Abstract Incident response is a key component in safeguarding the integrity and security of the nation’s critical infrastructures. Critical infrastructures are crucial components in maintaining the prosperity and security that this nation provides its citizens. The growing reliance on technology, in conjunction with the increasing interdependency of each infrastructure on one another, requires the ability to prevent, protect against, respond to, recover from, and mitigate the effects of various types of incidents. Any disruption to one or more of these critical infrastructures can have a devastating effect on the security and economic stability of this nation. Current incident response plans have been put to the test by various naturally occurring events that have underlined both the strengths and the weaknesses of existing response frameworks. The research findings indicate that some of the same vulnerabilities may exist in newly developed response frameworks targeting cyber incidents. Evidence also indicates that these infrastructures will face a new vulnerability. The increase reliance on technology has now unlocked new weaknesses, primarily the vulnerability to a cyber-attack. Continued evaluation and training of key entities and personnel in cyber response tactics is a necessary step to ensuring the effectiveness of these response frameworks. The research findings suggest that a more proactive approach to cyber incident response is required to sustain an effective response capability equivalent to the rapid innovations in technology. Partnerships among all entities involved in a response need to be strengthened and continually amended to ensure the preparedness of all response personnel in protecting the security of this nation’s critical infrastructures. CRITICAL INCIDENT COMMAND AND RESPONSE: AN EXAMINATION OF CURRENT POLICIES, PROCEDURES AND THE NECESSITY FOR A NATIONAL CYBER EVENT RESPONSE PLAN By Andrew C. Hotton A Capstone Project Submitted to the Faculty of Utica College April 16, 2012 In Partial Fulfillment of the Requirements for the Degree Master of Science in Cybersecurity – Intelligence and Forensics Copyright by Andrew C. Hotton, 2012 Table of Contents Abstract ii Table of Contents v List of Illustrative Figures vi Acknowledgment vii Literature Review………………………………...……………………………………....09 Discussion of the Findings……………………………………………………………… 27 Recommendations and Conclusions…………………………………………………….. 39 Appendix - Acronyms and Definitions…………………………………………………..48 References………………………………………………………………………………. 49 v List of Illustrative Materials Structure of the ICS (Figure 1)……………………………...…………………………...12 NCCIC and Partners (Figure 2)………………………………...………………………..35 Cyber Incident Management Lanes (Figure 3)…………………………………………..36 vi Acknowledgements I would like to thank my entire project committee, Professor Daniel Draz and Austen Givens, for their guidance and support throughout this entire project. I would like to give a special thanks to Professor Draz for his relentless encouragement, always making me believe that I could accomplish my goal. I would also like to thank my fellow students of Cohort 1 for the support that they provided throughout this entire program. I would also like to express my gratitude to all my friends who stood by my side and understood the sacrifices that I had to make while embarking on this scholarly journey. Finally, I would like to thank my mother Janet, my sister Catherine, and my son Joshua. Without the love and support of these three people, I would never have been able to successfully reach my goal of attaining a Master’s degree. vii Critical Incident Command and Response: An Examination of Current Policies, Procedures, and the Necessity for a National Cyber Event Response Plan The ability to respond to incidents, whether natural disasters or man-made, is one of the key elements of protecting and maintaining the strength of this nation. Our critical infrastructures are the backbone of our nation, and any disruption to these infrastructures can have a devastating effect on our nation’s economy and the prosperity provided to all of its citizens. Incidents such as the terrorist attacks of September 11, 2001 and Hurricane Katrina demonstrate the devastating impact that events like these can have on critical infrastructures. Currently, there are numerous frameworks already implemented that provide guidelines, components, and principles that are used to prevent, protect against, respond to, recover from, and mitigate the effects of a wide range of incidents. These frameworks have their basis in real-world events. However, the global shift to cyberspace requires that frameworks also be developed and implemented specifically for this domain. Cyberspace is positioned to be the next domain for a potential global confrontation, making it critical to establish, develop, and implement the necessary mechanisms to prevent, mitigate, and respond to such an event. The world finds itself in the infancy of a technological revolution. The United States, along with other countries across the globe, is heavily tied to technology which is used to operate and manage day-to-day operations. Entities ranging from government, financial institutions, and public and private sector companies, rely heavily on technology to maintain the financial stability of the United States as well as providing security measures protecting it from attacks. The increasing trend of using technology to provide security and financial stability requires the ability to prevent, mitigate, and respond to an attack or incident of any magnitude to preserve the security and financial independence 1 of the entire nation. The increased use of technology by the critical infrastructures of this country continually opens new vectors and opportunities for cyber-attacks. According to a report issued by the Office of Management and Budget: There were 41,776 reported cyber incidents of malicious intent in the federal network in 2010 out of a total 107,439 reported to the United States Computer Emergency Readiness Team (US-CERT), which represented a 39% increase over 2009, when 30,000 incidents were reported by the feds, of 108,710 attacks overall (Montalbano, 2011). With cyber-attacks rapidly becoming a major issue due to technological innovations, developing and implementing a framework to respond to these incidents is critical. The purpose of this paper is to examine the necessity for an incident response framework to prevent, mitigate and respond to cyber-attacks and incidents that affect the technology used to operate the nation’s critical infrastructures. This paper will first examine the existing frameworks that are currently being used to respond to incidents that can affect this nation’s critical infrastructures. While these current frameworks have their basis in real-world events, the foundations of these frameworks will be examined for their strengths and deficiencies. This paper will then examine the types of risks that this nation faces on the cyber front and the impact these risks have on critical infrastructures. This paper will also discuss the need for a response framework designed to prevent, mitigate and respond to cyber events. With technology being a major component within critical infrastructures, it is essential to have a framework designed to address the growing need for such a plan. Finally, this paper will propose some recommendations 2 that can potentially be implemented to strengthen existing cyber incident response frameworks that could potentially make them more effective during an actual response. The reality of a major cyber incident is a serious issue that must be addressed. With rapid innovations being made in the technology field, more vectors are created for attacks, as well as more mechanisms and mediums for cyber-attacks to be carried out. The areas of cyber-attacks that have seen an increased level of frequency and sophistication include, but are not limited to: Internet social engineering attacks, stealth and other advanced scanning techniques, techniques to analyze code to identify vulnerabilities, and distributed attack tools (Coleman, n.d.). The continuous innovations and increased frequency of cyber-attacks requires a robust and flexible framework to implement effective responses to accommodate this trend. Any disruption to one of the numerous critical infrastructures could deal a devastating blow to the country’s economy and national security. Currently, there are frameworks in place to prevent, mitigate and respond to incidents. However, these frameworks have their basis in real-world events. The National Response Framework (NRF) and the National Incident Management System (NIMS) are two such frameworks. The NRF is a direct result of the terrorist attack of September 11, 2011, and has its origin based upon the National Response Plan (NRP), while the origin of NIMS can be traced back to the destructive California wildfires of the 1970s and the Firefighting Resources of California Organized for Potential Emergencies (FIRESCOPE) Incident Command System (ICS) (Department of Homeland Security [DHS], 2004). While the core