SlideShare a Scribd company logo
CYBER SECURITY 2012
               1




Need for New Approaches
to Infrastructure Security
            By
            S K HIREMATH
                   ME MAeSI MIETE

      Assistant Professor
     skhnda@rediffmail.com
International Cyber Crime Top 10 Perpetrators)
                      2
Top Ten Countries (Cyber Crime Perpetrators)
                         3

 1. UNITED STATES 66.1%
 2. UNITED KINGDOM 10.5%
 3. NIGERIA 7.5%
 4. CANADA 3.1%
 5. CHINA 1.6%
 6. SOUTH AFRICA 0.7%
 7. GHANA 0.6%
 8. SPAIN 0.6%
 9. ITALY 0.5%
 10. ROMANIA 0.5%
STAKEHOLDER AGENCIES
 1 National Information Board (NIB)
                                 4
 2 National Crisis Management Committee (NCMC)
 3 National Security Council Secretariat (NSCS)
 4 Ministry of Home affairs
 5 Ministry of Defence
 6 Department of Information Technology (DIT)
 7 Department of Telecommunications (DoT)
 8 National Cyber Response Centre - Indian Computer Emergency
  Response Team (CERT-In)
 9 National Information Infrastructure Protection Centre (NIIPC)
  10 National Disaster Management of Authority (NDMA)
 11 Standardisation, Testing and Quality Certification (STQC)
  Directorate
 12 Sectoral CERTs
NEED FOR NEW APPROACHES TO
          INFRASTRUCTURE SECURITY
                      5


Global     infrastructures Security have become more complex and
interconnected, their operation and control has become more complicated.

 Area works with several government agencies in the area of cyber
security to ensure the integrity and availability of the nation’s cyber
infrastructure.

The performance of the nation’s infrastructure is an essential component
of the nation’s economic prosperity.

The Infrastructure Security Area seeks to endow the infrastructure with
five characteristics: security, reliability, safety, sustainability, and cost
effectiveness.
ARCHITECTRUAL DESIGN OF INFRASTRUCTURAL SECURITY
                                 6
 Critical Infrastructure Security Systems

Video Content Analysis System

Thermal Monitoring Systems

Access Security Systems

Face Recognition System

Urban Security Systems

Military And Border Security Systems

Traffic Control Systems

Central Integration Management Systems

Building Management Systems
CYBER INFRASTRUCTURE
         7
INFRASTRUCTURE SECURITY
IDENTIFYING AND SECURING VULNERABILITIES
                              8


   Enterprise Application Security

   Identity and Access Management

   Infrastructure Security

   Security Strategy and Risk Management

   Business Continuity and Disaster Recovery Planning

   Data Protection & Privacy Planning
9




Security Architecture

Security Planning

Secure Compliance Roadmaps

Network Vulnerability Assessment
10
The Four Phases of Infrastructure Security
Engagement                               11
                                              Assessment
•Business requirements                        •On-site health assessment of Infrastructure &
                                              Processes
•Estimate
                                              •Conduct Business Interviews

                                              •Reporting Requirements

                                              •Establish service dependencies


Transition                                    Steady State
•Establish connectivity                       •Ongoing Infrastructure Guardian Services

•Roles & responsibilities, processes &        •Monthly Reporting (Alerts, distributions,
procedures                                    assets, health)

•Phased onboarding approach                   •SME Advisory Service

•Monitoring/Reporting commences
CORPORATES BOARD
                            12

• Compliance to international security best practices and
demonstration

• Pro-active actions to deal with and contain malicious
activities, and protecting average end users by say of net
traffic monitoring, routing and gateway controls

• Keeping pace with changes in security technology and
processes to remain current (configuration, patch and
vulnerability management)
13
Adequate security of information, resources, and systems that process
within a company or organization is a fundamental management
responsibility.

Management of an organization/agency must understand the current
level of security within their infrastructure, and the risks that the
organization may be exposed to in today's fully internet-worked
environment.

The best way to mitigate this risk is to perform a security assessment &
associated risk assessment at least once every year.

 This will allow company management to address new trends in security
vulnerability and penetration, and make informed judgments and
investments that will appropriately mitigate these risks to an acceptable
level.
14

    Conform to legal obligations and cooperate with law
enforcement activities including prompt actions on
alert/advisories issued by CERT-In

• Use of secure product and services and skilled manpower

• Crisis management and emergency response.

