An Update from Washington – Cybersecurity / R&D
Homeland Security Advanced Research Projects Agency
Douglas Maughan, Ph.D. Division Director October 30, 2012
http://www.cyber.st.dhs.gov
An Update from Washington Cybersecurity / R&D Douglas Maughan, - - PowerPoint PPT Presentation
Homeland Security Advanced Research Projects Agency An Update from Washington Cybersecurity / R&D Douglas Maughan, Ph.D. Division Director October 30, 2012 http://www.cyber.st.dhs.gov Environment: Greater Use of Technology, More
Douglas Maughan, Ph.D. Division Director October 30, 2012
http://www.cyber.st.dhs.gov
Globalization & Transportation Natural Disasters & Pushing Beyond Design Limits Misuse of Technology Border Security & Immigration Cyber Domain
L E S S R E S O U R C E S MORE THREATS
Violent Extremism Nature of Innovation Both sides get to innovate Predictive & Reactive Aviation as an example … Low cost
Strategic potential Anywhere in the world in 24 hours Historical Perspective Tenuous balance Insider Threat
Chinese Hackers Blamed for Intrusion at Energy Industry Giant Telvent - 09/25/2012 Secret account in mission- critical router opens power plants to tampering
Unknown amount of Tiffany & Co. employees‘ account information exposed by unauthorized access to JPMorgan Chase Bank’s servers
Twitter users dealt malicious links via direct messages
Mozilla releases patches for more than 30 Firefox bugs - 9/1/12 DDoS attacks hit Wells Fargo, PNC Bank, U.S. Bancorp
Strategic Guidance Operational Directives
HSPD-5 National Incident Management System (2003) PPD-8 National Preparedness (2011) HSPD-22 Domestic Chemical Defense (2007) HSPD-9 Defense of U.S. Agriculture & Food (2004) HSPD-10 Biodefense for the 21st Century (2004) Homeland Security Act 2002 QHSR (Feb 2010) BUR (July 2010)
Prevention, Protection, Mitigation, Response, Recovery
S&T Strategic Plan (2011)
Smaller Scale Terrorism Trafficking, Crime Pandemics, Accidents, Natural Hazards Violent Extremism High Consequence WMD Threats Core Missions
QHSR
Reduce the Number of Trusted Internet Connections Deploy Passive Sensors Across Federal Systems Pursue Deployment of Automated Defense Systems Coordinate and Redirect R&D Efforts
Establish a front line of defense
Connect Current Centers to Enhance Situational Awareness Develop Gov’t-wide Counterintelligence Plan for Cyber Increase Security of the Classified Networks Expand Education
Resolve to secure cyberspace / set conditions for long-term success
Define and Develop Enduring Leap Ahead Technologies, Strategies & Programs Define and Develop Enduring Deterrence Strategies & Programs Manage Global Supply Chain Risk Cyber Security in Critical Infrastructure Domains
http://cybersecurity.whitehouse.gov Operational – NPPD and Inter-agency (S&T supporting NPPD) Classified – Intel Community/Inter-agency S&T CSD not involved S&T – part
NICE – S&T involved S&T – $18M FY12 OMB add NIPP -S&T involved Inter-agency Programs S&T CSD not involved Shape future environment / secure U.S. advantage / address new threats
cybersecurity experts.
industry, and academia.
consistency among programs, and potential employees lack information about the skills needed for jobs.
uncoordinated, and the resources that do exist are difficult to find.
NICE was established in support
Cybersecurity Initiative (CNCI) – Initiative 8: Expand Cyber Education – Interim Way Forward and is comprised of over 20 federal departments and agencies.
In the future, DHS will provide cybersecurity for … The .gov and critical .com domains with a mix of:
Linkages to our U.S. – CERT (Computer Emergency Readiness Team) DHS provides advice and alerts to the 18 critical infrastructure areas … … DHS collaborates with sectors through Sector Coordinating Councils (SCC)
National Cybersecurity and Communications Integration Center (NCCIC) is a 24x7 center for production of a common
part of the Homeland Security Advisory Council
internal and external)
can foster the development of a national security workforce capable of meeting current and future cybersecurity challenges;
its capability to recruit and retain that sophisticated cybersecurity talent.
