7 - Cyber Systems Flashcards
Standard Computer Capabilities and Characteristics
– Four
- Speed
- Accuracy
- Diligence
- Versatility
Computer Speed
– Limits
– Comparison
- Fastest possible = Speed of Light
- Limited by algorithm efficiency
- Thousands of times faster than humans
Computer Accuracy
- High accuracy
- Errors due to human error/inaccurate data
Computer Diligence
- Computers don’t suffer fatigue, lapse in concentration, etc. regardless of number of calculations
Computer Versatility
- Perform multiple tasks at once w/ multi-processing
- Perform various types of tasks
Workstation
– Other names
– Types
- Personal computer/client workstation
- Two Types
– Thin Client
– Thick Client
Thin Client
- Software or computer relying on another computer to do most of the work
- Acts as interface connecting to network server doing the actual processing
Thick Client
- Functions independent of the server
- May pull some data from server or run without being connected at all
Server
- Computer managing shared resources for other network systems
- Common Types
– Application
– Catalog
– Database
– DHCP
– File
– Mail
– Proxy
– Web
Vulnerability
- Weakness in a computer system that is open to exploitation
Threat
- Possible danger that may take advantage of a vulnerability
- Could be an individual, an event, etc.
Risk
- Likelihood that a threat will take advantage of a vulnerability
Virus
- Code that spreads from one computer to another by attaching itself to other files
Worms
- Code that spreads from one computer to another on its own
- Does not attach to another file
Logic Bombs
- Code that sits dormant on a target computer until it’s triggered by a specific event
- Ex: Specific date/time or starting specific process
Spyware
- Stealthily installed malicious software
- Intended to track/report data defined by author from a target system
Adware
- Software that automatically displays or downloads ads
- “Not all malicious”
Rootkits
- Code intended to take full or partial control of a system at low levels
Botnets
- Collection of software robots run by a C2 program, controlled by a person
Common Vulnerability Causes
- Configuration / Familiarity
- Implementation
- Design
Configuration / Familiarity (Vulnerability Cause)
-
Misconfigured system/app
– Ex: bad firewall rules - Using well-known software increases probability of vulnerability/exploit
– Ex: Default PW from application user manual
Implementation (Vulnerability Cause)
-
Lack of input validation
– Program assumes all user input is safe, allowing attacks such as XSS or SQL injection
Design (Vulnerability Cause)
- Inherent in a protocol, application, or architecture
– Ex: Using Telnet or FTP to administer a network
Unstructured Threat
- “Script Kiddy”
-
Unfocused attack often by individuals w/ limited skills
– “Unfocused” - system isn’t specifically targeted
Structured Threat
- “CWO”
- Focused attack by individual(s) w/ high skills against specific system
- Tend to be motivated by specific cause
– Money, politics, etc.
Internal Threat
- Originate from individuals who have/had authorized access
– Disgruntled/opportunistic employee
External Threat
- Originate outside the organization, often through the internet
Common Vulnerability and Exposure (CVE)
- Developed by MITRE in 1999
– Non-profit research and dev organization -
List of vulnerabilities, each containing:
– ID number
– Description
– At least one public reference - ID format: CVE-YYYY-NNNN
U.S. National Vulnerability Database (NVD)
- Launched by NIST in 2005
- Vulnerability database built upon and sychronized w/ CVE
- Provides Common Vulnerability Scoring System (CVSS)
Exploit Database
- Maintained by Offensive Security
- Archive of exploits, shellcode, and security papers
Motherboard
- Main electronic circuit board housing other sub-components
– CPU
– Chipsets
– Bus
– System Clock
– Expansion Slots
– BIOS
– CMOS
CPU
- Brain of computer
- Controls number of simultaneous tasks and task completion speed
Chipsets
- Circuitry responsible for managing specific hardware components
Bus
- Controls speed at which data is transferred between hardware components
System Clock
- Synchronizes and controls timing of computer ops
Expansion Slots
- Small plastic slots used to install additional devices such as video or network cards
- 1-6 in long x 1/2 in wide
BIOS
- Translates processor requests into instructions
- Executes POST
CMOS
- Contains computer’s inventory list and advanced setup options
- Stores data read by BIOS
Memory
2 Types
- Random Access Memory (RAM)