• Periodic training and up gradation of skills for personnel
engaged in security related activities

• Promote acceptable users’ behaviour in the interest of safe
computing both within and outside
National Cyber Security Policy
                    15




“For secure computing environment and
adequate trust & confidence in electronic
transactions ”
INFRASRUCTURE CYBER SECURITY
                        16
Cyber Security consists of sets of techniques,
policies, and activities intended to enhance trust
and mitigate vulnerabilities inherent in the
complex networked devices and services that
permeate our lives today
17


“A general rule for cyber security is
that it should be implemented ‘top-
down’ through direction as well as
‘bottom up’ through technology “
MODEL FOR DESCRIBING INFRSTRUCTURE
          CYBER SECURITY
                18
SECURITY AND SAFETY ARCHITECTURE
                                    19

Sensors and Detectors ( Microwave Systems , Infrared Sensors, Car X-rays,
Under Car Inspection Systems, Fence Mounted Sensors )

Physical Equipments (Mushroom Barriers, Road Blockers, Arm Barriers,
Turnstile)

Access Controls (Face Recognition Systems, Card Readers , Finger Print
Readers, other Biometric Access Controls)

Video Detection Systems (CCTV, VCA applications, Thermal Camera, Plate
Recognition)

Data Communication Systems

Management     Systems    (Fire   Detection,   Call   Management,   Alarm
Management)

                  
       INFRASTRUCTURE SECURITY
                             20

Network Infrastructure includes networks, network devices,
servers, workstations, and other devices.

The software running on these devices are also the part of
Network Infrastructure.

To make sure your network is secure, you should make sure
every time a configuration is changed or new device is added,
you are not creating a hole in your security.

A normal network comprise of routers, firewalls, switches,
servers and workstations. A typical layout of network
infrastructure devices is shown
Master the tools & techniques for effective information & network security.
                                          21
Discover how to create a complete & sustainable IT security architecture.

Gain knowledge on how to develop sound security policy together with your security

architecture.

 IT governance assessment using CoBIT 4.0( Control Objectives for Information

and Related Technology )

Smart security risk assessment within your organization.

Gain valuable insights on implementing a proactive & robust security management

system.

Detect & prevent information security breaches due to inadequate IT security

awareness within the organization.
INFRASTRUCTURE SECURITY

Network Level
Host Level
Application Level




                              22
23


Application Security: Managing business and information risk through
solutions for packaged SAP and Oracle ERP, and custom application
security.

Infrastructure Security: Providing visibility of information risks and
defending enterprise assets through platform security technologies.

Information Risk, Privacy & Strategy: Managing information risk through
security strategy, governance, risk and compliance management.

Security Outsourcing & Operations: Enabling application, infrastructure
and business risk management through flexible managed services options.
ARCHITECTURE DESIGN
          OF
           24

INFRASTRUCTURE SECURITY
Evolution of Architectures
                                      25




                                                      Virtualizatio
                                     Virtualization
              Individual    Data                            n
                                        (1 app /                      Cloud
                Servers    Centers                     (N apps /
                                        server)
                                                         server)


                            10 to
Utilization   10 to 20 %               15 to 25%      40 to 45 %      60 + %
                            20 %




 Security      Highest      High                                      Lowest
Infrastructure Security covering Data, Identity, Cloud,
Threat, Network, Mobile, End User Computing,
Virtualization and Cyber Security
                                     26
PORTAL SECURITY ARCHITECTURE
             27
CAMPUS DESIGN
      28
29
30
31
32
33
CASE STUDY: AMAZON'S EC2 INFRASTRUCTURE

 Exploring Information Leakage in Third-Party Compute Clouds”

     Multiple VMs of different organizations with virtual boundaries
      separating each VM can run within one physical server

     "virtual machines" still have internet protocol, or IP, addresses, visible to
      anyone within the cloud.

     VMs located on the same physical server tend to have IP addresses that
      are close to each other and are assigned at the same time

     An attacker can set up lots of his own virtual machines, look at their IP
      addresses, and figure out which one shares the same physical resources
      as an intended target

     Once the malicious virtual machine is placed on the same server as its
      target, it is possible to carefully monitor how access to resources
      fluctuates and thereby potentially glean sensitive information about the
      victim
                                                                                 34
Towards cyber operations - The new role of academic
       cyber security research and education
                              35
 The   cohesive cyber defense requires universities to
 optimize their campus wide resources to fuse knowledge,
 intellectual capacity, and practical skills in an
 unprecedented way in cyber security.

 The future will require cyber defense research teams to
 address not only computer science, electrical engineering,
 software and hardware security, but also political theory,
 institutional theory, behavioral science, deterrence theory,
 ethics, international law, international relations, and
 additional social sciences.

 Academic research centers, evaluating the collective group
 of research centers' ability to adapt to the shift towards
 cyber operations, and the challenges therein.
Towards cyber operations - The new role of academic
      cyber security research and education
                                    36


 The shift towards cyber operations represents a shift not only for the
  defense establishments worldwide but also cyber security research and
  education.