components and principles may be potentially applied to a framework for cyber incident response, the need for a framework specifically designed to incorporate 3 the nuances of a cyber-attack, or a hybrid framework that blends the principles contained in the NRF and NIMS with that of a cyber specific framework, is critical. There are also frameworks that have been initially developed to directly address the need for a response framework that is directly related to cyber incident response. One such framework is the National Strategy to Secure Cyberspace from DHS. First published in 2003, The National Strategy to Secure Cyberspace’s purpose is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact (DHS, 2003). The concept behind this document is to provide an initial framework to provide direction for government agencies that have roles in cyber security and identify steps that state and local governments, private companies and organizations, and individual Americans can take to improve our collective cyber security (DHS, 2003). Another framework that has been developed is the National Cyber Incident Response Plan (NCIRP). The NCIRP was developed based upon the guiding principles of the NRF and describes how the nation will respond to significant cyber incidents (DHS, 2010). While NIMS and the NRF are response frameworks primarily used for real-world events, the NCIRP is specifically designed for and intended to facilitate coordination with NRF mechanisms during cyber incidents with physical consequences (DHS, 2010). Because cyber incidents often cross the jurisdictional borders of federal, state, local, tribal, territorial, and private sector systems, it provides a strategy for rapidly coordinating the operational response activities of these particular entities (DHS, 2010). Although the NRF and NIMS have been successfully applied to actual incidents such as Hurricane Katrina and the British Petroleum (BP) oil rig explosion and spill, labeled Deepwater Horizon, the application of these frameworks are not without their 4 deficiencies. As an example, during the response to Hurricane Katrina, the communications were so severely affected by the storm, that according to Louisiana State Senator Robert Barham, “People could not communicate. It got to the point that people were literally writing messages on paper, putting them in bottles and dropping them from helicopters to other people on the ground” (Baker, 2006). The lack of a communication infrastructure made in nearly impossible for emergency communication centers to effectively communicate with response personnel to coordinate the required emergency response operations. This is an issue that needs to be clearly addressed during a response to a cyber incident. The result of a cyber incident can involve agencies and personnel from numerous arenas, making precise and clear communication a critical aspect of an effective response. Hurricane Katrina also underscores the impact than an incident can have on critical infrastructures, demonstrating the need for an effective incident response plan. While Hurricane Katrina was a natural disaster and not a cyber-attack, the impact on critical infrastructures can be equally devastating. Incidents of this magnitude can potentially attenuate critical infrastructures. The reliance of one critical infrastructure on another, combined with the technological interconnectivity that exists which is constantly expanding, requires that incident response plans have the flexibility to operate and function under extreme circumstances. As one government commission stated: The U.S. has developed more than most other nations as a modern society heavily dependent on electronics, telecommunications, energy, information networks, and a rich set of financial and transportation systems that leverage modern technology. This asymmetry is a source of substantial economic, industrial and societal 5 advantages, but it creates vulnerabilities and critical interdependencies that are potentially disastrous to the United States (Miller, n.d.). As Dr. Robert Miller ([Miller], n.d.) states, “During Katrina, these infrastructure collapses occurred rapidly, almost simultaneously, and over a very wide area. The multistate nature of the collapse inhibited effective response—as it is likely to do in any future incident” (p. 193). This underlines the need for more robust incident response plans that can adapt to extreme conditions. Another example of deficiencies that exist in current frameworks pertains to the Deepwater Horizon oil spill response. One of the key components of existing response frameworks is the assignment of roles and responsibilities during the course of a response. One of the major issues that became evident during Deepwater Horizon was the role that BP had during the response. In order for a response to be executed efficiently, roles and responsibilities must be clearly defined so that response personnel are acutely aware of their roles and responsibilities during a response. During the Deepwater Horizon oil spill response, deficiencies in role and responsibility assignment and understanding created an environment where divided responsibility, role duplicity, divided leadership, and unclear lines of authority which created a potentially ineffective environment (Epperson, 2011). As responses pertain to the cyber arena, there is very little evidence to base the effectiveness of initial response plans due to the lack of actual responses to tangible cyber-attacks. Frameworks such as the NCIRP and the National Strategy to Secure Cyberspace have not been fully implemented and tested during a real cyber incident. The only true test for these initial frameworks has been the biennial Cyber Storm exercises that began in February 2006 (DHS, n.d.). While these exercises integrated some entities from the public and private sector, government, and critical infrastructures, they have not 6 incorporated every critical infrastructure that can be affected by a cyber-attack. While this is understandable considering the exercises have only been taking place over the last six years, a more rigorous and thorough scheduling of these events may be warranted due to the increased cyber-attacks on federal agencies. The need for a comprehensive and robust cyber incident response plan is emphasized by the recent attack on several industrial sites which affected several countries, most notably Iran. The attack was the result of a computer worm named Stuxnet. This computer worm targeted Siemens WinCC SCADA (supervisory control and data acquisition) Step 7 Programming Software and Simatic PLCs (programmable logic controller) (Piggin, 2010). Stuxnet specifically targets computer systems that control electricity, water treatment, nuclear and chemical plants, pipelines, communications networks, transportation systems and other critical infrastructure, and it is unique in its complexity, flexibility, and resilience (Lieberman, 2010). By demonstrating the ability to successfully attack and disrupt critical infrastructures through a cyber-attack, Stuxnet validates the immediate need for the development and implementation of an incident response plan that can effectively prevent, mitigate, and respond to attacks that are conducted through the cyber medium. Another example supporting the need for a cyber incident response plan is the torrent of alleged cyber-attacks that have been carried out by China against defense industries of Western governments, most notably the United States (Wortzel, 2009). According to Major General William Lord, a senior Air Force officer, China has downloaded 10 to 20 terabytes of information from United States defense and government computer networks (Wortzel, 2009). While stronger defense protocols are 7 necessary to prevent and mitigate these intrusions, an incident response plan that will enable the United States to effectively respond to any successful intrusion as a result of these attacks is equally necessary. These intrusions are not limited to government and defense industries. Successful intrusions have also affected the public sector with Chinese government’s successful intrusion of Google and Gmail (Glenny, 2011). The fact that these alleged intrusions have infiltrated government, defense, and public sector industries reinforces the necessity for a cyber incident response plan that provides enough flexibility in its application that it can accommodate industries from a variety of sectors. By evaluating NIMS and the NRF and the core components and principles contained in these frameworks in conjunction with assessing risks of past cyber incidents, a robust and effective response framework can be developed and implemented to prevent, mitigate, and respond to cyber-attacks and incidents of all magnitudes. This framework can be leveraged by government entities at the federal, state, local, tribal, and territorial levels. The framework should provide the flexibility and standardization required so that entities and personnel at all levels of government can execute a coordinated response to a cyber event regardless of magnitude. Existing frameworks provide guidelines to