– Volatile
– Temporary data storage which may be quickly accessed by CPU - Read Only Memory (ROM)
– Non-volatile
– Stores programs the same way RAM does, but once the data is stored it cannot be changed (hence, read only)
– Stores frequently used instructions and data, often for things such as BIOS
Hard Drives
- Stores changing data in relatively permanent form
- Most popular drives today are SCSI, SAS, and SATA
Operating System
- Significant impact on overall performance
- Ex:
– Windows
– Red Hat
– Solaris
Distributed System Architectures (2)
- Client-Server Model (Centralized Environment)
- Peer-to-Peer Model (Decentralized Environment
Client-Server Model
- Smart clients contact server for data, then format/display it for user
- Permanent changes at the client are committed back to the server
Peer-to-Peer Model
- No special machines providing a service or managing network resources
- All responsibilities divided among all machines
- Peers can be both clients and servers
CIA Triad
- Confidentiality - Protect data from being accessed by unauthorized parties
- Integrity - Ensure data authenticity
- Availability - Ensure data accessibility for authorized users
Enforce System Policies/Procedures
- Policy Statement
– Outlines a plan for the user security component - Standards
– Defines how to measure the level of adherence to the policy - Guidelines
– Recommendations or best practices for how to meet the policy standard - Procedures
– Step-by-step instructions that detail how to implement the components of the policy
Four A’s
- Authentication
– Uniquely ID’ing a particular individual/entity - Authorization
– Determining what rights/privileges a particular entity has - Access Control
– Determining and assigning privileges to resources, data, etc. - Auditing or Accounting
– Tracking & recording system activities / resource access
System Hardening
- Eliminate as many security risks as possible
– Disable unnecessary services/accounts
– Protect management interfaces/apps
– Password protection
Vulnerability Management
-
Ongoing, comprehensive process or program that aims at managing an organization’s vulnerabilities in a holistic and continuous manner
– Asset Management - devices
– Software Management - software
– Vulnerability Assessment - continuous vuln scans/remediation
– Patch Management - obtaining, evaluating, testing, deploying new patches
– Change Management - approving/executing change to assure CIA
Due Care
- Describes how individuals should use/maintain organization-issued hardware/software
- Includes both using equipment safely and in an approved manner
Due Diligence
- Investigating/researching all issues and options relating to a particular subject
- Ensure security policies/practices are effective
- Ensure no violation of laws, statutes, or human rights
Due Process
- Organization does not assume an individual is guilty w/o due process
Operations Continuity Plan
Defines how an org will maintain normal day-to-day ops during disruption or crisis
Disaster Recovery Plan
- Defines how people and resources will be protected in the case of a natural or man-made disaster
Benefits of Websites
- Reduces communication costs
- Enhances communication and coordination
- Accelerates the distribution of knowledge
- Improves customer service and customer satisfaction
Database Capabilities and Benefits
- Improved data sharing
- Improved data security
- Effective data integration
- DBMS minimize data inconsistency
- Better access to data
- Increase in productivity of end user
- Quick decision making
10 Most Critical Security Risks
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
Injection
- Untrusted data sent to an interpreter as part of command or query
- Tricks interpreter into accessing data w/o proper authorization
Broken Authentication
- Assuming another user’s identity temporarily or permanently
Sensitive Data Exposure
- Lack of encryption for data at rest or in transit
XML External Entities (XXE)
- Older or poorly configured XML
- Ability to upload hostile XML content, exploiting vulnerable code or dependencies
Broken Access Control
- Exploitation of access control
- Failing to enforce authenticated user restrictions
Security Misconfiguration
- Exploiting Default configurations or unpatched flaws
Cross-Site Scripting (XSS)
- Insufficient input validation
- Attacker able to add malicious content to a website; content executed on other victim’s browser
Insecure Deserialization
- Existing data structures used but content changed
