Home · About · A-Z Index · Search · Contacts · Press · Register · Login

Plenary - Boundaryless Information Flow: Keeping IT Secure

Day 1: Monday 3rd February 2003

Conference Home Page

Proceedings Index


An International Perspective on Securing Information Flow

Allen Brown
Introduction

Andy Purdy
Keynote Address

Kei Harada
IT Security Center, IPA

Andrea Servida
European Commission, DG INFSO C4


Industry Strategies for Securing Boundaryless Information
Pat Gilmore
System Security, Certification Consortium
Charles Le Grand
The Institute of Internal Auditors
Bill Hancock
Chairman ISA
Laura Lundin
Senior Director, BITS
Candy Alexander
Information Systems Security Association
Deb Frazer 
NOI Group/APL Limited, ISACA
Panel Session

Saving Private Data - Act 1

Cybersecurity on the Front Line
Len Hynds
National Hi-Tech Crime Unit, England and Wales

Bill Hancock
Cable & Wireless


Conference Home Page

Proceedings Index

An International Perspective on Securing Information Flow

Introduction

Allen Brown, President of The Open Group

Allen began the conference by welcoming the delegates to Burlingame, and introduced the theme of the day.  In the first session, key government security speakers from the United States, Japan and the European Community would be addressing the evolving policies and issues in information security. Allen introduced the first speaker, Andy Purdy.


Keynote Address

Andy Purdy
Deputy to the Vice Chair, Senior Advisor, IT Security and Privacy, The President's Critical Infrastructure Protection Board.

Andy began his presentation by reflecting on the troubled times in which we live - acts of terrorism by organizations and individuals, and problems caused by individual criminal activities.

Information technology revolution has changed the way business is transacted, government functions, and national defense is conducted.

Protection of a country's information systems is essential to its critical infrastructures: telecommunications, energy, financial services, manufacturing, water, transportation, health care, and emergency services.  Accordingly, cyber security is essential to US national security; the nation's economic well-being, law enforcement/public safety; and privacy.

The overall strategic goal is to empower all Americans to secure their portions of cyberspace.  It is the policy of the United States to protect against disruptions of information systems for critical infrastructures, and to ensure that disruptions are infrequent, minimal duration, manageable, and cause least damage.

Andy moved to considering the spectrum of sources of danger, varying from teenage joyriders, through individuals engaged in ID theft, fraud, extortion, and industrial espionage, nations engaged in espionage against U.S. companies and U.S. government, to, most seriously, nations building information warfare units.

The aim is to not to focus on specific threats, but to focus instead on vulnerabilities: to have a strategy in which everyone is responsible for their portion of Cyberspace.  The Strategy provides a roadmap by removing barriers, empowering people and organizations to do their part, and fostering a national partnership between government, industry and individuals.

The guiding principles of the Strategy are:

  • To encourage market forces to improve security, rather than using a regulatory approach
  • To share information among and between companies, departments and agencies, and state/local governments
  • To create public/private partnership solutions to IT security
  • To clean up the Federal Government's own IT security problems as a model
  • To foster public/ corporate awareness of importance of IT security

Sector strategies in support of this overall approach are being documented at www.pcis.org

The priorities in the strategy are:

Short Term (1-3 yrs):

  • Enterprise wide automated security policy enforcement
    • Improvements in software patch management
    • Development and testing of protocols needed to secure the mechanisms of the Internet
    • Development and testing of security mechanisms for Supervisory Control and Data Acquisition Systems
  • Development of secure operating Systems 
  • Expand the Institute for Information Infrastructure Protection’s R&D agenda gap analysis program
  • Develop security enhancements for Ad hoc networks and grid computing

Medium Term (3-5 years)

  • Secure routers, switches and protocols
  • Development of new protocols for internet and wireless that maintain security at higher speeds and scales
  • Investigation of the security implications of intelligent agent software in networks

Long Term (5-10 years)

  • Fundamental shifts in technology and the development of novel or unforeseen applications, e.g. nano technology, quantum computing
  • Provide a sound theoretical scientific and technological basis for assured construction of safe, secure systems
  • Ultra secure communications over optical backbone networks
  • Orders of magnitude increases in the speed of algorithms such as for searching unsorted databases

For home users and small businesses, the strategy is to empower the home user and small business person to protect their cyberspace and prevent it from being used to attack others.

In large enterprises the aim is to encourage and empower large enterprises to establish secure systems, with several key themes: raising the level of responsibility, creating corporate security councils for cyber security, where appropriate, implementing ACTIONS and best practices, and addressing the challenges of the borderless network.

Several Sectors are preparing strategies with lead organizations, including: 

  • Electricity: North American Electrical Reliability Council
  • Oil & Gas: National Petroleum Council
  • Water: American Water Works Association
  • Transportation (Rail): Association of American Railroads
  • Banking & Finance: Financial Services Round Table, BITS

Overall the priorities of the Critical Infrastructure Protection Board are:

  • Awareness: The National Cyber Security Alliance and its StaySafeonLine campaign
  • Education: The CyberCorps Scholarship for Service program
  • Info Sharing: The Cyber Warning & Info Network (CWIN) between Govt and Industry; limited FOIA exemption
  • Research: The CyberSecurity Research Consortium and a national research agenda
  • Protecting Internet Infrastructure: projects to secure Domain Name Servers and Border Gateway Protocols, blunt Distributed Denial of Service attacks
  • Physical Security of Key Nodes
  • Standard & Best Practices: including relating to Federal procurement
  • Digital Control Systems: securing utilities and manufacturing control systems
  • Securing Future Systems: beginning with new Wireless web enabled devices

Questions:

Isn't there a fundamental problem, that enterprises are going to be able to do a certain amount to protect themselves, but there are threats that are beyond their power - such as a threat to elements of the infrastructure.

A: The strategy will allow for areas of government intervention in areas where corporate response is not adequate.

Q: Bob Blakely: Markets respond to financial incentives.  How can a market-driven strategy work when it doesn't return value to the shareholders?

A: The alternative can stifle technology and innovation; it's our belief that we are getting the right kind of movement and direction and the Government will be able to respond if the infrastructure owners are not able to respond appropriately.

Q: Eliot Solomon: How can public protection be achieved without intruding on the rights of individuals? Is there some movement to separate public and private spaces?