implement a tiered response, beginning with the lowest level capable of responding to an incident. Therefore, personnel in leadership roles in each of the entities should be able to leverage the framework to its full extent without compromising the integrity of the response. A cyber response framework should also apply to public and private sectors that may be involved in a cyber incident response. Partnership between the public and private sectors and government agencies is essential, in part because the private sector owns and 8 operates approximately 85% of the nation's critical infrastructure, government agencies have access to critical threat information, and each controls security programs, research and development, and other resources that may be more effective if discussed and shared, as appropriate, in a partnership setting (DHS, n.d.). Developing a framework that establishes standardized communication methods and terms, accompanied by clear guidelines on the division of roles and responsibilities among these entities is a key factor in the success of an incident response. The goal of a cyber incident response framework is to provide entities, from the smallest town to the Department of Defense (DoD), with the capability to respond to a cyber incident of any magnitude. This framework must also provide personnel, from a company’s Information Technology (IT) department to a local firefighter, with the ability to respond, communicate, and understand their roles and responsibilities during the course of a response to a local or multi-jurisdictional incident. Each member of a potential response team should be able to leverage the components and principles contained in the response framework and effectively apply these tools to decisively respond to a cyber incident. Because a cyber incident can affect critical infrastructures, which in turn can affect both technology and the physical world, a clear and decisive framework that can be implemented by individuals holding a multitude of roles is vital in preserving the security and economic vitality of this nation. Literature Review Background and Significance The basic function of incident response plans, such as NIMS, the NRF, and the NCIRP, is to provide frameworks that contain flexible guidelines and principles that can 9 be applied during a response to an incident. As stated in NIMS: NIMS provides a systematic, proactive approach to guide departments and agencies at all levels of government, nongovernmental organizations, and the private sector to work seamlessly to prevent, protect against, respond to, recover from, and mitigate the effects of incidents, regardless of cause, size, location, or complexity, in order to reduce the loss of life and property and harm to the environment. NIMS works hand in hand with the NRF. NIMS provides the template for the management of incidents, while the NRF provides the structure and mechanisms for national-level policy for incident management (DHS, 2008). NIMS and the NRF are primarily used for responses to incidents that occur in the physical world. The primary function of the NCIRP is “…to establish the strategic framework for organizational roles, responsibilities, and actions to prepare for, respond to, and begin to coordinate recovery from a cyber incident” (DHS, 2010). The necessity for critical incident response frameworks is continually reinforced when there is an occurrence of an incident, regardless if the incident takes place in the physical or cyber realm. Incidents, such as the terrorist attacks of September 11, 2001, Hurricanes Katrina, and the BP oil rig explosion and spill, are just a few examples that show the necessity and importance of response frameworks. Historically, existing frameworks have been developed and implemented to address events that primarily occur in the physical world, but this landscape is evolving. The new trend in damaging incidents and attacks is the transition to cyberspace as the medium for which these attacks can be deployed. Technology plays an enormous role in how our nation’s critical infrastructures are connected and how they interact with 10 government, public, and private sector industries. This push toward technology has created a variety of new vectors that can be exploited for attacks on critical infrastructures. Recent cyber-attacks, such as Stuxnet and the alleged siphoning of information from government agencies by China, only emphasizes the need to develop robust response frameworks that can be implemented to prevent, mitigate, and respond to these types of incidents. National Incident Management System The literature relating to existing frameworks was examined for insight into the core principles and components used in incident responses that act as a foundation for future incident response plans. NIMS origin can be traced back to the destructive California wildfires of the 1970s. In response to the wildfire, the FIRESCOPE ICS was established (DHS, 2004). Although the FIRESCOPE ICS was developed for wild-land fire response, many in the incident management community recognized that it could be used by other public safety responders for a wide range of situations including hurricanes, earthquakes, floods and other natural disasters as well as hazardous materials accidents (DHS, 2004). In 1982, as a result of collaboration between FIRESCOPE and the National Wildfire Coordinating Group to establish a national application for ICS, all FIRESCOPE ICS documentation was revised and adopted as NIIMS (DHS, 2004). According to Michael D. Brown, Under Secretary for Homeland Security for Emergency Preparedness and Response, “The National Incident Management System incorporates best practices that have been developed over the years and one of the most valuable of these practices is the Incident Command System” (DHS, 2004). Figure 1 outlines the structure of the ICS. 11 Figure 1: Structure of the ICS The core concept behind NIMS is to provide a comprehensive national approach, applicable at all jurisdictional levels and across functional disciplines, that improves the effectiveness of emergency management/response personnel, across the full spectrum of potential incidents and hazard scenarios (including but not limited to natural hazards, terrorist activities, and other manmade disasters) (DHS, 2008). While incident response requires the cooperation of agencies at all levels of government and the public and private sector, NIMS provides a framework that allows for incidents of all magnitudes to begin and end at the local level. NIMS contains two core principles: flexibility and standardization. The flexibility of the NIMS framework provides a mechanism where the core components of NIMS can be applied during responses to incidents regardless of scope and magnitude. This flexibility also provides personnel and organizations from different sectors the ability to interact with each other to provide a more effective response during an incident. 12 Standardization provides a common working model for individuals and organizations that are part of an incident response. Standardization of organizational structures can improve integration and connectivity among jurisdictions and disciplines, while also providing and promoting common terminology, which fosters more effective communication among agencies and organizations responding together to an incident (DHS, 2008). NIMS is also comprised of five key components. Each of these components is critical in fostering an effective response to an incident. The five components contained in the NIMS framework are Preparedness, Communications and Information Management, Resource Management, Command and Management, and Ongoing Management and Maintenance (DHS, 2008). Each of these components plays a critical role in responding effectively to a response and must be used to provide the most effective response to an incident of any magnitude. Preparedness involves an integrated combination of assessment; planning; procedures and protocols; training and exercises; personnel qualifications, licensure, and certification; equipment certification; and evaluation and revision (DHS, 2008). Communication and Information Management is based on the concepts of interoperability, reliability, scalability, and portability, as well as the resiliency and redundancy of communications and information systems (DHS, 2008). Resource Management contains standardized mechanisms and establishes the resource management process to identify requirements, order and acquire, mobilize, track and report, recover and demobilize, reimburse, and inventory resources (DHS, 2008). Command and Management is designed to enable effective and efficient incident management and coordination by providing a flexible, standardized incident management 13 structure (DHS, 2008). The Command and Management component of NIMS is made up of three components: Incident Command System, Multiagency Coordination System, and Public information. Ongoing Management and Maintenance is made up of two components: the National Integration Center and Supporting Technologies. The National Integration Center (NIC) is a product of Homeland