- Serialization used for persistence/caching
Using Components w/ Known Vulnerabilities
- Using preconfigured client/server-side components
- Not understsanding component patch state
Insufficient Logging/Monitoring
- Not validating logging and monitoring capabilities
Website Components
- Web Page
- Web Content
- Websites
- Web Browser
- Web Application
- Browser Engine
Web Page
- Computer file suitable for the world wide web / a web browser
- Two types
– Static - Flat/stationary page
– Dynamic - Controlled by Application Server processing server-side scripts and Client Web Browser processing client-side scripts
Web Content
- Textual, visual, or aural content that is encountered as part of the user experience
Websites
- Collection of related web pages
- Common domain name
- Published on at least one web server
- Accessible by URL
Web Browser
- Application for accessing info on WWW
- Retrieves web page and content by distinct URLs
Web App
-
Client-server program which client runs in a web browser
– Ex: Webmail
Browser Engine
- Core software component of every major web browser
- Ex:
– Blink - Used in Chrome and Chromium
– EdgeHTML - Used in MS Edge and Universal Windows Platform
– WebKit - Used in Safari and Adobe AIR apps
Data (database)
– Definition
– Characteristics
- Recorded facts and figures
- Characteristics
– Persistent - Remains unchanged until acted upon
– Integrated - Interacts and corresponds w/ other data
– Shared - Ability to be accessed/manipulated by multiple users
Database
- Collection of meaningful information
- Organized for searching and retrieving info
Database System (Schema)
- Logical layout of the database
Database Management System (DBMS)
- Set of programs/utilities used to create, process, and administer a database
Major Database Components (4)
- Data
- Known facts and implicit meaning - Hardware
- Equipment needed to maintain DB - Users
- Individuals manipulating/maintaining the DB - Software - DBMS and programs supporting it
Markup Languages
– Definition
– Categories (3)
– Examples
- Modern system for annotating a document in a way syntactically distinguishable from text
- Three general categories
– Presentational
– Procedural
– Descriptive - Most Common Languages
– HTML
– XHTML
– XML
Style Sheets
– Definition
– Examples
- Form of separation of presentation and content for web design
- Defines visual layout/style
- Example Languages
– CSS
– Extensible Stylesheet Language (XSLT)
Client-side Scripting Languages
- Computer programs on the web executed client side instead of server side
- Used to turn static content into dynamic content
- Ex
– AJAX
– DOM
– ActionScript
– JavaScript
– VBScript
Server-side Scripting Languages
- Executed by web server when user requests a document
- Ex
– ASP/ASP.NET
– ColdFusion
– JSP
– Perl
– PHP
– Python
– Ruby
DBMS Languages
- Retrieve data from database
- Often embedded in server side scripts
- Ex
– MS-SQL
– MySQL
– Oracle
– PostgrSQL
– Derby
– MongoDB
– SQLite
Flat File Database
- Only One large table
- Contains records w/ no structured relationships
- Ex
– Tables found in MS Excel and Apple Numbers
Relational Database
- Numerous tables containing rows and columns of data
- Tables relate to one another through shared data values
- Ex
– Two separate tables of data (Pay Records and Course Grades) linked by SSN (used to find and retrieve data from both)
Relational Database Tables
– 2 parts
- Entity (Table Name)
– Refers to storing info about an object
– Data on members associated w/ a “CPT”
– “CPT” would be the entity/table name - Attribute (Column Name)
– Characteristic or property of the entity that will be stored
Define Security Requirements
- Derive security reqs from industry standards, applicable laws, and vulnerability history
Leverage Security Frameworks/Libraries
- Guard against security-related design and implementation flaws by covering for lack of sufficient developer knowledge/time/budget
Secure Database Access
- Secure access to all data stores
- Consider securing queries, configuration, authentication, and communication
Encode and Escape Data
- Defensive techniques meant to stop injection attacks
Validate All Inputs
- Programming technique
- Ensures only properly formatted data may enter a software system
Implement Digital Identity
- Using Authentication and Session Management
Enforce Access Controls (Authorization)
- Granting or denying specific requests from a user, program, or process
Protect Data Everywhere
- Protect sensitive data (passwords, health records, etc.)
