’ websites

A well-designed and well-maintained Web site gives a group an aura of legitimacy and increasingly attracts attention from the mass media in and of itself

Unofficial websitesForums and blogs

Distributor sitesVideo sites

Youtube and liveleak

Focus

Page 26: Francesca Bosco, Le nuove sfide della cyber security

OBJECTIVES OF ONLINE TERRORIST PUBLICITY

1. To wage psychological warfare(through terror) and advance a cause

Terrorist use internet publicity to:

• amplify panic

• spread fear

• facilitate economic loss (eg. scaring away investment and tourism)

• make populations loose faith in their governments' ability to protect them

• trigger government and popular overreaction to specific incidents and the overall threat of terrorism

Focus

Page 27: Francesca Bosco, Le nuove sfide della cyber security

OBJECTIVES OF ONLINE PUBLICITY2. To gain sympathy and support of their cause

The Internet has significantly increased the opportunities for terrorists to secure publicity for their ideological causes and spread propaganda.

The Internet has become a virtual library of terrorist material, granting easy access to everything from political, ideological and theological literature, via fatwas and khutbas, to videos of assaults and attacks, and even video games.

Focus

Page 28: Francesca Bosco, Le nuove sfide della cyber security

When does a computer attack become an act of terrorism or of war?

Information warfare, in information technology, is that series of actions aimed

at exploiting, corrupting, wasting or destroying the information or information

resources of the enemy in order to achieve a significant advantage, using the same

weapon.

Page 29: Francesca Bosco, Le nuove sfide della cyber security

Modern Weapons Economics

$1.5 to $2 billion

$80 to $120 million

What does a stealth bomber cost?

What does a stealth fighter cost?

$1 to $2 millionWhat does a cruise missile cost?

$300 to $50,000What does a cyber weapon cost?

Page 30: Francesca Bosco, Le nuove sfide della cyber security

Interesting Quote

NATO's cyber defense chief has warned that computer-based terrorism poses the same threat to national security as a missile attack. He went on to say that “Cyber war can become a very effective global problem because it is low-risk, low-cost, highly effective and easily globally deployable. It is almost an ideal weapon that nobody can ignore.“

Using this as a framework, we can put into context the evolving architecture for cyber weapons.

Page 31: Francesca Bosco, Le nuove sfide della cyber security

How to build a cyber weapon: Cyber Weapons Design-1

Cyber Weapon – Delivery Vehicle

There are numerous methods of delivering cyber weapons to their targets. Emails with malicious code embedded or attached is one mechanism of delivery. Another delivery vehicle is web sites that can have malicious links and downloads. Hacking is a manually delivery vehicle that allows a cyber soldier to place the malicious payload on a target computer, system or network. Counterfeit hardware, software and electronic components can also be used as delivery vehicles for cyber weapons.

Page 32: Francesca Bosco, Le nuove sfide della cyber security

Cyber Weapons Design-2

Cyber Weapon – Delivery VehicleJust as a navigation system guides a missile, it allows the malicious payload to reach a specific point inside a computer, system or network. System vulnerabilities are the primary navigation systems used in cyber weapons. Vulnerabilities in software and computer system configurations provide entry points for the payload of a cyber weapon. These security exposures in operating systems or other software or applications allow for exploitation and compromise. Exploitation of these vulnerabilities may allow unauthorized remote access and control over the system.

Page 33: Francesca Bosco, Le nuove sfide della cyber security

Cyber Weapons Design-3

Cyber Weapon – Delivery VehicleThe payload of a missile is sometimes called a warhead and is packed with some type of explosive. In a cyber weapon the payload could be a program that copies information off of the computer and sends it to an external source. It can also be a program that begins to ease or alter information stored on the system. Finally, it can allow remote access so that the computer can be controlled or directed over the internet. A “bot” (a component of a botnet) is a great example of a payload that allows remote use of the computer by an unauthorized individual or organization.

Page 34: Francesca Bosco, Le nuove sfide della cyber security

Cyber Weapons Design-4

Cyber Weapon – Architecture

This three element architecture demonstrates how advanced and sophisticated cyber weapons are becoming. The architecture creates reusability and reconfiguration of all three components. As one software or system vulnerability is discovered, reported and patched, that component can be removed and replaced while the other two components are still viable. This not only creates flexibility but also significantly increase the productivity of the cyber weapons developers.