 Traditionally cyber security research and education has been founded
  on information assurance, expressed in underlying subfields such as
  forensics, network security, and penetration testing.

 Cyber security research and education is connected to the     security
  agencies and defense through funding, mutual interest in the outcome
  of the research, and the potential job market for graduates.

 The future of cyber security is both defensive information assurance
  measures and active defense driven information operations that jointly
  and coordinately are launched, in the pursuit of a cohesive and decisive
  execution of the national cyber defense strategy.
ONLINE ASSESSMENT FOR HANDS-ON CYBER
       SECURITY TRAINING IN A VIRTUAL LAB
                                 37
 Online (self) assessment is an important functionality e-learning
  courseware, especially if the system is intended for use in distant
  learning courses.
 Precisely for hands-on exercises, the implementation of effective and
  cheating-proof assessment tests poses a great challenge.

 That is because of the static characteristics of exercise scenarios in the
  laboratories: adopting the environment for the provision of a “unique”
  hands-on experience for every student in a manual manner is
  connected with enormous maintenance efforts and thus not scalable to
  a large number of students.
 This work presents a software solution for the assessment of practical
  exercises in an online lab based on virtual machine technology.
 The basic idea is to formally parameterize the exercise scenarios and
  implement a toolkit for the dynamic reconfiguration of virtual
  machines in order to adopt the defined parameters for the training
  environment.
 The actual values of these parameters come to use again in the dynamic
  generation of multiple-choice or free-text answer tests for a web-based
  e-assessment environment.
COMPUTATIONAL INTELLIGENCE IN
           CYBER SECURITY
                  38
 Fuzzy Logic


 Evolutionary Computation,


 Intelligent Agent Systems


 Neural Networks


 Artificial Immune Systems and other similar computational
 models.

 A Survey of Security Challenges in Cognitive Radio
 Networks: Solutions and Future Research Directions
39

 Security evaluation of data exchange path in
 infrastructure networks ( This method is based on
 Floyd-Warshall    shortest  path   algorithm   in
 MATLAB)

 Improving Network Infrastructure Security
 using Geospatial Technology.


 A survey of information-centric networking


 Aviation communication infrastructure security
Aircraft systems cyber security
                            40


Aircraft manufacturers, avionics / electronics vendors,
 and owners / operators are implementing technologies
 (e.g. packet switching devices, wireless interfaces) that
 are easier to implement, reduce cost /size /weight
 /power, and increase connectivity but could potentially
 introduce cyber security vulnerabilities that affect
 aircraft safety.
LIFECYCLE INFRASTRUCTURE
    SECURITY SERVICES
           41
Conclusions/Recommendations
                         42

 Efforts to promote cyber security in Academics
  as a Capacity Building
 Support International Cooperation cyber security
        community
 Cyber Security forums announced in December
  2011 that that  "there’s no such thing as ‘secure’
  any more...”
       Cyber security community has settled on
  Continuous Monitoring (CM)
 NEED FOR AN    INTERNATIONAL     CONVENTION   ON
 CYBERSPACE
                         43

 THE FUTURE OF CYBER SECURITY IS IN THE HANDS OF
 CORPORATE BOARDS

 WHY CURRENT SECURITY PARADIGMS ARE LIKELY TO
 FAIL - THE FUTURE OF CYBER SECURITY

 * SECURITY DATA VISUALIZATION


 * ONLINE PRIVACY


 * SECURE AND USABLE INTERFACE DESIGN


 * CYBER WARFARE
44

Promoting a comprehensive national program
 Fostering adequate training and education programs to
support the Nation’s information security needs (Ex School,
college and post graduate programs on IT security)

 Increase in the efficiency of existing information security
training programs and devise domain specific training
programs (ex: Law Enforcement, Judiciary, E-Governance etc)

 Promoting private-sector support for well-coordinated,
widely      recognized professional information security
certifications
SURVEY ON DEMAND AND SUPPLY CHAIN
                             45



• Chief information security officer (CISO)
• System operations and maintenance personnel
• Network security specialists
• Digital forensics and incident response analysis
• Implementation of information security and auditing
• Vulnerability analyst
• Information security systems and software development
• Acquisition of technology
• Techno-legal
• Law enforcement
The Thrust areas of R&D include:
• Cryptography and cryptanalysis research and related
                                  46
aspects
• Network Security – including wireless & Radio (WiFi. WiMax,
3G, GPRS)
• System Security including Biometrics
• Security architecture
• Monitoring and Surveillance
• Vulnerability Remediation & Assurance
• Cyber Forensics
• Malware Analysis Tools
• Scalable trust worth systems and networks
• Identity Management
 Situational understanding and Attack attribution
• Survivability of critical systems and networks.
E-GOV
  47
“Management Invests in the IT Infrastructure system; But
    IT Leadership work on development of Secure
      Technology of IT Infrastructure system .”