Implement Security Logging and Monitoring
- Log security and app
- Monitor security and app logs
Handle All Errors and Exceptions
- Allowing an application to respond to errors correctly
- Critical to making code reliable and secure
Cyber Command and Control Mission System (C3MS)
- Provides 24/7/365 awareness, management, and control of the AF domain
- Ensures unfettered access, mission assurance, and joint warfighter use of networks and info processing systems to accomplish worldwide ops
- Provides operational level C2 and SA of AF cyberspace forces, networks, and mission systems
AF Cyber Security and Control System (CSCS)
- Provides 24/7/365 NetOps and Management functions
- Enables enterprise services within AF unclassified and classified networks
- Supports DCO within those AF networks
AF Intranet Control (AFINC)
- Manages top-level boundary and entry point into the AFIN
- Controls flow of all external and inter-base traffic - 16 gateways
- Consists of two Integrated Management Suites (IMS)
AF Cyberspace Defense (ACD)
- Prevents, detects, responds to, and provides forensics of intrusions into unclassified and classified AF networks
Cyberspace Defense Analysis (CDA)
- Monitors, collects, analyzes, and reports on sensitive info released from friendly unclassified systems
Cyberspace Vulnerability Assessment/Hunter (CVA/H)
- Executes vulnerability, compliance, pen-testing, and hunter missions on AF and DoD networks/systems
- Hunter ops characterize and then eliminate threats for the purpose of mission assurance
- Performs defensive sorties world-wide via remote or on-site access
Delivery Vector
- The primary path or method used by the adversary to cause an incident or event to occur
Reconnaissance (delivery vector)
– Definition
– Sub Categories (3)
- Accessible information used to characterize systems, apps, networks, and users
- Sub Categories
– Information Gathering and Data Mining - Gather publicly available information
– Network Scan - Targeting multiple IP addresses (horizontal scan)
– System Scan - Target single IP address across range of ports (vertical scan)
Authorized User (delivery vector)
– Description
– Categories (2)
- User w/authorized access took specific actions that resulted in jeopardizing systems or data
- Sub Categories
– Purposeful - Authorized user knowingly took specific actions
– Accidental - Authorized user took actions that had consequences over and above the intentions
Social Engineering (delivery vector)
– Definition
– Categories (3)
- Human interaction (social skills) or deception used to gain access
- Sub Categories
– E-mail - Used to deliver malicious payload/gain access
– Website - Used to deliver malicious payload/gain access
– Other - Target deceived or manipulated in a way other than email/website
Configuration Management (delivery vector)
– Definition
– Categories (3)
- Compromise resulting from inadequate or improper config of a system
- Sub Categories
– Network - Improperly/inadequately configured network system/service
– OS - OS improperly/inadequately configured
– App - App improperly/inadequately conifgured
Software Flaw (delivery vector)
– Description
– Categories (2)
- Vulnerability in the software that allows for unauthorized use of or access to a system
- Sub Categories
– Exploited new vulnerability - Vuln unknown prior to event or w/o mechanism to prevent it
– Exploited known vulnerability - vuln known prior to event and w/ a mechanism to prevent it
Transitive Trust (delivery vector)
- Definition
- Categories (2)
- Compromise resulting from the implicit or explicit trust relationship between security domains
- Sub Categories
– Other IS compromise - Compromise resulting from access previously gained by another system
– Masquerading - Compromise resulting from the unauthorized use of valid credentials
Resource Exhaustion (delivery vector)
– Definition
– Categories (2)
- Consumption of system resources that prevent legitimate users from accessing resources
- Sub Categories
– Non-Distributed Network Activity - Activity from single IP that overwhelms system
– Distributed Network Activity - Activity from multiple IP that overwhelms system
Physical Access (delivery vector)
– Definition
– Categories (3)
- Unauthorized physical access to resources
- Sub Categories
– Mishandled or Lost Resource - Equipment was lost, stolen, or left accessible to unauthorized parties
– Local Access to System - Unauthorized user provided local physical access to a DoD information network resource
– Abuse of Resources - Physical destruction of an information resource by an unauthorized party
Other (delivery vector)
- Delivery vector not covered by other methods
Unknown (delivery vector)
- Delivery vector could not be determined w/ info available
C3MS
- Operated By
- Sub Components (5)
Operated By
- JBSA-Lackland
– 616th Ops Center (AD)
