1 / 27

Cyber Security, Cyber Defence and Cyber Operations

Cyber Security, Cyber Defence and Cyber Operations - National Framework and International Cooperation - RACVIAC: Building a Cyber Resilient Society in South-Eastern Europe – Advanced Training Course , Supported by The NATO Science for Peace and Security Programme Zagreb, 17 October 2016.

charlest
Download Presentation

Cyber Security, Cyber Defence and Cyber Operations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security, Cyber Defence and Cyber Operations - National Framework and International Cooperation - RACVIAC: Building a Cyber Resilient Society in South-Eastern Europe – Advanced Training Course, Supported by The NATO Science for Peace and Security Programme Zagreb, 17 October 2016 Dr. sc. Aleksandar Klaić

  2. Table of Contents: • Global trends and developments in Cyberspace - Situational awareness • Cyber Terms & Definitions – Taxonomy • Information Security Policy vs Cyber Security Policy • National Cyber Security Strategy Framework – Croatian Example • Conclusion

  3. Actual Cyberspace Related Trends in NATO • NATO Warsaw Summit July 2016 - Communique http://www.nato.int/cps/en/natohq/official_texts_133169.htm • „… recognise cyberspace as a domain of operations in which NATO has to defend itself as effectively as it does in the air, on land, and at the sea …” • Baseline Requirements for National Resilience • Security implications of energy supply and national critical infrastructure • . . .

  4. Actual Cyberspace Related Trends in EU • Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace, 7 February 2013 • NIS Directive (EU) 2016/1148, 6 July 2016 • eIDAS Regulation (EU) No 910/2014 • A Digital Single Market Strategy for Europe, May 2015 • GDPR Regulation (EU) 2016/679, 27 April 2016 • GDPR Directive (EU) 2016/680, 27 April 2016 • Contractual Public Private Partnership on Cybersecurity

  5. International Cyberspace Related Trends • Opinion - Council of EU, July 2013, 12109/13 • „. . . international law, including international conventions such as the Council of Europe Convention on Cybercrime (Budapest Convention) and relevant conventions on international humanitarian law and human rights, such as the International Covenant on Civil and Political Rights, the International Covenant on Economic, Social and Cultural Rights provide a legal framework applicable in cyberspace. Efforts should therefore be made to ensure that these instruments are upheld in cyberspace; therefore the EU does not call for the creation of new international legal instruments for cyber issues, . . .” • UN, OECD, OSCE – Regionally targeted initiatives • Meridian process (CIIP) - https://www.meridianprocess.org/ • International Chamber of Commerce- http://www2.hgk.hr/ • ICC Cyber Security Guide for Business - www.iccwbo.org/cybersecurity

  6. Cyberspace • Internet and all connected communication and information systems • Infrastructure and data • People ? • Cyberspace = virtual dimension of the society

  7. Cyber Security • Capacitation and mutual coordination of all societal sectors • Protection of core values of liberty, fairness, transparency and the efficient rule of law • Primarily organizational issues • Societal sectors (public, academic, economic, citizens) • Sectoral cyber security stakeholders with different understanding of cyber issues, different competences, responsibilities, tasks, needs, expectations, interest, …

  8. Cyber Terms & Definitions • NATO CCD COE - https://ccdcoe.org/cyber-definitions.html#list • NIST - http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf • Cyber Security: • „Preservation of confidentiality, integrity and availability of information in the Cyberspace.” ISO/IEC 27032:2012  Information technology — Security techniques — Guidelines for cybersecurity • „The ability to protect or defend the use of cyberspace from cyber attacks.” NIST US Department of Commerce: Glossary of Key Information Security Terms • Cyber Operations: • The employment of cyber capabilities with the primary purpose of achieving objectives in or by the use of cyberspace.Tallinn Manual on the International Law Applicable to Cyber Warfare - 2013

  9. Cyber Terms & Definitions • Cyber Defence: • Represents the part of the defence strategy falling under the responsibility of the ministry in charge of defence issues: Croatian Cyber Security Strategy (2015) • Refers to all measures to defend cyber space with military and appropriate means for achieving military-strategic goals. Cyber defence is an integrated system, comprising the implementation of all measures relating to ICT and information security, the capabilities of milCERT and CNO (Computer Network Operations) as well as the support of the physical capabilities of the army: Austrian Cyber Security Strategy (2013) • The set of all technical and non-technical measures allowing a State to defend in cyberspace information systems that it considers to be critical. Source: Information Systems and Defence – France’s Strategy (2011)

  10. Cyber Taxonomy … • Hierarchical domain taxonomy • comprised of vocabulary (terms), definitions of terms (concepts) and relations to other concepts • Cyberspace  Virtual Part of the Society • Cyber Security  National Cyber Security Strategy (NCSS) III. Cyber Crime  NCSS, Criminal Code, … III. CIIP  CIP, NCSS III. Cyber Defence  Military Doctrine III. Cyber Espionage  Separate Strategy/policy III. Cyber Terrorism  Separate Strategy/policy III. . . .

