Copyright © 2015 ardantic - All rights reserved
Continuity and Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by our partners and
extended team of industry experts
Our Contact Details:
INDIA UAE
Continuity and Resilience
Level 15,Eros Corporate Tower
Nehru Place ,New Delhi-110019
Tel: +91 11 41055534/ +91 11 41613033
Fax: ++91 11 41055535
Email: neha@continuityandresilience.com
Continuity and Resilience
P. O. Box 127557
Abu Dhabi, United Arab Emirates
Mobile:+971 50 8460530
Tel: +971 2 8152831
Fax: +971 2 8152888
Email: info@continuityandresilience.com
Copyright © 2015 ardantic - All rights reserved
BCM for national critical
resources
BCM Summit Middle East 2015
Henri Haenni – MBCI / ISO 22301 LI / ISO 27001 LI /
ISO 20000 LA / BCS Green IT
2
Copyright © 2015 ardantic - All rights reserved
Agenda
• Introduction
• What are national critical infrastructures ?
• Which are the threats ?
• Who are the potential attackers ?
• Which are their targets ?
• Are our national critical infrastructures vulnerable ?
• How can we get prepared ?
3
Copyright © 2015 ardantic - All rights reserved
Introduction
4
Stuxnet (2009)
DuQu (2010)
Flame(r) (2012)
SkyWiper
Copyright © 2015 ardantic - All rights reserved
Introduction
5
Extremely
advanced
Zero-day
vulnera-
bilities
Unprece-
dented
capabilities
TargetedWide spread
Stealth
Anonymous
« … unparallaled number
of functionalities… »
Sources : Kaspersky, Lexsi, Symantec
Detected in
Saudi Arabia
Egypt
Iran
Israel
Lebanon
Sudan
Syria
Russia
Austria
Hong Kong
UAE
Several
thousands of
« victims »
Individuals
Enterprises
Public admin
…
Copyright © 2015 ardantic - All rights reserved
Introduction
6Source : Kaspersky
Geography of the
targets
Complexity
« No doubts that it
was sponsored by a
state »
« … a group of
specialists, financed
and managed… » « New phase
in cyberwar »
Evgueni
Kaspersky
Copyright © 2015 ardantic - All rights reserved
Introduction
7Source : Kaspersky
« … Cyber
weapons
directed to any
countries… »
« The most developed
countries are the most
vulnerable »
Copyright © 2015 ardantic - All rights reserved
Introduction
8Source : Cylance OpCleaver, Kaspersky
Retaliation
« Global critical infrastructure
organizations need to take this threat
seriously »
M. Weatherford
Former Deputy Under Secretary for Cyber Security at
the US Dept of Homeland Security
« Shamoon »
malware, similar to
« Flame »
>30’000 affected
endpoints
Countless hours of
recovery
Huge downtime
financial
consequences
2014 :
Ababil
Saffron Rose
Cleaver
…
Copyright © 2015 ardantic - All rights reserved
Introduction
9Source : Cylance OpCleaver
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
10
“These war games are about the real effects of a cyberwar ...
about causing chaos in our streets at home due to sudden
crashes in our critical infrastructure through manipulation
of our banking, transportation, utilities, communications,
and other critical infrastructure industries.
These are all real scenarios.”
Tom Patterson CSO at MagTek & US Air For Senior Advisor, 2010
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
11
Anything that contributes to the safety, wellness, wealth,
integrity, health and stability of a collectivity of people and the
infrastructures and organizations that supports it.
« Critical infrastructure is the backbone of our nation's economy, security and
health. We know it as the power we use in our homes, the water we drink, the
transportation that moves us, and the communication systems we rely on to stay
in touch with friends and family. »
« Critical infrastructure are the assets, systems, and networks, whether physical
or virtual, so vital to the United States that their incapacitation or destruction
would have a debilitating effect on security, national economic security,
national public health or safety, or any combination thereof. »
Copyright © 2015 ardantic - All rights reserved 12
« an asset, system or part thereof located in member states
which is essential for the maintenance of vital societal
functions, health, safety, security, economic or social
well-being of people, and the disruption or destruction of
which would have a significant impact in a member state as a
result of the failure to maintain those functions »
What are national critical
infrastructures ?