A: Many things that we have been accused of doing, like monitoring individual emails, we are not doing, and there is a great deal of sensitivity in the area of civil liberties.

Q: (questioner not known) The paradigm of the President has been in the direction of Open Source, publicly available code, which gives the potential for malicious code being inserted.  How can this be made secure?

A: This problem is going to have to be addressed, and the experts in Government are aware of this.

Q: Bob Blakely: How expensive is this going to be for US business?

A: The business case is something that people in the private sector are trying to articulate, but companies are going to have to meet the best practices in the sector in which they operate.

Top


Japanese Information Security Status – Environment and Policies

Kei Harada
Senior Researcher, IT Security Center, Information-technology Promotion Agency (IPA is an affiliated organization to the Japanese Ministry of Economy, Trade and Industry)

Harada-san began his presentation by explaining that he intended to present Japanese Government Policies on Safety and Security, and by distinguishing between the two: safety - free from danger, and security - protected.  He also commented on the increase in awareness of the issues in Japan, due to the threats from viruses and cyber crime.

IPA, the Japanese Information-technology Promotion Agency, is a cross-governmental organization under the Ministry of Economy, Trade and Industry (METI), which was established in October 1970.  Its mission is the promotion of information processing technology, and it has a personnel of about 170.  It has four main missions: R&D and support for IT; Credit Guarantee; Education and Training; and IT Security enhancement.

He presented a graph of the number of computer viruses reported to IPA/ISEC, which showed that after a fairly steady rise to 3,645 in 1999, the number had leapt to 24,261 in 2001 before falling slightly in 2002 (to 20,352). These numbers are only those reported, and are only the tip of the iceberg, but they give an idea of the trend.  Although this is a dramatic increase, the level of damage caused by the viruses is actually falling because systems are better protected.  In 1998 80% of the viruses reported had done real damage, but in 2002 that figure had fallen to 8%, a lower figure than in comparable countries.

A similar trend showed itself in the number of unauthorized accesses reported to JPCERT/CC, which had been fairly steady at between 500 and 1000 before increasing to over 2000 in 2000 and nearly 3000 in 2001 before falling to just below 1500 in 2002 (although in that year home systems were excluded from the statistics).

The figures for the current status of cyber crime showed that whereas before 1998 crimes committed over the internet had been less than a third of the total, the percentage had increased dramatically since then.

  1999 2000 2001
Violation of the unauthorized computer access law - 31 35
Crime against PC or electronic format 110 44 63
Crime committed over the internet 247 484 712
Total 357 559 810

In the category of crimes committed over the internet, the largest number, sadly, relate to child prostitution and child pornography.  However, increasingly crimes relate to internet commerce - in particular internet auctions.  The police in Japan have received over 17000 reports of claims, over a quarter of which relate to internet auctions.

Turning to preparations carried out by private companies, Harada-san reported that increasingly large companies have security policies, but small companies (with fewer than 300 employees) are much less well prepared.  In a recent survey, 42.8% of large companies had established a security policy in the last year, and 20% had carried out a security audit in the same period.  In small companies the comparable figures were 12.5% and 7.2%.

Cryptographic techniques were similarly more in use in large companies than small.  33.1% of large companies are using cryptography, while 37.7% are planning to do so; in small companies the figures were 14.3% and 28.6%.

Finally Harada-san summarized the Japanese Government Security Policies.  The cabinet secretariat is the center for this activity, and coordinates activity among organizations such as the National Police Agency, Japanese Defense Agency, the Ministry of Public Management, Home Affairs, Posts and Telecommunications, the Ministry of Economy, Trade and Industry, and so on.

The Action Plan for Information Systems Protection against Cyber-threats, released in January 2000, aims to protect Government IT infrastructure.  Arising from this plan, the Guidelines for IT Security Policies were published in July 2000, and also a Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (December 2000).

The IT Strategy headquarters established the 'e-Japan Priority Policy Program in March 2001' to be completed by 2005, which covered five aspects:

  • Preparation of Regulatory Frameworks and an Infrastructure
  • Establishment of IT Security Measures within the Government
  • IT Security Measures and Raising of Public Awareness in the Private Sector
  • Countermeasures against Cyber-terrorism for Critical Infrastructure
  • R&D, Human Resource Development, and Strengthening of International Collaboration

Harada-san then went on to review the policies and activities of METI itself, including:

  • Enhancing the security of e-government
    • IT security evaluation (ISO/IEC15408)(NITE, IPA)
    • evaluation of cryptography (IPA, TAO)
    • supporting  the cabinet office (policy advice, helping NIRT, etc.)
    • operating and promoting GPKI
  • Supporting private sector activities
    • information sharing/analysis on computer virus & hacking (JPCERT/CC, IPA)
    • promoting security management (based on ISO/IEC 17799)
    • promoting PKI (voluntary accreditation scheme, etc.)
    • training experts (national exam., etc.)
    • awareness raising of IT security (seminar, etc.)
    • promoting R&D
    • establishing guidelines against computer viruses & hacking, etc.
  • Countermeasures against cyber-terrorism
    • measures based on “Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure” (communication and coordination scheme with private sectors such as electric power and gas, etc.)
    • promoting R&D
  • International cooperation
    • cooperation with OECD, APEC, G8 Lyon Group, etc. 
    • promoting info-share network of CSIRTs
Conclusions and next steps

Japanese Government Organizations are cooperating to establish the most advanced and secure Information technology oriented society and e-Government.  In order to achieve this the government is Improving and enforcing laws relating to computer crimes.  A Cyber-Police Force (National Police Agency) was established in 2001, and a National Incident Response Team set up in 2002.  A Conformity Assessment Scheme for Information Security Management Systems was also established in 2002.

There is still work to be done to secure the reliability of eGovernment, including improving and enforcing laws, enhancing human and technological resources, and international collaboration.

Top


Trust and Security in the Ambient Intelligence space

Andrea Servida
Head of Sector, European Commission, DG Information Society D/4

Mr Servida said that he intended to explain how the European Commission is planning initiatives on network security in Europe.  He explained his role in planning the sponsorship by the Commission of R&D initiatives aimed at improving security levels in Europe.

He also explained the differences between the administrative role of the Commission in Europe, compared with that of the Federal Government in the US.  Fundamentally the Commission is trying to encourage member states to unify their policies and approaches in the vital area of security.  The role of the Commission in Europe is different from that of the Federal Government in the US in that in Europe the aim is primarily to guide member states, and the Commission has no direct mandate to act.

European Union Activities on Information and Network Security

Since 1997 there has been the first agreement by member states on using electronic signatures, and the commission has agreed a number of initiatives; for example, to ensure that an attack would be regarded as such everywhere in Europe, and that there would be a coordinated response. Other initiatives have focused on ensuring better collaboration between police and security services, and in providing a legal framework that would ensure that an attack on an information system would be regarded as a crime anywhere in Europe and would be dealt with under the criminal system.

In addition there have been a range of Research and Development activities which have been focused on enabling member states to deliver.  In the previous Framework Program there was a focus on dependability.  There have also been initiatives which have been looking at issues that have become more critical in recent years, for instance relating to secure visas, the use of biometrics and smart travel documents.

Andrea moved on to describe three angles for actions on security policy: prevention, involving network and information security; prosecution, involving policies on cyber crime and terrorism; and protection, including policies for privacy and data protection.

He described the 6th Framework Programme as a whole, integrating European Research over a range of issues from food safety and health risks to aeronautics and space.  The entire budget of 16270 M€ is broken down as follows:

  • Focussing and Integrating
    • Genomics 2255 M€
    • Information Society Technologies 3625 M€
    • Nanotechnologies, int.. 1300 M€
    • Aeronautics and space 1075 M€
    • Food quality and safety 685 M€
    • Sustainable development 2120 M€
    • Citizens and governance 225 M€
    • Anticipation of S&T needs
      • Anticipating needs 555 M€
      • SMEs 430 M€
      • Specific INCO 315 M€
  • Strengthening ERA foundations 320M€
  • Structuring ERA
    • Research and Innovation 290 M€
    • Human resources 1580 M€
    • Research Infrastructures 655 M€
    • Science/Society 80 M€
  • Joint Research Centre 760M€

In order to provide a focus for R&D activities the commission is focusing on the vision of 'Ambient intelligence' - how a society would be different with the range of future technologies that will become available, with products and equipment at the service of individuals.

Immediate issues center around pervasiveness, interdependencies and intrusiveness, influencing factors being the needs for attention to compatibility between technology and human systems, for thinking in terms of a privacy respecting Society, and for a coordinated effort to address the dependability of information and communication infrastructures.

Future objectives center around the need to develop a “respectful”, productive, innovative and secure information society, by fostering a global dialogue on an IS respecting the personal sphere, safeguarding resilience of systems and infrastructures, encouraging innovation and enabling productivity, promoting the understanding of interdependencies, sharing a vision on how to depend on technology, and carrying out innovative research and development.  These are ethical as well as technological issues, and we must not ignore human behavior as an essential component of an integrated society, and education and public debate are as important as technological development.

These thought processes are resulting in a change in the paradigm for security, moving from 'security in obscurity' to 'security in openness', and there are three areas for consideration: securing the individual, securing communities, and securing critical infrastructures.

Towards a global dependability and security framework

The objective is to strengthen security and enhance dependability of information and communication systems and infrastructures and to ensure trust and confidence in the use of IST by addressing new security and dependability challenges. These are resulting from higher complexity, ubiquity of computing and communications, mobility, and increased dynamicity of content. Integrated and comprehensive approaches involving all relevant stakeholders of the value chain should address security and dependability at different levels and from different perspectives.  The focus is on:

  • Development of integrated approaches, architectures and technologies for security and mobility, virtual identity management, privacy enhancing both at application level and at infrastructure level. Aspects of usability as well as socio-economic and regulatory issues would have to be taken into account.
  • Development of integrated interdisciplinary approaches and ensuing technologies for the provision of dependable network and information systems that underpin our economy and our society
  • Development of modeling-, and simulation-based management decision support tools for critical infrastructure protection addressing ICT-related interdependencies of critical infrastructures and aiming at prevention of threats and reduction of vulnerabilities. 
  • Development, testing and verification of underlying and novel crypto technologies for a wide spectrum of applications. Development, testing and verification of technologies for protecting, securing and trustable distribution of digital assets. Due consideration should be given to implementation and standardization issues and to security policy development and consensus building among the relevant key players.
  • Research, development, testing and certification on next generation secure smart devices (e.g. smart cards) and their components. This includes design, production and automated verification of smart devices.
  • Multidisciplinary research on biometrics and its applications with due consideration also of the social and operational issues. Strengthening European competence on security certification leading to mutual recognition as well as network and computing forensic technologies to combat cyber-crime.

This work cannot be done in isolation; it should link to Member State research initiatives and policies. Related to dependability and critical infrastructure protection, targeted international collaboration with complementary research communities and programmes should be fostered.

The 6th Framework Programme is the framework for EU/US partnership on R&D.  A detailed joint R&D agenda was drafted at a workshop in Leesburg in Sept 2002), and covers information assurance and survivability, secure networked embedded systems, and modelling and simulation of critical interdependent systems.  Contacts with funding agencies have been established and co-ordination between the State Department and OSTP.

He emphasized the importance of European and US cooperation, but stressed the need also to work with colleagues in Japan, Australia and other countries.

Finally, Andrea referred the audience to several relevant web sites, of which the main one is www.cordis.lu.

Top

Allen Brown concluded first part of the morning proceedings by thanking the three speakers for their presentations, and spoke of the work going on within The Open Group, on Mobile Management, Active Loss Prevention and Security.


Industry Strategies for Securing Boundaryless Information

In the following sessions a group of key figures from IT and security industry consortia addressed the issue of securing the flow of information in the boundaryless enterprise. They outlined strategies for implementing policies, procedures and standards that will assist industry or government bodies in achieving a secure information environment


Managing Your E-mail from Over-flowing the Floodgates

Pat Gilmore
Treasurer, International Information System Security Certification Consortium ISC2

Pat began by describing recent troublesome email attacks.  She referred to an article in Information Security Magazine, November 2002, which had published the results of a survey of the damage caused by viruses, worms, and similar attacks.  Code Red (2001) was the most 'popular', with 300,000 corporate servers affected in less than 9 hours.  Others included Nimda in 2001, of which there were estimated to be 11,000,000 instances within one month, Melissa (1999) and finally LoveLetter (2002), which cost businesses 8.75 Bn$.  In 2000 there were several Distributed Denial of Service (DDoS) attacks, and organizations such as eBay came together to try to resist them.

