62
Can Game Theory Save Us From Cyber Armageddon? Barry Kouns, CEO Risk Based Security [email protected]

Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

Can Game Theory Save Us From Cyber Armageddon?

Barry  Kouns,  CEORisk  Based  [email protected]

Page 2: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

2©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Game Theory Basics• Mutually Assured Destruction (MAD)• Current State of Cyber Threats• Mutually Assured Cyber Destruction (MACD)• Lessons for the Office

Overview

Page 3: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

3©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• How many of you have been exposed to using game theory?• Did you use it to predict an outcome?• Any game theory experts with us?• How many of you know about MAD?

Quick Poll #1

Page 4: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

4©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Models conflict and cooperation between rational decision makers. • Assumes non-emotional behavior.• Predicts events as people act in their own best interests.

Game Theory

Page 5: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

5©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• A computer model that considers the options open to the ‘players’, determines their likely course of action, evaluates their ability to influence others and predicts the course of events.

Game Theory, In Essence …

Page 6: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

6©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• The “Prisoners' Dilemma” is the most used example of game theory.• How many of you heard of it?• Anyone recognize the movie this picture is from?

The Most Popular Game Theory Exercise?

Page 7: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

7©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Two persons were picked up on a suspicion of committing a crime. (They are both equally guilty, but the police have no proof).

• Both are moved to separate holding areas and questioned. Both are offered deals to reduce their jail time if they confess and rat on the other.

• Here's the game with the numbers representing years in prison.

Prisoners’ Dilemma

Page 8: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

8©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Both prisoners would be better off if they both kept quiet. • Human nature seems to drive us to not trust the other and think “better

to get 2 years than 5” and both confess/rat instead.

Prisoners’ Dilemma

Page 9: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

9©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• If Red and Blue were related would the result be different?• What if they were married? • Seems like knowledge of or trusting the other person is key.

Poll #2

Page 10: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

MAD

Mutually Assured Destruction

Forget the Prisoners, we had a Nuclear dilemma.

Page 11: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

11©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Threat from USSR Army Neutralized

• After World War II tensions between the USA and the USSR escalated as the USSR realized the Atom bomb had neutralized the might of their vast army.

Page 12: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

12©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Nuclear Arsenal Build-up

• The USSR soon had an Atom bomb of its own and both sides began a build-up of nuclear weapons, (Cold War).

Page 13: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

13©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Fear of a Nuclear Attack .. No Doctrine

• With suspicions growing and as fear of a nuclear exchange (Armageddon) gripped both sides, both nations struggled to develop a strategic nuclear doctrine.

Page 14: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

14©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

The Doctrine

• The eventual doctrine, developed by Game Theory experts at the RAND corporation, was named MAD, Mutually Assured Destruction.

Page 15: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

15©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Nuclear War Avoided

• MAD is largely attributed with preventing any full-scale conflicts between the United States and the USSR.

Page 16: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

16©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Game Theory was used to examine nuclear strategy during the Cold War. • MAD was based on the Prisoner’s Dilemma.

MAD

Page 17: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

17©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

MAD

Joshua from "War Games"

Page 18: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

18©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• “We do this by maintaining a highly reliable ability to inflict unacceptable damage upon any single aggressor or combination of aggressors at any time during the course of a strategic nuclear exchange, even after absorbing a surprise first strike”

US Mutual Deterrence Doctrine

"Mutual Deterrence" Speech by Sec. of Defense Robert McNamara, San Francisco, September 18, 1967

Page 19: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

19©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Each side has enough weaponry to destroy the other side.• Each side if attacked, could and would retaliate with equal or greater

force.• Each side believed there was no possibility of camouflaging a launch.• Each side believed no rogue states will develop nuclear weapons.

Assumptions Behind MAD …

Page 20: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

20©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Each side could not defend itself against the other's nuclear attack.

• Each side had to believe that once initiated a retaliatory strike could not be stopped.

• Each side must have perfect detection equipment.• Each side must show their commitment to MAD.

• Each side had the ability for perfect attribution of the launch.

MAD Assumptions …

Page 21: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

21©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Anyone know when the Cold War ended?• Has the Cold War ended?• Has the risk of nuclear war diminished since the Cold War?• Has the fear of nuclear war been replaced with worrying about cyber war?

