Cyber Security Primer What you need to know and what we can do IBMS Facility Managers Sundowner Series 4 May 2017 Outcomes 1. Appreciation of the risks 2. Awareness of mitigations and solutions 3. Suggestions on good personal security habits ©IBMS Pty Ltd 2 What is Cyber Security • Anything you do to protect your networks, computers, software and data from attack, damage or authorized access • Distinct from Physical Security • Includes aspects of: • Policies • Processes • Technology ©IBMS Pty Ltd 3 What does it do? • Protects confidential information • Prevents malicious damage • Keeps systems running efficiently • Helps to recover from disasters ©IBMS Pty Ltd 4 Why do we need it? “It has cost about A$10,000 in terms of the hours devoted to the rebuild – but it’s hard to quantify the cost of the dent to its reputation.” The true cost of a cyber security breach in Australia, October 2015 ©IBMS Pty Ltd 5 Why do we need it? ©IBMS Pty Ltd 6 Why do we need it? ©IBMS Pty Ltd 7 Could this happen to me? • Buildings more commonly include Internet connected systems • Service contractors are not (necessarily) IT experts • Policies are often lax or missing. Symptoms of this include: • • • • • • Undocumented internet connections (e.g. ADSL and 4G modems) Weak or default passwords on critical system Users granted more rights than required Out of date or absent anti-malware software Lack of software and firmware patching Insecure Wi-Fi connected to critical system networks ©IBMS Pty Ltd 8 But why would anyone care about my computer? They might want your resources Bandwidth Processing power Or it might be a stepping stone Storage Or they might want your money Or they don’t care ©IBMS Pty Ltd 9 The Internet of Things (IoT) • Millions of new, automated devices connected to the Internet • Connected to everyday objects • Powerful new possibilities • IELVS is an example of a system using IoT devices ©IBMS Pty Ltd 10 IoT: But ….. • Same bugs, same passwords • Search tools like Shodan exist • One breach means all breached • IoT devices can then be used as Botnets ©IBMS Pty Ltd 11 What’s a Botnet? • A group of Internet connected devices that are infected with Malware and controlled by a remote server • Individual components are small but the Botnet is powerful • Example: Mirai botnet with over 100,000 IoT devices ©IBMS Pty Ltd 12 Shodan ©IBMS Pty Ltd 13 A brief history of cyber threats ©IBMS Pty Ltd 14 Malware • Any software that has a detrimental effect to a computer system • Very common and effective • Ranges from annoying to very serious ©IBMS Pty Ltd 15 Malware examples Think before using • USB sticks • External computers • Email attachments ©IBMS Pty Ltd 16 Exploits • All software has bugs including firewalls and operating systems • These do get fixed and deployed as a patch • Attackers use knowledge of patches to ‘exploit’ a system’s bugs • Bug with no patch = “Zero Day Exploit” ©IBMS Pty Ltd 17 Exploit examples Keep up to date • OS • Browsers • Routers, firewalls, everything! ©IBMS Pty Ltd 18 Distributed Denial of Service Attack (DDoS) • A targeted attack designed to overwhelm an IT system’s ability to process legitimate requests • Uses large numbers of “zombie” computers • Denies real users access ©IBMS Pty Ltd 19 DDoS examples • Very hard to defend against due to scale • Unlikely to be effective against building systems • Talk to your IT staff and ISP if concerned ©IBMS Pty Ltd 20 Social Engineering Tactics • Attacks aimed at people not machines • Targets people who have legitimate access to systems or data • “Phishing” emails • Targeted or “Spear Phishing” attacks • Potentially very effective but risky ©IBMS Pty Ltd 21 Phishing examples Best defended against by; • Policy • Training ©IBMS Pty Ltd 22 Brute Force / Cracking • At its simplest, its just guessing every possible password • Sophisticated attempts use dictionaries and lists of known common passwords ©IBMS Pty Ltd 23 Brute Force / Cracking • How long to break a password? password Simple Brute Force 3.5 minutes P@ssword 70 days P@55W0rD11 1,707 years m9!mzdS7z@llGHCt 1 quadrillion years ©IBMS Pty Ltd Sophisticated Cracking 24 Quadrillion? • A quadrillion is 10 to the power of 15 ©IBMS Pty Ltd 25 Brute Force / Cracking • How long to break a password? • The best defence is aForce long,Sophisticated complex, Simple Brute Cracking 3.5 minutes password Less than a second truly random, unique passwords P@ssword 70 days 26 minutes • Use of an online password26 minutes 1,707 years P@55W0rD11 management tool years is highly1 quadrillion years 1 quadrillion m9!mzdS7z@llGHCt recommended ©IBMS Pty Ltd 26 Two-Factor Authentication • Combines a password with a token sent by a different channel • Has pros and cons • No doubt it improves security © IBMS Pty Ltd 27 Case Study – Google Sydney • In 2013 security researchers from Cylance gained access to the building management system at Google offices in Sydney • Able to view blueprints, floor and roof plans • Even managed to locate a water leak in the kitchen • Access was gained via unpatched version of Tridium Niagara AX • The system was found using the Shodan search tool • The system was setup by a third party contractor • The system was disconnected from the internet ©IBMS Pty Ltd 28 Case Study – Target USA • In 2013 attackers broke into Target -systems installed custom built Malware onto every cash register in every store • 40 million debit and credit card accounts and 70 million sets of shopper personal data were exposed • An HVAC subcontractor was targeted with malware delivered by email and their passwords were stolen • The subcontractor had remote access to the Target systems • There was no proper separation between networks ©IBMS Pty Ltd 29 Case Study – Target USA • Target had a password policy but it wasn’t being followed • For example, lists of usernames and passwords, weak passwords, default passwords ©IBMS Pty Ltd 30 What should I be doing? Create and Enforce ICT Security Policy Clearly Identify Accountability Audit and Secure Network Create Network Map Verify Authentication Management ©IBMS Pty Ltd 31 Some good personal practices • • • • • Take this stuff seriously Follow security policy including password rules Use an online password management tool Don’t give out passwords over the phone or email Don’t trust hardware that isn’t yours (USB sticks, public computers, etc) • Report suspicious activity including emails, phone calls and behaviour • Don’t download weird crap off the Internet 31/07/2017 32 Activity : Spot the Risks ©IBMS Pty Ltd 33 © IBMS Pty Ltd 34
© Copyright 2026 Paperzz