northrop grumman corporation
play

Northrop Grumman Corporation Operating Safely in a Cyber Dense - PowerPoint PPT Presentation

Northrop Grumman Corporation Operating Safely in a Cyber Dense Environment the Good, the Bad, and the Ugly. World Air Traffic Management Congress March 2016 Dr. Dennis McCallam, DIA. Northrop Grumman Fellow Who we are Leading global


  1. Northrop Grumman Corporation Operating Safely in a Cyber Dense Environment – the Good, the Bad, and the Ugly. World Air Traffic Management Congress March 2016 Dr. Dennis McCallam, DIA. Northrop Grumman Fellow

  2. Who we are • Leading global security company • $24 billion sales in 2014 • $38.2 billion total backlog • Leading capabilities in: – Unmanned Systems – Cyber – C4ISR – Logistics Focus on Performance 2 Approved For Public Release # 16-0385; Unlimited Distribution

  3. Agenda • Lets put a context on the cyber threat from a capability standpoint • The cyber environment out there….ugly • Understanding that our environment has both enterprise and platform information systems • Some thoughts on security engineering and resilience • Some ways ahead (and some good news) Approved For Public Release # 16-0385; Unlimited Distribution

  4. Looking at the Threat Landscape - Capabilities 1 Use existing malicious code and known exploits The Known - Develop tools to use known exploits against publically 2 Known known vulnerabilities Develop and use unknown malicious code against known 3 The vulnerabilities Known- Unknown Criminal or state actors who discover new vulnerabilities 4 and develop exploits against known vulnerabilities State actors who create vulnerabilities and impact products The 5 in the supply chain to enable exploitation of networks and systems of interest Unknown - Unknown States with the ability to successfully execute full spectrum 6 cyber operations * Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat January 2013 4 Approved For Public Release # 16-0385; Unlimited Distribution

  5. So….How vulnerable are things • Some factual attacks or alerts – Computer researcher hacked into aircraft control system (masquerading as a passenger): May 2015 • Contention between safety and security – Johnson, C. (2016). Why We Cannot (Yet) Ensure the Cyber-Security of Safety- Critical Systems. – Need to address the difference between platform (sensor, etc) systems and enterprise systems • Some urban legend attacks – Was it a virus or a bad maintenance computer? 5 Approved For Public Release # 16-0385; Unlimited Distribution

  6. Cyber resilience impacts a lot of things Enterprise IT System of Systems Platform IT The traditional IP based IT Combination of platform and The IT residing within and on infrastructure: HW/SW and all enterprise IT systems (their platforms that it touches sensors and components) that make up the mission KEY CHARACTERISTICS KEY CHARACTERISTICS KEY CHARACTERISTICS • More homogenous and known • Hybrid – multiple interfaces • Some non-Internet operating • Infrastructure dependent across enterprise and systems, protocols and transport • Designed to manage large platform • Proprietary components volumes of critical data • Huge attack surface • Some legacy systems, • Events are played out in • Risk of “Pearl Harbor” if pre-“cyber era” massive scale in public “jump the gap” events • Solutions must be safety-centric • Vast array of COTS cyber tools of varying effectiveness Not everything is the same. 6 Derived from DoDD 8500.1, Paragraph E2.1.16.4 Approved For Public Release # 16-0385; Unlimited Distribution

  7. Security Engineering: Simplified • Continuously improve your C4ISR architecture with security in mind – Think: “Secure by Design” • The Internet of Things (and a lesson for us) 192.168.0.63 …and I just hacked a bank. Where Should We Protect From? 7 Approved For Public Release # 16-0385; Unlimited Distribution

  8. Cyber Threats…Are They Really Everywhere? Performance Data Recorder Supply Chain Bluetooth/4G/OnStar Keyless Entry Remote Start Security Engineering and Vulnerability Analysis Enable Successful Cyber Design and Test 8 Approved For Public Release # 16-0385; Unlimited Distribution

  9. The Resilience Lifecycle Start Secure. Stay Secure. Return Secure. ™ TRUSTED BASELINE RESILIENT OPERATIONS SECURE RE-BASELINING Operations & Support Upgrade & Modernize Design, Acquire, Build & Field • Detect/prevent loss of sensitive information • Maintain supply chain • Avoid supply chain intrusion integrity • Operate through attacks • Continually assess security • Preserve software integrity posture • Respond to attacks across the board, not just on IP-based connections • Prevent malware injection • Detect & reject built-in malware and undocumented features • Detect RF links & code insertion • Prevent security mitigation bypass • Design holistically • Prevent mission critical function alteration • Detect non-intentional S/W • Follow software assurance • Monitor for mission load compromise modifications processes • Review & protect diagnostic • Ensure software provenance equipment injection points • Detect & reject counterfeit parts Attack Vectors Resilience Approaches • Ensure software/data • Prevent contract process flaws Data integrity Start Secure Code • Secure related environments Infrastructure Communications Stay Secure People Return Secure Mission Assurance 9 Approved For Public Release # 16-0385; Unlimited Distribution

  10. Some good news • The enterprise IT side is well understood – Build on the shoulders of giants • The safety and operational demands on ATC Platform IT is a GREAT start towards cyber protection – Code evaluations – Secure CM and patch control • We can and should get into two rhythms – Start secure, Stay secure, Seturn secure™ to help with the development and architecture of the next generation systems – Secure it, Optimize it, Evolve it ™ to make sure we always know where we are and know where we are going • Secure the design data of your system – it is critical 10 Approved For Public Release # 16-0385; Unlimited Distribution

  11. Final thoughts - maintain your vision with education • The development of processes around E System Security Engineering is a natural extension of the formal Systems Engineering 20 1 100 process • Engineering a solid system to protect the D U 20 integrity of the supply chain is necessary 50 2 • Educate application developers about risks to 20 C A T E 3 20 the supply chain and what to watch for Information Supply Chain Security Security Standards Policy and Regulations Systems and Vendors 11 Approved For Public Release # 16-0385; Unlimited Distribution

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend