critical information infrastructure protection enhancing ......telvent -2012 telvent, the smart grid...

24
Critical Information Infrastructure Protection Enhancing Cybersecurity and Resilience Presentation at the 12 th International Conference Nigeria Computer Society Tope S. Aladenusi, CISA, CISSP, CRISC, CBCI, CEH, CIA, COBIT5(i), ISO27001LA Cyber Risk Services Leader, Deloitte Nigeria 22 July 2015

Upload: others

Post on 12-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Critical Information Infrastructure ProtectionEnhancing Cybersecurity and Resilience

Presentation at the 12th International ConferenceNigeria Computer Society

Tope S. Aladenusi, CISA, CISSP, CRISC, CBCI, CEH, CIA, COBIT5(i), ISO27001LACyber Risk Services Leader, Deloitte Nigeria22 July 2015

Page 2: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Background

Critical Information Infrastructure

Why is Security of CII so important?

Types of Threats and Threat Vectors

What are Other Countries Doing to Protect CII?

Enhancing Cybersecurity and resiliency of CII

Way Forward

ContentsBackground

Critical Information Infrastructure

Why is Security of CII so important?

Types of Threats and Threat Vectors

What are Other Countries Doing to Protect CII?

Enhancing Cybersecurity and resiliency of CII

Way Forward

1

Page 3: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Background

2

Page 4: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

President talks about cybercrime during InauguralSpeech…

3

“I also wish to assure the wider international community of our readiness tocooperate and help to combat threats of cross-border terrorism … financialcrime, cyber crime, … and other challenges of the 21st century.”

Page 5: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Polish Airline Cyber Attack - 2015

Ten planes and around 1,400passengers of Polish airliner LOTwere grounded Sunday after amajor hacking attack jammed thecarrier's systems, the companyconfirmed.

The issue, which took five hoursto solve, meant that 10 flightswere cancelled and around 15were delayed at Warsaw Chopinairport.

4

Ten planes and around 1,400passengers of Polish airliner LOTwere grounded Sunday after amajor hacking attack jammed thecarrier's systems, the companyconfirmed.

The issue, which took five hoursto solve, meant that 10 flightswere cancelled and around 15were delayed at Warsaw Chopinairport.

Page 6: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

On 15 August 2012, the computernetwork of Saudi Aramco was struckby a self-replicating virus that infectedas many as 30,000 of its Windows-based machines. Despite its vastresources as Saudi Arabia’s national oiland gas firm, Aramco, according toreports, took almost two weeks torecover from the damage.

Aramco Cyber Attack - 2012

On 15 August 2012, the computernetwork of Saudi Aramco was struckby a self-replicating virus that infectedas many as 30,000 of its Windows-based machines. Despite its vastresources as Saudi Arabia’s national oiland gas firm, Aramco, according toreports, took almost two weeks torecover from the damage.

The virus also spread to the networks of other oil and gas firms, including thatof RasGas

5

Page 7: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Telvent - 2012

Telvent, the smart grid giant owned by Schneider Electric, reported thathackers breached its network, left behind malicious software andaccessed project files for its OASyS SCADA system.

This was the same system that Telvent used to control power grid, oiland gas pipeline, and industrial controls around the world, as well as tointegrate them with utility enterprise systems and new smart gridplatforms.

6

Page 8: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

On April 23, 2013, hackers used the Associated Press Twitter account to report anattack at the White House. The Dow Jones Industrial Average plunged over 150points within moments, and quickly corrected itself after the hack was discovered.

Associated Press Twitter Account hacked - 2013

3 minutes

7

Page 9: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

The Mask and Stuxnet

The Mask - 2014

• Researchers uncovered a sophisticated cyber spying operation that had been alive sinceat least 2007 and used sophisticated techniques and code.

• The attack targeted government agencies and diplomatic offices and embassies. It alsotargeted companies in the oil, gas and energy industries as well as researchorganizations and activists.

• The attackers sought to steal documents, encryption keys, etc.

8

Stuxnet - 2010

• Stuxnet is a computer worm that was designed to attack industrial programmable logiccontrollers (PLCs).

• Stuxnet reportedly compromised Iranian PLCs, collecting information on industrialsystems and causing the fast-spinning centrifuges to tear themselves apart. Stuxnetreportedly ruined almost one-fifth of Iran's nuclear centrifuges.

Page 10: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Related Cyber Attacks in Nigeria

INEC - 2015

• The website of the IndependentNational Electoral Commission hasbeen hacked. The website washacked by a group that paradeditself as Nigerian Cyber Army. Thehacking was confirmed by INEC onits Twitter handle, @inecnigeria

• “We are aware of the recent hack ofour @inecnigeria website, we arecurrently investigating this incident#NigeriaDecides”

Nigerian Defense Website - 2015

• The Defense website was hacked'ISIS' style (i.e. an attempt to hackinto the Government platform).Spokesperson of Defense HQ,Chris Olukolade confirmed it, thenlater revealed that the website hasbeen taken back from the hackers.

9

• The website of the IndependentNational Electoral Commission hasbeen hacked. The website washacked by a group that paradeditself as Nigerian Cyber Army. Thehacking was confirmed by INEC onits Twitter handle, @inecnigeria

• “We are aware of the recent hack ofour @inecnigeria website, we arecurrently investigating this incident#NigeriaDecides”

• The Defense website was hacked'ISIS' style (i.e. an attempt to hackinto the Government platform).Spokesperson of Defense HQ,Chris Olukolade confirmed it, thenlater revealed that the website hasbeen taken back from the hackers.

Page 11: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Critical Information Infrastructure

Critical Information Infrastructure (CII) are those ICT infrastructure upon whichcore assets that are essential for the functioning of the society and economy isdependent.The destruction of these assets has a catastrophic impact on national security,governance, economy and social well-being of a nation.

Critical Information Infrastructure Protection (CIIP) refers to the security andprotection of these IT connections and solutions.

10

Page 12: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

According to section 7.5 of the National Cyber Security Policy (2014), thefollowing have been defined as Critical Infrastructure sectors in Nigeria.

Currently, there are 15 industry sectors defined ascritical infrastructure

Critical infrastructure sectors

Food and Agriculture Dams Information TechnologyFood and Agriculture Dams Information Technology

Financial Services Defense Public Health andHealthcare

Chemical (Oil and gas) Emergency Services TransportationSystems

Commercial Facilities Power and Energy Water and WastewaterSystems

Communications Government andFacilities Manufacturing

11

Page 13: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Intensity and impact• Heavy reliance on cyber• Interdependence of industries

and sectors of the economy• Complexity and volume of

threats• Velocity of change• Highly centralised operations• Potential for catastrophic

physical and economicdamage

Why is Security of CII so important?

Intensity and impact• Heavy reliance on cyber• Interdependence of industries

and sectors of the economy• Complexity and volume of

threats• Velocity of change• Highly centralised operations• Potential for catastrophic

physical and economicdamage

12

Page 14: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Internal Threat

• It is defined as “One or more individualswith the access and/or insideknowledge of a company, organization,or enterprise that would allow them toexploit the vulnerabilities of that entity’ssecurity, systems, services, products, orfacilities with the intent to cause harm.”

• Insider betrayals cause losses due to ITsabotage, Fraud, and Theft ofConfidential or proprietary information

• This may be intentional or due toignorance

Types of Threats to CII

External Threat

• Arise from outside of the organizationby individuals, hackers, organizations,terrorists , foreign Government agents,non state actors and pose risk likeCrippling CII, Espionage,Cyber/Electronic warfare, CyberTerrorism etc.

Internal Threat

• It is defined as “One or more individualswith the access and/or insideknowledge of a company, organization,or enterprise that would allow them toexploit the vulnerabilities of that entity’ssecurity, systems, services, products, orfacilities with the intent to cause harm.”

• Insider betrayals cause losses due to ITsabotage, Fraud, and Theft ofConfidential or proprietary information

• This may be intentional or due toignorance

External Threat

• Arise from outside of the organizationby individuals, hackers, organizations,terrorists , foreign Government agents,non state actors and pose risk likeCrippling CII, Espionage,Cyber/Electronic warfare, CyberTerrorism etc.

13

Page 15: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Negative Mentionon Brandreputation

Intangible AssetsAttacks

InadvertentInform.

Disclosure

MaliciousInsider

CorporateEspionage

ConfidentialInformation

Leakage

Hacking/APT

Denial ofService

Attacks onPlatforms (SCADA,

ICS, FinancialPlatform)

Phishing

Malware/Botnets

Customers/Citizens being

attacked

Threat Vectors

SocialEngineering

Intangible AssetsAttacks

CompromisedEquipment/Embeddedsystems

TamperedSecurityCamerasSystem

Misuse ofEmployee

AccessPhysical AssetsAttacks

SocialNetworks

Card Fraud Moneylaundering

FraudDevice

Robbery/Loss

CorporateEspionage

ConfidentialInformation

Leakage

Supply ChainContamination

14

Page 16: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

What are Other Countries Doing to Protect CII?