Copyright © 2015 ardantic - All rights reserved 13
What are national critical
infrastructures ?
« We safeguard critical infrastructure to
assure social and economic stability
within Abu Dhabi and beyond using
integrated security strategies and the
sharing of best practices through public-
private partnerships. »
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
14
They are like the « chakras » or vital points of the nations
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
15
Energies
Agriculture
Emergencies
Energies transport &
processing
Chemicals Healthcare
Manufacturing
Water supply
Transports
Gov’t services
Financials
Telecoms
IT
Defence
Copyright © 2015 ardantic - All rights reserved 16
What are national critical
infrastructures ?
Domino effect
Copyright © 2015 ardantic - All rights reserved
17
What are national critical
infrastructures ?
Critical
infratructures
ICT &
network
Financials
Gov’t facilities
& services
Healthcare
Manufac-
tures
Agriculture &
food network
Emergen-
cies
Transport
network
Natural
resources
Chemicals
Water/Dams
Oil/Rigs
Ore/Mines
Machines
Metal
Electr.
Pharma
Fertilizers
Basics
Fire
Medics
Law enforc.
Railw
Airports
Roads
Ports
Defence
Energies
& grid
Nuclear
Refineries
Pipelines
Smart gridCivil prot.
Copyright © 2015 ardantic - All rights reserved
18
What are national critical
infrastructures ?
Critical
infratructures
ICT &
network
Financials
Gov’t facilities
& services
Healthcare
Manufac-
tures
Agriculture &
food network
Emergen-
cies
Transport
network
Natural
resources
Chemicals
Water/Dams
Oil/Rigs
Ore/Mines
Machines
Metal
Electr.
Pharma
Fertilizers
Basics
Fire
Medics
Law enforc.
Railw
Airports
Roads
Ports
Defence
Energies
& grid
Nuclear
Refineries
Pipelines
Smart gridCivil prot.
Copyright © 2015 ardantic - All rights reserved
Critical
infrastructure
Air Traffic Control Financial systems Power grid
Involves
Passengers, airports, air
navigation authorities,
regulators, aeronautics
industry
Individuals, enterprises,
banks, insurances, funds,
regulators, market
infrastructure
Consumers, power plants,
substations, distribution
grid, regulating authorities
Security
requirements
Security, extreme
performance, reliability,
massive interoperability
Availability, confidentiality,
integrity, authentication,
access control, non
repudiation
Reliability, interoperability,
performance, resilience
Vulnerabilities
Unencrypted data links,
capabilities to temper radar
rendering, remote control
of aircraft
Use of mobile apps,
human factor, susceptibility
to phishing,
unpreparedness
SCADA obsolescence,
hyper interconnectivity,
market deregulation, smart
metering
19
What are national critical
infrastructures ?
Sources : H. Teso. Aircraft hacking (2013), Critical Infrastructure protection
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
20
Mass injuries or
casualties
Large scale
environmental
damages
Important loss of
services
Loss of
confidence, civil
unrest
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
21
Interdepen-
dencies
Physical
Information
systems
Geographical
Logical
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
Which are the threats ?
22
Can take « real, large scale » actions !!!
Copyright © 2015 ardantic - All rights reserved
Who are the potential attackers?
23
Who
Smart
hacker
Competitor Hacktivist
Organized
crime
Terrorist
groups
Countries,
nations
Resources
Almost
none
Money, time,
limited skills
Limited but
organized
and skilled
Very large : money, time,
skills
Infinite
Motivations
Ego, self
esteem
To sabotage
competitors
image
Campaign
based.
ideological
Money,
power,
blackmail
Ideological,
political,
nothing to
lose
Geostrategy,
economical,
political,
espionage
Capabilities
Very
limited
Limited Extensive Very important Unlimited
Damages
Most of the
time, none
Focused,
material only
Serious,
purpose-
bound
Regional
High profile
incidents,
spectacular
Nation level,
massive
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
Which are their targets ?