  11. National CERT Responsibility and International Exchange of Security Incident Information Direct Functional and Sectoral Approach Early Warning Incident Handling Analysis and Forensics Information Sharing Situational Awareness * S/H = Service or Hosting Red Arrows = Notifications/Feeds to National CERT Blue Arrows = Notifications from National CERT

  12. CERT Taxonomy … • CERT = CSIRT • Public Sector: • National, Governmental, Departmental, … • Private Sector • Abuse Teams, SOC / CSOC, … • Economic Sectors/Regulators • ISACs (Information Sharing and Analysis Centres) • Subsidiarity principle • National Coordination • Sub-national Scope of Operation (Gov, Dept, Sector, Company, …) • Intelligence analysistrend

  13. From Information Security to Cyber Security Cyber Security Sectors / Nations InformationSecurity Persons / Entities

  14. Cyber Security Policy vsInformation Security Policy • UK – Cyber Essential Scheme: • Boundary firewalls and internet gateways, Secure configuration, Access Control, Malware Protection, Patch Management • Mapping to ISO 27001/02, ISF, HMG - Gov security Policy, … • US - Framework for Improving Critical Infrastructure Cybersecurity • Mapping to NIST SP800-53, ISO 27001, CoBIT, …

  15. What is the difference between IS and CS policy? • Cyber Security Risk vs Information Security Risk • Core Strategic Riskvs Operational Risk • Company Management Board vs IT Department • Classified Information - Head of Gov. body • Organisational (key) factor in the policy • Plus: People / Process / Technology • Interdependenciesamong four key policy factors

  16. Security Policy • Baseline Procedures / Risk Management • Information Centric / Value Centric • Protected Information (Regulation) • Classified Information • Unclassified Information, Limite, FOUO, … • Personal Data • Intellectual property • Trade Secret • Sensitive Information / infrastructure?

  17. Duty of Diligence --------------- Awareness & Responsibility Cyber Space regulation and Security Policy …Gaps: Government Security Policy ----------------- Classified / Unclassified Information Protection Critical Infrastructure Protection ----------------- National Critical Sectors Sensitive Information Sensitive infrastructure Duty of Care --------------- Appropriate Protection Measures

  18. Security of the Virtual Dimension of Society Communication New Emerging Threats Information Sharing NATIONAL CYBER SECURITY STRATEGY e-Government Cooperation CIP / CIIP Public Electornic Services Security Awareness and Education SECURITY TRUST 18

  19. Implementa-tion of Croatian National Information Security Programme enacted in 2005:

  20. The Main Elements of Croatian Strategy:

  21. The Method for the Elaboration of Strategy and Action Plan:

  22. Correlation of the Strategy and Action Plan • Strategy: • VISION is defined with 8 GENERAL GOALS • 5 AREAS and 4 INTERRELATIONS with 35 SPECIFIC OBJECTIVES • Action Plan: • 35 SPECIFIC OBJECTIVES are elaborated with 77 MEASURES • Areas & Interrelations marked with red colour are covered by most of the measures: • (B) Gov. Inf. Infrastructure, (D) Critical Inf. Infrastructure & Crises Management, (I) Education, Security Awareness, R&D

  23. Levels for the Strategy Planning Process

  24. Covered Levels In the Initial Documents Strategy and Action Plan (10/2015) Interdepartmental Bodies (06/2016) Furtherenhancements on thebasisoftheregularyearlycontroland 3-years period oftheStrategyrevision

  25. Stakeholders & Strategy Implementation Management EU NIS Cooperation Group National Council for Cyber Security (Representatives from 16 institutions headed by the Office of the National Security Council, Government Decision in theOfficial Gazette 61/2016) National Competent Authorities, other requirements National Single Point of Contact, CSIRTs Network Operational and Technical Cyber Security Coordination Group (Representatives from 8 institutions headed by MoI) Other Institutions – Stakeholders in the Strategy & Action Plan, societal sectors in general NIS Directive Correlation

  26. Conclusion • Cyberspace • virtual dimension of the society • Cyber Security • trust for economy development • Cyber Taxonomy • Terms, definitions, relations • Cyber Security Strategy / Policy • National / institutional Frameworks for cooperation in virtual dimension of the society – organisational factor

  27. Thank You !? Aleksandar Klaić, Ph.D. Assistant Director for Information Securityaleksandar.klaic@uvns.hr Office of the National Security Council Croatian NSA/DSA tel. +385.1.4681 222; fax. +385.1.4686 049www.uvns.hr

More Related