Page 35: Francesca Bosco, Le nuove sfide della cyber security

Recent events discussed on the media

• Cyber Attack on Estonia [April 2007]– sometimes referred to as “Web War 1”– sophisticated and large set of denial of service (DoS) attacks on Estonian

parliament, banks, ministries, newspapers, other web sites– severe effect on above institutions for approximately three weeks

• Cyber Attack against Georgia [August 2008]– denial of service against gov’t web sites– concurrent with armed conflict

• Advanced Persistent Threat (APT) [December 2009]– (a.k.a. “Google war”)– “deep infiltration” of several technology providers

• Stuxnet [June 2010]– technically highly sophisticated “malware” that appears to target Iranian

nuclear facilities

Page 36: Francesca Bosco, Le nuove sfide della cyber security

Nearly every bank in the United States runs its operations on an internal network that connects to the Internet

Sandeep JunnarkarCNET News, 2002

Estonia depended largely on the internet because of the country's "paperless government" and web-based banking. If these services are made slower, we of course lose economically

Mihkel Tammet, head ofIT security at the

Estonian defence ministry, 2007

The U.S. is increasingly dependent on "... the unimpeded and secure flow of technology.“

CIA ReportCyber Threats and

the US Economy, 2007

Hackers are intensifying their efforts to compromise social-networking sites using unsecure Web 2.0

Jon SwartzUSA TODAY, 2008

….repercussions go beyond the loss of personal data, security experts say. As more consumers are victimized, it could undercut their confidence in legitimate websites

Billy Hoffman, manager ofHewlett-Packard Security Labs

With global attacks on data networks increasing at an alarming rate, in a more organized and sophisticated manner, and often originating from state-sponsored sources, there is precious little time to lose.

Tim Bennett, president of theCyber Security Industry Alliance, 2008

Several nations, including China and Russia, “have the technical capabilities to target and disrupt elements of the U.S. information infrastructure and for intelligence collection.”

Mike McConnell, Director of National Intelligenceduring the Senate Intelligence Committee

…regarding counter-terrorism must be pursued “Information sharing with our allies and partners to support counter-terrorist operations overseas”;

The National Security Strategy of the United Kingdom - Security in an interdependent world

Page 37: Francesca Bosco, Le nuove sfide della cyber security

“Cyber War” In Estonia, 2007

Page 38: Francesca Bosco, Le nuove sfide della cyber security

July 23 2010

The First Cyber Attack Specifically Targeting Control SystemsAccording to antivirus company Symantec Corp., Stuxnet looks for industrial control systems and then

changes the code in them to allow the attackers to usurp controls of industrial equipment such as sensors, actuators, pumps, and valves without the operators knowing.

“Stuxnet searches for industrial control systems, often generically (but incorrectly) known as SCADA systems, and if it finds these systems on the compromised computer, it attempts to steal code and design projects,” Symantec explained. “It may also take advantage of the programming software interface to also

upload its own code to the Programmable Logic Controllers (PLC), which are ‘mini-computers’, in an industrial control system that is typically monitored by SCADA systems.”

Very complex Windows-specific computer worm that infects computers and connected industrial control equipment (PLCs)

First known worm to attack industrial infrastructureSpreads through USB thumb drives as well as network connectionsUtilizes four “zero-day” exploitsUses stolen valid security certificatesInitial high rate of infection in Iran, specifically found at nuclear facilities

May be government (Israel, US, UK?) attempt to damage Iranian nuclear facilities

Unclear if delay or damage actually occurredWorm has spread to many other countries (including large infection of Chinese systems)

Iran was prime target of SCADA wormhttp://www.computerworld.com/s/article/9179618/Iran_was_prime_target_of_SCADA_worm

Stuxnet

Page 39: Francesca Bosco, Le nuove sfide della cyber security

FocusSCADA: Why do I care?

SCADA systems are essentially the arteries of national infrastructure, the behind-the-scenes devices that make our day to day life convenient and safe. Any disruption could lead to major inconvenience, or even loss of life…

The dangers inherent in obscure or rustic SCADA architectures are very real, and no vendor or governmental body responsible for NCIs can afford to let a lack of communication be an excuse for passivity…

Page 40: Francesca Bosco, Le nuove sfide della cyber security

VIDEO

Suki

Page 41: Francesca Bosco, Le nuove sfide della cyber security

SCADA• Supervisory Control And Data Acquisition

NCI• National Critical Infrastructure

Other terms:• ICS – Industrial Control Systems• PCS – Process Control System - Also known as Distributed Control System

(DCS)SCADA Generations and Evolution:

1. Monolithic – Mainframe computing, limited to no connectivity.2. Distributed – Proprietary networking technology led to increased

efficiency and redundancy due to real-time information sharing and specialization of tasks.

3. Networked – Transition to modern, °open° networking standards such as IP (Internet Protocol) and the deployment of “thin clients” and web applications to facilitate operations.

Focus

Page 42: Francesca Bosco, Le nuove sfide della cyber security

NCI Examples

Modern NCIs can be resumed as:

Food Agricultural and processing industry Food safety Food distribution

Water Drinking water treatment Wastewater management

Transportation Air Land (rail, roads) Marine

Focus

Page 43: Francesca Bosco, Le nuove sfide della cyber security

NCI Examples

Modern NCIs can be resumed as:

Safety Chemical, biological, radiological and nuclear safety Hazardous materials Emergency services (police, fire, amublance, etc)

Manufacturing Chemical industry Defense industrial base

Focus

Page 44: Francesca Bosco, Le nuove sfide della cyber security

1) We tend to seek a “centralized” solution to what is a very multi-dimensional problem with hidden interdependencies.

2) Opacity – We are not enforcing enough transparency nor regulating the disclosure of data breaches.

3) We aren’t moving away from a purely technical view towards a global shared approach with Political Vision, Strategy, Policies and Standards.

Cybersecurity:What we’re doing wrong

Page 45: Francesca Bosco, Le nuove sfide della cyber security

1) Public – Private Partnerships2) Developing technical solutions.3) Information exchange and awareness raising

at various levels.

Cybersecurity: What we’re doing right

Page 46: Francesca Bosco, Le nuove sfide della cyber security

Why cybersecurity partnership matters

• Public and private sectors need to share more information--more parties must be included and new platforms used.

• They must pay more attention to defending against attacks that threaten critical IT infrastructure and even damage physical facilities

• Much of the activity revolves around information sharing in key industries.

• Their collaboration must be ratcheted up to the next level--real-time identification and response as threats occur and, more to the point, "moving security practices from a reactionary posture to one that's proactive and pre-emptive"

Page 47: Francesca Bosco, Le nuove sfide della cyber security

Example

Critical Infrastucture Protection in the US (1996-2010)

Page 48: Francesca Bosco, Le nuove sfide della cyber security

Example

Critical Infrastucture Protection in Italy(2010)

• Information security is an integral part of the e-government 2010 plan

• 2010-A Technical group was established, under the Presidency of the Council of Ministers, to “foster coordination at the national and international level with regard to critical infrastuctures and its protection from cyberattacks”

• June 2009-Centro nazionale anticrimine informatico per la protezione delle infrastrutture critiche (CNAIPIC)

• In 2007, the Bank of Italy approved a set of guidelines to ensure continuity for the main financial actors, in case of cyberattack.

Page 49: Francesca Bosco, Le nuove sfide della cyber security

Creating a culture of security

Despite our best efforts over the years, we need a new,

comprehensive doctrine and perspective to face the innovative threats.

Page 50: Francesca Bosco, Le nuove sfide della cyber security

Recognise the Internet as a key infrastructure in addressing mainstream policy challenges (e.g. ageing, health, environment, globalisation…)

Reaffirm fundamental principles (e.g. privacy, security, policies to promote broadband access on fair terms and competitive prices…)

Recognise the Internet as an agent of change and foster an enabling environment so that it can make positive contributions

1.Towards a new Policy Framework

Page 51: Francesca Bosco, Le nuove sfide della cyber security

The Internet reflects the real world – shapes it and is shaped by it – and has a darkside. Confidence and trust in the Internet and about its vulnerability to events,both accidental and malicious.

Issues: Multilateral efforts to ensure the security and integrity of the Internet have

been limited We need to embed privacy protection in the design of applications and

devices (social networking sites; profiling and advertising; geolocation; sensors and RFID)

We need to identify and enforce the rights and obligations to protect digital identity

Security Considerations: (i) technical – diffusion of traffic rather than optimisation of traffic for DoS; security of connection (SSL) vs. authentication of content; use of virtual machines (ii) social -- Co-operation to protect availability, integrity, confidentiality (security)

Protect and inform consumers, redress and enforcement of consumer protection measures, including across jurisdictional borders

Rising concerns regarding “cybersecurity”.