The article had gone on to speak of the future - The Coming Deluge, with: 

  • "Super" Worms and Polymorphic Code
  • Application-Level attacks
  • Massively Distributed Attacks 
  • Attacks Against Routing or DNS infrastructure
  • Kernel-Level Holes in Operating Systems
  • IDS Evasion
  • Simultaneous Cyber and Physical Terrorist Attacks - perhaps the most serious of the predictions.

So how can we prepare for inbound email attacks?  Pro-active measures that can be taken include:

  • Awareness and Training (Don't Open that Strange E-mail - it really doesn't Love You!)
  • External Facing OS hardening: Firewalls, DNS, E-mail and Web Servers
  • Keep 'em patched - a monumental task in large organizations.
  • Up-to-date Anti-virus software everywhere (desktop, mail and file servers)
  • Stop it Upstream (Agreements with your ISP to filter and block infected packets).
  • IDS and Incident Response Programs

As well an inbound email, outbound traffic needs to be secured.  Requirements and controls are needed to ensure email confidentiality.  Customer privacy needs to be protected, as does Company proprietary information.  Message controls might include use of obfuscation and strong encryption.

Securing outbound email also requires message integrity controls to protect against data tampering and against falsified messages.  These controls might include use of message authentication techniques, such as digital signatures, and these need to be put in place, because falsifying an email message is easy.

Controls are also needed to ensure email availability by protecting network bandwidth, and traffic flow against attacks.  This can be done by employing high availability systems, and capacity management - reserving capacity against such emergencies.  Organizations should establish and test business resilience plans, including actions to be taken if email communications are disrupted.  Physical security needs also to be checked - the danger of simultaneous physical and cyber attacks is considerable.

Conclusion: sustaining the flow of your company's email makes the difference between business survival and failure.

Top


Information Security Assurance and Auditing

Charles Le Grand
Assistant Vice President, Technology Practices, The Institute of Internal Auditors

Charles reflected briefly on the changes in auditing and accounting brought about by recent business losses, and the partnership that there must be be among all those involved in achieving financial and information security.

Integrity begins at the top of any organization, and is part of the duty of care at Director level.  It permeates the organization, and exists in a complex environment in which responsibility can be very difficult to identify.  At board level there is responsibility to ask questions about topics such as information security, and to be able to understand the answers.  Directors also carry a personal liability, and they may want to ensure that they are adequately insured against lawsuits brought, for example, by business partners whose business may be damaged by a failure in security.

Many organizations have been damaged by various forms of attacks, and have suffered not only direct and tangible losses, but have had to cope with the loss of shareholder confidence resulting from a forced admission that their systems were not secure.  Why did they not take steps to answer questions such as 'What percentage of our assets have been physically verified?'

What everyone is seeking is assurance, provided through dual reporting, and independent sources, and derived from monitoring, analytics, and assessment, that an organization has an effective system of internal controls.  The internal auditor has the responsibility for finding things that are not quite right, and shining a light on them.  Often the manager responsible is naturally reluctant to encourage this, but the approach is essential.  There should be a natural partnership between auditors and information security professionals because both are trying to ensure that the right controls are in place.

Risk Management maintains risk within defined and acceptable boundaries. but how many organizations have a formal risk policy?  How many decisions are taken within a company that place the organization at risk, without that risk being realized or understood at a senior management level.

The problem with assessing risk  is that it spans organizational boundaries, and is subject to complex interactions between the various functions within an organization.

Top


The Internet Security Alliance

Bill Hancock
Deputy to the Vice Chair, Senior Advisor, IT Security and Privacy, The President's Critical Infrastructure Protection Board

Bill introduced the Internet Security Alliance as a Trusted and Reliable Public-Private Partnership for Information Sharing and E-Security Issues.

He described the Distributed Denial of Service attacks that occurred on 9th February 2000, and the need that emerged for an organization that would tackle the standards issues raised, leading to the formation of the ISAlliance.  Its goals are to:

  • Provide a forum for information sharing and thought leadership on information security issues
  • Represent industry's interests before legislators and regulators 
  • Identify and standardize best practices in Internet security and network survivability
  • Create a collaborative environment to develop and implement information security solutions and standards

Efforts in progress include the following activities, some of which are already having a real impact in areas such as new security legislation and the US National Security Plan:

  • Promote greater corporate responsibility on information security issues
  • Provide early warning of emerging security threats
  • Provide in-depth reports on vulnerabilities and threats
  • Facilitate executive-to-executive communications about solutions to threats and emerging trends
  • Conduct research leading to identification and resolution of root causes to problems
  • Develop training and certification programs in information assurance and other fields
  • Initiate standard-setting activities on the foundation of EIA's 75-year heritage in the standards world
  • Provide a coordination point for industry dialogue on self-regulation issues such as privacy
  • Develop organizationally viable models for integration and adoption of security practices
  • Work with legislative and regulatory bodies to ensure efficient linkages are maintained
  • Educate senior management and boards
  • Conduct timely seminars on emerging security issues

CERT/CC and ISAlliance provides a security information sharing service. This includes receiving reports from ISA members, sharing analysis reports with ISA members, and allowing ISA members to share information with one another.  In addition, ISA members have access to the CERT/CC's database of information through secure distribution channels, thereby enabling the CERT/CC to provide more information to the private sector, in a responsible way.

Products from the ISA include a 'Common Sense Guide to Internet Security for Executives' and the 'Home PC User's Guide to Safe Computing'.

The ISAlliance influences Governments on Information Security Issues by holding direct meetings with influential members of the U.S. Senate, U.S. Congress, and White House cybersecurity advisors and with other U.S. Government departments involved with security initiatives; also other international government groups who affect legislation of security.

It also aims to influence industry-wide security improvement, by activities such as:

  • Creation of corporate standards and best practices for security
  • Education and influence on senior management on security issues
  • Industry-wide creation of standards and guidance on security issues
  • Cooperation with membership to build high standards of security
  • Access and sharing of technical security issues, threats, vulnerabilities and procedures via CERT/CC to improve security
  • Fostering "community of security" concepts and procedures.  The intention is that the more organizations make themselves secure the less they can be used as a base for attacking others.

www.isalliance.org

Top


IT Security: BITS' Initiatives

Laura Lundin
Senior Director, BITS

Laura began by introducing BITS, the sister organization to The Financial Services Roundtable.  It was founded in 1996 to address areas in which there is need for collaborative industry action, and focuses on emerging technologies, payments and e-commerce.  Members of BITS are drawn from the membership of the RoundTable.