8
Jeff Moss (Co-Chair) ICANN Alan Paller (Co-Chair) SANS Institute Steve Adegbite Lockheed Martin Asheem Chandna Greylock Partners Larry Cockell Time Warner, Inc. Robert Gallucci MacArthur Foundation John Gilligan Gilligan Group Steven Myers Steven Myers & Associates
Northrop Grumman Tony Sager National Security Agency Nicole Seligman Sony Corporation of America Michael Steed Paladin Capital Group Joe Sullivan Facebook Roy Vallee Avnet, Inc. Rita Wells Idaho National Laboratory
mission-critical cybersecurity tasks (Page 6).
evaluation of mission-critical cybersecurity talent for each of the mission-critical tasks (Page 9).
the competency and progress of the existing and future DHS mission-critical cybersecurity workforce (Page 10).
9
with direct responsibility for the development and oversight of the cybersecurity workforce (Page 12).
supportive and make mission-critical cybersecurity jobs for the federal civilian workforce enticing in every dimension: in mission and service, skills, growth potential, and “total value proposition” (Page 14).
10
based program that identifies and trains large numbers of talented men and women to prepare them for mission-critical jobs in cybersecurity (Page 17).
as CAE and SFS schools to ensure that graduates are prepared to perform technical critical cybersecurity jobs (Page 19).
enhance the opportunities for U.S. veterans to be trained for and hired in mission-critical cybersecurity jobs (Page 21).
11
mission-critical skills, apply the large majority of direct hire authority related to information technology in the Department to bringing on people with technical mission critical cybersecurity skills (Page 22).
(Page 23).
12
program that ensures DHS cyber alumni and other talented cybersecurity experts outside of government are known and available to DHS in times of need and determine how this program may be implemented long-term (Page 24).
13
Strengthen America’s security and resiliency by providing knowledge products and innovative technology solutions for the Homeland Security Enterprise
1) Create new technological capabilities and knowledge products 2) Provide Acquisition Support and Operational Analysis 3) Provide process enhancements and gain efficiencies 4) Evolve US understanding of current and future homeland security risks and
14
FOCUS AREAS
– Standard Issue to S&T employees from S&T CIO
Technology
– Acquired by Microsoft
Analysis
– Over 100 pilot deployments as part of Cyber Forensics
Analysis tools
– Acquired by McAfee
Technologies
– Open source; most browsers have included Stanford R&D
Visualization
– Pilot with DHS/NCSD/US-CERT; Acquisition
Environment for Software Assurance and SW Tools
(E.S. w/DOE); DECIDE (F.S. w/FSSCC); Internet Measurement and Attack Modeling
Privacy (w/GSA for HSPD-12 and NSTIC more broadly)
Practice (TTP)
16
PEOPLE SYSTEMS INFRASTRUCTURE RESEARCH INFRASTRUCTURE
Secure Protocols Identity Management Enterprise Level Security Metrics & Usability Data Privacy Cyber Forensics Competitions - Education Process Control Systems Internet Measurement & Attack Modeling Experimental Research Testbed Research Data Repository Software Quality Assurance (SWAMP) Software Quality Assurance Homeland Open Security Technology Assessments & Evaluations Experiments & Pilots Cyber Economic Incentives Moving Target Defense Tailored Trustworthy Spaces Leap Ahead Technologies Transition To Practice
prevention of, and response to cyber attacks on the nation’s critical information infrastructure, based on customer requirements
security of existing deployed technologies and to ensure the security of new emerging cybersecurity systems;
environments.
Type I (New Technologies) Applied Research Phase Development Phase Demo in Op Environ. Funding ≤ $3M & 36 mos. Type II (Prototype Technologies) More Mature Prototypes Development Phase Demo in Op Environ. Funding ≤ $2M & 24 mos. Type III (Mature Technologies) Mature Technology Demo Only in Op Environ. Funding ≤ $750K & 12 mos.