                          48



  ANY QUESTIONS PLEASE ?
The Infrastructure Security develops and applies
technologies and analytical approaches to secure the
nation’s infrastructure against natural or malicious
disruption and we seek our vision towards
independent and secure future of our Country.
                          49



               THANK YOU!!!



                CONTACT US
                 skhnda@rediffmail.com
                 Mobile No: 9765069841

More Related Content

PDF
The What, Why, and How of DevSecOps
Cprime
 
PDF
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
PPTX
Quality Attributes In Software Architecture & Design Patterns
Gatte Ravindranath
 
PDF
DevSecOps Implementation Journey
DevOps Indonesia
 
PPT
Software architecture design ppt
farazimlak
 
PPTX
MITRE ATT&CK framework
Bhushan Gurav
 
PPTX
Software Evolution
Muhammad Asim
 
PPTX
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 
The What, Why, and How of DevSecOps
Cprime
 
Security in the Software Development Life Cycle (SDLC)
Frances Coronel
 
Quality Attributes In Software Architecture & Design Patterns
Gatte Ravindranath
 
DevSecOps Implementation Journey
DevOps Indonesia
 
Software architecture design ppt
farazimlak
 
MITRE ATT&CK framework
Bhushan Gurav
 
Software Evolution
Muhammad Asim
 
DevSecOps Beginners Guide : How to secure process in DevOps with OpenSource
DevOps Indonesia
 

What's hot (20)

PDF
Vulnerability and Patch Management
n|u - The Open Security Community
 
PDF
Threat Modeling for IoT Systems
Denim Group
 
PPT
Architecture design in software engineering
Preeti Mishra
 
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
PDF
Agile software development
Rajesh Piryani
 
PPTX
DevOps.pptx
EswarVineet
 
PPTX
software maintenance
rajshreemuthiah
 
PPTX
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
PPTX
Software Development Process
Amira Elsayed Ismail
 
PPT
System Administration: Introduction to system administration
Khang-Ling Loh
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PDF
Cloud Computing Architecture
Animesh Chaturvedi
 
PPT
JINI Technology
Rachna Singh
 
PPTX
Comparison of windows linux and mac os
Ali Zar
 
PPTX
Software testing
Kunal Prajapati
 
PPT
Lecture 6 agile software development
IIUI
 
PPTX
DevSecOps
Cheah Eng Soon
 
PPT
Quality Attributes Workshop
CS, NcState
 
Vulnerability and Patch Management
n|u - The Open Security Community
 
Threat Modeling for IoT Systems
Denim Group
 
Architecture design in software engineering
Preeti Mishra
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
Agile software development
Rajesh Piryani
 
DevOps.pptx
EswarVineet
 
software maintenance
rajshreemuthiah
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Katie Nickels
 
Software Development Process
Amira Elsayed Ismail
 
System Administration: Introduction to system administration
Khang-Ling Loh
 
Cloud security ppt
Venkatesh Chary
 
Cloud Computing Architecture
Animesh Chaturvedi
 
JINI Technology
Rachna Singh
 
Comparison of windows linux and mac os
Ali Zar
 
Software testing
Kunal Prajapati
 
Lecture 6 agile software development
IIUI
 
DevSecOps
Cheah Eng Soon
 
Quality Attributes Workshop
CS, NcState
 
Ad

Viewers also liked (18)

PPTX
Infrastructure security
Adhar kashyap
 
PPTX
Cloud security From Infrastructure to People-ware
Tzar Umang
 
PDF
VMware vCloud Air: Security Infrastructure and Process Overview
VMware
 
PPTX
The Importance of Consolidating Your Infrastructure Security – by United Secu...
United Security Providers AG
 
PDF
Diadelemprendedor10
DesignThinkers Group Spain
 
PPTX
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
APNIC
 
PDF
Cloud computing security infrastructure
Intel IT Center
 
PDF
IPv4 Transfers, Taiwan Internet Forum
APNIC
 
PPT
AWS & Infrastructure Hardening - Cloud Infrastructure Security
Nutanix Beam
 
PDF
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Personal Interactor
 
PDF
Cloud Security Secure Your Infrastructure
xband
 
PDF
Defeating The Network Security Infrastructure V1.0
Philippe Bogaerts
 
PPTX
Panduit Enteprise Network Infrastructure Security Solution
Panduit
 
PPTX
Critical Infrastructure and Security
Can Demirel
 
PDF
Automated Infrastructure Security: Monitoring using FOSS
Sonatype
 
PDF
Tech in asia culture code v3
Tech in Asia
 
PPTX
Smart Security Infrastructure
GAURAV. H .TANDON
 
PPT
Network Security Threats and Solutions
Colin058
 
Infrastructure security
Adhar kashyap
 
Cloud security From Infrastructure to People-ware
Tzar Umang
 
VMware vCloud Air: Security Infrastructure and Process Overview
VMware
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
United Security Providers AG
 
