Cyber Security Primer

Cyber Security Primer
What you need to know and what we can do
IBMS Facility Managers Sundowner Series
4 May 2017
Outcomes
1.
Appreciation of the risks
2.
Awareness of mitigations and solutions
3.
Suggestions on good personal security habits
©IBMS Pty Ltd
2
What is Cyber Security
• Anything you do to protect
your networks, computers,
software and data from
attack, damage or authorized
access
• Distinct from Physical Security
• Includes aspects of:
• Policies
• Processes
• Technology
©IBMS Pty Ltd
3
What does it do?
• Protects confidential
information
• Prevents malicious
damage
• Keeps systems running
efficiently
• Helps to recover from
disasters
©IBMS Pty Ltd
4
Why do we need it?
“It has cost about A$10,000 in terms of the hours
devoted to the rebuild – but it’s hard to quantify
the cost of the dent to its reputation.”
The true cost of a cyber security breach in Australia,
October 2015
©IBMS Pty Ltd
5
Why do we need it?
©IBMS Pty Ltd
6
Why do we need it?
©IBMS Pty Ltd
7
Could this happen to me?
• Buildings more commonly include Internet connected systems
• Service contractors are not (necessarily) IT experts
• Policies are often lax or missing. Symptoms of this include:
•
•
•
•
•
•
Undocumented internet connections (e.g. ADSL and 4G modems)
Weak or default passwords on critical system
Users granted more rights than required
Out of date or absent anti-malware software
Lack of software and firmware patching
Insecure Wi-Fi connected to critical system networks
©IBMS Pty Ltd
8
But why would anyone care about my
computer?
They might want your resources
Bandwidth
Processing power
Or it might be a stepping stone
Storage
Or they might want your money
Or they don’t care
©IBMS Pty Ltd
9
The Internet of Things (IoT)
• Millions of new,
automated devices
connected to the Internet
• Connected to everyday
objects
• Powerful new possibilities
• IELVS is an example of a
system using IoT devices
©IBMS Pty Ltd
10
IoT: But …..
• Same bugs, same
passwords
• Search tools like
Shodan exist
• One breach means all
breached
• IoT devices can then
be used as Botnets
©IBMS Pty Ltd
11
What’s a Botnet?
• A group of Internet connected
devices that are infected with
Malware and controlled by a
remote server
• Individual components are
small but the Botnet is
powerful
• Example: Mirai botnet with
over 100,000 IoT devices
©IBMS Pty Ltd
12
Shodan
©IBMS Pty Ltd
13
A brief history of cyber threats
©IBMS Pty Ltd
14
Malware
• Any software that has
a detrimental effect
to a computer system
• Very common and
effective
• Ranges from annoying
to very serious
©IBMS Pty Ltd
15
Malware examples
Think before using
• USB sticks
• External computers
• Email attachments
©IBMS Pty Ltd
16
Exploits
• All software has bugs including firewalls and
operating systems
• These do get fixed and deployed as a patch
• Attackers use knowledge of patches to ‘exploit’ a
system’s bugs
• Bug with no patch = “Zero Day Exploit”
©IBMS Pty Ltd
17
Exploit examples
Keep up to date
• OS
• Browsers
• Routers, firewalls, everything!
©IBMS Pty Ltd
18
Distributed Denial of Service Attack
(DDoS)
• A targeted attack
designed to
overwhelm an IT
system’s ability to
process legitimate
requests
• Uses large numbers of
“zombie” computers
• Denies real users
access
©IBMS Pty Ltd
19
DDoS examples
• Very hard to defend against due to
scale
• Unlikely to be effective against building
systems
• Talk to your IT staff and ISP if
concerned
©IBMS Pty Ltd
20
Social Engineering Tactics
• Attacks aimed at people
not machines
• Targets people who
have legitimate access
to systems or data
• “Phishing” emails
• Targeted or “Spear
Phishing” attacks
• Potentially very
effective but risky
©IBMS Pty Ltd
21
Phishing examples
Best defended against by;
• Policy
• Training
©IBMS Pty Ltd
22
Brute Force / Cracking
• At its simplest, its just
guessing every possible
password
• Sophisticated attempts
use dictionaries and lists
of known common
passwords
©IBMS Pty Ltd
23
Brute Force / Cracking
• How long to break a password?
password
Simple Brute Force
3.5 minutes
P@ssword
70 days
P@55W0rD11
1,707 years
m9!mzdS7z@llGHCt
1 quadrillion years
©IBMS Pty Ltd
Sophisticated Cracking
24
Quadrillion?
• A quadrillion is 10 to the power of 15
©IBMS Pty Ltd
25
Brute Force / Cracking
• How long to break a password?
•
The best defence
is aForce
long,Sophisticated
complex,
Simple Brute
Cracking
3.5 minutes
password
Less than a second
truly random,
unique passwords
P@ssword
70 days
26 minutes
• Use of an online
password26 minutes
1,707 years
P@55W0rD11
management
tool years
is highly1 quadrillion years
1 quadrillion
m9!mzdS7z@llGHCt
recommended
©IBMS Pty Ltd
26
Two-Factor Authentication
• Combines a password with a
token sent by a different
channel
• Has pros and cons
• No doubt it improves
security
© IBMS Pty Ltd
27
Case Study – Google Sydney
• In 2013 security researchers from Cylance
gained access to the building management
system at Google offices in Sydney
• Able to view blueprints, floor and roof plans
• Even managed to locate a water leak in the
kitchen
• Access was gained via unpatched version of
Tridium Niagara AX
• The system was found using the Shodan search
tool
• The system was setup by a third party contractor
• The system was disconnected from the internet
©IBMS Pty Ltd
28
Case Study – Target USA
• In 2013 attackers broke into Target -systems
installed custom built Malware onto every cash
register in every store
• 40 million debit and credit card accounts and 70
million sets of shopper personal data were
exposed
• An HVAC subcontractor was targeted with
malware delivered by email and their passwords
were stolen
• The subcontractor had remote access to the
Target systems
• There was no proper separation between
networks
©IBMS Pty Ltd
29
Case Study – Target USA
• Target had a password policy but it
wasn’t being followed
• For example, lists of usernames
and passwords, weak passwords,
default passwords
©IBMS Pty Ltd
30
What should I be doing?
Create and
Enforce ICT
Security Policy
Clearly Identify
Accountability
Audit and
Secure
Network
Create
Network Map
Verify
Authentication
Management
©IBMS Pty Ltd
31
Some good personal practices
•
•
•
•
•
Take this stuff seriously
Follow security policy including password rules
Use an online password management tool
Don’t give out passwords over the phone or email
Don’t trust hardware that isn’t yours (USB sticks, public
computers, etc)
• Report suspicious activity including emails, phone calls
and behaviour
• Don’t download weird crap off the Internet
31/07/2017
32
Activity : Spot the Risks
©IBMS Pty Ltd
33
© IBMS Pty Ltd
34