Security Presidential Directive 5 and serves to enhance the ability of the United States to manage domestic incidents by establishing a single, comprehensive incident management system (DHS, 2003). Supporting Technologies relates to the rapidly changing technologies that are used by response personnel and their reliance on these technologies during a response. The NIC, in partnership with the DHS Science and Technology Directorate, oversees and coordinates the ongoing development of incident management-related technology, including strategic research and development (DHS, 2008). National Response Framework The NRF is another framework that is used for incident response and management. After the terrorist attacks of September 11, 2011, Congress and the President moved to consolidate numerous federal emergency plans into a single, unified national response plan. The end product of these efforts was the NRP, which established broad lines of authority for agencies responding to emergencies and major disasters (Lindsay, 2008). Perceived problems with the implementation of the NRP during Hurricane Katrina led Congress to enact the Post-Katrina Management Reform Act (P.L. 109-295) to integrate preparedness and response authorities, which resulted in the issuance of a successor plan to the NRP entitled the NRF which was implemented in 14 March 2008 (Lindsay, 2008). Much like NIMS, the NRF is a framework that provides the doctrine and guiding principles for a unified response from all levels of government, and all sectors of communities, to all types of hazards regardless of their origin (Lindsay, 2008). Although the primary focus of the NRF is on response and short-term recovery, the document also defines the roles and responsibilities of the various actors involved in all phases of emergency management (Lindsay, 2008). Similar to NIMS, the NRF recognizes the importance of local authority during a response effort and that local authorities will have the lead role in the response and recovery efforts (DHS, 2008). The NRF is comprised of five key sections that present the key response principles, participants, roles, and structures that guide the Nation’s response operations (DHS, 2008). The key sections of the NRF are: Roles and Responsibilities, Response Actions, Response Organization, Planning, and Additional Resources. Roles and Responsibilities focuses on the individuals involved in the response effort and the key roles and responsibilities they have. This section of the NRF provides an overview of the roles and responsibilities of key partners at the local, tribal, State, and Federal levels, including an important role for the private sector and nongovernmental organizations (NGOs) such as The American Red Cross (DHS, 2008). Response Actions include guidelines to implement a tiered response, beginning with the lowest level capable of responding to an incident. The three critical phases outlined in the NRF are: prepare, respond, and recover. Response Organization outlines the organizational structures that have been developed, tested, and refined over time and how these structures are applied at all levels to support an effective response (DHS, 15 2008). The Planning section of the NRF stresses the importance of planning across all levels of government to foster unity of effort for emergency operations planning by providing common doctrine and purpose (DHS, 2008). As stated in the NRF (DHS, 2008), planning provides three principle benefits: (1) it allows jurisdictions to influence the course of events in an emergency by determining in advance the actions, policies, and processes that will be followed; (2) it guides other preparedness activities; and (3) it contributes to unity of effort by providing a common blueprint for activity in the event of an emergency. Planning is a foundational element of both preparedness and response and thus is an essential homeland security activity. Finally, the Additional Resources section describes how additional resources and operational information will be made available, especially to emergency management practitioners, in support of the NRF (DHS, 2008). National Strategy to Secure Cyberspace Literature pertaining to existing cyber response frameworks was reviewed to evaluate its main components, compare them to existing frameworks for real-world incidents, and examine their specificity to cyber incident response. The National Strategy to Secure Cyberspace is a framework that directly addresses the need for a response plan for cyber incidents. First published in 2003, The National Strategy to Secure Cyberspace’s purpose is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they 16 interact (DHS, 2003). The concept behind this document is to provide an initial framework to provide direction for government agencies that have roles in cyber security and identify steps that state and local governments, private companies and organizations, and individual Americans can take to improve our collective cyber security (DHS, 2003). The National Strategy to Secure Cyberspace contains five key national priorities to improve cyber security. These priorities are: a National Cyberspace Security Response System, a National Cyberspace Security Threat and Vulnerability Reduction Program, a National Cyberspace Security Awareness and Training Program, Securing Governments’ Cyberspace, and National Security and International Cyberspace Security Cooperation (DHS, 2003). The first priority, a National Cyberspace Security Response System, is aligned with other frameworks, such as NIMS and the NRF, in that it focuses on the response aspect of a cyber-attack. The priority pertaining to the response to a cyber-attack stresses the necessity for collaboration between government agencies and public/private sector organizations. The National Strategy to Secure Cyberspace also contains eight core actions that need to be addressed to form an effective response. These actions are: establish a public/private architecture for responding to national-level cyber incidents, provide for the development of tactical and strategic analysis of cyber-attacks and vulnerability assessments, encourage the development of a private sector capability to share a synoptic view of the health of cyberspace, expand the Cyber Warning and Information Network to support the role of DHS in coordinating crisis management for cyberspace security, improve national incident management, coordinate processes for voluntary participation in the development of national public-private continuity and contingency plans, exercise cyber security continuity plans for federal systems, 17 and improve national incident management (DHS, 2003). The first key action mentioned in the National Strategy to Secure Cyberspace refers to the establishment of a public/private architecture for responding to national-level cyber incidents. This is a critical aspect of cyber incident response. Partnership between the public and private sectors is essential, in part because the private sector owns and operates approximately 85% of the nation's critical infrastructure, government agencies have access to critical threat information, and each controls security programs, research and development, and other resources that may be more effective if discussed and shared, as appropriate, in a partnership setting (DHS, n.d.). National Cyber Incident Response Plan The NCIRP was developed based upon the guiding principles of the NRF and describes how the nation will respond to significant cyber incidents (DHS, 2010). While NIMS and the NRF are response frameworks primarily used for real-world events, the NCIRP is specifically designed for and intended to facilitate coordination with NRF mechanisms during cyber incidents with physical consequences (DHS, 2010). Because cyber incidents often blur the jurisdictional borders of federal, state, local, tribal, territorial, and private sector systems, it provides a strategy for rapidly coordinating the operational response activities of these particular entities (DHS, 2010). The NCIRP and the NRF share similar core principles. These principles, however, have some specificity to accommodate a response to a cyber incident. As an example, the NRF outlines guiding principles on roles and responsibilities as a key component during a response. The NCIRP contains the same component, but pre-assigns certain roles and responsibilities during a response. In response to a Significant Cyber Incident, DHS, through its National Cybersecurity and Communications Integration Center (NCCIC), 18 coordinates national response efforts and works directly with federal, state, local, tribal, and territorial governments and private sector partners (DHS, 2010). The NCIRP also lists other federal agencies, individuals, and their roles during a response to a cyber incident. This differs from other response frameworks in that certain roles and responsibilities are pre-defined and in place prior to an incident and do not have to be established during the course of an incident response. Cyber Threats Cyber threats are a growing concern with the advancement of technologies and the increasing dependency of critical infrastructures and businesses on these technologies. The question is not whether a cyber-attack of significant magnitude will impact this country, but when. The inevitability of such a cyber-attack is only reinforced by recent events such as the Stuxnet attack and the continuous alleged siphoning of information from critical infrastructures by China. The need for a comprehensive and robust cyber incident response plan is only emphasized by theses recent attacks on several industrial sites which affected several countries, as well as the constant threat of foreign countries and terrorist groups attempting to devastate this country’s critical infrastructures via cyber-attacks. Stuxnet Stuxnet was a sophisticated computer program designed to penetrate and establish control over remote systems (Farwell & Rohozinski, 2011). This computer worm targeted Siemens WinCC SCADA Step 7 Programming Software and Simatic PLCs (Piggin, 2010). Using four ‘zero-day vulnerabilities’ (vulnerabilities previously unknown, so that there has been no time to develop and distribute patches), the Stuxnet worm employs 19 Siemens’ default passwords to access Windows operating systems that run the WinCC and PCS 7 programs (Farwell & Rohozinski, 2011). Stuxnet specifically targeted computer systems that control electricity, water treatment, nuclear and chemical plants, pipelines, communications networks, transportation systems and other critical infrastructure, and it is unique in its complexity, flexibility, and resilience (Lieberman, 2010). Stuxnet is an example of the evolution of warfare. This type of attack is completely different from the type of warfare that has been typically carried out throughout the course of history. First, the availability of methods and means for a cyberattack is readily available. The production and delivery of such weapons does not require large, expensive systems and they are accessible to small groups or individuals that have the ability to hide under the radar (Hoffman, 2011). Also, the aspects of deterrence and attribution with this type of attack are unique. With modern warfare tactics, the enemy is known and any retaliation for an attack is directed toward a known enemy. Cyber-attacks, such as the Stuxnet worm, are difficult to attribute to a specific perpetrator (Hoffman, 2011). If the perpetrator cannot be found, then the certainty of retaliation dissolves, and deterrence might not be possible (Hoffman, 2011). China The alleged siphoning of sensitive information from critical infrastructures, government and defense industries by China is a growing concern to this country and other nations around the world. China’s alleged cyber intrusions of western governments has become more pervasive over the last couple of years. According to Wortzel (2009) 20 In 2000, the Chinese military established a strategic information warfare unit to wage combat through computer networks to manipulate enemy information systems spanning spare parts deliveries to fire control and guidance systems. China continues to equip and staff its military to carry out such electronic warfare. The Third Department of the General Staff Department of the People’s Liberation Army is responsible for technology reconnaissance and intelligence officers are trained for various forms of electronic warfare and electronic espionage. Past cyber incidents attributed to China only further supports the threat that China poses to our critical infrastructures and security as well as allies of the United States. In March 2009, Canadian researchers revealed how a cyber spy network, based mainly in China, hacked into classified documents from government and private organizations in 103 countries, including the Dalai Lama and Tibetan exiles (Hughes, 2010). Almost a year earlier, in May 2008, U.S. officials had investigated whether Chinese officials secretly copied the contents of a laptop computer used by Secretary of Commerce Carlos Gutierrez, who left it unattended during a trip to Beijing, and then used the data to hack into computers at the Commerce Department (Hughes, 2010). In October 2009, the U.S.China Economic and Security Review Commission found cases that suggested China's elite hacker community is tied to its government (Hughes, 2010). These continuous cyber-attacks against the United States and other countries fully substantiates the requirement for a cyber incident response plan capable of protecting and responding to cyber incidents targeting critical infrastructures and sensitive information. Cyber Incident Preparation Preparedness is just one of the critical components of any existing and future 21 framework that addresses the need to respond to incidents, whether these incidents occur in the physical or cyber realm. NIMS, the NRF, the National Strategy to Secure Cyberspace, and the NCIRP all contain principles and guidelines pertaining to preparation for incidents of all magnitudes. Directly related to cyber incidents, the United States government has conducted training exercises to examine the functionality and effectiveness of the response frameworks directly related to cyber incidents (DHS, 2006). These exercises continually examine the level of preparedness of all parties involved in a response and build upon past exercises to constantly improve the effectiveness of the implemented frameworks. Cyber Storm Exercises Cyber Storm is a series of exercises that are used to evaluate the frameworks that have been developed to prepare for, protect, mitigate, and respond to cyber incidents. These exercises were examined in this review to emphasize the steps being taken to assess current incident response plans. According to DHS (n.d.), these exercises were conducted to allow participants to: Examine organizations’ capability to prepare for, protect from, and respond to cyber attacks’ potential effects; Exercise strategic decision making and interagency coordination of incident response(s) in accordance with national level policy and procedures; Validate information sharing relationships and communications paths for collecting and disseminating cyber incident situational awareness, response and recovery information; and Examine means and processes through which to share sensitive information 22 across boundaries and sectors without compromising proprietary or national security interests. The first Cyber Storm exercise was conducted in February 2006. Cyber Storm provided participants with a controlled environment in which to exercise a coordinated cyber incident response, including information sharing mechanisms, procedures for establishing situational awareness, public and private organizational decision making, and public communications during a cyber-related Incident of National Significance (DHS, 2006). Over 100 public and private agencies, associations, and corporations participated in the exercise from over 60 locations and 5 countries (DHS, 2006). The exercise scenario simulated a large-scale cyber campaign affecting or disrupting multiple critical infrastructure elements primarily within the Energy, Information Technology, Transportation, and Telecommunications Sectors (DHS, 2006). Cyber Storm II was executed in March of 2008. While building on the successes and failures of the first Cyber Storm exercise, Cyber Storm II simulated cyber-attacks that were focused on critical infrastructure in the Information Technology, Communications, Chemical, and Transportation (specifically Rail and Pipe) sectors and required action from foreign and domestic partners in the cyber response community (DHS, 2008). One of the key objectives of Cyber Storm II was to validate information sharing relationships and communications paths for the collection and dissemination of cyber incident situational awareness, response, and recovery information (DHS, 2008). Cyber Storm III was executed in September 2010. This was the primary vehicle to exercise the newly-developed NCIRP - a blueprint for cybersecurity incident response to examine the roles, responsibilities, authorities, and other key elements of the nation's 23 cyber incident response and management capabilities and use those findings to refine the plan (DHS, n.d.). One of the key findings in Cyber Storm III was: Cyber response collaboration among private-sector companies has advanced because of targeted initiatives and understanding of mutual benefit. Although public–private interaction around cyber response is continually evolving and improving, it can be complicated by the lack of timely and meaningful shared situational awareness; uncertainties regarding roles and responsibilities; and legal, customer, and/or security concerns (DHS, 2011). These biennial exercises are a critical aspect of response plans, allowing key participants to evaluate the incident response framework for strengths and weaknesses during a simulated cyber incident. Incident Response Deficiencies Response frameworks have been applied to numerous incidents. Real world incidents of a large magnitude, such as Hurricane Katrina, quickly highlight the strengths and weaknesses of frameworks that are used during these responses. Assessing the deficiencies during an actual response is a necessary step of a framework’s lifecycle in order to apply corrective measures that are learned throughout the course of an incident response. According to Dr. Robert Miller ([Miller], n.d.), “One way to think about Katrina is to see it as a comprehensive critical infrastructure collapse—perhaps the most widespread critical infrastructure collapse that any advanced country has experienced since World War II.” During Hurricane Katrina, the communication infrastructure was dealt the most damaging blow. According to the White House report on Hurricane 24 Katrina, “The complete devastation of the communications infrastructure left responders without a reliable network to use for coordinating emergency response operations” (The White House, 2006). The sheer magnitude of this event and its devastating impact on critical infrastructures points out the weaknesses of the response framework and, based upon the lessons learned during the response, allow for re-evaluation and modifications to further strengthen the response framework. Although there has not been an actual cyber event that can be compared to Hurricane Katrina, the potential for an event of this magnitude is on the horizon. Critical infrastructures rely on technology and are becoming more dependent on this technology. Because critical infrastructures rely so heavily on technology, it is crucial for all parties at all levels of government to be equipped and prepared to respond effectively during a cyber event. While response plans such as the NCIRP and the National Strategy to Secure Cyberspace are in place, there are those that do not believe that individuals and agencies at the local level are sufficiently prepared. According to Rahul Bhaskar ([Bhaskar], 2006), there are simply not enough law enforcement officers at the state level with appropriate computer forensics and computer crime investigative skills to protect their part of the infrastructure. While Bhaskar concedes that the National Strategy to Secure Cyberspace plan makes improvements to the nation’s response to cyber incidents and makes reducing potential damage the top priority, he stresses that responses to such incidents at the state level are handled by different agencies that do not necessarily coordinate (Bhaskar, 2006). With the creation of the NCIRP, a concerted effort was made to more effectively coordinate with state, local, tribal, or territorial governments. The NCIRP leverages the Multi-State Information Sharing and Analysis Center (MS-ISAC). According to the NCIRP (DHS, 2010), MS25 ISAC is a key resource for state, local, tribal, and territorial government information sharing, early warnings and alerts, mitigation strategies, training, and exercises and for maintenance of overall cyber situational awareness. Summary Existing response frameworks were reviewed to examine key components and principles that have been implemented in real world incidents. The core principles contained in NIMS and the NRF have been used in real life situations, and have acted as the blueprint for other response frameworks. The effectiveness of these frameworks have proved successful, but have also come under some scrutiny when applied to events of a large magnitude, such as Hurricane Katrina. Key insights and lessons learned are a critical part of the evolution of these response plans in order to make them more effective and efficient for future incident responses. Although there have been no actual cyber incidents of the magnitude of Hurricane Katrina, examining the current frameworks in place to respond to a cyber incident lends insight into the organizational structure and the defined roles and responsibilities of federal, state, local, tribal, and territorial governments. To further examine the effectiveness of the NCIRP, the Cyber Storm exercises are a method to test the overall functionality of the response framework by applying the framework to various scenarios simulating actual cyber events. These simulated cyber exercises are a critical step in evaluating the frameworks that will be applied in the event of a real cyber incident. The need for cyber incident response frameworks was substantiated by examining real threats that can directly impact critical infrastructures. The Stuxnet worm attack and the alleged siphoning of sensitive data from government agencies by China only 26 reinforces the need for robust response frameworks that can be leveraged to prevent, protect against, respond to, recover from, and mitigate cyber-attacks of all magnitudes. The occurrence of a major cyber incident is inevitable and potentially could happen in the not so distant future. Due to the conceivable threat of a cyber-attack with the potential of catastrophic damage being inflicted on the country’s critical infrastructures, the continued assessment, testing, training of personnel, and amending of current cyber incident response frameworks is critical to the uninterrupted security and prosperity of the United States. Discussion of the Findings The capability to respond to incidents, whether the incidents occur in the physical world or the cyber domain, is an essential component to securing the critical infrastructures and the economic independence of this nation. Critical infrastructures play an enormous role in the day-to-day operations of this country. The critical infrastructures of this nation rely heavily on technology and are dependent on this technology to function at a level necessary to maintain government, public, and private sector industries that make the United States one of the most powerful nations in the world. The interdependency of these infrastructures and the technology that each one uses presents potential vectors for attacks of both physical and cyber origins. The ability to prevent, mitigate, and respond to an attack or incident of any magnitude or origin is crucial to the continued security and prosperity of this nation. The ongoing threat of cyber-attacks, combined with the continuous threat of physical events such as natural disasters, reinforces the need for robust response frameworks that can be implemented to minimize the damage caused by these events and reduce the affects these events have on 27 this nation’s critical infrastructures and economic stability. Resources The primary resources reviewed in this paper were existing response frameworks that are currently being implemented when a response to an event is required. The response frameworks reviewed for this paper, the NIMS, the NRF, the National Strategy to Secure Cyberspace, and the NCIRP, are all intended to provide agencies and personnel with components, principles, and guidelines that can be applied and leveraged during a response to a crisis. While each of these response frameworks is organized and structured differently, they all contain some of the same basic principles regarding the methods that can be used to respond to an event. As stated in the National Infrastructure Protection Plan (NIPP), Protecting and ensuring the resiliency of the critical infrastructure and key resources (CIKR) of the United States is essential to the Nation’s security, public health and safety, economic vitality, and way of life. Attacks on CIKR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nation’s CIKR as weapons of mass destruction could have even more devastating physical and psychological consequences (DHS, 2009). The examination of ongoing and potential cyber threats was also necessary to 28 provide sufficient evidence that response frameworks are required for not only physical threats, but cyber threats as well. Threats such as the continuous attack on government and public/private sector industries indicates the need for a proactive response plan that can be implemented to protect the critical infrastructures and highly sensitive information this country relies on. Also, attacks such as the Stuxnet cyber-attack that affected several nations across the world, most notably Iran, further supports the need for cyber incident response plans. The increased dependency on technology, in conjunction with cyberattacks such as Stuxnet, provide further evidence that attacks like these are likely to continue in the future and the ability to effectively respond to these incidents is essential. Response Plan Components Each incident response plan framework contains components, principles, and guidelines that act as the basis for any incident response. Although each individual response framework is an entity unto its own, they share common components, principles, and guidelines that allow for flexibility in their application to different types of situations. The commonality shared by these frameworks accentuates the importance of the key components and guidelines that each of these frameworks has in common. These core principles and components are a necessity during the course of a response in order to maximize the effectiveness of response to an incident of any magnitude. Of the core components that these frameworks share, the two components that are of critical importance for an effective response are preparedness and the