United States:Responsibility ofCritical Infrastructureprotection falls underthe jurisdiction of theDepartment ofHomeland Security.

11

Europe: Europeanprogram for CriticalInformationInfrastructure Protection(EPCIP)

United Kingdom: Centre forthe Protection of NationalInfrastructure (CPNI)

South Korea:NationalIntelligenceService

15

Australia:National SecurityAgency

United States:Responsibility ofCritical Infrastructureprotection falls underthe jurisdiction of theDepartment ofHomeland Security.

UN Resolution 58/199 for the promotion of aglobal culture of cybersecurity and theprotection of critical informationinfrastructures.

11

South Korea:NationalIntelligenceService

India: NationalCriticalInformationInfrastructureProtectionCentre (NCIIPC)

Page 17: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Enhancing Cybersecurity : -Key ConsiderationsEnhancing Cybersecurity : -Key Considerations

2

Page 18: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Secure – Vigilant – Resilient

Enhancing Cybersecurity and resiliency of CII

SECURE

Are controls in placeto guard against

known and emergingthreats?

VIGILANT

Can we detect maliciousor unauthorised activity,including the unknown?

RESILIENT

Can we act and recoverquickly to minimize

impact?

17

Identify specific CII Development and enforcement of a framework/standard for

protection of CII Education and Awareness Government should implement the Cybercrime Act Drive sector specific programs for cyber security Organisations in CII sectors should regularly perform self

assessment16

Page 19: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Secure – Vigilant – Resilient

Enhancing Cybersecurity and resiliency of CII

SECURE

Are controls in placeto guard against

known and emergingthreats?

VIGILANT

Can we detect maliciousor unauthorised activity,including the unknown?

RESILIENT

Can we act andrecover quickly tominimize impact?

18

Public Private Partnership Develop 24/7 Cyber

Intelligence capabilities Cyber threat and

countermeasures ClearingHouse

17

Page 20: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Secure – Vigilant – Resilient

Enhancing Cybersecurity and resiliency of CII

SECURE

Are controls in placeto guard against

known and emergingthreats?

VIGILANT

Can we detect maliciousor unauthorised activity,including the unknown?

RESILIENT

Can we act andrecover quickly tominimize impact?

19

ngCERT effectiveness War Gaming Integrated Crisis

Response Digital Forensics Business Continuity

Management18

Page 21: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Way Forward

Page 22: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Way ForwardMaintaining the Cybersecurity and Resilience of Critical Information Infrastructure(CII) is not a destination but a journey. As our interconnectedness and reliance oncyber security increases, the criticality of these systems also increase and so doesour risk exposure.

Key considerations include …

Properly DefineSpecific Critical

InformationInfrastructureand work with

affected privateand public

sectororganisations

ContinuousAwareness andImprovement byall stakeholders

Improve on thework done by

previousadministrationsby implementingCybercrime Act,CybersecurityStrategy and

Policy

20

Page 23: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

Thank You

The views and opinions expressed in this presentation are those of the author and do not in any way represent the views of theauthor’s employer. You should not act upon the information contained in this publication without obtaining specific professionaladvice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information containedin this publication. The author does not accept or assume any liability, responsibility or duty of care for any consequences of you oranyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it.

Page 24: Critical Information Infrastructure Protection Enhancing ......Telvent -2012 Telvent, the smart grid giant owned by Schneider Electric, reported that hackers breached its network,

ReferencesAll sites access 21 July 2015

http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2009:0149:FIN:EN:PDF

https://ccdcoe.org/sites/default/files/multimedia/pdf/2014-Technical%20Analysis%20of%20Advanced%20Threat%20Tactics%20Targeting%20Critical%20Information%20Infrastructure.pdf

http://www.dis.uniroma1.it/~tenace/download/deliverable/Report_tenace.pdf

http://pulse.ng/tech/cyber-attack-nigerian-defence-official-website-hacked-isis-style-id3429555.html

http://usa.kaspersky.com/threats/gauss

http://indiasmartgrid.org/en/Lists/Member/Attachments/19/ISGD%20Plenary%20III%20Muktesh%20Chander%20NCIIPC.pdf

http://www.vanguardngr.com/2015/03/inec-website-hacked/#sthash.gvxuVTk7.dpuf

http://techloy.com/2015/05/16/nigerias-president-jonathan-signs-the-cybercrime-bill-into-law/

http://www.cybersecuritynigeria.org.ng/ncsf/index.php/downloadable-docs?download=8:NCSP%20main%20body

http://www.cybersecuritynigeria.org.ng/ncsf/index.php/downloadable-docs?download=12:NCSS%20Volume%2010%20main%20body%20(3)