Diadelemprendedor10
DesignThinkers Group Spain
 
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
APNIC
 
Cloud computing security infrastructure
Intel IT Center
 
IPv4 Transfers, Taiwan Internet Forum
APNIC
 
AWS & Infrastructure Hardening - Cloud Infrastructure Security
Nutanix Beam
 
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Personal Interactor
 
Cloud Security Secure Your Infrastructure
xband
 
Defeating The Network Security Infrastructure V1.0
Philippe Bogaerts
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit
 
Critical Infrastructure and Security
Can Demirel
 
Automated Infrastructure Security: Monitoring using FOSS
Sonatype
 
Tech in asia culture code v3
Tech in Asia
 
Smart Security Infrastructure
GAURAV. H .TANDON
 
Network Security Threats and Solutions
Colin058
 
Ad

Similar to Infrastructure Security by Sivamurthy Hiremath (20)

PPTX
CSO CXO Series Breakfast
CSO_Presentations
 
PDF
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
PDF
8 Top Cybersecurity Tools.pdf
Metaorange
 
PDF
Marlabs cyber threat management
Rajendra Menon
 
PPT
Cognitive security
Iqra khalil
 
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
PPTX
8 Top Cybersecurity Tools.pptx
Metaorange
 
PDF
Advanced IT and Cyber Security for Your Business
Infopulse
 
PPTX
Cyber risks in supply chains
Aparajita Banerjee
 
PPTX
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
PPTX
SAM05_Barber PW (7-9-15)
Norm Barber
 
PPTX
Managed security services
manoharparakh
 
PPT
Cy Cops Company Presentation
ChaitanyaS
 
PDF
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
PDF
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
PDF
CyberX - Redefining Digital Protection in the Emirates
tekmuzammil
 
PPTX
Zero Trust: Redefining Security in the Digital Age
Arnold Antoo
 
PPTX
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
CompanySeceon
 
PPTX
Tyler Technology Expo
Tony DeGonia (LION)
 
PDF
Deep Dive into Operational Technology Security - USCSI®.pdf
United States Cybersecurity Institute (USCSI®)
 
CSO CXO Series Breakfast
CSO_Presentations
 
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
8 Top Cybersecurity Tools.pdf
Metaorange
 
Marlabs cyber threat management
Rajendra Menon
 
Cognitive security
Iqra khalil
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
8 Top Cybersecurity Tools.pptx
Metaorange
 
Advanced IT and Cyber Security for Your Business
Infopulse
 
Cyber risks in supply chains
Aparajita Banerjee
 
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
SAM05_Barber PW (7-9-15)
Norm Barber
 
Managed security services
manoharparakh
 
Cy Cops Company Presentation
ChaitanyaS
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
CyberX - Redefining Digital Protection in the Emirates
tekmuzammil
 
Zero Trust: Redefining Security in the Digital Age
Arnold Antoo
 
Seceon-Case-Study-Smart-Government-Cybersecurity (1).pptx
CompanySeceon
 
Tyler Technology Expo
Tony DeGonia (LION)
 
Deep Dive into Operational Technology Security - USCSI®.pdf
United States Cybersecurity Institute (USCSI®)
 

More from ClubHack (20)

PDF
India legal 31 october 2014
ClubHack
 
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
ClubHack
 
PPT
Cyber Insurance
ClubHack
 
PPTX
Summarising Snowden and Snowden as internal threat
ClubHack
 
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
ClubHack
 
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
ClubHack
 
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
ClubHack
 
PPTX
Smart Grid Security by Falgun Rathod
ClubHack
 
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
ClubHack
 
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
ClubHack
 
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
ClubHack
 
PPTX
Critical Infrastructure Security by Subodh Belgi
ClubHack
 
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
ClubHack
 
PDF
XSS Shell by Vandan Joshi
ClubHack
 
PDF
Clubhack Magazine Issue February 2012
ClubHack
 
PDF
ClubHack Magazine issue 26 March 2012
ClubHack
 
PDF
ClubHack Magazine issue April 2012
ClubHack
 
PDF
ClubHack Magazine Issue May 2012
ClubHack
 
PDF
ClubHack Magazine – December 2011
ClubHack
 
PDF
One link Facebook (Anand Pandey)
ClubHack
 
India legal 31 october 2014
ClubHack
 
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
ClubHack
 
Cyber Insurance
ClubHack
 
Summarising Snowden and Snowden as internal threat
ClubHack
 
Fatcat Automatic Web SQL Injector by Sandeep Kamble
ClubHack
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
ClubHack
 
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
ClubHack
 
Smart Grid Security by Falgun Rathod
ClubHack
 
Legal Nuances to the Cloud by Ritambhara Agrawal
ClubHack
 
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
ClubHack
 
Hacking and Securing iOS Applications by Satish Bomisstty
ClubHack
 
Critical Infrastructure Security by Subodh Belgi
ClubHack
 
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
ClubHack
 
XSS Shell by Vandan Joshi
ClubHack
 
Clubhack Magazine Issue February 2012
ClubHack
 
ClubHack Magazine issue 26 March 2012
ClubHack
 
ClubHack Magazine issue April 2012
ClubHack
 
ClubHack Magazine Issue May 2012
ClubHack
 
ClubHack Magazine – December 2011
ClubHack
 
One link Facebook (Anand Pandey)
ClubHack
 

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Software Development Methodologies in 2025
KodekX
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Doc9.....................................
SofiaCollazos
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 

Infrastructure Security by Sivamurthy Hiremath

  • 1. CYBER SECURITY 2012 1 Need for New Approaches to Infrastructure Security By S K HIREMATH ME MAeSI MIETE Assistant Professor [email protected]
  • 2. International Cyber Crime Top 10 Perpetrators) 2
  • 3. Top Ten Countries (Cyber Crime Perpetrators) 3  1. UNITED STATES 66.1%  2. UNITED KINGDOM 10.5%  3. NIGERIA 7.5%  4. CANADA 3.1%  5. CHINA 1.6%  6. SOUTH AFRICA 0.7%  7. GHANA 0.6%  8. SPAIN 0.6%  9. ITALY 0.5%  10. ROMANIA 0.5%
  • 4. STAKEHOLDER AGENCIES  1 National Information Board (NIB) 4  2 National Crisis Management Committee (NCMC)  3 National Security Council Secretariat (NSCS)  4 Ministry of Home affairs  5 Ministry of Defence  6 Department of Information Technology (DIT)  7 Department of Telecommunications (DoT)  8 National Cyber Response Centre - Indian Computer Emergency Response Team (CERT-In)  9 National Information Infrastructure Protection Centre (NIIPC) 10 National Disaster Management of Authority (NDMA)  11 Standardisation, Testing and Quality Certification (STQC) Directorate  12 Sectoral CERTs
  • 5. NEED FOR NEW APPROACHES TO INFRASTRUCTURE SECURITY 5 Global infrastructures Security have become more complex and interconnected, their operation and control has become more complicated.  Area works with several government agencies in the area of cyber security to ensure the integrity and availability of the nation’s cyber infrastructure. The performance of the nation’s infrastructure is an essential component of the nation’s economic prosperity. The Infrastructure Security Area seeks to endow the infrastructure with five characteristics: security, reliability, safety, sustainability, and cost effectiveness.
  • 6. ARCHITECTRUAL DESIGN OF INFRASTRUCTURAL SECURITY 6  Critical Infrastructure Security Systems Video Content Analysis System Thermal Monitoring Systems Access Security Systems Face Recognition System Urban Security Systems Military And Border Security Systems Traffic Control Systems Central Integration Management Systems Building Management Systems
  • 8. INFRASTRUCTURE SECURITY IDENTIFYING AND SECURING VULNERABILITIES 8  Enterprise Application Security  Identity and Access Management  Infrastructure Security  Security Strategy and Risk Management  Business Continuity and Disaster Recovery Planning  Data Protection & Privacy Planning
  • 9. 9 Security Architecture Security Planning Secure Compliance Roadmaps Network Vulnerability Assessment
  • 10. 10
  • 11. The Four Phases of Infrastructure Security Engagement 11 Assessment •Business requirements •On-site health assessment of Infrastructure & Processes •Estimate •Conduct Business Interviews •Reporting Requirements •Establish service dependencies Transition Steady State •Establish connectivity •Ongoing Infrastructure Guardian Services •Roles & responsibilities, processes & •Monthly Reporting (Alerts, distributions, procedures assets, health) •Phased onboarding approach •SME Advisory Service •Monitoring/Reporting commences
  • 12. CORPORATES BOARD 12 • Compliance to international security best practices and demonstration • Pro-active actions to deal with and contain malicious activities, and protecting average end users by say of net traffic monitoring, routing and gateway controls • Keeping pace with changes in security technology and processes to remain current (configuration, patch and vulnerability management)
  • 13. 13 Adequate security of information, resources, and systems that process within a company or organization is a fundamental management responsibility. Management of an organization/agency must understand the current level of security within their infrastructure, and the risks that the organization may be exposed to in today's fully internet-worked environment. The best way to mitigate this risk is to perform a security assessment & associated risk assessment at least once every year.  This will allow company management to address new trends in security vulnerability and penetration, and make informed judgments and investments that will appropriately mitigate these risks to an acceptable level.
  • 14. 14  Conform to legal obligations and cooperate with law enforcement activities including prompt actions on alert/advisories issued by CERT-In • Use of secure product and services and skilled manpower • Crisis management and emergency response. • Periodic training and up gradation of skills for personnel engaged in security related activities • Promote acceptable users’ behaviour in the interest of safe computing both within and outside
  • 15. National Cyber Security Policy 15 “For secure computing environment and adequate trust & confidence in electronic transactions ”
  • 16. INFRASRUCTURE CYBER SECURITY 16 Cyber Security consists of sets of techniques, policies, and activities intended to enhance trust and mitigate vulnerabilities inherent in the complex networked devices and services that permeate our lives today
  • 17. 17 “A general rule for cyber security is that it should be implemented ‘top- down’ through direction as well as ‘bottom up’ through technology “
  • 18. MODEL FOR DESCRIBING INFRSTRUCTURE CYBER SECURITY 18
  • 19. SECURITY AND SAFETY ARCHITECTURE 19 Sensors and Detectors ( Microwave Systems , Infrared Sensors, Car X-rays, Under Car Inspection Systems, Fence Mounted Sensors ) Physical Equipments (Mushroom Barriers, Road Blockers, Arm Barriers, Turnstile) Access Controls (Face Recognition Systems, Card Readers , Finger Print Readers, other Biometric Access Controls) Video Detection Systems (CCTV, VCA applications, Thermal Camera, Plate Recognition) Data Communication Systems Management Systems (Fire Detection, Call Management, Alarm Management)
  • 20.  INFRASTRUCTURE SECURITY 20 Network Infrastructure includes networks, network devices, servers, workstations, and other devices. The software running on these devices are also the part of Network Infrastructure. To make sure your network is secure, you should make sure every time a configuration is changed or new device is added, you are not creating a hole in your security. A normal network comprise of routers, firewalls, switches, servers and workstations. A typical layout of network infrastructure devices is shown
  • 21. Master the tools & techniques for effective information & network security. 21 Discover how to create a complete & sustainable IT security architecture. Gain knowledge on how to develop sound security policy together with your security architecture.  IT governance assessment using CoBIT 4.0( Control Objectives for Information and Related Technology ) Smart security risk assessment within your organization. Gain valuable insights on implementing a proactive & robust security management system. Detect & prevent information security breaches due to inadequate IT security awareness within the organization.
  • 22. INFRASTRUCTURE SECURITY Network Level Host Level Application Level 22
  • 23. 23 Application Security: Managing business and information risk through solutions for packaged SAP and Oracle ERP, and custom application security.  Infrastructure Security: Providing visibility of information risks and defending enterprise assets through platform security technologies.  Information Risk, Privacy & Strategy: Managing information risk through security strategy, governance, risk and compliance management.  Security Outsourcing & Operations: Enabling application, infrastructure and business risk management through flexible managed services options.
  • 24. ARCHITECTURE DESIGN OF 24 INFRASTRUCTURE SECURITY
  • 25. Evolution of Architectures 25 Virtualizatio Virtualization Individual Data n (1 app / Cloud Servers Centers (N apps / server) server) 10 to Utilization 10 to 20 % 15 to 25% 40 to 45 % 60 + % 20 % Security Highest High Lowest
  • 26. Infrastructure Security covering Data, Identity, Cloud, Threat, Network, Mobile, End User Computing, Virtualization and Cyber Security 26
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. CASE STUDY: AMAZON'S EC2 INFRASTRUCTURE  Exploring Information Leakage in Third-Party Compute Clouds”  Multiple VMs of different organizations with virtual boundaries separating each VM can run within one physical server  "virtual machines" still have internet protocol, or IP, addresses, visible to anyone within the cloud.  VMs located on the same physical server tend to have IP addresses that are close to each other and are assigned at the same time  An attacker can set up lots of his own virtual machines, look at their IP addresses, and figure out which one shares the same physical resources as an intended target  Once the malicious virtual machine is placed on the same server as its target, it is possible to carefully monitor how access to resources fluctuates and thereby potentially glean sensitive information about the victim 34
  • 35. Towards cyber operations - The new role of academic cyber security research and education 35  The cohesive cyber defense requires universities to optimize their campus wide resources to fuse knowledge, intellectual capacity, and practical skills in an unprecedented way in cyber security.  The future will require cyber defense research teams to address not only computer science, electrical engineering, software and hardware security, but also political theory, institutional theory, behavioral science, deterrence theory, ethics, international law, international relations, and additional social sciences.  Academic research centers, evaluating the collective group of research centers' ability to adapt to the shift towards cyber operations, and the challenges therein.