Poll #3

Page 22: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

22©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Nuclear War Not in Top 10 Fears – Cyber #2

Help Desk Tickets

DoS Attacks

Page 23: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

23©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Help Desk Tickets

DoS Attacks

Neither Nuclear or Cyber War in Top 10 Fears

Page 24: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

24©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

And Yet …

North Korea on 'inevitable' path to nuclear ICBM: US DIA chief says if left unchecked, it's only a matter of time before Pyongyang can strike the US with a nuclear missile.

Page 25: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

25©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

And Yet …

Russia  declares  US  relations  in  ‘worst  period’  since  the  Cold  War.

Alexey  Eremenko,  Alastair  Jamieson  &  Abigail  WilliamsTuesday,  11  Apr  2017  |  10:32  AM  ETNBC NEWS

Page 26: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

But, should we fear Cyber Armageddon?

Page 27: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

27©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

0

1000

2000

3000

4000

5000

6000

-

500,000,000

1,000,000,000

1,500,000,000

2,000,000,000

2,500,000,000

3,000,000,000

3,500,000,000

4,000,000,000

4,500,000,000

5,000,000,000

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

RecordsIncidentsExpon. (Records)Expon. (Incidents)

The Number of Data Breaches Point to Yes

2017 YTD as of June 6th:1,771 Incidents5.8 Billion Exposed Records

RECORDS

INCIDENTS

Page 28: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

28©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Number of New Vulnerabilities Points to Yes

110,891  Vulnerabilities  currently  tracked

9,633

9,884

8,253

9,314

8,103 10,670

11,509

14,238

15,034

15,603

0

2,000

4,000

6,000

8,000

10,000

12,000

14,000

16,000

18,000

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

Software Vulnerabilities

New Vulnerabilities

Over  157,000  Vulnerabilities  Tracked

Over  1300  new  vulnerabilities  each  month,  no  wonder  hacking  is  the  number  1  breach  type  7  years  running.  

Page 29: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

29©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Staggering NumbersCyber Attacks Light Up the Map

NSA Data Center Experiencing 300 Million Hacking Attempts Per DayThe Hacker News

Nearly 1 million new malware threats released every day Money.cnn.com

UK businesses were hit 230,000 times each by cyber-attacks in 2016cnbc.com

Russia tops list of 100 countries that could launch cyberattacks on USMike Levine, May 18, 2017, 11:54 AM ET

Page 30: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

30©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Most Recent Global Cyber Attack?

Help Desk Tickets

DoS Attacks

WannaCry infects more than 200,000 systems in over 150 countries around the world.

Page 31: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

31©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Have you heard of the term “Fire Sale?

Poll #3 continued

Page 32: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

32©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Step one: Take out all the transportation• Step two: Take out the financial base and telecoms. • Step three: You get rid of all the utilities. Gas, water, electric, nuclear. Pretty much

anything that's run by computers which... which today is almost everything. • So that's why they call it a fire sale, because everything must go.

Fire SaleMatt Farrell: Man! It's a fire sale.John McClane: What?Matt Farrell: It's a fire sale.Deputy Director Bowman: Hey! We don't know that yet.Taylor: Yeah, it's a myth anyway. It can't be done.Matt Farrell: Oh, it's a myth? Really? Please tell me she's only here for show and she's actually not in charge of anything.John McClane: Hey, what's a fire sale?Matt Farrell: It's a three-step... it's a three-step systematic attack on the entire national infrastructure. Okay, …

Page 33: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

33©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

Help Desk Tickets

DoS Attacks

France has a 'fourth army' of young hackers for cyber warfareBusiness Insider-Apr 5, 2017

Page 34: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

34©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

Help Desk Tickets

DoS Attacks

UK will enact legislation to adopt the Network & Information Security Directive (NIS) and the General Data Protection Regulation (GDPR) will also come into force.

Page 35: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

35©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

Help Desk Tickets

DoS Attacks

China Restructures Military, Enhances Cyber-Warfare CapabilitiesBreitbart News-Apr 19, 2017

Page 36: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

36©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

Help Desk Tickets

DoS Attacks

THE WHITE HOUSE,May 11, 2017.

