La Governance della Sicurezza delle Informazioni in

Transcription

La Governance della Sicurezza delle Informazioni in
La Governance della Sicurezza delle
Informazioni in Italia:
stato dell’arte e nuove prospettive
Genova 18 Febbraio 2011
Rev. 0_18
Posizionamento strategico dell’ offerta
Selex SI
Offerta allo Stato dell’Arte: dai singoli Prodotti ai Sistemi Integrati
SISTEMI INTEGRATI
© 2011 SELEX Sistemi Integrati - commercial in confidence
PROTEZIONE DEL
TERRITORIO
SISTEMI DI DIFESA
PROTEZIONE DEL TERRITORIO E DEI CONFINI,
PROTEZIONE DELLE INFRASTRUTTURE CRITICHE,
GESTIONE DELLE CRISI E GRANDI EVENTI
SISTEMI C4ISTAR,
INFRASTRUTTURE NCW,
SISTEMI DI DIFESA AEREA,
SISTEMI C4ISTAR PER IL CAMPO DI
BATTAGLIA
SISTEMI DI BORDO, DI SORVEGLIANZA E SICUREZZA
SISTEMI DI MISSIONE
AEREA
SISTEMI
ATC/ATM E AEROPORTI
SENSORI
AVIONICA (EW, RADAR, EO),
RADAR NAVALI E SISTEMI DI
DIREZIONE DI TIRO,
RADAR TERRESTRI
SELEX SISTEMI
© 2011
SELEX Sistemi Integrati. All rights reserved
FINMECCANICA
VTMS &
CONTROLLO MARITTIMO
IT AVANZATA PER LA
SICUREZZA, LOGISTICA,
AUTOMAZIONE
COMANDO E CONTROLLO
COMUNICAZIONI
INTEGRAZIONE SISTEMI DI
COMBATTIMENTO NAVALE,
SISTEMI COMANDO E CONTROLLO
TERRESTRI
NAVALI E TERRESTRI,
AVIONICA CNI,
PROFESSIONAL TETRA, WiMAX
ATC & ATP
TERRA
NAVALE
C4I
SICUREZZA
LOGISTICA
MAPPA 2
© 2011 SELEX Sistemi Integrati - commercial in confidence
L’offerta dei Sistemi di Sicurezza
SISTEMI DI CONTROLLO
DEL TERRITORIO
SISTEMI DI CONTROLLO DEI
CONFINI MARITTIMI E DEL
TRAFFICO NAVALE
SISTEMI PER LA GESTIONE DELLE
CRISI E LA PROTEZIONE CIVILE
SISTEMI DI PROTEZIONE DEI
CONFINI TERRESTRI
SISTEMI DI PROTEZIONE PORTUALE
SISTEMI DI CONTROLLO DELLE
INFRASTRUTTURE CRITICHE
SELEX SISTEMI
© 2011
SELEX Sistemi Integrati. All rights reserved
FINMECCANICA
ATC & ATP
TERRA
NAVALE
C4I
SICUREZZA
LOGISTICA
MAPPA 3
Cyber: Threats
Propaganda
Web Vandalism
Robbery of digital identity
Critical Infrastructure attacks
Equipment Distruction
Robbery of sensible and reserved files
Examples: Spoofing; Trojan; Virus; DoS (Denial of Service); DDoS (Distributed Denial of Service);
Buffer overflow; Shellcode; Cracking; Backdoor; Port scanning; Sniffing; Keylogging; Spyware
© 2011 SELEX Sistemi Integrati. All rights reserved
4
Cyber: Vulnerabilities
Eavesdropping
The act of secretly
listening to the private
conversation of others
without their consent
Bad Social engineering
Malicious individuals have regularly
penetrated well-designed, secure computer
systems by taking advantage of the
carelessness of trusted individuals,
or by deliberately deceiving them.
Exploit
Backdoor
Method of bypassing normal
authentication, securing remote
access to a computer, obtaining
access to plaintext, and so on,
while attempting to remain
undetected.
Rootkit
A rootkit is software that enables
continued privileged access to a
computer, while actively hiding its
presence from administrators by
subverting standard operating system
functionality or other applications.
© 2011 SELEX Sistemi Integrati. All rights reserved
Piece of software, a chunk of data, or
sequence of commands that take
advantage of a bug, glitch or vulnerability
in order to cause unintended or
unanticipated behavior to occur on
computer software and hardware.