Note: Technology Demonstrations = Test, Evaluation, and Pilot deployment in DHS “customer” environments
18
TTA-1 Software Assurance DHS, FSSCC TTA-2 Enterprise-Level Security Metrics DHS, FSSCC TTA-3 Usable Security DHS, FSSCC TTA-4 Insider Threat DHS, FSSCC TTA-5 Resilient Systems and Networks DHS, FSSCC TTA-6 Modeling of Internet Attacks DHS TTA-7 Network Mapping and Measurement DHS TTA-8 Incident Response Communities DHS TTA-9 Cyber Economics CNCI TTA-10 Digital Provenance CNCI TTA-11 Hardware-Enabled Trust CNCI TTA-12 Moving Target Defense CNCI TTA-13 Nature-Inspired Cyber Health CNCI TTA-14 Software Assurance MarketPlace (SWAMP) S&T
19
UK, CA, NL, SWE
20
Applied Visions, Inc Oak Ridge National Laboratory Carnegie-Mellon University Pacific NW National Laboratory Columbia University Purdue University Def-Logix Raytheon BBN Technologies George Mason University Rutgers University Georgia Tech Research Corp. Princeton University HRL Laboratories, LLC University of Alabama at Birmingham IBM Research University of North Carolina International Computer Science Institute Dartmouth College ITT Advanced Engineering & Sciences Division Indiana University Kestrel Technology, LLC, Palo Alto, CA University of California, San Diego Merit Network Inc University of Houston Morgridge Institute for Research
University of Illinois at Urbana-Champaign
Naval Postgraduate School University of Maryland Northrop Grumman Information Systems USC Information Sciences Institute
21 Operational Capability: Performance Targets:
Quantify Performance
and 1000 hosts in under 24 hours. Cost of Ownership
Meeting BAA Goals
metrics at enterprise level
designing/modifying network architecture Schedule, Cost, Deliverables, & Contact Info. Deliverables NetAPT transitioned to commercial support Extensive training material Compliance and defense-in-depth metrics Vigorous promotion of use supporting NERC-CIP audits Contact Information Offeror : University of Illinois at Urbana-Champaign POC : Professor David M. Nicol Coordinated Science Lab 1308 West Main Street, Urbana, IL 61801 217 244-1925 dmnicol@illinois.edu Proposed Technical Approach Will bring enterprise-scale network connectivity metrics into practice in a significant critical infrastructure Tasks : * Develop training materials * Develop off-site NetAPT analysis capability * Develop/implement defense-in-depth metrics * Include layer-2 analysis Status --- NetAPT in use under evaluation licenses. Actions --- NetAPT used in NERC-CIP compliance testing of large electric utility On-going --- small effort in bug fixes, documentation
technologies that demonstrate the potential for significant improvement in homeland security missions and operations
submission that is reviewed by an S&T Program Manager
Opportunities website (www.fbo.gov) (Solicitation #:DHSS- TLRBAA12-07)
National Cybersecurity Initiative and Federal R&D Strategic Plan topics
Security
Infrastructure
Security Technology
law enforcement
Information Flow technologies.
competitions and education and curriculum development.
Systems and Critical Infrastructure Security
and Attack Modeling
workforce
systems
Technologies developed through federally funded research requiring test and evaluation in experimental operational
24
1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
NRC CSTB Trust in Cyberspace National Strategy to Secure Cyberspace NIAC Hardening the Internet PITAC – Cyber Security: A Crisis of Prioritization IRC Hard Problems List NSTC Federal Plan for CSIA R&D NRC CSTB Toward a Safer and More Secure Cyberspace White House Cyberspace Policy Review NSPD-54/HSPD-23 DHS S&T Roadmap for Cybersecurity Research Trustworthy Cyberspace – Federal Cybersecurity R&D Strategic Plan
DHS S&T Produced DHS S&T Led
All documents available at: http://www.cyber.st.dhs.gov/resources/
Identified critical research gaps in:
Attribution
25
http://www.cyber.st.dhs.gov
– Tailored Trustworthy Spaces – Moving Target Defense – Cyber Economics and Incentives – Designed-In Security (New for FY12)
– Technology Discovery – Test & Evaluation / Experimental Deployment – Transition / Adoption / Commercialization
– Health IT, Smart Grid, NSTIC (Trusted Identity), NICE (Education), Financial Services
Released Dec 6, 2011
http://www.whitehouse.gov/blog/2011/12/06/f ederal-cybersecurity-rd-strategic-plan-released
FY 2011 Annual Report
Available NOW!
27
support our future
agenda
infrastructure and systems
datasets
including education
experimental deployments
28
Douglas Maughan, Ph.D. Division Director Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) douglas.maughan@dhs.gov 202-254-6145 / 202-360-3170
29