The imperative for collaborative action exists in a number of areas, such as payments and delivery channels, legal and public policy, communications research and education, security and risk management, eCommerce market development, business standards and practices, and industry infrastructure.  The key is that most efforts span more than one of these issues.  The strength of the organization consists in its ability to bring together key industry players to get things done.  The BITS CEOs meet twice a year to set the direction for the organization, and below them is the BITS Advisory Group Council, made up of member CIOs and CEOs, which meets monthly.  The organisation:

  • Addresses cutting edge issues from a CEO perspective.
  • Marshals key players to respond quickly to industry issues.
  • Provides strategic as well as tactical direction.
  • Accomplishes as an industry what individual institutions cannot.
  • Reduces the risk of legislation and regulation.
  • Mitigates threats, reduces industry costs, identifies new business opportunities and increases revenue.
  • Shares intellectual capital and enables peer-to-peer networking.

Examples of BITS Deliverables include:

  • BITS FSR Crisis Communicator
  • BITS FSR Crisis Management Process: Members' Manual of Procedures
  • BITS Voluntary Guidelines for Aggregation Services
  • BITS Framework for Managing Technology Risk for Information Technology (IT) Service
  • Provider Relationships
  • BITS Guidelines for Mobile Financial Services
  • Business Method Patents White Paper
  • Consumer Privacy Research and Business Implications
  • EA/ECP Business Model and Tool (Updated 2002)
  • E-Insurance Technology Risk Transfer Gap Analysis Tool
  • Fraud Prevention Technologies in a Truncation Environment White Paper
  • Security Profiles and Testing Process for E-Commerce Products

Laura went on to describe some of BITS activities that relate to the area of security.

Crisis Management

The BITS Crisis Management Working Group was formed to coordinate member crisis management activities to ensure we are prepared if a disaster were to occur today. Activities are focused in the following areas:

  • CEO Crisis Communications Coordination
  • Scenario Building
  • Event Management
  • Key Messages for Maintain Public Confidence
  • Best Practices
  • Liaison to Key Government Agencies and Critical Infrastructure Industries

The current focus in crisis management relates to telecommunications, which is key to the flow of money in US commerce.  BITS is setting out to:

  • Develop a White Paper on critical issues and potential solutions to be used for discussions.
  • Schedule CEO to CEO discussions with key vendors.
  • Schedule CEO to Regulator discussions with key regulators.
  • Draft letters addressing issues through business practices and public policies.
  • Draft letters making issues known to the industry through business requirements.
IT Service Providers

Many organizations have increasingly used outsourcing as an approach to their IT needs, creating the need to assess the risks associated with this decision.  BITS has produced a Framework for Managing Technology Risk for ITSPs, which is intended for use as a guiding document and set of criteria against which IT service provider relationships can be effectively evaluated and managed.  It is also intended to complement regulatory guidance and requirements, and to set voluntary industry guidelines for risk-based management of IT service provider relationships.  It includes the following elements:

  • Framework Application and Flow Chart
  • Business Decision to Outsource
  • RFP Considerations
  • Due Diligence Considerations
  • Contractual, Service Level and Insurance Considerations
  • Procedures Supporting Specific Controls
  • Implementation and Conversion Plan
  • Ongoing Relationship Management

ITSP Framework Phase II will include:

  • Education and Awareness: Gain broad acceptance of the BITS Framework for Managing Technology Risk for IT Service Provider Relationships among key stakeholders.
  • Vendor Management: Identify and share industry best practices and considerations for relationship and risk management of IT service provider relationships.
  • Crisis Management: Update BITS Framework to include crisis management/business continuity issues for service providers.
  • Security Assessments: Identify industry, regulatory and Framework requirements for third-party audits and assessments.
  • Cross-Border: Identify industry issues and best practices related to cross-border outsourcing.
Security & Risk Assessment 

The Security & Risk Assessment Committee is a standing  committee, made up of over 65 members.  It has four main project areas:

BITS Product Certification Program.  This sets out to improve the baseline security of products that are used in the financial services industry, to provide an opportunity to leverage independent testing efforts including common criteria testing, and to provide an outward facing seal to visibly identify products that meet the criteria.  Criteria have been developed for 6 product categories, and certification programs are in place to evaluate products from vendors.

Critical Infrastructure Assurance addresses the growing interdependencies between core sectors such as telecommunications, transportation, electric power and financial services in e-commerce and requires a partnership between providers, customers and intermediaries to ensure a secure environment.

In the area of Operational Risk Management, the SRA Committee is looking at legislation that is expected later in 2003.  It sets out to develop a common body of high risk factors for the industry related to information security that influence operational risk models, to establish metrics and measurement methodologies, and to provide sound practices for preventing the likelihood of occurrence and/or diminishing the resulting damage for information security risk events.

Finally, the SRA looks at regulation and compliance.  Analysis involves the SRA in sharing experiences on how regulators are interpreting the new cybersecurity and other security requirements, as well as the institutional impact of implementing these regulations.

www.BITSinfo.org

Top


Information Systems Security Association

Candy Alexander
VP of International Relations, ISSA

Candy began by referring to the impact that internet security is having on our society.  She referred to a headline from the front page of the previous New Hampshire Sunday News: “SQ hell Virus attacks Net - Infection slows thousands of computer systems, hampers ATMs, other services".

The reason for this publicity is that the virus touched the lives of ordinary people by, for instance, slowing ATM machines and the response of home computers.

In order to reduce this challenge, it is essential to "spread" the word and to persuade users to adopt techniques such as:

  • Best Practices - Patch management is key; in the case of the virus mentioned previously a patch had been issued that would have provided protection, but many had not applied it.
  • Standards/Policies.  The important thing is that they have to be measurable, and they have to be measured and followed through.
  • Risk Assessment/Management.  It is extremely important for companies and organizations to think through the risks involved in their operations and to plan potential responses.
  • Training.  It is essential that people have the skill sets to perform the duties that are expected of them, and certification is an important part of this.
  • Awareness of all members of the workforce.  It is really important that throughout the organization everybody understands the significance of the role they have to play.

