27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Strategies for Critical Cyber Infrastructure (CCI) Protection<br />

by Enhancing Software Assurance<br />

Mecealus Cronkrite, John Szydlik and Joon Park<br />

Syracuse University, USA<br />

micronkr@syr.edu<br />

jaszydli@syr.edu<br />

jspark@syr.edu<br />

Abstract: Modern organizations are becoming more reliant on complex, interdependent, integrated information<br />

systems. Key national industries are the critical infrastructure (CI) and include telecommunications, energy,<br />

healthcare, agriculture, and transportation. These CI industries are becoming more dependent on a critical cyber<br />

infrastructure (CCI) of computer information systems and networks, which are vital to the continuity of the economy.<br />

Organized attackers are increasing in number and power with more powerful computing resources that increasingly<br />

threaten CCI software systems. The motivations for attacks range from terrorism, fraud, identity theft,<br />

espionage, and political activism. Government and industry research have found that most cyber attacks exploited<br />

known vulnerabilities and common software programming errors. Software publisher vendors have been<br />

unable to agree or implement a secure coding standard for two main reasons. The on-technical consumer is ill<br />

informed to demand secure quality products. These current conditions perpetuate preventable risk. As a result,<br />

software vendors do not implement security unless specifically required by the customer, leaving many systems<br />

full of gaps. Since most of exploited vulnerabilities are preventable, the implementation of a minimum level of<br />

software quality is one of the key countermeasures for protecting the critical information infrastructure. Government<br />

and industry can improve the resilience of the CI in an increasingly interdependent network of information<br />

systems by protecting the CCI with stronger software assurance practices and policies and strengthening product<br />

liability laws and fines for non-compliance. In this paper we discuss the increasing software and market risks to<br />

CCI and address the strategies to protect the CCI through enhancing software assurance practices and policies.<br />

Keywords: critical cyber infrastructure, secure programming quality, software assurance<br />

1. Introduction<br />

The first major Internet attack in 1988 by the Morris worm was a bad prank gone awry, but made it<br />

clear, that for the first time, cyber security threats could escape physical boundaries. Cyber threats<br />

could now spread rapidly through the Internet and impact different organizations and countries simultaneously.<br />

In 2001, Code Red and Nimda were the first attacks to operate disrupt the commercial<br />

internet affecting many business and ecommerce sites. (Gelbstien & Kamal, 2002) Next, the 2003<br />

SQL Slammer worm caused major disruption of commercial and banking systems this attack used a<br />

weakness that already had a solved by patch but had not been applied to enough of the consumer<br />

base to cause damage to other companies because of internet slowdown. In 2003, the Sobig virus<br />

temporarily shut down 23,000 miles of a railway system, arguably the first successful CI attack,<br />

(McGuinn, 2004). However, the 2010 Stuxnet SCADA attack was undoubtedly the first of its kind to<br />

disrupt CI operations. Its entry point was ultimately attributable to a hard coded SQL administrative<br />

password (Falliere, et. al. 2010), a well-known bad development practice. In the twenty-two years<br />

since Morris, damage from cyber security incidents have grown in frequency and impact.<br />

Over the past ten years, especially, the numbers of successful CCI attacks have been increasing. The<br />

profile of the creators of malware programs have changed since the days of the Morris worm. Today<br />

malware is being developed and used primarily by criminal actors for financial gain and potentially by<br />

other actors seeking to cause market instability and economic damage.<br />

In the past computing attacks required access to high-end computing which was limited to wellfunded,<br />

established entities that could support large data centres and computer clusters. However,<br />

the introduction of the botnet has created a black-market for spam sending, decryption large-scale<br />

brute force cracking activities, and Distributed Denial of Service (DDoS) attacks for hire for very cheap<br />

prices scaled according to the target size. (OCED, 2008)<br />

A “botnet” is criminal network of distributed computing, created by compromising victim devices, usually<br />

through malware that exploits existing software weaknesses, and makes them a slave or “zombie”<br />

to the larger criminal computer network called a “botnet.” As the computing power of non-secured<br />

internet-connected devices increases so does the collective computing power of botnets. It is typical<br />

68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!