angelicaharris manager,cybersecurity canarie · >a successful cybersecurity program requires all...

20
Cybersecurity for Research Software Angelica Harris | Manager, Cybersecurity | CANARIE 68

Upload: others

Post on 22-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

Cybersecurity for Research SoftwareAngelica Harris | Manager, Cybersecurity | CANARIE

68

Page 2: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

Wearewitnessestoevolution…

69

Page 3: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

…advancementsinsoftwareandnetworking

70

Page 4: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

…anddevelopersofresearchsoftware.(You,notme.)

71

Page 5: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

Cognitivebiasesarelimitationsinourbrain’sabilitytoprocessinformation,whichcancauseillogicaldecisionmakingandpoorjudgment.

OvercomingCognitiveBiases

72

Page 6: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 73

Whatdoesthishavetodowithcybersecurity?

Page 7: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

>Asuccessfulcybersecurityprogramrequiresallemployeestobeonthesamepageandrequiressupportandacceptance.

>Preventingbreachesrequireschangingbehaviourandreducingthenumberofopportunitiesforpeopletomakemistakes.

It’sahumanproblem.

74

Page 8: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 76

Page 9: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 77

Confidentiality,Integrity,Availability

Page 10: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

>NRCChinesehack(CNE)costingCanadians100sofmillionsofdollars• http://www.theglobeandmail.com/news/national/federal-documents-say-2014-china-hack-cost-hundreds-of-millions-of-dollars/article34485219/

>Otherdocumentedcases• https://github.com/trustedci/OSCRP/blob/master/OSCRP.md• Embargoeddatareleased• Researchgrantsandacademicprizeslosttostolenresults• Scienceinstrumentimpairmentandopportunitiesforeverlost

Whenbadthingshappen…

78

Page 11: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 79

Page 12: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

CyberKillChain

80

Source: darkreading.comfirstarticulatedbyLockheedMartin“killchain”

“…theonlyrealwaytoachievesounddefensivesecurityisthroughanoffensivemindsetandapproach.”

– KaliLinuxBlogOffensiveSecurity

Page 13: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 81

Whynotbecomeanethicalhacker?

Page 14: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 82

Whynotbecomeanethicalhacker?

Hackingtools:

https://kali.orghttps://www.offensive-security.com/https://codingsec.net/category/ethical-hacking-tutorials/https://github.com/secfigo/Awesome-Fuzzinghttps://github.com/dloss/python-pentest-toolshttps://www.metasploit.com/https://www.hex-rays.com/index.shtml

Page 15: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

MonsterMitigation

83

Source:CommunityWeaknessEnumeration(http://cwe.mitre.org/index.html)

Top25MostDangerousSoftwareErrors

Page 16: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

MonsterMitigation

84

Source:CommunityWeaknessEnumeration(http://cwe.mitre.org/index.html)

Top25MostDangerousSoftwareErrors

Page 17: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

>Canada’sCyberSecurityStrategyhttps://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/cbr-scrt-strtgy/index-en.aspx

> CanadianCyberIncidentResponseCentrehttps://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-en.aspx

>CanadianCyberThreatExchangehttps://cctx.ca

> CommunicationsSecurityEstablishmentITSAdviceandGuidancehttps://www.cse-cst.gc.ca/en/group-groupe/its-advice-and-guidance

CanadaandCybersecurity

85

Page 18: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

canarie.ca|@canarie_inc 86

Soph

istication

2010 2011 2012 2013

Duration:3days4AttackVectorsAttackTarget:Visa,Mastercard

Duration:3days5AttackvectorsAttackTarget:HKEX

Duration:20days7+AttackvectorsAttackTarget:Vatican

Duration:7monthsMultipleattackvectorsAttackTarget:USBanks

Page 19: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

> MonsterMitigationList• http://cwe.mitre.org/top25

> OpenWebApplicationSecurityProjectOWASP• https://www.owasp.org/index.php/Main_Page

> Microsoft• https://www.microsoft.com/en-us/SDL

> StaticandDynamicAnalysisTools• https://www.owasp.org/index.php/Source_Code_Analysis_Tools• https://en.wikipedia.org/wiki/Dynamic_program_analysis

> OtherLinks• http://www.itsecurityguru.org/2016/06/23/10-steps-to-addressing-the-human-vulnerability-in-cybersecurity/• https://dsimg.ubm-us.net/envelope/385633/510213/DR16_1611055__EditReport_Dec13_SecAppDev_Sponsored-

CloudPassage_FINAL.pdf

Appendix

87

Page 20: AngelicaHarris Manager,Cybersecurity CANARIE · >A successful cybersecurity program requires all employees to be on the same page and requires support and acceptance. >Preventing

Thank you!Questions?

88