– 854th Combat Ops Sq (R) - McGhee Tyson
– 119 COS (R)
Sub Components
- Situational Awareness
– Produce a cyber operational picture - ISR
– Enable integration of cyberspace actionable intel products into other sub-components - Planning
– Leverage SA to develop long and short term plans to execute OCO, DCO, and DoDIN ops - Execution
– Ability to leverage plans to generate and track Cyber Tasking Orders (CTO) - Integration
– Provides ability to integrate AF-generated cyber effects w/ other C2 nodes
CSCS
- Operated By
- Sub Components (2)
Operated By
- Joint Base Langley-Eustis
– 83 NOS (AD)
– 860 NOS (R) - Peterson
– 561 NOS (AD)
– 960 NOS (R) - Pearl Harbor-Hickam
– 690 COS (AD) - Ramstein
– 691 COS (AD) - McConnell
– 299 NOS (R)
Sub Components
- DoDIN Ops and Management
– Activities designed to maintain and protect base-level operational networks - Enterprise Services
– Provides network application hosting and storage management w/in AF networks
AFINC
- Operated By
- Sub Components (4)
Operated By
- Gunter Annex
– 26 NOS (AD)
Sub Components
- Defense-in-Depth
– Delivers an enterprise-wide layered approach by integrating the gateway and boundary devices - Situational Awareness
– Delivers network data flow, traffic patterns, utilization rates, and in-depth research of historical traffic for anomaly resolution - Proactive Defense
– Conducts continuous monitoring of AF network traffic - Network Standardization
– Creates and maintains standards and policies
ACD
- Operated By
- Sub Discipline Areas (4)
Operated By
- JBSA-Lackland
– 33 NWS (AD)
– 426 NWS (R) - Quonset ANGB
– 102 NWS (R)
Sub Discipline Areas
- Incident Prevention
– Protecting against malware by assessing/mitigating known vulnerabilities - Incident Detection
– Monitoring classified/unclassified AF networks - Incident Response
– Determines extent of intrusions and develops COAs to mitigate the threat - Computer Forensics
– Conducting in-depth analysis to determine threats from ID’d incidents
CDA
- Operated By
- Sub Discipline Areas (6)
Operated By
- JBSA-Lackland
– 68 NWS (AD) - Offutt
– 860 NWF (AD)
– 960 NWF (R)
Sub Discipline Areas
- Telephony
– Monitor & assess unclassified voice networks - Radio Frequency
– Monitor and assess various frequency bands - Email
– Monitor and assess email traffic w/in AFNet - Internet Based Capabilities
– Monitor and assess info that originated w/in AFNet that is posted to publicly accessible websites - Cyberspace Op Risk Assessment
– Assess data compromised through AFNet intrusion and determine Ops impact - Web Risk Assessment
– Assess info posted on unclassified AF-owned, leased, or operated public and private websites
CVA/H
- Operated By
- Sub Components (4)
Operated By
- 6 AD Units
– JBSA-Lackland
– Scott - 12 ANG Units
- 1 Reserve Unit
– Scott
Sub Components
- Mobile Interceptor Platform (MIP)
– Laptop - Deployable Interceptor Platform (DIP)
– 2 servers and 5 network sensors used for remote ops - Garrison Interceptor Platform (GIP)
– Security ops floor for remote ops - Information Ops Platform (IOP) Flyaway Kit
– Boundary defense device placed in-line w/ network traffic
AFNet
- Design
- Enclave
– Collection of computing environments (including personnel and physical security) connected by one or more internal networks
– Under control of single authority
– Ex: NIPR, SIPR
NIPRNet
- Private IP network
- Unclassified
- Provides access to internet, email, file storage, etc
- Comprised of routers and nodes owned by the DoD
- Largest private network in the world
- Part of Defense Information System Network (DISN)
SIPRNet
- SECRET private IP network
- Provides access to DoD’s classified intranet services
- Utilized outside the military
– Ex: Department of State
Surveillance (DCO Tactical Mission Type)
- Objective
– Collect relevant data/information in/on the AO - Tasks
– Collect/monitor network infrastructure
– Collect/monitor network user characteristics/trends
– Collect/monitor data from individual systems
Reconnaissance (DCO Tactical Mission Type)
- Objective
– Collect relevant data/information on threats in the AO - Tasks
– Find and track specified enemies, adversaries, and threats
– Understand and characterize specified enemies, adversaries, and threats
Access (DCO Tactical Mission Type)
- Objective
– Provide sufficient access for supported cyber forces - Tasks
– Configure firewall rules/policies
– Routing config changes
– Provision/configure accounts
– Configuring permissions
Strike (DCO Mission Type)
- Objective
– Damage or destroy an objective or capability - Tasks
– Destroying resident adversary/malicious code or other assigned artifacts
– Quarantining malicious code and/or preventing code execution
– Manipulating, denying, degrading, or disrupting adversary network traffic
Escort (DCO Tactical Mission Type)
- Objective