The new challenge in today's world is provided by the expanded on-line community.  Like it or not, our community has grown to include non-technical people that do not fully  understand the laws regarding electronic information and do not realize that they have an obligation to secure their environment - let alone how to do so.  Security has to be made easy, by providing more secure applications and 'out of the box' security solutions.

The ISSA is working to help provide security.  In contributing to the support of securing boundaryless information for the traditional challenge, the following list includes some of the important ways that ISSA members work toward achieving these goals:

  • Creation of new standards: ISSA members are involved in the ongoing efforts of existing standards bodies such as ANSII, IEEE, ISO, IETF. 
  • Deployment of standards: members learn through ISSA organized industry conferences, chapter meetings and seminars. 
  • Education and Awareness: ISSA members help to facilitate discussion to educate public, government, media and other important audiences. 

The ISSA is also working with committees to help identify resources in areas such as: Community Outreach, International Development, Standards, Professional Ethics, Privacy and Security Education.  It is also working in partnership with other security consortia such as ITAA - Community Outreach, ICS2 - Certifications.

Top


Auditing Information Technology in the Boundaryless Enterprise

Deb Frazer 
Director, Global IT Audit, APL Limited, NOL Group

Deb began by pointing out that risks are unavoidable, and a coherent approach to  managing risk is key.  She made the distinction between risk and exposure, which she defined as 'risk minus controls'.

The Board of Directors wants to reduce exposure, they want accountability in the organization and they want to leverage cost.

Risk is driven by many factors, and organizations are concerned about issues such as:

  • What is the impact on my customers and on my brand name if something goes wrong?
  • Cost drives risk
  • New or disparate technologies can introduce new risks
  • Historical events are a major source of risk in the modern world
  • The regulatory environment in the area of security creates new considerations
  • Inherent conditions - issues such as fraud
  • Other external factors such as regulations in other countries; weather conditions, strikes, and other factors are all sources of risk.

Assessment and measurement of risk needs a framework, and the CobiT (Control Objectives for Information and related Technology) can be highly successful, and is understood by all levels from the Board to technologists.

CobiT starts with business processes, and breaks the IT environment into understandable units.  It then matches the business requirements with technology that meets those requirements.  The Risk Assessment Process should not be a guessing game.  It should mirror the organization's IT Governance, and risks should be given a ranking which relates risks to each other.  Management input is key, and there need to be mutually agreed high risk areas.

Audit Execution identifies high risk areas.  Its findings are correlated with CobiT objectives and risk ranking, and there is then a need for corrective action tracking.

Top


Consortia Panel Session

Allen Brown began the session by suggesting the potential for consortia such as those assembled today to adopt and promote each other's work.

Candy Alexander expressed support for this idea and referred to cooperative relationships that the ISSA has formed with other organizations working in similar fields.

Bill Hancock referred to a list of high level practices that home users should have.  Home users whose computer might be involved in a terrorist attack can become liable for their part in the activity if they have failed to do due diligence.  The problem is not trivial to come back with a consensus view on adopting documents from other consortia.

Charles Le Grand raised the issue of identifying the correct tools for any organization, when a standard might work for one but not for another.

Laura Lundin expressed the view that her organization would support the cross-promotion of specifications and work from other consortia.

Mike Jerbic asked: When the worm hit last week, Systems Administrators that should have patched their systems and hadn't were called into question.  Could you address the issue of the responsibility that Systems Administrators should face in such situations?

Bill described the steps that his company had taken that had provided effective defenses against this worm - in particular a strategy that was based on denying all services except those that were specifically allowed.

Pat Gilmore - there should be a business process with regard to patch management; there's a business process that should be implemented, from the CIO down.

Top


Saving Private Data - Act 1

This workshop was staged in two Acts, with nine players providing the action, and each member of the audience as a Board Director bearing ultimate responsibility for the attacked corporation.

Act 1 played out a sequence of response scenarios to the discovery of an intrusion, illustrating the various priorities a business must reconcile when facing such situations, and bringing out the need for well-prepared and regularly updated response procedures to manage it well.

Act 2, on Tuesday morning used the outcomes from Act 1, to indicate what considerations well-prepared response procedures need to include. It reviews the business and legal consequences of the intrusion, liability to third parties and defence for any enforcement procedures (under data protection/ privacy laws), and steps to be taken to minimize their own potential losses, and to bring the hacker to justice (or not). It also considers whether to provide details of the intrusion to clients, law enforcement or to an ISAC or other organization, and the possible consequences of doing so, or not doing so.

The cast
Rocky Wardrop - StarCorp IT Operations Manager Walter Stahlecker – Hewlett Packard / Open Group Board member
Col. K. A. "Kelly" Rider (ret.) - StarCorp IT Security Manager Steve Jenkins - NASA Jet Propulsion Laboratory
Lucinda Walls - StarCorp Order-Processing Application Owner Sally Long – The Open Group
Brenda Star – StarCorp CEO Jane Hill - Barrister, Chambers of Benet Hytner Q.C. London
David Auric - StarCorp Public Relations Officer Eliot Solomon – Eliot M. Solomon Consulting
Brendan “Blowtorch” Boylan - Boylan, Boylan, Singh, Girardo (retained counsel to Nebular Networks) Wes Kinnear - Holme Roberts & Owen, LLP
Anna Williamson – StarCorp Corporate Counsel Ola Clinton - Holme Roberts & Owen, LLP
Tim “the Terrier” Malone – Independent Daily Tabloid - reporter John Mawhood – Partner, Tarlo Lyons, London
Bailiff David Lounsbury – The Open Group
Board of Directors The audience
Synopsis

At 09.35, StarCorp's online order-processing application goes down. The initial word from IT operations was that it was a hacker attack. Getting the system back on line was the company's highest priority. A SWAT team headed by IT Operations Manager Rocky Wardrop tried to identify and fix the problem. StarCorp CEO Brenda Star was determined that the offender would not go unpunished.

Brenda was rather busy being interviewed by the press, and so Rocky was asked to put together a team to address the problem.  The team consisted of:

  • Rocky Wardrop - StarCorp IT Operations Manager 
  • Col. K. A. "Kelly" Rider (ret.) - StarCorp IT Security Manager
  • Lucinda Walls - StarCorp Order-Processing Application Owner 
  • David Auric - StarCorp Public Relations Officer
  • Anna Williamson – StarCorp Corporate Counsel
Meeting 1

The team began by discussing the implications of the problem that the application was down.  The company had contractual commitments which after 8 hours would result in financial penalties.  Nothing like this had happened before.

'Johnny' was missing.

Meeting 2

Initial diagnostics showed a long series of mis-formatted orders, which suggested that some sort of attack had occurred.  Kelly claimed that he had been warning for months that something like this would happen if nothing were done.  He produced a very thick security plan and insisted that it should be followed to the letter.  Rocky asked him to begin implementing the plan.

Customers needed to be informed that StarCorp were on top of the problem and would be solving the problem within the 8 hour period.  Anna Williamson instructed that only accurate information should be communicated.

'Johnny' was still missing.

Meeting 3

The source IP addresses of the mysterious packets was o.36.25.36, an internal system, which suggested that the problem was being caused by a member of staff.

Traffic was going to e.112.57.5, a Nebula Systems address - StarCorp had a non-standard cooperative processing contract with Nebula Networks.

The intrusion response plan required that a full back-up be taken, which would take three hours.  Lucinda Walls argued that at this time the application should be restarted.  Anna Williamson pointed out that failing to follow the plan could make StarCorp liable.  Kelly objected to this but went ahead anyway, and the application was restarted before the backup was complete.

It was confirmed that the source of the attack was Johnny's machine.  It seemed that Johnny had penetrated Nebula's system, before traveling to Rio de Janeiro.  If Johnny's employment had not been managed properly, StarCorp could be liable for his behavior.  Anna Williamson advised that there was no non-disclosure agreement with Nebula.

At this point Tim “the Terrier” Malone – Independent Daily Tabloid - entered, and then had a meeting with David Auric, who told him that there had been a brief system problem but now everything was running well.  He promised to phone Tim as soon as he knew the source of the problem.

Lucinda drafted a letter to Nebular Networks summarizing what had happened and pointing out that StarCorp had met the terms of their contract.

Meeting 4

Tim Malone had written an article in the Daily Tabloid pointing out that StarCorp 'faced disaster' following an attack by a hacker.  David Auric wanted to send out a press release responding to this, but was advised not to.

At this point Johnny was discovered.  The possibility of pressing charges was discussed, but no decision was taken.

Anna agreed to summarize the company's liabilities.

At this point the San Mateo deputy sheriff appeared with a Brendan “Blowtorch” Boylan, retained counsel to Nebular Networks, who had an order entitling him to take away any computer that might contain information stolen from Nebula Networks.

Questions

The cast assembled on stage to answer questions from the audience.

Q: The last scene portrays the execution of a seizure order.  Could that happen in the real world?

  • A: It does happen, but rarely.  It would be unlikely to seize systems, but they might take away backup data.

Q: When they come in for a bank seizure, they do come in and grab everything.

  • A: Yes, but that's largely in a criminal context - this was civil.

Q: In the production there was a lot of effort to preserve evidence.  Would that happen in real life?  If in the course of restoring service the team had lost evidence, would that be a problem?

  • A: Yes, but more about that in Act 2.

Q: It's interesting that when it came to the issue the Security plan was ignored.  Are there circumstances where having a plan and not following it is worse than not having one?

  • A: Both are bad - not having a plan is no defense.
  • A: Failure to follow a policy is a very easy line for a lawyer to attack.

Q: You said in the script that using PKI would have avoided this problem.  Do you think that is the case?

  • A: No it wouldn't.  An employee would have had access to the keys.

Q: There's an HR issue relating to the management of staff, so this shows that security is an architectural issue that runs through every aspect of the business.  This could be written up as a case study.

  • A: Yes, we plan to do so.

Q: We saw some examples of SLAs, etc.  What is the default that would happen if agreements were silent on these points.

  • A: If you have an agreement and you breach it, then you would simply be expected to act in a commercially reasonable manner.
  • A: It was a mistake for Anna Williamson to negotiate a contract that had a financial penalty in the event of data loss.
  • A: In Europe there is another complication - Data Protection.

Q (of the audience): How many of you have been aware of an exercise in your company to simulate an attack in your company?

  • A: (Two hands were raised)

Q: I wasn't convinced by the realism of the relationship with the reporter.  What does StarCorp stand to lose by the poor press coverage.

  • A: Reputation was everything.

Q: I'm surprised that you say it was a civil offence.  Surely the hacker had committed a criminal offence.

  • A: Maybe, but in 95% of cases there would not be a prosecution because of the bad publicity.

Q: Would the fact that a criminal offence had been committed provide any defense on the civil side.

  • A: It depends whether what happened was really outside StarCorp's control.

Q: I understand why you would backup a system before an attack, but why do so during it?

  • A: Did you not read the incident response plan? !
  • A: One reason for taking a backup might be to preserve evidence.

Q: Are states doing anything about problems like this?

  • A: It comes and goes as a topic.

Q: Since many networks cover multiple states, how is jurisdiction determined?

  • A: That is only really an issue in criminal matters.  In a civil issue it might be commonly determined by the contract.

Q: Is there a burden for a company to take steps to preserve that might be useful in a prosecution of someone like Johnny?

  • A: Because in 95% of cases there is no prosecution, the more compelling reason would be to act as a deterrent.  There is no public duty.

Q: What would have been the situation if Johnny had acted as he did but without a system outage.  How would StarCorp react?  Would they tell Nebula?

  • A: Sometimes people will do the right thing, sometimes they won't.  If there wasn't an outage, Johnny's hacking of Nebula's systems would probably never be noticed.
  • A: In most systems, the symptoms of a problem can be observed long before the real problem occurs.  It's important to have monitoring systems in place so that these things can be detected.

Q: (of the audience) How many companies would involve the legal council from the start?

  • A: (surprisingly many).

Top


Cybersecurity from the Front Line

DCS Len Hynds and Dr. Bill Hancock presented sessions from the cybersecurity front line.  Dr. Bill shared his experience of dealing with 200-400 attacks a month on half a million online systems, and DCS Len Hynds warned of the growing international threat posed by IT organized crime.