designation of roles and responsibilities. Preparedness Preparedness for an event of any magnitude, regardless of origin, is one of the 29 first steps of a response framework in order to adequately respond to an incident. Each framework stresses the importance of preparedness. As an example, according to NIMS, Effective emergency management and incident response activities begin with a host of preparedness activities conducted on an ongoing basis, in advance of any potential incident. Preparedness involves an integrated combination of assessment; planning; procedures and protocols; training and exercises; personnel qualifications, licensure, and certification; equipment certification; and evaluation and revision (DHS, 2008). Like NIMS, the NCIRP states, Preparedness activities, including establishing common situational awareness in a common operational picture, are shared responsibilities across Federal, State, Local, Tribal, and Territorial governments and the private sector. By the time coordinated response actions are needed during a Significant Cyber Incident, the cybersecurity community must be prepared and maintain a shared situational awareness to help identify, respond to, and recover from an incident (DHS, 2010). The emphasis on preparedness is a theme that is at the core of each and every response framework. Without the necessary preparation at all levels of government, public and private sector organizations, and other agencies, an effective response can potentially be hindered due to lack of awareness and knowledge of preparation methods required prior to an incident. A perceived lack of preparedness came to light in the response to Hurricane Katrina. According to Moynihan (2010) After September 11, the Federal Emergency Management Agency (FEMA) was 30 swallowed up by the new DHS, whose most pressing concern was dealing with terrorist activities. FEMA lost direct access to the White House and some key responsibilities, and in doing so, lost a key function in the transition. The loss of the preparedness function limited FEMA’s ability to influence state preparation and weakened relationships with state responders. Another aspect of the response where the preparedness was perceived to be weak was at the local level of the response. One of the key aspects of any incident response is the response from local government agencies and authorities. According to Moynihan (2010), the Louisiana Office of Homeland Security and Emergency Preparedness (LOSHEP), had a staff of between 43-45 people, which was about 60% of the staffing capacity of peer organizations in other states, with only about 15 employees having emergency management experience. This reinforces the need for adequate preparation at all levels of government, especially at the state and local levels where most incident responses begin. For cyber incident response, the responsibility of state and local governments and other agencies being prepared is equally important, if not more so. Cyber incidents are a relatively new form of attack, and will soon become the norm as more agencies and infrastructures place more of their day-to-day operations in the hands of technology. It is imperative that state and local government agencies, along with NGOs, be fully prepared to interact with federal authorities and be fully prepared to assist and undertake multiple roles during an incident response that affects their respective local community. The federal government has taken steps to better prepare state and local 31 government personnel for incident responses. One such action was the Homeland Security Presidential Directive HSPD-8. This directive put an emphasis on National Preparedness. The main goal of HPSD-8, as stated in NIMS (2008), was to “strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies.” It also required DHS to develop mechanisms for the improved delivery of federal preparedness assistance to state, tribal, and local governments and to strengthen the nation’s preparedness capabilities (DHS, 2008). For cyber incident responses, the federal government took steps to bolster preparedness on a federal, state, local, and tribal level by conducting training exercises on fact-based scenarios to simulate a cyber event. The lack of an occurrence of a major cyber incident in this country further stresses the need for training exercises to determine the strengths and weaknesses of the NCIRP framework that would be implemented during an actual cyber incident. The series of Cyber Storm exercises was the method employed by the federal government to help train and review the preparedness capabilities of government agencies on the federal, state, local, and tribal levels of government as well as public and private sector agencies and NGOs. Through this series of exercises, lacking a real incident for assessment, scenarios based upon real, potential threats were conducted to assess how well each participant was prepared to respond to various cyber incident scenarios. Roles and Responsibilities The roles and responsibilities that key participants take on during an incident response is another key factor in the success of the response. The fact that many different 32 organizations, ranging from all levels of government to NGOs and public/private sector businesses participate in an incident response makes it critical that each participant understand their role during a response. Determining and understanding the role and the responsibilities that each participant will be assigned and expected to carry out during an incident response can potentially determine the success or failure of a response. Roles and responsibilities are such critical factors during an incident response that the concept can be found in all phases of the NIMS framework. Roles and responsibilities is a key component of the Ongoing Management and Maintenance, Planning, Area Command, and Planning sections of NIMS (DHS, 2008). Each of these sections contains guidelines on the roles and responsibilities that key participants will assume during a response. The lack of preparedness to handle these roles and the responsibilities that are assigned to each role can adversely affect the effectiveness of an incident response. With NIMS being so closely tied to the NRF, a similar theme is contained in each framework. The NRF considers roles and responsibilities to be of such importance that it is the first section discussed in the framework’s key components. The NRF (2008) states: The responsibility for responding to incidents, both natural and manmade, begins at the local level – with individuals and public officials in the county, city, or town affected by the incident. Significant incidents require a coordinated response across agencies and jurisdictions, political boundaries, sectors of society, organizations, etc. These incidents will require that publicly elected and appointed officials, as well as business owners and community leaders, make difficult decisions for the benefit of the community as a whole. The NRF stresses the importance of incident responses beginning at the local level. For 33 this reason, it is imperative that all agencies at the local and tribal levels be prepared to participate in an incident response and understand the roles they will undertake. The fact that incidents can affect numerous infrastructures makes it critical for every local agency and business to be prepared and capable of performing the necessary tasks to execute an effective response. Depending on the nature of the incident, a different local authority can be placed in a lead role during a response, making it crucial for personnel at every level to be prepared to accept and carry out the responsibilities associated with that role. The concept of roles and responsibilities during a cyber event is similar to that of a real-world event. However, during a Significant Cyber Incident, a slightly different approach has been implemented through the use of the NCIRP. Key roles and relationships have been pre-established for a response to a Significant Cyber Incident instead of establishing certain roles at key local agencies in response to an incident. According to the NCIRP (2010), during a Significant Cyber Incident, DHS, through its NCCIC, coordinates national response efforts and works directly with federal, state, local, tribal, and territorial governments and private sector partners. The following figure depicts the structure of the NCCIC. 34 Figure 2: NCCIC and Partners The NCCIC will provide the facility and mechanisms to coordinate national response efforts, with certain key roles and responsibilities having been pre-determined. The pre-determination of key roles and responsibilities and how these roles interact with each other is a step toward better preparedness for an incident response. By pre-defining certain roles and responsibilities, personnel in these roles can be better prepared to effectively lead and respond to a Significant Cyber Incident. The following figure represents the coordination and organizational structure of Cyber Incident Management as designed through the NCIRP framework. 