– Provide defensive support to cyber weapon systems or mission partners conducting primary missions in the AO - Tasks
– Deploy countermeasures
– Ensure all required forces have the necessary level of access to assigned AO during mission vulnerability window
SCAR (DCO Tactical Mission Type)
- Objective
– Conduct strike coordination and reconnaissance in response to adversary activity w/in the AO - Tasks
– Patrolling the AO, or a portion of the AO
– Conduct or support strike and/or follow-on Intelligence Preparation of the Environment (IPOE) missions
Secure (DCO Tactical Mission Type)
- Objective
– Enhance the Defenses of the assigned AO in response to active threats - Tasks
– Enhance defense of cyber key terrain
– Reconfigure network appliances to a more secure config in response to active threats
Threat Emulation (DCO Tactical Mission Type)
- Objective
– Replicate realistic TTP of specific cyber threats to evaluate cyber defenses - Tasks
– Emulate known adversary TTP
– Identify unmitigated vulnerabilities
– Assesses defensive posture and processes
Public Switched Telephone Network
- Worldwide collection of interconnected public telephone networks
- Circuit-switching to allow users to make landline telephone calls
Voice over IP (VoIP)
- Able to deliver voice communications/multimedia over the internet
- Packet-switched network to allow users to make calls
Defense Switched Network (DSN)
- World-wide non-secure voice, secure voice, data, facsimile, and video teleconferencing services for DoD C2 elements
- Assures non-blocking service for users w/ flash and flash override precedence capabilities
Cellular Networks
- Communication network w/ last link being wireless
- Able to connect to PSTN and Internet
Phreaking
- PSTN vulnerability
- Reverse engineering the system of tones used to route long-distance calls
- Recreate tones to route free calls
War Dialing
- PSTN Vulnerability
- Technique to automatically scan a list of telephone numbers
- Usually dialing every number in a local area code to search for modems
Dialup Modems
- PSTN Vulnerability
- Overlooked “backdoor” through a PSTN into another IT network
- Used by admins to remote into Control System equipment
Registration Server Hijacking
- VoIP Vulnerability
- Rogue device registers as Registration Server by impersonating a valid user
Session Initiation Protocol (SIP) Attack Vectors
- VoIP Vulnerability
- Enumeration
– Means to ID SIP systems - Fuzzing
– Type of DoS attack used to send malformed data packets to crash the SIP system - Man-in-the-Middle
– Attacker intercepts SIP call-signaling traffic
– Attacker masquerades as both calling and called parties
– Hijacks calls via redirection server
Tower Hijacking
- Cellular Network Vulnerability
- Attack ID’s bug in Base Transceiver Station software services
- Attacker exploits vulnerability and takes over the tower transceiver
Mobile Device Software
- Cellular Network Vulnerability
- Incorrect system permission settings granting great access to other areas of the device
- Exposed internal communication protocols that pass messages internally within the device to itself or other apps
PSTN Components
- Class 4 (Toll Office)
– Connects to multiple Class 5 offices
– Connects to other Class 4 offices and Class 1 (Regional Center) office - Class 5 (End Office)
– ONLY office that connects to individual or business subscribers
– Connects to other Class 5 offices and Class 4 office - Local Loop (“Last Mile”)
– Physical connection between a carrier’s Class 5 and the subscribers’ premises - Private Branch Exchange (PBX)
– Telephone exchange typically owned by the customer
– Calls made within PBX are at no cost
VoIP Components
- IP Phone/Software (Skype, etc.)
– Uses VoIP tech allowing telephone calls to be made over an IP network - Registration Server
– Entity that receives registrations from a UAC
– Extracts info about current location and stores it (IP address, port, username) - Proxy Server
– Forwards requests on behalf of the endpoint by consulting the registrar
– Handles Session Initiation Protocol (SIP) requests for the User Agent - Redirect Server
– Accepts a request, maps the address, and returns to the client
– DOES NOT pass the request on to other servers - Call Manager
– Provides consolidated services
– Sets up and monitors calls, maintains the dial plan, performs phone number translations - Media Gateway
– Interfacing IP network based voice communications w/ traditional circuit-switched network
DSN Components
- DSN Backbone Switches
– Route calls to other nodal switches
– Multifunction switch, similar to PSTN Class 4 and 5 combined - Installation Switches
– Switches at bases, posts, camps, and stations - End Office (EO)
– Primary Switch for long distance services for either an installation or group of installations in a geographic area - Small End Office (SMEO)
– Switch that serves as primary switch