• Combination of cyber & physical attacks to destroy or
invalidate critical supplies
• Disruption of international communications backbones
preventing any financial transactions
• Cyber attacks on the control systems of a major
power/smart grid leading to large areas blackout
 DDoS, routing attacks, malwares, protocol attacks, insider
 Control can be taken and left dormant for further coordinated attacks
• Coordinated cyber attacks on the rail grid, air control and
traffic control systems to generate massive congestions
24
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
25
Vulnerability chain
Infrastructure, SCADA, network Applications Users
Brute force Human errors
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
• Use of standard communication protocols
• Increased use of commercialy available HW or SW components
• Absence of any authentication/authorization protocols
• Increased number of internet-facing SCADA appliances
SCADA
• Interconnectivity
• Critical infrastrutures are going mainstream
• More and more connected to corporate networks
• Use of poorly protected wireless protocols
Network
• Distributed architectures on different platforms
• Vulnerability to compromised sensorsApplication
• The most vulnerable components of allHuman factor
26
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
27
Massive
interconnectivity
Reliability
Availability
Efficiency
Resilience
Vulnerability
Obsolesence
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
28
Robust
critical
infrastructure
Impacts
analysis
Vulnerability &
risks
assessment
Prevention
security
measures
Contingency
measures
Resilience to
disasters
Community /
social
resilience
Awareness
Crisis
management
structure
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
At national, regional or local level
29
National
level
Regional
level
Local /
Private
level
Organization
National crisis
management
agency
Regional
coordination
entities
Local or cities
authorities
Private CI
owners/operators
Preparedness
• Defines security standards
• Provide BC/DR methods /
templates / training
• Monitors preparedness state via
regional and local reporting
• Monitors CI usage
• Participates in exercises and
awareness campaigns
• Acquire and develop expertise on
regional specifics in relation with
CI
• Report to national level
• Participates in local exercises and
awareness campaigns
• Implement security standards
• Monitors local preparedness
• Report to regional
Incident
• CI owner leads recovery and
restoration of CI service
• Assess local level or CI impact
and damages, report
• Activates restoration plans for CI
• Activates crisis mgmt and
response procedures
• Assesses impacts, damages at
national level
• Identifies options for recovery
• Provides SMEs to assist CI
owners/operators
• Activates recovery and restoration
plans at regional level
• Assesses impacts, damages at
regional level, report
• Coordinates local level recovery
actions
• Liaise with CI owners/operators
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
At critical infrastructure level
30
Context analysis and modeling
Identify
scenarios
Define impact
scales
Identify and
model CI
components
Identify
stakeholders
Identify
possible
threats
Identify
possible
attackers
Security requirements
Determine
security
requirements
Perform gap /
maturity
analysis
Risk analysis
Assess
impacts of
attacks
Assess
risks
Assess
likelihood of
attacks
Design & implement security measures (prevention)
Design + impl
security
architecture
Design + impl
critical infras.
modifications
Design + plan
security tests
Design + plan
compliance
assessment
Design + impl
monitoring
programme
Identify
existing vul-
nerabilities
Design & implement crisis management & recovery planning
Setup crisis
mgmt org &
procedures
Setup local
continuity
solutions
Develop fast
recovery local
solutions
Setup
exercising
programme
Review for
changes
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
Key success factors
• Government led infrastructure and organizational resilience
directives (national infrastructures department)
• Government assisted (cyber) security standards definition,
threats and vulnerabilities identification and impact
assessment (sector based)
• Government supported communities awareness campaigns
• Government representatives supervised exercises on major
CIs
• Sustainable public/private partnerships with CI owners or
operators (regulatory)
• Government and CI level surveillance structure (national
intelligence agency)
31
Copyright © 2015 ardantic - All rights reserved 32
Questions ?
Copyright © 2015 ardantic - All rights reserved 33
Thank you for your Attention
‫اهتمامكم‬ ‫على‬ ‫لكم‬ ‫شكرا‬

More Related Content

PDF
What's Next in Cybersecurity Policy
PDF
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
PDF
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
PDF
Unternehmen & Social Media. Schluss mit lustig.
PPTX
PDF
Plataformas eCommerce Best Practices Magento
PPT
Breaking down the cyber security framework closing critical it security gaps
PDF
The State of Cyber
What's Next in Cybersecurity Policy
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Unternehmen & Social Media. Schluss mit lustig.
