The cyber infrastructure is vulnerable to threats from many different sources
نویسندگان
چکیده
The criticality of cyber infrastructure makes it a very attractive target, which we try to protect by building perimeter defences. This paper argues that a reactive-oriented network defence policy based solely on perimeter defences is not sufficient to properly safeguard IT infrastructure. An argument is made for an approach based on the idea that defence begins with an understanding of those adversaries that pose significant risk to the cyber infrastructure, their motivations and their capabilities. Therefore, the first response to an attack should not always be to immediately block the attack. Instead the paper examines response with a defensive counterinformation operation (IO counter-measure) with the objective to discover: who is attacking, what they are capable of, what their current mission objective is, and what is the larger strategic goal or context for the current attack. A set of Operational Objectives for such a response is defined. This response concept is also oriented in a set of Principles of Operation for Network-based IO counter-measures. To enable this new kind of operation, new tools and techniques are required. Key research areas have been identified and a honeypot-based IO countermeasures tool is presented as specific topic area for fruitful research.
منابع مشابه
Security Challenges in Smart Grid Implementation
The smart grid architecture amalgamates the physical power grid and a communication grid into a single monolithic network. It poses several security threats that are well known (Li et al. in IEEE Trans Smart Grid 3:1540–1551, 2012 [1], McDaniel and McLaughlin in IEEE Secur Priv 7:75, 77, 2009 [2], Bisoi and Dash 2011 [3]). However, it faces unknown threats from the cyber-physical interfaces whe...
متن کاملRecommendations on Future Operational Environments Command Control and Cyber Security
—It is a well-known fact that today a nation's telecommunication networks, critical infrastructure, and information systems are vulnerable to growing number of attacks in cyberspace. Cyber space contains very different problems involving various sets of threats, targets and costs. Cyber security is not only problem of banking, communication or transportation. It also threatens core systems of a...
متن کاملA Taxonomy of Cyber Attacks on 3G Networks
Cross Network Services are a new breed of services that have spawned from the merger of the Internet and the previously isolated wireless telecommunication network. These services act as a launching pad for a new type of security threat the Cross Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of C...
متن کاملDesigning a Cyber Attack Information System for National Situational Awareness
Information and communication technology (ICT) systems underpin many of today’s societal functions and economic development. Consequently, protecting a nation’s ICT infrastructure from deliberate cyber attacks and unintentional disruptions is of paramount importance. Collaboration among all parties across all domains of cyberspace is the key to effective and coordinated effort to cope with cybe...
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کامل