+ All Categories
Home > Documents > Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN...

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN...

Date post: 19-Dec-2015
Category:
View: 214 times
Download: 0 times
Share this document with a friend
13
Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All CYBERSECURITY-RELATED CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY TELECOMMUNICATIONS INDUSTRY ASSOCIATION ASSOCIATION Eric Barnhart, Division Eric Barnhart, Division Chief Chief Georgia Tech Research Georgia Tech Research Institute Institute Document No: GSC16-GTSC9-03 Source: TIA Contact: Eric Barnhart ([email protected]) GSC Session: GTSC-9 Agenda Item: 4.2: Cybersecurity
Transcript
Page 1: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

CYBERSECURITY-RELATED CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE STANDARDS ACTIVITY IN THE

TELECOMMUNICATIONS TELECOMMUNICATIONS INDUSTRY ASSOCIATIONINDUSTRY ASSOCIATION

Eric Barnhart, Division ChiefEric Barnhart, Division Chief

Georgia Tech Research InstituteGeorgia Tech Research Institute

Document No:

GSC16-GTSC9-03

Source: TIA

Contact: Eric Barnhart ([email protected])

GSC Session:

GTSC-9

Agenda Item:

4.2: Cybersecurity

Page 2: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

2

TIA Cybersecurity BackgroundTIA Cybersecurity Background

• TIA focus on Critical Infrastructure Protection and Homeland Security includes efforts in Network Security

• TIA TR-51 (Smart Utility Networks) views TR-50 (Smart Device Communications) as logical group to address security in parallel with deference to ITU-T SG17 (cybersecurity) from ITU Focus Group SMART

• TIA urges caution in establishing any USA government mandated security certification programs (TIA comments in US FCC PS Docket No. 10-93)– more data is needed with rapidly evolving needs

– certification programs may not be most effective protection

– Government mandated certification program could stifle needed flexibility

Page 3: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

3

Highlight of Current ActivitiesHighlight of Current Activities

• TIA TR-50 (Smart Device Communications) established Security Ad Hoc Group in February, 2011– Supports TR-50 and its other subcommittees to contribute

requirements, architecture, protocols, etc. related to the topic of security in Smart Device Communications.

– Reviews/approves all ballots by TR-50 and its subcommittees to ensure that any architectures, protocols, or specifications meet the requirements set by the SDC Security Ad Hoc Group for secure solutions.

– Architecture, protocols, or specifications should support options that can be exported without restriction from countries for which TIA serves as a regional Standards Development Organization (SDO).

Page 4: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

4

Highlight of Current ActivitiesHighlight of Current Activities• TIA TR-50 Smart Device Communications Security Ad Hoc Group

Activity includes development of:– Data-in-Transit Use Cases to support progress toward Machine-to-Machine

(M2M) Multilayer Distributed Security Architecture (MMDSA)

Page 5: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

5

Highlight of Current ActivitiesHighlight of Current Activities• TIA TR-50 Smart Device Communications

Security Ad Hoc Group Activity:– Developing M2M Threat Analysis Overview to drive architecture

development in tandem with Use Cases– Includes Operating System and Applications layer

considerations; User Data considerations; and Network considerations.

– Methodology includes measures of threat Likelihood and Impact. Product of these factors produces Risk Assessment Level:

Page 6: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

6

TIA Strategic DirectionTIA Strategic Direction• TIA supports cyber security objectives and

study items of ITU-T Study Group 17 as captured in Question 4/17- Cybersecurity

• TIA 2011 Goals and Positions include:– Government and industry must partner to

increase the number of dialogues between domestic and foreign experts to discuss international best practices

– Support cybersecurity policies that keep markets open and minimize barriers to trade

Page 7: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

7

ChallengesChallenges• With M2M Cybersecurity in TR-50 (Smart Device

Communications) as current TIA cybersecurity focal point, extend focus as appropriate to address needs:– TR-30 Multimedia Access, Protocols and Interfaces– TR-41 User Premises Telecommunications Systems – TR-45 Mobile and Personal Communications Systems

Standards– TR-47 Terrestrial Mobile Multimedia Multicast– TR-48 Vehicular Telematics– TR-49 Healthcare ICT

Page 8: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

8

ChallengesChallenges• Embracing user community (including verticals)

is vital• User needs are particularly important to

understand with regard to risks and security demands – examples include energy management and healthcare ICT

• Export control and harmonization issues demand attention

Page 9: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

9

Next Steps / ActionsNext Steps / Actions• In TIA TR-50 Smart Device Communications

Security Ad Hoc Group:– Continue focus on Data In Transit

• Multilayer Security • Security Zone Definitions

– Continue focus on Data At Rest• Trusted Environments

– Continue focus on Threat Analysis• Risk Analysis• Financial Impact• Attack Trees

– Examine Test Bed needs to investigate cybersecurity issues

Page 10: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

10

Supplementary SlidesSupplementary Slides

Page 11: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

11

Supplementary Comments on Supplementary Comments on M2M SDC Threat AssessmentM2M SDC Threat Assessment

In order to quantify vulnerability, we assign numeric values to multiple factors. Vulnerability is calculated as the product of likelihood and impact (after NIST, OWASP,SANS Institute, and other similar approaches for IT risk management). 

•Likelihood factor ranges from 1 through 4 with the following levels defned: 

– 1 = “Low Likelihood” being the least likely due to little or no motivation, opportunity and/or capability

– 2 = “Moderate Likelihood” being of moderate likelihood, with average motivation, opportunity and/or capability

– 3 = “Substantial Likelihood” being substantial likelihood, with high motivation, opportunity and/or capability

– 4 = “Severe Likelihood” being the most likely as an agent with high motivation, opportunity and capability.

Page 12: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

12

Supplementary Comments on Supplementary Comments on M2M SDC Threat AssessmentM2M SDC Threat Assessment

Criteria assigning likelihood levels include assessing the attacker, motivation, opportunity, and capability:

Attacker Characteristic: Threat sources which can be detailed as:

“0” No agent present

“1” Individual criminal, hacker, disgruntled employee

“2” Competitor

“3” Extremist, Organized Crime

“4” Terrorist or Nation State

Motivation: including financial, political, emotional, revenge as well as constraints such as detection, and risk involved:

“0” No motivation

“1” Low

“2” Moderate

“3” Substantial

“4” High

Opportunity: including proximity, security, standards:

“0” No Opportunity

“1” Little

“2” Limited

“3” Substantial

“4” High

Capability: including education, knowledge, access, specialized equipment and reverse engineering:

“0” None

“1” Little

“2” Limited

“3” Substantial

“4” High

Page 13: Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart,

Halifax, 31 Oct – 3 Nov 2011 ICT Accessibility For All

GSC16-GTSC9-03

13

Supplementary Comments on Supplementary Comments on M2M SDC Threat AssessmentM2M SDC Threat Assessment

Impact characterizes the implications/seriousness of a successful attack, with the following levels:

 •1 = minor impact or no effect to the stakeholder

•2 = serious impact, including impacting revenue streams, processes, support systems

•3 = wide spread impact, causing irreparable damage to key systems and processes

•4 = severe impact causing damage to systems and processes that support infrastructure requirements.


Recommended