Plataformas eCommerce Best Practices Magento
Breaking down the cyber security framework closing critical it security gaps
The State of Cyber

Similar to BCM for National Critical Resources (20)

PDF
Cyber as WMD- April 2015- GFSU
PPT
CTO-Cybersecurity-2010-Dr. Martin Koyabe
PPTX
Webinar: CYREN WebSecurity for Healthcare
PDF
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
PDF
IOT and Big Data - The Perfect Marriage
PDF
How secure are your customers.pptx
PDF
Internet of Things - Connecting and Aggregating the Innovative Minds
PDF
Understanding Cyber Security Risks in Asia
PPT
Smarter Cyber Security
PDF
Why the Private Sector is Key to Cyber Defence
PDF
Infosecurity magazine webinar v2
PPTX
An Introduction to The New Crisis Communications
PDF
Hacker House August Proposal
PPTX
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
PPTX
15 Years of Web Security: The Rebellious Teenage Years
PDF
Prachi Kapil_23.1042_Eco.(H)_VAC Assignment 2.pdf
PDF
Brochure
PDF
Brochure
PPTX
Cyber Security: Threat and Prevention
PPTX
At&t cybersecurity introduction with alien vault
Cyber as WMD- April 2015- GFSU
CTO-Cybersecurity-2010-Dr. Martin Koyabe
Webinar: CYREN WebSecurity for Healthcare
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
IOT and Big Data - The Perfect Marriage
How secure are your customers.pptx
Internet of Things - Connecting and Aggregating the Innovative Minds
Understanding Cyber Security Risks in Asia
Smarter Cyber Security
Why the Private Sector is Key to Cyber Defence
Infosecurity magazine webinar v2
An Introduction to The New Crisis Communications
Hacker House August Proposal
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
15 Years of Web Security: The Rebellious Teenage Years
Prachi Kapil_23.1042_Eco.(H)_VAC Assignment 2.pdf
Brochure
Brochure
Cyber Security: Threat and Prevention
At&t cybersecurity introduction with alien vault
Ad

More from Continuity and Resilience (20)

PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - AWS
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - John Davison
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Sunil Mehta
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE Paul Gant - A...
PDF
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Abdelmoaty Ali
PDF
🌟 Join Resilience Expert Dhiraj Lal in this FREE Career Upgrade Session! 🌟
PDF
Celebrating Success: Transformative BCM Specialist Training for the Water & P...
PPTX
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
PPTX
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
PPTX
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
PPTX
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
PPTX
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
PDF
DEFLUFFING RESILIENCE
PDF
CREATING AND MAINTAINING A BCM PROGRAM
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - AWS
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - John Davison
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Sunil Mehta
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Zhanar Tuke...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE Paul Gant - A...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Abdelmoaty Ali
🌟 Join Resilience Expert Dhiraj Lal in this FREE Career Upgrade Session! 🌟
Celebrating Success: Transformative BCM Specialist Training for the Water & P...
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
DEFLUFFING RESILIENCE
CREATING AND MAINTAINING A BCM PROGRAM
Ad

Recently uploaded (20)

PDF
Couples Therapy: Rebuild Your Lost Connection With Your Partner
PDF
Jinee Green Card – Simplifying Immigration Solutions
PPTX
B2B Marketplaces Explained. Connect with Verified Buyers & Sellers
PPTX
Professional Digital Marketing Company with Advance Services.pptx
PPTX
Digital marketing services with 10x results in chandigarh.pptx
PDF
Top 500+ High DA PA Profile Creation Sites in 2025?
DOC
价格咨询UMBC毕业证学历认证,克利夫兰州立大学毕业证留学生学历
PDF
Case Studies Successful Website Redesigns.pdf
PDF
Achievers Computing for Junior High school
PDF
HPM Tashan ( Herbicides ) Presentation !
PDF
Drone Mapping and 3D Modeling for Railway Infrastructure Planning
PDF
Best Interior Designers in Delhi - Commercial & Residential
PPTX
chapter 6 scrap management in material management
PPTX
Asset Protection Strategies Aby Galsky's Framework for Sustainable Wealth Man...