Keylogging
The action of tracking/logging the
keys struck on a keyboard,
typically in a covert manner so that
the person using the keyboard is
unaware that their actions are
being monitored
5
CyberDefence: Architectural Context
•
•
•
•
•
•
•
•
•
Symmetric and A-Symmentric Threats
Active, Passive, Conventional and non – Conventional Defence
High level complexity in Organizational Structure
Evolution in Employment Concept
Expeditionary Missions and in nations and out of the area
Interoperability Requirements
Multi level Security Needs
Multinational and multiforces missions (combined, joint) with
different lead (NATO, EU, Nations, ONU)
CIMIC Integration : Civil and Military Infrastructure Protection
• NCW, NCO, NEC Trasformation
• Open Source and open standards adoption
• Speed change in technology evolution
© 2011 SELEX Sistemi Integrati. All rights reserved
6
Cyber Industrial Enablers
Organization
• Establish Governance for Cyber Defence Issues
• Share and Synchronize Culture
• Develop and Synchronize a different Business Models
Methodology
• Strengthen Life Cycle Management & Develop a Collaborative
Working Environment
• Manage and Synchronize Frameworks
• Re-use of existing Cyber efforts and investments
• Program Management & Risk/ Cost Control/Reduction
• Methodologies of Continuous Training forCyber
Technical
© 2011 SELEX Sistemi Integrati. All rights reserved
• Develop a Cyber Assessment Environment
• Develop Interoperability Framework
• Setup a Federated and Secured Communications
Infrastructure through specific SO and HW
• Setup an Information & Core Services Infrastructure
• Setup an Information Assurance (IA) Infrastructure and
Security Services
• Anticipate Man-in-the-Loop and Improve Human Factors
• Setup a System Management
7
System of System Engineering Approach:
From AF to SysML
SYSTEM OF SYSTEM
DOMAIN
System
Requirement
Specification
Specialised
Studies
Traceability
Functional
Analysis & Design
SYSTEM DOMAIN
Requirement
Analysis
Battelab
Interface
Requirement
Specification
ISFM
HMI Functional
Analysis & Design
ISFM
Performance
Analysis
HMI
Requirement
Specification
SW Requir
Specification
Integration &
Test
Activity
SW Code
Implemention
SW
Unit Test
SW
Integration
ISFM
© 2011 SELEX Sistemi Integrati. All rights reserved
Int. Lab
Field Int.
HMI Interface
Requirement
Specification
SW/HW Test
Validation
SOFTWARE
DOMAIN
8
Network Operation Center (IT+UK)
© 2011 SELEX Sistemi Integrati. All rights reserved
9
Italian+UK Security Operation Centre
Security Audit
Intrusion detection
The appliance implements
Vulnerability Assessment
functions aimed to control the
presence of vulnerabilities in the
different OS versions and
configurations, and network
system applications.
operates Security Alerts,
generates events and forwards
them to the main collector .
Bandwith management
Manage the network bandwidth
partitioning according to
different criteria
Traffic Monitoring
Has the aim to analyse both
network traffic (up to application
level) and Netflow information
Log Server
Has the aim to gather and store
SNMPTrap and syslog messages from
different host and applications, and to
extract and visualise them according to
different criteria.
© 2011 SELEX Sistemi Integrati. All rights reserved
10
The Finmeccanica Business Model
•
FNM provided a contribution to COPASIR
Report ( Italian Government Report)
•
Internal Organization – IPT : FNM Cyber team
lead by Selex SI (Selex Sistemi Integrati, Selex
Communications, Elsag Datamat, Digint,
Vega, Selex Sistem Integration)
•
Strategic issue:
– SELEX Sistemi Integrati has been
engaged by FNM corporate to partecipate
to Cyber Defence Exercise (Cyber Shot
2010)
© 2011 SELEX Sistemi Integrati. All rights reserved
11
CyberShield Solution (1/2)
SELEX Sistemi Integrati has developed a prototype project on a security
architecture that has been integrated into a product CyberShield_SoS, which
offers an advanced modular and flexible solution to the market, based on the
following building blocks
Cyber Sensors
Cyber C4
Every Sensor usable to
detect the threats
The infrastructure is needed to
manage the 5° dimension (Cyber
Sfera)
Cyber Effectors
Every single resource is needed
to react to the threat
© 2011 SELEX Sistemi Integrati. All rights reserved
12
CyberShield Solution (2/2)
Cyber C4
Cyber Sensors
“Learn” information
Overlook the fifth dimension
•Threats analysis and identification and
prevention of threat and sources
•Discovery of intrusion and network
traffic flow analysis
•Cyber intelligence on open sources
•Monitoring upon event and network
activities
•Supervision of the correlation analysis of the
information domains
•Generation and Evalutation of the operative pictures
(CYOP, Cyber Operational Picture)
•Implementation of operative Pictures and Geografical
network Maps
•Advanced Management of information in the classified
domains.
Cyber Effectors
To stop, to ban, to recover
•Select and activate countermeasure
•To Ban neutralize the threats
•Verify effects of the response
•Recover to normal activities
© 2011 SELEX Sistemi Integrati. All rights reserved
13
CyberShield : Architecture and Domains
Protect
CYBER
GOVERNANCE
& RULES OF
ENGAGEMENT
CYBER
SENSORS AND
EFFECTORS
Deter
Recover
Detect
Respond
CYBER C4 : CYOP
© 2011 SELEX Sistemi Integrati. All rights reserved
14
Programmi di rilievo per la Cyber Defence
• OSN – Osservatorio Sicurezza Nazionale
(Selex SI/Finmeccanica – CASD)
© 2011 SELEX Sistemi Integrati. All rights reserved
15