– Used at smaller DoD installations
– Will not serve installations with critical missions - Private Branch Exchange (PBX)
– PBX-1 - Switches w/ MLPP capabilities
– PBX-2 - Switches without MLPP capabilities - Remote Switch Unit (RSU)
– Switching capability that is connected to a host as a remote
– Dependent upon the host switch for software control
Cellular Network Components
- Base Transceiver Station (BTS)
– Considered the “Radio Tower” with “RF” - Base Station Controller (BSC)
– Controls one or more BTS
– Think of as a cell - Base station System (BSS)
– Acts like a PTSN Local Loop for Cell Networks
– Combines the BTS and BSC - Mobile Switching Center (MSC)
– Connects to a Base Station Controller
– Acts like a PTSN Class 5 but for Cell Networks - Mobile Telephone Switching Office (MTSO)
– Considered the PTSN Central Office equivalent
– Each carrier in each city runs one office
PTSN Design
- Local Access and Transport (LATA)
– Represents an area within which a divested Regional Bell Operating Company (RBOC)
– Permitted to offer exchange telecommunications and exchange access services - North American Numbering Plan (NANP)
– System used to direct telephone calls to a particular region
– Provides telephone numbering scheme
—- Three-digit area code
—- Seven-digit telephone number
VoIP Design
- Session Initiation Protocol (SIP)
– Call set up (INVITE) and terminate/transfer (BYE)
– Two types of messages (request and response)
– Port 5060
– Similar to TCP three-way handshake, but more steps - Realtime Transport Protocol (RTP)
– Media protocol
– Describes the packet format for the actual data
Cell Network Design
- GSM (Global System for Mobile Communication)
– World standard
– Subscriber ID Module (SIM) cards used for different providers in different countries - TDMA (Time Division Multiplexing)
– American Standard
– Assigns each call a certain portion of time on a designated frequency - CDMA (Code Division Multiple Access)
– American Standard
– Gives a unique code to each call and spreads it over available frequencies - Network Data Technologies
– 1G
– 2G
– 3G
– 4G (Long Term Evolution, LTE)
– 5G
PSTN Security
- Physical Security
- Network Security
VoIP Security
- Physical Security
- Layer-2 Network Segregation
- Layer-3 IP Segregation
Encryption
- Voice over Secure IP (VoSIP)
– Unencrypted voice over encrypted network - Secure VoIP
– Encrypted voice over non-secure network - Secure Voice over Secure IP (SVoSIP)
- Encrypted voice over Encrypted network
Cell Network Security
- Physical Security
- Mobile Device
– Patch Management
– Treat it like a computer
– Encryption
– Two-factor auth
—- Preferably not SMS due to ease of spoofing
Supervisory Control and Data Acquisition (SCADA)
- Computerized system that is capable of gathering and processing data and applying operational controls over long distances
- Used to control dispersed assets
- Designed to collect field information, transfer it to central computer facility, and display to operator
- Allows operator to monitor or control an entire system
Distributed Control System (DCS)
- Control achieved by intelligence that is distributed about the process to be controlled
- Used to control production systems within the same geographic location
– Usually process control or discrete part control systems
ICS Industrial Sectors/Interdependencies
Manufacturing Industries
- Process-based
– Continuous manufacturing process
—- Runs continuously, often w/ transitions for different product grades
– Batch Manufacturing Process
—- Distinct processing steps - Discrete-based
– Series of steps on a single device to create an end product - Manufacturing systems usually located w/in confined area
– LAN
Distribution Industries
- Used to control geographically dispersed assets
– Water distribution, gas pipelines, etc. - Distribution systems spread over large area
– WAN, wireless, RF
ICS Critical Infrastructure
- System of Systems
– multiple, independent systems combined to form larger more complex system -
Interconnected and mutually dependent in complex ways
– Both physically and through info/comms - Cascading failure in electric power grid
ICS Components
Control Loops
- Utilizes sensors, actuators, and controllers to manipulate some controlled process
– Sensors measure a physical property
– Controllers interpret the signal and generate corresponding variables
– Actuators (valves, switches, motors, etc.) directly manipulate the controlled process
Human-Machine Interface (HMI)
- Used by operators/engineers to monitor/configure elements of controllers/actuators
- Displays process status info and historical info
Remote Diagnostics
- Used to prevent, ID, and recover from abnormal operation/failure
ICS Design Considerations (7)
- Control timing Requirements
– Wide range of time-related reqs
– Human reliability/consistency vs automated controllers
