Download - Michigan Cyber Range

Transcript
Page 1: Michigan Cyber Range

Powered byPowered by Connecting Organizations, Building Community

Michigan Cyber Michigan Cyber RangeRange

Michigan Cyber Michigan Cyber RangeRange

Page 2: Michigan Cyber Range

Powered by

IntroductionIntroduction

2

Page 3: Michigan Cyber Range

Powered by

IntroductionIntroduction

Dr. Joe Adams Vice President of Research and

Cyber Security 26 years Army Signal Corps Associate Professor at US Military

Academy 3 time winner of the NSA’s Inter-

Service Academy CDX Senior Member IEEE

3

Page 4: Michigan Cyber Range

Powered by

AgendaAgenda

Who am I? Where is the Threat? How am I at risk? How to prepare?

4

Page 5: Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

5

Page 6: Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

6

Page 7: Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

7

Page 8: Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

8

Page 9: Michigan Cyber Range

Powered by

Attack SurfaceAttack Surface

9

Page 10: Michigan Cyber Range

Powered by

Why is this so hard?Why is this so hard?

10

Page 11: Michigan Cyber Range

Powered by

PlansPlans

11

Page 12: Michigan Cyber Range

Powered by

The Price of Doing BusinessThe Price of Doing Business

12

Page 13: Michigan Cyber Range

Powered by13

Page 14: Michigan Cyber Range

Powered by

Security TheaterSecurity Theater

14

Page 15: Michigan Cyber Range

Powered by

An Example of WhyAn Example of Why

15

Page 16: Michigan Cyber Range

Powered by

What can we do?What can we do?

16

Page 17: Michigan Cyber Range

Powered by

What has to be protected?What has to be protected?

17

Page 18: Michigan Cyber Range

Powered by

What can we monitor?What can we monitor?

18

Page 19: Michigan Cyber Range

Powered by

What is on its own?What is on its own?

19

Page 20: Michigan Cyber Range

Powered by

Make a planMake a plan

20

Page 21: Michigan Cyber Range

Powered by

PolicyPolicy

21

Page 22: Michigan Cyber Range

Powered by

Education and AwarenessEducation and Awareness

22

Page 23: Michigan Cyber Range

Powered by

The ResultThe Result

23

Page 24: Michigan Cyber Range

Powered by

But then…But then…

24

Page 25: Michigan Cyber Range

Powered by

Practice the planPractice the plan

25

Page 26: Michigan Cyber Range

Powered by

CommunicationCommunication

26

Page 27: Michigan Cyber Range

Powered by

Fight complacencyFight complacency

27

Page 28: Michigan Cyber Range

Powered by

Internal AuditsInternal Audits

28

Page 29: Michigan Cyber Range

Powered by

Build HabitsBuild Habits

29

Page 30: Michigan Cyber Range

Powered by

It only takes onceIt only takes once

30

Page 31: Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

31

Page 32: Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

32

Page 33: Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

33

Page 34: Michigan Cyber Range

Powered by

What we’ve talked aboutWhat we’ve talked about

34

Page 35: Michigan Cyber Range

Powered by

Skills training & maintenance

Classes Events Networking

Accessible

Persistent

Using the Cyber RangeUsing the Cyber Range

Page 36: Michigan Cyber Range

Powered by

ClassesClasses

17 Certifications Pen Testing, Incident Handling, Ethical Hacking Forensics Leadership Disaster Recovery

Classes held: At Merit or at the customer’s location Online

Cost includes: Tuition Certification Exam

http://www.merit.edu/cyberrange/courses.php

Page 37: Michigan Cyber Range

Powered by

Capture the FlagCapture the Flag

Self-Paced Threads of flags to find

Individual skills Penetration testing Forensics SCADA

Scoring engine Encourages competition

Page 38: Michigan Cyber Range

Powered by

Force on ForceForce on Force

Paintball Multiple teams; everyone for themselves Penetrate system, plant a flag, secure the system

Red vs Blue Focus on system & service

security and continuity Force on Force

Incident Response Asynchronous Red team creates havoc Blue team diagnoses and

recovers

Page 39: Michigan Cyber Range

Powered by

Welcome to AlphavilleWelcome to Alphaville

Page 40: Michigan Cyber Range

Powered by

AlphavilleAlphaville

Page 41: Michigan Cyber Range

Powered by

AlphavilleAlphaville

A persistent training environment A Network of Things More realistic than an IP range

Every exercise is a separate, customizable copy of the town and its infrastructure

Heterogeneous environment Wide variety of operating systems and services Residents of Alphaville provide “background noise” Bot nets, rootkits, and backdoors

Page 42: Michigan Cyber Range

Powered by

Flexible terms & pricing Pay for what you use

Voucher/Credit system

Using the Cyber RangeUsing the Cyber Range

Page 43: Michigan Cyber Range

Powered by

Questions?Questions?

http://www.merit.edu/cyberrange/43