Top Banner
10/19/15 1 Cyber Metrics in the DoD or How Do We Know What We Don’t Know? John S. Bay, Ph.D. Executive Director Things People Have Asked Me Things People Have Asked Me How much money should I spend this year on cyber defense technologies? How many attacks has your firewall repelled this month? If I only had a dollar to spend on cyber, where should I spend it? Why is cyber research such a slog? 2 11/ 12/ 14 Answers (which did not go over well) Answers (which did not go over well) How much money have you got? We repelled all of them … except that one you read about in the paper Spend your dollar on upgrades Cyber research is a slog because there is no physics theory underlying it all, liker Maxwells’ Equations or Newton’s Laws 3 11/ 12/ 14
6

8_Bay - CSIAC Cyber Metrics

Dec 04, 2015

Download

Documents

John Shu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 8_Bay - CSIAC Cyber Metrics

10/19/15

1

Cyber&Metrics&in&the&DoD

or

How&Do&We&Know&What&We&Don’t&Know?

John S. Bay, Ph.D.Executive Director

Things& People&Have&Asked&MeThings& People&Have&Asked&Me

• How&much&money&should&I&spend&this&year&on&cyber&

defense&technologies?

• How&many&attacks&has&your&firewall&repelled&this&

month?

• If&I&only&had&a&dollar&to&spend&on&cyber,&where&

should&I&spend&it?

• Why&is&cyber&research&such&a&slog?

211/12/14

Answers

(which& did&not& go&over&well)

Answers

(which& did&not& go&over&well)

• How&much&money&have&you&got?

• We&repelled&all&of&them&…&except&that&one&you&read&

about&in&the&paper

• Spend&your&dollar&on&upgrades

• Cyber&research&is&a&slog&because&there&is&no&physics&

theory&underlying&it&all,& liker&Maxwells’&Equations&

or&Newton’s&Laws

311/12/14

Page 2: 8_Bay - CSIAC Cyber Metrics

10/19/15

2

But&really&…&it&DEPENDSBut&really&…&it&DEPENDS

• The&“threat”&factor&is&common&in&cybersecurity,&

but&mostly&not&elsewhere

• …&&and&it&IS& true&that&there&is&no&useful&PHYSICS&

for&the&problem

411/12/14

DoD&Taxonomy&of& ThreatsDoD&Taxonomy&of& Threats

5

From:.Defense.Science.Board,.Resilient(Military(Systems(and(the(Advanced(Cyber(Threat,.January.2013

Tier Description

I Practitioners . who. rely. on. others . to. develop. the. malicious . code,. delivery. mechanisms,. and. executionstrategy. (use.known. exploits ).

II Practitioners . with. a.greater. depth. of. experience,. with. the. ability. to.develop. their. own. tools . (from.publically. known. vulnerabilities ).

III Practitioners . who. focus . on.the. discovery. and.use. of. unknown. malicious . code,. are. adept. at. installing.user. and. kernel. mode. root. kits ,. frequently. use.data. mining. tools ,. target. corporate. executives . akey.users . (government. and. industry). for. the. purpose. of.s tealing. personal. and. corporate. data. with. the.expressed. purpose. of. selling. the. information. to. other. criminal. elements .

IV Criminal. or. s tate. actors . who. are. organized,. highly. technical,. proficient,. well.funded. profess ionals .working. in.teams. to. discover. new. vulnerabilities . and.develop. exploits .

V State. actors . who. create. vulnerabilities . through. an.active. program. to. “influence”. commercial. products .and. services .during. des ign,. development. or. manufacturing,. or. with. the. ability. to. impactproducts . while. in.the. supply. chain. to. enable. exploitation. of. networks . and. systems.of. interest

VI States . with. the. ability. to. success fully. execute. full. spectrum. (cyber. capabilities . in.combination. withall.of. their. military. and.intelligence. capabilities ). operations . to. achieve. a.specific.outcome. in. political,military,. economic,. etc.. domains . and. apply.at. scale.

11/12/14

And&The& Corresponding& CriticalityAnd&The& Corresponding& Criticality

611/12/14

Page 3: 8_Bay - CSIAC Cyber Metrics

10/19/15

3

What&Might&the&COSTS& Be?What&Might&the&COSTS& Be?

711/12/14

So&Then,&What&to&Measure?So&Then,&What&to&Measure?

• Qualitative

– Capabilities

– Missions&lost

• Quantitative

– Performance

– Cost

• To&achieve

• Not&achieving

811/12/14

Capabilities&and&MaturityCapabilities&and&Maturity

911/12/14

Page 4: 8_Bay - CSIAC Cyber Metrics

10/19/15

4

Dashboard&ApproachDashboard&Approach

1011/12/14

“Stoplight&Chart”&Assessments“Stoplight&Chart”&Assessments

1111/12/14

See:. SPIDERS.JCTD

Costs& to&UsCosts& to&Us

• All&vulnerabilities&are&bugs&

• All&code&has&bugs

• Bugs&are&expensive

• Exploits&are&cheap&! the&“asymmetry”&problem

1211/12/14

Page 5: 8_Bay - CSIAC Cyber Metrics

10/19/15

5

MissionUAssurance& ApproachMissionUAssurance& Approach

• Helps& focus& attention

• Requires& a&“map”& o& the&

mission

• Implies& a&prioritization&

on&missions& (something&

loses)

• Requires& reconfigurable&

systems& and& networks

• Is&not& cheap

13

From:. .DUSD(I&E). Office,. HANDBOOKFor( SELFAASSESSING ( SECURITY( VULNERABILITIES( &(RISKS( of(INDUSTRIAL( CONTROL(SYSTEMSOn(DOD( INSTALLATIONS,.December. 201211/12/14

Just& Good& Enough& (Incremental)

Approach

Just& Good& Enough& (Incremental)

Approach

• How& long&would& our& red&team& take&to&penetrate&the&

system?

– An&empirical&measure,&at&best.

– Implies&a&canonical&red&team

14

prob(first&

vulnerability& is&

discovered)

time

Bad&code

Better&code

Gamma(distribution?

11/12/14

The&Accountability&ApproachThe&Accountability&Approach

• NIST&800U53&guidelines

• The&“did&we&do&everything&we&know&how&to&do”&approach

15

From:.NIST.Special.Publication.800]53,.rev..4,.Security(and(Privacy(Controls(forFederal(Information(Systems(and(Organizations,.April.201311/12/14

Page 6: 8_Bay - CSIAC Cyber Metrics

10/19/15

6

Conclusions:&Which&is&Best?Conclusions:&Which&is&Best?

• None& of&them.& They& service&somewhat& orthogonal&

purposes.

– But&they&can&provide&applesUtoUapples&comparisons

• Can& they&answer& the&Generals’& questions?

– No

– …&except&maybe&the&one&about&the&firewall

– There& is&CERTAINLY&no&satisfactory&“physics”&to&guide&anybody

• Cyber&Metrics& is&still&an& extremely&important& and& highU

priority&problem& for&OSD!

1611/12/14