– Computation proximity to sensor (as close as possible) - Geographic Distribution
– Varying degrees of distribution
– Small local process control vs wide area/mobile comms - Hierarchy
– Provides human operators w/ comprehensive view - Control Complexity
– Reliance on controllers and preset algorithms
– Higher complexity requires human operators (such as ATC) - Availability
– High up-time reqs = more redundancy - Impact of failures
– What’s affected if system fails
– Higher impacts require continued ops through redundancy/degraded state ops - Safety
– Systems need ability to detect unsafe conditions
– Human oversight in safety critical ops
SCADA Hardware
- Control Center
- Comm Equipment
- Remote Terminal Units (RTUs)
- Programmable Logic Controllers (PLC)
Programmable Logic Controllers (PLC)
-
Primary controller in smaller control system configs, used to control discrete processes
– Ex: automobile assembly lines - Generally lack a central control server/HMI
– closed-loop control w/o human involvement
ICS vs IT systems
- ICS control physical world
- IT systems manage data
- Different risks/priorities
- Different performance/reliability reqs
- ICS may use OSs and apps that may be unconventional in typical IT network
ICS Network Segmentation and Segregation
- One of the most effective architectural concepts to protect ICS
- Determine critical parts of network that need segregation
- Goal is to minimize access to sensitive info
- No system should be dual-NIC’d
- Methods
– Logical Network Separation (minimum separation) (VLANs, VPNs, unidirectional gateways)
– Physical Network Separation
– Network Traffic Filtering (IP/route, ports, protocols, applications, etc.)
ICS Boundary Protection
- Transfer of info between domains = Risk
- Boundary devices are key to enforcement of security policies
- Can be used to isolate ICS and enterprise components
– Limits unauthorized info flow - Includes
– Gateways, routers, firewalls, IDS, etc.
ICS Firewalls
- Control flow of traffic between networks
- Typically deployed between ICS and enterprise networks
- All connections between networks should go through firewall
- Special considerations:
– Possible addition of delay to ICS comms
– Lack of experience in the design of rule sets for ICS
ICS Defense in Depth
- Single security product can’t do it all
- Utilize overlapping security mechanisms
– Firewall, DMZ, IDS, etc
– Policies, training, incident response, physical security - Requires a thorough understanding of adversary tactics
General Firewall Policies (ICS)
- Deny all except for traffic absolutely required
– Difficult to implement in reality
– Basic premise - Best Practices (examples)
– Base rule set - deny all, permit none
– All “permit” rules should be address and port specific
– All rules should restrict traffic to specific IP or range
Recommended Firewall Rules (ICS)
- Disallow DNS requests
- Disallow HTTP from public/corporate to the control network
- Block TFTP, allow FTP for outbound sessions only
- Use SSH over Telnet
ICS Fireall Issues
- Data Historians
- Remote Support Access
- Multicast Traffic
- Unidirectional Gateways
- Single Points of Failure
- Redundancy and Fault Tolerance
- Preventing Man-in-the-Middle Attacks
- Authentication and Authorization
- Monitoring, Logging, and Auditing
- Incident Detection, Response, and System Recovery
ICS Policy and Procedure and Predisposing Conditions (Vulnerabilities)
- Introduced because of incomplete, inappropriate, or nonexistent security policy
- Ex:
– Inadequate security policy for ICS
– No formal ICS security training/awareness program
– Lack of redundancy for critical components
ICS System and Predisposing Conditions (vulnerabilities)
- Can occur in hardware, firmware, and software
- Can occur in large complex systems and networks
- Sources:
– Design Flaws
– Development Flaws
– Misconfigurations
– Poor Maintenance
– Poor Administration
– Connections w/ other systems and networks
ICS Vulnerabilities
- Architecture and Design
– Insecure architecture allowed to evolve; no security perimeter defined - Configuration and Maintenance
– Inadequate testing of security changes, data unprotected - Physical
– Unauthorized personnel have physical access - Software Development
– Improper Data Validation - Comm and Network Config
– Firewalls nonexistent or improperly configured
Example ICS Adversarial Incidents
- Denial of Control Action
- Control Devices Reprogrammed
- Spoofed System Status Info
- Control Logic Manipulation
- Safety Systems Modified
- Malware on Control Systems
Documented ICS Incidents
- Adversarial Events
– Worcester Air Traffic Communications
– Stuxnet Worm - Structural Events
– CSX Train Signaling System
– Browns Ferry-3 PLC Failure - Environmental Events
– Fukushima Daiichi Nuclear Disaster - Accidental Events
– Vulnerability Scanner Incidents
– Penetration Testing Incident