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Page 37: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

37©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

Help Desk Tickets

DoS Attacks

Germany activates new cyber warfare unitWorld Socialist Web Site-Apr 7, 2017

Page 38: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

38©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Government Actions

The US Army Wants to Call in Cyber Attacks Like Artillery FireThe Drive-Apr 18, 2017

Page 39: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

39©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Do you think Cyber warfare is in our future? • Do you think nuclear retaliation for a cyber attack is possible?• Can the same Game Theory be used to save us from Cybergeddon?

Poll #4

Page 40: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

Mutually Assured Cyber Destruction (MACD)

Page 41: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

41©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Do the same MAD assumptions hold-up?

MAD Assumption: Each Side … MACD1. Has enough weaponry to destroy the other side

2. If attacked for any reason by the other, could and would retaliate with equal or greater force

3. Believes there is no possibility of camouflaging a launch

4. Believes no rogue states will develop nuclear weapons (or, if they do, they will adopt the logic of MAD)

5. Cannot defend itself against the other's attack

Page 42: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

42©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Do the same MAD assumptions hold-up?

MAD Assumption: Each Side … MACD6. Believes that once initiated a retaliatory strike could not be

stopped7. Has perfect detection equipment with no false positives

8. Will demonstrate its commitment to MAD

9. Has the ability for perfect attribution of an attack

Page 43: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

43©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Prisoners’ Dilemma Work Here?

Over  121,000  Vulnerabilities  Tracked

What game theory exercise would be better?

Page 44: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

44©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Cyber war is a “game” with multiple moves with many players exchanging attacks.

• There are five cyber warfare super powers plus as many as 100 others that could wage an attack.

Assumptions Guiding a MACD Doctrine

Page 45: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

45©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• The proliferation of cyber weapons is impossible to control.

• All governments are working to improve cyber capabilities.

Assumptions Guiding a MACD Doctrine

Page 46: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

46©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• All Cyber-attacks are not acts of war.

• Less technologically developed nations are not equally vulnerable to cyber-attacks compared to the US or European nations.

Assumptions Guiding a MACD Doctrine

Page 47: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

47©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

• Assured Destruction from a cyber-attack is not a guarantee.

• Attribution for an attack could take days/weeks/ months.

Assumptions Guiding a MACD Doctrine

Page 48: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

48©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Attribution – Not an Exact Science

Over  121,000  Vulnerabilities  Tracked

http://www.secmeme.com/2017/05/copy-attribution-for-copy-cyber-threat.html

• Deterrence is highly

dependent on the ability to

distinguish the source of the

attack (attribution) and the

motivation of the attacker.

Page 49: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

49©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

1. Publish what is considered an act of cyber warfare. (Draw the Line)

2. Be recognized as a cyber super power. (Carry a big stick)

3. Obtain perfect attribution capability. (Let them know that we will know)

4. Publish a Retaliatory Response Plan. (Define the pain they can expect in return)

5. Ensure resiliency. (Deny them the hope of victory)

6. Build a global coalition of Cyber-Nations. (Attack one you attack us all)

7. Muster the will to execute the plan. (Demonstrate resolve)

Proposed MACD Tenants

Page 50: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

50©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

1. What type of cyber-attack would you consider an act of war?

2. Do NATO member obligations extend into cyber warfare?

3. Can a doctrine of MACD work to deter Cybergeddon?

4. What, if anything, can we learn from preparing for Cybergeddon?

Poll #5

Page 51: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

Lessons for the Office

Page 52: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

52©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Seven Steps in a Successful Cyber-Attack

1. Reconnaissance - identify a vulnerable target and explore the best ways to exploit it.

2. Scanning - identify a weak point that allows access.3. Access and Escalation - gain access and then escalate, usually with

privileged access credentials.4. Exfiltration - extract data, change or erase files.5. Sustainment - stay in place quietly, ensuring an easy path to return.6. Assault – stealth no longer important, alter or disable functionality.7. Obfuscation - trail of obfuscation to confuse, disorientate and divert the

forensic process to assign attribution.