Cybersecurity from the Front Line - fighting cyber crime

Detective Chief Superintendent Len Hynds
Head of National Hi-Tech Crime Unit, England and Wales.
(slides not available)

DCS Hynds pointed out that his presentation was not about cyber-security, but about cyber-crime.

Cyber-crime is crime.  It hurts as much as any other sort of crime, and it's what is allowed to happen when we get IT security wrong.  Governments around the world have for some time been trying to make IT an integral part of business, so it is hardly surprising when it becomes an integral part of crime.

For many years the legal system has been trying to solve the problems of young people and crime; the internet allows kids to hang out on 'street corners' that nobody can reach.

Cyber crime happens instantaneously, and it can happen across jurisdictions.  It is a global problem and demands a global solution.  Any tool can be adapted for a criminal use but the level of appeal that tool has relates to its attractiveness in a criminal context.  The criminal can attack multiple victims, and because of these factors it is an aggravated version of its low-tech counterpart.

The fundamental point is that hi-tech crime is just as serious as any form of crime.

Len referred to three studies, carried out by the CBI in the UK, the FBI-CSI, and the UK Threat Assessment Agency.  Trends in cyber-crime are difficult to track because information gathering is difficult and inconsistent.  But even without authoritative data, the prediction is that it will increase.  

  • Networks can be accessed from mobile phone and other small devices, and access from televisions is being rolled out across Europe.
  • There is high reward (profit, power, recognition, corporate victims) and low risk (anonymity, remote ability, low custodial sentences, public perception).  Cyber-criminals such as child abusers flock together, and the turf wars that happen in 'old' crime do not seem to exist in cyber-crime.
  • There are currently 3000 Web sites that will demonstrate how to hack.

The assessment is clear.  If organized crime employs the risk v reward model, there is only one way - up.

The cyber-criminals are not in the typical mould of criminals.  Vladimir Levin transferred $12m into his own accounts, but received a punishment of only 3 years in prison; Onel de Guzman, the originator of the 'I love you' virus has never been charged because there is no relevant law in the Philippines.

Organized crime has not yet fully realized the opportunity of internet crime, and we are not yet seeing the total figures for it because of incomplete reporting and detection.  However, as crime syndicates begin to understand the opportunity, we can expect them to use all the techniques familiar in traditional crime.

The decision was taken in the UK to create a multi-agency national hi-tech crime unit which would bring together a collaborative and nationally coordinated effort, with interagency collaboration and in partnership and cooperation with industry.

The NHTCU was established in April 2001, with new funding of £25m, staffed by people from a range of disciplines.  Its work is divided into four disciplines: Investigations, intelligence, collaboration and support (the interface with local law enforcement and industry).  Operational success has come quickly, because of the multi-agency nature of the unit.

To police cyber-space it is necessary to establish a presence within it, to establish policing by consent, to have an e-presence, act at e-speed, while maintaining standards.

Much legislation has been put in place in the area of traditional policing, and its principles need to be applied in this area as well.

International Collaboration is key.  Interpol connects 179 countries through some well-established protocols.  More importantly, the G8 24/7 agreement provides a commitment to emergency mutual support.  Europol brings together 15 European states, and the heads of cyber crime policing meet regularly.  The NHTCU has 22 partners on the ground in 22 countries.

Industry Liaison is equally important - for both sides of the relationship, and confidentiality contracts can be agreed with industry in order to avoid problems of reluctance to report crime.  The popular image of a detective ringing the crime scene with tape and seizing anything within it is pervasive, but it is founded on stereotypes that bear no relationship to reality.

There is reliable intelligence showing that drug and arms traffickers are using the internet to support their activities and to store information on the servers of organizations who are unaware of what is going on.

Top


Cybersecurity from the Front Line

Bill Hancock
Deputy to the Vice Chair, Senior Advisor, IT Security and Privacy, The President's Critical Infrastructure Protection Board

Bill began this presentation by emphasizing the size of the internet - currently 655 million accounts.  He described an event at his home, in which his 13-year old son had provided internet access to his friends through the wireless network.  The point is that there is an almost infinite potential for intrusion into an almost infinite network.

By contrast, security is very complex; it is currently where networking was 15 years ago.  There are many complex components, and a general lack of expertise in the industry (60% vacancy with no qualified personnel).  There are no common GUIs and a lack of standards.  And the number of attacks is growing.

At the same time, software is too complex.  Bill illustrated this by the number of lines in successive versions of the Windows operating system.

Windows version Number of lines (million)
3 1.3
NT

4

95 15
NT 4.0 16.5
98 18
2000 35
XP 45

It is not surprising if there are security bugs in such a vast collection of code!  A recent version of windows shipped with 29,000 known bugs.

He showed a graph illustrating the growth in the number of incidents reported to the CERT/CC, which had gone from less than 4000 in 1998 to around 86,000 in 2002.  During the same period the number of vulnerabilities reported to the CERT/CC had grown from 262 to 3,222.  And the internet continues to increase in size, with around 160 million hosts.

The issue for all organizations is: as all these figures increase, what is happening to your security budget; to the numbers and skill levels of the staff who have security responsibilities?

At the same time that systems are becoming more complex, attackers are becoming less mentally sophisticated, building on the work of the very smart people who originated attack technology.

Classic current IT security risks arise from the well-known sources: DNS attacks, DDoS, DoS, Virii, worms, spoofs and redirects, and so on.  But there are serious upcoming security threats that arise from: 

  • Geographic locations - China is major concern
  • New hacker methods and tools
  • VoIP - there is a readily available tool to cut off a VoIP conversation
  • MPLS
  • ASN.1 and derivatives - problems with SNMP; LDAP vulnerability corrupts the directory tree
  • Hacker “gangs”
  • Complexity of application solutions make it easier to disrupt them (Active Directory, VoIP, etc.)
  • Industrial espionage from competition
  • Covert sampling
  • Covert interception

Prime resources to be protected include: DNS, router tables, and DHCP.  To stop a DNS attack, attack mitigation technology needs to be used, with the right firewalls, filters and switches; and you need to work closely with your ISP.

Three concluding messages:

  • Keep your DNS clean: the only way to defeat a frontal attack is with a frontal defense
  • Keep your router tables healthy; make sure that people don't send corrupt data to them
  • Make sure that DHCP is well-protected, because if not the whole infrastructure will fall on its face.

Top


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Tuesday, 25 March 2003