27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Mecealus Cronkrite et al.<br />

to see botnets with over ten thousand nodes or hosts at their command. (US-CERT, 2005) Very large<br />

botnets such as Conflicker or Mariposa controlled millions of nodes.<br />

Botnets can also do any distributed application criminals can imagine these are “Criminal Clouds” already<br />

active and operational years ahead of industry. These rouge ad-hoc botnets have greatly<br />

strengthened the computing arsenal of non-state criminal and terrorist organizations. (Council of<br />

Europe Counterterrorism Task Force, 2007) Motivated attackers now have access to cheap, large<br />

scale “stolen” computing grids. As a result, all the baseline security presumptions associated with securing<br />

or encrypting data and the securing the data’s availability over the internet has greatly weakened.<br />

2. Background<br />

2.1 The relationship between the CI and the CCI<br />

Figure 1: CCI IS stack by security control and influence<br />

The US Department of Homeland Security Presidential Directive-7 (HSPD-7) defines the critical infrastructure<br />

(CI) by the importance of an industry to society and the economy, e.g. transportation, agriculture,<br />

energy, healthcare, telecommunications, and emergency services. The critical cyber infrastructure<br />

(CCI) represents the information systems that support the operation of these key needs.<br />

DHS’ National Cyber Command Division (NCCD) is responsible for protecting the CCI in the US, and<br />

focuses on helping the CI industries, “conduct vulnerability assessments, develop training, and educate<br />

the control systems community on cyber risks and mitigation solutions.” (Mcurk Testimony, 2010)<br />

We can layer the components that intersect in a malware attack by their ability to control or influence<br />

security processes, as in Figure 1. Developer knowledge and skill are the final arbiters of quality code<br />

with the influence of the software publisher’s development methodology supervising those decisions.<br />

Therefore, the ability to control and change the behaviour of security depends on the quality practices<br />

of the software publisher and their developers. (Wang, et. al, 2008) The responsibility for security<br />

software rests with the company that publishes software code, and the developers that participated in<br />

IS system development because their knowledge of the system exceeds other spheres of influence.<br />

2.2 The increasing risk to Critical Cyber Infrastructure (CCI)<br />

Losses attributable to coding defects or weak configuration have increased in all industry sectors. The<br />

impact from cyber attacks grows as the dependence on CCI systems designed with poor practices<br />

continues. Up until the 2010, Stuxnet attack critical infrastructure systems were ‘siloed’ or separated<br />

69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!