POSTED IN EXPLOIT DEVELOPMENT, GENERAL SECURITY, HACKING ON JUNE 11, 2015ETHICAL HACKING TRAINING – RESOURCES (INFOSEC)

Page 53: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

53©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Reduce Your Attack Surface

1. Reconnaissance 2. Scanning3. Access

POSTED IN EXPLOIT DEVELOPMENT, GENERAL SECURITY, HACKING ON JUNE 11, 2015ETHICAL HACKING TRAINING – RESOURCES (INFOSEC)

• The key to avoiding a cyber attack is minimizing exploitable vulnerabilities.

• If you have access to, and act upon, the latest vulnerabilities, you have a fighting chance to avoid being compromised.

• Minimize your potential attack surface. Identify, Prioritize, Mitigate - Repeat.

Page 54: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

54©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Vulnerability Intelligence

1. CVE/NVD is far from a complete list of vulnerabilities.2. Know what your scanner/service provider is using for a vulnerability feed.3. Using CVSS to set priorities is a good start, but a “critical asset” review will

uncover lower CVSS scores that need mitigation. 4. Integrate Common Platform Enumeration to determine what is running on

each asset down to the exact version. Skip the vulnerability scanner guesswork and go straight to mitigation.

5. Don’t forget Application security.6. Don’t accept mounds of data without prioritized mitigation actions.

Ed Bellis, Kenna Security

https://www.alienvault.com/blogs/security-­essentials/7-­guidelines-­for-­vulnerability-­management-­scanning

Page 55: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

55©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Once they are in …

1. Reconnaissance 2. Scanning3. Access and Escalation4. Exfiltration5. Sustainment6. Assault7. Obfuscation

• Each step starting with number three requires privileged credentials to succeed.

• The key to minimizing a cyber attack is controlling privileged access.

• If you have the ability to control privileged access, a cyber attack can be significantly mitigated.

POSTED IN EXPLOIT DEVELOPMENT, GENERAL SECURITY, HACKING ON JUNE 11, 2015ETHICAL HACKING TRAINING – RESOURCES (INFOSEC)

Page 56: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

56©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Implementing Privileged Identity Management

1. Create account holder profiles – what they may and may not do.2. Create a privileged user account management policy.3. Identify a responsible party to implement the policy.4. Inventory and review privileged accounts regularly.5. Audit privileged accounts for access creep. 6. Consider tools or specialized products for managing the accounts.

MANAGE,  MONITOR  AND  AUDIT  PRIVILEGED  USERS  

Page 57: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

57©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Prepare by Playing Cyberwar Games

Page 58: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

58©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Prepare by Playing Cyberwar Games

1. Conduct ‘tabletop’ cyber war games.

2. Much like a BCP/DR exercise, but focused on a potential cyber-attack.

3. Consider scenarios not directed at you. (Transportation, Financial Sector, Utilities, SaaS, Key Partners, Clients)

4. Shoot for asset and business process relevant and realistic.

5. Extend the circle - Involve product development, infrastructure, customer relations, operations, marketing, legal, government affairs, and corporate communications in addition to IT and security.

Tucker Bailey and James Kaplan; McKinsey Associates

Page 59: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

59©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

War Game Objectives

• Realistic simulated cyber-attacks.

• Exercise business continuity plans as needed.

• Exercise technology, processes, and people.

• Build confidence in resistance, reaction, recovery, and resuming normal operations.

• Witness your team’s situational analysis, decision making, and communication.

Page 60: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

60©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Parting Bullets…

• Cyber Warfare is better understood by playing Mind Craft or Strike Force.

• The cyber super powers need to adopt and publish a MACD doctrine.

• Deterrence is achieved when opposing sides are convinced that neither can win.

• Although prevention is unlikely, we can lessen the severity of a cyber-attack.

• While we wait for governments to take action, there are some things (beyond duck & cover) we can do to protect ourselves.

Page 61: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

61©  Copyright  2017  Risk  Based  Security,  Inc.  All  Rights  Reserved

Or Just Maybe it’s All About Money

“A wise cynic might suggest that the operations researchers on both sides

were playing a cunning strategy in a game over funding, one that involved

them cooperating with one another in order to convince their politicians to

allocate more resources to weapons.” ~ Don Ross

Page 62: Barry Kouns Can Game Theory Save Us from Cyber Armageddon … · 2017. 7. 5. · Threat from USSR Army Neutralized •After World War II tensions between the USA and the USSR escalated

Thank you for your attention

Barry KounsRisk Based Security, Inc. Email: [email protected]