PDF
Presentation - Aerospace and Industrial XR Training Solutions.pdf
PDF
The Best Wireless Security Cameras in Hyderabad
PDF
How Foster Care in Wisconsin Helps Children Heal from Trauma.pdf
PPTX
store management in material management
PDF
How Can Digital Twin Services in 2025 Transform Your Real-World Assets.pdf
PPTX
OOPS concepts Object Oriented features are described in this ppt
Couples Therapy: Rebuild Your Lost Connection With Your Partner
Jinee Green Card – Simplifying Immigration Solutions
B2B Marketplaces Explained. Connect with Verified Buyers & Sellers
Professional Digital Marketing Company with Advance Services.pptx
Digital marketing services with 10x results in chandigarh.pptx
Top 500+ High DA PA Profile Creation Sites in 2025?
价格咨询UMBC毕业证学历认证,克利夫兰州立大学毕业证留学生学历
Case Studies Successful Website Redesigns.pdf
Achievers Computing for Junior High school
HPM Tashan ( Herbicides ) Presentation !
Drone Mapping and 3D Modeling for Railway Infrastructure Planning
Best Interior Designers in Delhi - Commercial & Residential
chapter 6 scrap management in material management
Asset Protection Strategies Aby Galsky's Framework for Sustainable Wealth Man...
Presentation - Aerospace and Industrial XR Training Solutions.pdf
The Best Wireless Security Cameras in Hyderabad
How Foster Care in Wisconsin Helps Children Heal from Trauma.pdf
store management in material management
How Can Digital Twin Services in 2025 Transform Your Real-World Assets.pdf
OOPS concepts Object Oriented features are described in this ppt

BCM for National Critical Resources

  • 1. Copyright © 2015 ardantic - All rights reserved Continuity and Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by our partners and extended team of industry experts Our Contact Details: INDIA UAE Continuity and Resilience Level 15,Eros Corporate Tower Nehru Place ,New Delhi-110019 Tel: +91 11 41055534/ +91 11 41613033 Fax: ++91 11 41055535 Email: [email protected] Continuity and Resilience P. O. Box 127557 Abu Dhabi, United Arab Emirates Mobile:+971 50 8460530 Tel: +971 2 8152831 Fax: +971 2 8152888 Email: [email protected]
  • 2. Copyright © 2015 ardantic - All rights reserved BCM for national critical resources BCM Summit Middle East 2015 Henri Haenni – MBCI / ISO 22301 LI / ISO 27001 LI / ISO 20000 LA / BCS Green IT 2
  • 3. Copyright © 2015 ardantic - All rights reserved Agenda • Introduction • What are national critical infrastructures ? • Which are the threats ? • Who are the potential attackers ? • Which are their targets ? • Are our national critical infrastructures vulnerable ? • How can we get prepared ? 3
  • 4. Copyright © 2015 ardantic - All rights reserved Introduction 4 Stuxnet (2009) DuQu (2010) Flame(r) (2012) SkyWiper
  • 5. Copyright © 2015 ardantic - All rights reserved Introduction 5 Extremely advanced Zero-day vulnera- bilities Unprece- dented capabilities TargetedWide spread Stealth Anonymous « … unparallaled number of functionalities… » Sources : Kaspersky, Lexsi, Symantec Detected in Saudi Arabia Egypt Iran Israel Lebanon Sudan Syria Russia Austria Hong Kong UAE Several thousands of « victims » Individuals Enterprises Public admin …
  • 6. Copyright © 2015 ardantic - All rights reserved Introduction 6Source : Kaspersky Geography of the targets Complexity « No doubts that it was sponsored by a state » « … a group of specialists, financed and managed… » « New phase in cyberwar » Evgueni Kaspersky
  • 7. Copyright © 2015 ardantic - All rights reserved Introduction 7Source : Kaspersky « … Cyber weapons directed to any countries… » « The most developed countries are the most vulnerable »
  • 8. Copyright © 2015 ardantic - All rights reserved Introduction 8Source : Cylance OpCleaver, Kaspersky Retaliation « Global critical infrastructure organizations need to take this threat seriously » M. Weatherford Former Deputy Under Secretary for Cyber Security at the US Dept of Homeland Security « Shamoon » malware, similar to « Flame » >30’000 affected endpoints Countless hours of recovery Huge downtime financial consequences 2014 : Ababil Saffron Rose Cleaver …
  • 9. Copyright © 2015 ardantic - All rights reserved Introduction 9Source : Cylance OpCleaver
  • 10. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 10 “These war games are about the real effects of a cyberwar ... about causing chaos in our streets at home due to sudden crashes in our critical infrastructure through manipulation of our banking, transportation, utilities, communications, and other critical infrastructure industries. These are all real scenarios.” Tom Patterson CSO at MagTek & US Air For Senior Advisor, 2010
  • 11. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 11 Anything that contributes to the safety, wellness, wealth, integrity, health and stability of a collectivity of people and the infrastructures and organizations that supports it. « Critical infrastructure is the backbone of our nation's economy, security and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. » « Critical infrastructure are the assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. »
  • 12. Copyright © 2015 ardantic - All rights reserved 12 « an asset, system or part thereof located in member states which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact in a member state as a result of the failure to maintain those functions » What are national critical infrastructures ?