  • 36. Towards cyber operations - The new role of academic cyber security research and education 36  The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education.  Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing.  Cyber security research and education is connected to the security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates.  The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately are launched, in the pursuit of a cohesive and decisive execution of the national cyber defense strategy.
  • 37. ONLINE ASSESSMENT FOR HANDS-ON CYBER SECURITY TRAINING IN A VIRTUAL LAB 37  Online (self) assessment is an important functionality e-learning courseware, especially if the system is intended for use in distant learning courses.  Precisely for hands-on exercises, the implementation of effective and cheating-proof assessment tests poses a great challenge.  That is because of the static characteristics of exercise scenarios in the laboratories: adopting the environment for the provision of a “unique” hands-on experience for every student in a manual manner is connected with enormous maintenance efforts and thus not scalable to a large number of students.  This work presents a software solution for the assessment of practical exercises in an online lab based on virtual machine technology.  The basic idea is to formally parameterize the exercise scenarios and implement a toolkit for the dynamic reconfiguration of virtual machines in order to adopt the defined parameters for the training environment.  The actual values of these parameters come to use again in the dynamic generation of multiple-choice or free-text answer tests for a web-based e-assessment environment.
  • 38. COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY 38  Fuzzy Logic  Evolutionary Computation,  Intelligent Agent Systems  Neural Networks  Artificial Immune Systems and other similar computational models.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
  • 39. 39  Security evaluation of data exchange path in infrastructure networks ( This method is based on Floyd-Warshall shortest path algorithm in MATLAB) Improving Network Infrastructure Security using Geospatial Technology.  A survey of information-centric networking  Aviation communication infrastructure security
  • 40. Aircraft systems cyber security 40 Aircraft manufacturers, avionics / electronics vendors, and owners / operators are implementing technologies (e.g. packet switching devices, wireless interfaces) that are easier to implement, reduce cost /size /weight /power, and increase connectivity but could potentially introduce cyber security vulnerabilities that affect aircraft safety.
  • 41. LIFECYCLE INFRASTRUCTURE SECURITY SERVICES 41
  • 42. Conclusions/Recommendations 42  Efforts to promote cyber security in Academics as a Capacity Building  Support International Cooperation cyber security community  Cyber Security forums announced in December 2011 that that "there’s no such thing as ‘secure’ any more...”  Cyber security community has settled on Continuous Monitoring (CM)
  • 43.  NEED FOR AN INTERNATIONAL CONVENTION ON CYBERSPACE 43  THE FUTURE OF CYBER SECURITY IS IN THE HANDS OF CORPORATE BOARDS  WHY CURRENT SECURITY PARADIGMS ARE LIKELY TO FAIL - THE FUTURE OF CYBER SECURITY  * SECURITY DATA VISUALIZATION  * ONLINE PRIVACY  * SECURE AND USABLE INTERFACE DESIGN  * CYBER WARFARE
  • 44. 44 Promoting a comprehensive national program  Fostering adequate training and education programs to support the Nation’s information security needs (Ex School, college and post graduate programs on IT security)  Increase in the efficiency of existing information security training programs and devise domain specific training programs (ex: Law Enforcement, Judiciary, E-Governance etc)  Promoting private-sector support for well-coordinated, widely recognized professional information security certifications
  • 45. SURVEY ON DEMAND AND SUPPLY CHAIN 45 • Chief information security officer (CISO) • System operations and maintenance personnel • Network security specialists • Digital forensics and incident response analysis • Implementation of information security and auditing • Vulnerability analyst • Information security systems and software development • Acquisition of technology • Techno-legal • Law enforcement
  • 46. The Thrust areas of R&D include: • Cryptography and cryptanalysis research and related 46 aspects • Network Security – including wireless & Radio (WiFi. WiMax, 3G, GPRS) • System Security including Biometrics • Security architecture • Monitoring and Surveillance • Vulnerability Remediation & Assurance • Cyber Forensics • Malware Analysis Tools • Scalable trust worth systems and networks • Identity Management  Situational understanding and Attack attribution • Survivability of critical systems and networks.
  • 48. “Management Invests in the IT Infrastructure system; But IT Leadership work on development of Secure Technology of IT Infrastructure system .” 48 ANY QUESTIONS PLEASE ?
  • 49. The Infrastructure Security develops and applies technologies and analytical approaches to secure the nation’s infrastructure against natural or malicious disruption and we seek our vision towards independent and secure future of our Country. 49 THANK YOU!!! CONTACT US [email protected] Mobile No: 9765069841