Northrop Grumman Corporation
World Air Traffic Management Congress March 2016
- Dr. Dennis McCallam, DIA.
Northrop Grumman Fellow
Northrop Grumman Corporation Operating Safely in a Cyber Dense - - PowerPoint PPT Presentation
Northrop Grumman Corporation Operating Safely in a Cyber Dense Environment the Good, the Bad, and the Ugly. World Air Traffic Management Congress March 2016 Dr. Dennis McCallam, DIA. Northrop Grumman Fellow Who we are Leading global
World Air Traffic Management Congress March 2016
Northrop Grumman Fellow
Approved For Public Release # 16-0385; Unlimited Distribution
company
– Unmanned Systems – Cyber – C4ISR – Logistics
Focus on Performance
2
Approved For Public Release # 16-0385; Unlimited Distribution
capability standpoint
enterprise and platform information systems
resilience
Approved For Public Release # 16-0385; Unlimited Distribution
4
* Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat January 2013
1
Use existing malicious code and known exploits
2
Develop tools to use known exploits against publically known vulnerabilities
3
Develop and use unknown malicious code against known vulnerabilities
4
Criminal or state actors who discover new vulnerabilities and develop exploits against known vulnerabilities
5
State actors who create vulnerabilities and impact products in the supply chain to enable exploitation of networks and systems of interest
6
States with the ability to successfully execute full spectrum cyber operations
The Known - Known The Known- Unknown The Unknown - Unknown
Approved For Public Release # 16-0385; Unlimited Distribution
– Computer researcher hacked into aircraft control system (masquerading as a passenger): May 2015
– Johnson, C. (2016). Why We Cannot (Yet) Ensure the Cyber-Security of Safety- Critical Systems. – Need to address the difference between platform (sensor, etc) systems and enterprise systems
– Was it a virus or a bad maintenance computer?
5
Approved For Public Release # 16-0385; Unlimited Distribution
6
Derived from DoDD 8500.1, Paragraph E2.1.16.4Not everything is the same.
Combination of platform and enterprise IT systems (their sensors and components) that make up the mission
KEY CHARACTERISTICS
across enterprise and platform
“jump the gap” events
System of Systems
The traditional IP based IT infrastructure: HW/SW and all that it touches
KEY CHARACTERISTICS
volumes of critical data
massive scale in public
Enterprise IT
The IT residing within and on platforms
Platform IT
KEY CHARACTERISTICS
systems, protocols and transport
pre-“cyber era”
Approved For Public Release # 16-0385; Unlimited Distribution
– Think: “Secure by Design”
7
…and I just hacked a bank.
192.168.0.63
Where Should We Protect From?
Approved For Public Release # 16-0385; Unlimited Distribution
8
Keyless Entry Remote Start Performance Data Recorder Bluetooth/4G/OnStar Supply Chain
Security Engineering and Vulnerability Analysis Enable Successful Cyber Design and Test
Approved For Public Release # 16-0385; Unlimited Distribution
Start Secure. Stay Secure. Return Secure.™
9
Operations & Support
just on IP-based connections
Design, Acquire, Build & Field
posture
and undocumented features
processes
Upgrade & Modernize
integrity
bypass
modifications
equipment injection points
integrity
Resilience Approaches
Mission Assurance
Attack Vectors
Data Code Infrastructure Communications People
TRUSTED BASELINE SECURE RE-BASELINING RESILIENT OPERATIONS
Start Secure Stay Secure Return Secure
Approved For Public Release # 16-0385; Unlimited Distribution
– Build on the shoulders of giants
Platform IT is a GREAT start towards cyber protection
– Code evaluations – Secure CM and patch control
– Start secure, Stay secure, Seturn secure™ to help with the development and architecture of the next generation systems – Secure it, Optimize it, Evolve it ™ to make sure we always know where we are and know where we are going
10
Approved For Public Release # 16-0385; Unlimited Distribution
System Security Engineering is a natural extension of the formal Systems Engineering process
integrity of the supply chain is necessary
the supply chain and what to watch for
11
20 100 20 50 20 20 1 2 3
Standards Policy and Regulations Systems and Vendors
Information Security Supply Chain Security