2. Building Confidence

Page 52: Francesca Bosco, Le nuove sfide della cyber security

3.Public-Private Partnerships (PPP)To emphasize: Both the private sector and thepublic sector have crucial roles to play. Theprivate sector leads, the government enables.

It is important that both agree and are aware of their respective roles.

Page 53: Francesca Bosco, Le nuove sfide della cyber security

International cooperation

The European Convention on cybercrime

• The Council’s of Europe Convention on Cybercrime was opened for signatures on the 23rd of November 2001.

• In January 2003, an additional Protocol was adopted, concerning the criminalization of acts of racism and xenophobia committed through computer systems. This protocol has not been signed by several states and has not yet entered into force.

• At the present time, 46 States among Member and non-Member States of the Council of Europe signed the Convention

• Italian ratification: 2008

Page 54: Francesca Bosco, Le nuove sfide della cyber security

October, 2008

Why Council of Europe Convention on cybercrime? The only multilateral treaty dealing with cybercrime matters already implemented in many

countries while others are taking into consideration to become Party A guideline for drafting the legislation on cybercrime Provides important tools for law enforcement to investigate cybercrime Ensure adequate protection of human rights and liberties according to the relevant international

documents Flexible mechanisms to avoid conflicts with national legislations and proceedings CC provides for countries: Coherent national approach to legislation on cybercrime Harmonisation of criminal law provisions on cybercrime with those of other countries Legal and institutional basis for international LE and judicial cooperation with other parties Participation in the Consultations of the Parties The treaty as a platform facilitating public-private cooperation

Source:COE

Convention provides global standards and a framework for an effective fast international cooperation

Page 55: Francesca Bosco, Le nuove sfide della cyber security

What needs to be done nextLegal

• Develop international law to accommodate cyber warfare offensive and defensive activities, thus making it operative for the cyber age.

• In that regard, elaborate on the UN Charter in the direction of topical interpretations: Define Article 2 armed attack and Article 51 limits of self-defense, define the concept of cyber weapon, define operational modes for Chapter VII action in case of cyber attack, develop and analyze scenarios of cyber war and cyber terrorism with a view to their legal consequences.

• Drawing upon NATO’s Strasbourg/Kehl Summit Declaration, and previous NATO work in analyzing gaps in the international legal framework with respect to collective response, develop proposed amendments to NATO Treaty definitions of armed attack and territorial integrity and clarification of collective responses to accommodate collective cyber activities, self defence actions, and communication requirements.

• Encourage the ratification of the Council of Europe Convention on Cybercrime (“Convention”) and internal implementation by signatory states, and, where this does not obtain, encourage the harmonization of cybercrime laws (substantively and procedurally) around the globe consistent with the Convention and the cybercrime laws enacted in developed nations.

Page 56: Francesca Bosco, Le nuove sfide della cyber security

What needs to be done nextTechnical

• Develop enterprise level security metrics so security progress can be measured

• Enable time-critical system availability and resiliency across distributed systems.

• Improve the ability to track and trace cyber communications to enable source identification (accountability) and use of digital assets by technical means

• Improve transparency of network operations to enable visibility of activities, knowledge of status of operations, and identification of issues as a diagnostic tool to enhance security.

• Develop digital identification mechanisms to protect and advance the interconnection of devices, information, and networks.

• Address the security challenges of mobile/wireless systems. The widespread and exponential deployment of such devices and systems presents security challenges in and of themselves and the risks they present to interconnected systems and devices.

Page 57: Francesca Bosco, Le nuove sfide della cyber security

It’s a Collective Effort: Example

Shared datasetsRed TeamingSystem stress testsShared common problem to tackle…

New models of engagementSustained investment modelsLightweight submission and reporting…

Academia

Industry Government

ecosystem

Page 58: Francesca Bosco, Le nuove sfide della cyber security

58

“The pursuit of peace and progress cannot endin a few years in either victory or defeat. Thepursuit of peace and progress, with its trialsand its errors, its successes and its setbacks,can never be relaxed and never abandoned.”

Dag Hammarskjold, UN Secretary-General, 1953 - 1961

Page 59: Francesca Bosco, Le nuove sfide della cyber security

Q&A

Only by joining forces and bringing together ourstrategic capabilities will we be able to address current and

emerging cyberthreats !


Recommended