  • 13. Copyright © 2015 ardantic - All rights reserved 13 What are national critical infrastructures ? « We safeguard critical infrastructure to assure social and economic stability within Abu Dhabi and beyond using integrated security strategies and the sharing of best practices through public- private partnerships. »
  • 14. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 14 They are like the « chakras » or vital points of the nations
  • 15. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 15 Energies Agriculture Emergencies Energies transport & processing Chemicals Healthcare Manufacturing Water supply Transports Gov’t services Financials Telecoms IT Defence
  • 16. Copyright © 2015 ardantic - All rights reserved 16 What are national critical infrastructures ? Domino effect
  • 17. Copyright © 2015 ardantic - All rights reserved 17 What are national critical infrastructures ? Critical infratructures ICT & network Financials Gov’t facilities & services Healthcare Manufac- tures Agriculture & food network Emergen- cies Transport network Natural resources Chemicals Water/Dams Oil/Rigs Ore/Mines Machines Metal Electr. Pharma Fertilizers Basics Fire Medics Law enforc. Railw Airports Roads Ports Defence Energies & grid Nuclear Refineries Pipelines Smart gridCivil prot.
  • 18. Copyright © 2015 ardantic - All rights reserved 18 What are national critical infrastructures ? Critical infratructures ICT & network Financials Gov’t facilities & services Healthcare Manufac- tures Agriculture & food network Emergen- cies Transport network Natural resources Chemicals Water/Dams Oil/Rigs Ore/Mines Machines Metal Electr. Pharma Fertilizers Basics Fire Medics Law enforc. Railw Airports Roads Ports Defence Energies & grid Nuclear Refineries Pipelines Smart gridCivil prot.
  • 19. Copyright © 2015 ardantic - All rights reserved Critical infrastructure Air Traffic Control Financial systems Power grid Involves Passengers, airports, air navigation authorities, regulators, aeronautics industry Individuals, enterprises, banks, insurances, funds, regulators, market infrastructure Consumers, power plants, substations, distribution grid, regulating authorities Security requirements Security, extreme performance, reliability, massive interoperability Availability, confidentiality, integrity, authentication, access control, non repudiation Reliability, interoperability, performance, resilience Vulnerabilities Unencrypted data links, capabilities to temper radar rendering, remote control of aircraft Use of mobile apps, human factor, susceptibility to phishing, unpreparedness SCADA obsolescence, hyper interconnectivity, market deregulation, smart metering 19 What are national critical infrastructures ? Sources : H. Teso. Aircraft hacking (2013), Critical Infrastructure protection
  • 20. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 20 Mass injuries or casualties Large scale environmental damages Important loss of services Loss of confidence, civil unrest
  • 21. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 21 Interdepen- dencies Physical Information systems Geographical Logical Source : Critical Infrastructure protection 2014
  • 22. Copyright © 2015 ardantic - All rights reserved Which are the threats ? 22 Can take « real, large scale » actions !!!
  • 23. Copyright © 2015 ardantic - All rights reserved Who are the potential attackers? 23 Who Smart hacker Competitor Hacktivist Organized crime Terrorist groups Countries, nations Resources Almost none Money, time, limited skills Limited but organized and skilled Very large : money, time, skills Infinite Motivations Ego, self esteem To sabotage competitors image Campaign based. ideological Money, power, blackmail Ideological, political, nothing to lose Geostrategy, economical, political, espionage Capabilities Very limited Limited Extensive Very important Unlimited Damages Most of the time, none Focused, material only Serious, purpose- bound Regional High profile incidents, spectacular Nation level, massive Source : Critical Infrastructure protection 2014
  • 24. Copyright © 2015 ardantic - All rights reserved Which are their targets ? • Combination of cyber & physical attacks to destroy or invalidate critical supplies • Disruption of international communications backbones preventing any financial transactions • Cyber attacks on the control systems of a major power/smart grid leading to large areas blackout  DDoS, routing attacks, malwares, protocol attacks, insider  Control can be taken and left dormant for further coordinated attacks • Coordinated cyber attacks on the rail grid, air control and traffic control systems to generate massive congestions 24
  • 25. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? 25 Vulnerability chain Infrastructure, SCADA, network Applications Users Brute force Human errors Source : Critical Infrastructure protection 2014
  • 26. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? • Use of standard communication protocols • Increased use of commercialy available HW or SW components • Absence of any authentication/authorization protocols • Increased number of internet-facing SCADA appliances SCADA • Interconnectivity • Critical infrastrutures are going mainstream • More and more connected to corporate networks • Use of poorly protected wireless protocols Network • Distributed architectures on different platforms • Vulnerability to compromised sensorsApplication • The most vulnerable components of allHuman factor 26
  • 27. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? 27 Massive interconnectivity Reliability Availability Efficiency Resilience Vulnerability Obsolesence
  • 28. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? 28 Robust critical infrastructure Impacts analysis Vulnerability & risks assessment Prevention security measures Contingency measures Resilience to disasters Community / social resilience Awareness Crisis management structure
  • 29. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? At national, regional or local level 29 National level Regional level Local / Private level Organization National crisis management agency Regional coordination entities Local or cities authorities Private CI owners/operators Preparedness • Defines security standards • Provide BC/DR methods / templates / training • Monitors preparedness state via regional and local reporting • Monitors CI usage • Participates in exercises and awareness campaigns • Acquire and develop expertise on regional specifics in relation with CI • Report to national level • Participates in local exercises and awareness campaigns • Implement security standards • Monitors local preparedness • Report to regional Incident • CI owner leads recovery and restoration of CI service • Assess local level or CI impact and damages, report • Activates restoration plans for CI • Activates crisis mgmt and response procedures • Assesses impacts, damages at national level • Identifies options for recovery • Provides SMEs to assist CI owners/operators • Activates recovery and restoration plans at regional level • Assesses impacts, damages at regional level, report • Coordinates local level recovery actions • Liaise with CI owners/operators
  • 30. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? At critical infrastructure level 30 Context analysis and modeling Identify scenarios Define impact scales Identify and model CI components Identify stakeholders Identify possible threats Identify possible attackers Security requirements Determine security requirements Perform gap / maturity analysis Risk analysis Assess impacts of attacks Assess risks Assess likelihood of attacks Design & implement security measures (prevention) Design + impl security architecture Design + impl critical infras. modifications Design + plan security tests Design + plan compliance assessment Design + impl monitoring programme Identify existing vul- nerabilities Design & implement crisis management & recovery planning Setup crisis mgmt org & procedures Setup local continuity solutions Develop fast recovery local solutions Setup exercising programme Review for changes
  • 31. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? Key success factors • Government led infrastructure and organizational resilience directives (national infrastructures department) • Government assisted (cyber) security standards definition, threats and vulnerabilities identification and impact assessment (sector based) • Government supported communities awareness campaigns • Government representatives supervised exercises on major CIs • Sustainable public/private partnerships with CI owners or operators (regulatory) • Government and CI level surveillance structure (national intelligence agency) 31
  • 32. Copyright © 2015 ardantic - All rights reserved 32 Questions ?
  • 33. Copyright © 2015 ardantic - All rights reserved 33 Thank you for your Attention ‫اهتمامكم‬ ‫على‬ ‫لكم‬ ‫شكرا‬