35 Figure 3: Cyber Incident Management Lanes The NCIRP framework maximizes preparedness by designating specific, key roles to federal, state, local, and tribal government agencies, as well as public and private sector organizations and NGOs. Ongoing Cyber Threats Cyber threats are now a fixture in the world’s landscape. The continued progression of technology and the ease with which technology is made available opens 36 up a variety of vectors and opportunities for cyber-attacks, changing the face of warfare. The use of technology as a weapon introduces new players into the warfare arena, requiring little funding to attain these cyber weapons and making attribution extremely difficult. The inability to attribute a cyber-attack to an individual, group, or nation makes responding to a cyber-attack much more difficult as opposed to historic warfare tactics. As Herbert Lin, chief scientist at the Computer Science and Telecommunications Board of the U.S. National Research Council, points out, …you may have only an IP address, not a physical location that you can attack in response. Assume a computer controls an adversary’s air defense network and you cannot physically locate it. If you go after it with a cyber-attack, what if it’s located in a neutral nation? Or on your own territory? Cyber war complicates matters and challenges traditional notions of neutrality and sovereignty (Farwell & Rohozinski, 2011). Cyber-attacks against this nation are already a reality. Attacks, such as Stuxnet, are likely to increase in number in the very near future. The success of the Stuxnet attack, combined with the lack of preparedness for such an attack, only encourages comparable attacks in the future. Ralph Langer, one of the first security experts to analyze the Stuxnet worm, indicates that the attacks like Stuxnet are unlikely to disappear. When speaking of the Stuxnet attack, Langer states: You want to create a set of reusable tools. I mean, reusability is a big thing in software development, and certainly also applies to sophisticated cyber attackers. So these guys are pros, and they are just using the latest technology and architecture. So this didn’t surprise me at all. And it would also not surprise me if 37 it would see an attack executed by the very same group, just targeting completely different product base. So, for example, doing something against Rockwell, PLCs, or doing something against Areva safety controllers that are used in the nuclear industry (Roberts, 2012). Langer also points out the lack of preparedness and training of personnel on how to manage a cyber incident. He states, So look at major installations and critical infrastructure. The point is, I haven’t seen really solid contingency plans for cyber-attacks. So point is that the operators and maintenance staff, management, et cetera, would pretty much have to improvise on how to handle the sophisticated attack” (Roberts, 2012). The lack of preparedness of personnel holding key positions within critical infrastructures and prominent industries can severely hinder an effective and timely response to a cyberattack. Preparedness for such an event, in conjunction with clearly defined roles and responsibilities, are two vital factors when attempting to prevent, mitigate, prepare for, respond to, and recover from incidents of this nature. Limitations The focal point of the research conducted for this examination was limited in scope due to the primary source for existing response frameworks limited to DHS. DHS is the driving force behind the NCIRP and plays a major role in each of the response frameworks that has been examined. The drawback to only examining frameworks originating from one source is the lack of variation in concepts, components, guidelines, and the approach to incident response. The lack of varying approaches to incident response, regardless of whether these incidents are of a real-world or cyber origin, 38 narrowed the scope of the research for this paper. The inability to examine other frameworks from different sources made comparisons of distinct approaches to incident response problematic. Another limitation in the examination of this topic was the inability to research a Significant Cyber Incident that has occurred in the United States. While there have been several security breaches and alleged cyber-attacks against this country, the only true examination of the NCIRP has been the Cyber Storm exercises conducted by the federal government. These exercises were conducted in a controlled environment using predefined scenarios. Although numerous agencies from all levels of government, public and private sector organizations, and different associations participated in the exercise, it was difficult to measure the exact effectiveness of the NCIRP. The effectiveness of a cyber response framework will only truly be tested when an actual response is required to a Significant Cyber Incident. Recommendations and Conclusions The extent of the damage that can be caused by a cyber-attack of significant magnitude is still widely unknown. The effectiveness of a cyber incident response plan, such as the NCIRP, still has yet to be tested in response to a significant cyber incident directly aimed at a critical infrastructure. Due to the absence of a real-world application of the NCIRP, a more proactive approach is needed in training and awareness when it comes to applying the components, guidelines, and principles of a cyber response framework. The reality is the number of cyber incidents that are occurring is increasing in frequency and, regardless of the magnitude and the damage inflicted, requires the need for government agencies, public and private sector organizations, and other affiliated 39 response agencies to have a more complete understanding of what is required to execute an effective response plan. Cybersecurity training and certification programs are currently being offered by numerous government agencies and public and private organizations. However, the number of cyber incident response training programs is limited. DHS, one of the driving forces behind cyber incident response plans such as the National Strategy to Secure Cyberspace and the NCIRP, offers a limited number of incident response training programs and exercises that include the Cyber Storm exercises mentioned in this paper. The findings in this paper suggest that a more proactive schedule of cyber incident response training programs and events to combat the increase in the frequency of cyber-attacks that are occurring. This finding is also supported by the fact that the technology used to execute cyber-attacks is varying with the introduction of new technology and the widespread availability of technology that can be implemented to carry out cyber-attacks against this nation. The Cyber Storm training exercises are held on a biennial basis. Although time to evaluate previous Cyber Storm exercises is necessary to perform an accurate assessment of the training exercise, instituting a more vigorous schedule of events like these could potentially strengthen and solidify the response effort. Preparedness is one of the key concepts that makes up each response framework discussed in this paper. Key personnel, government agencies, and other organizations that have critical roles during a response to a cyber incident could benefit from more frequent training exercises. The introduction of more frequent training exercises, using scenarios that leverage recent cyber events and the technology that was used to execute these attacks, can provide response personnel and 40 entities with the most current snapshot of the cyber-attack landscape that they will face during a response. The findings also suggest that training programs and exercises could put more focus on the involvement of local governments and their subsequent roles and responsibilities during a response to a cyber incident. As previously stated in this paper, during the response to Hurricane Katrina, LOSHEP only had about 15 employees with emergency management experience (Moynihan, 2010). Because technology has flattened out the landscape by enhancing the interconnectivity among federal, state, local, tribal, and territorial governments, the participants in the most recent Cyber Storm exercise were made up of mostly federal and state government agencies, private sector companies, international partners, and other coordinating agencies (DHS, 2011). A resolute commitment to the implementation of training programs specifically directed toward local government agencies could potentially strengthen the response effort carried out by these entities. According to the NCIRP (2010), When prevention and protection efforts are unsuccessful, federal, state, local, tribal, territorial and private sector owners and operators of critical networks are likely to be the first to detect malicious or unauthorized activity on their networks. These owners and operators work individually within their incident response processes and, when appropriate, in partnership with others to identify and contain malicious and unauthorized activity on critical networks. If personnel at the local level are not adequately trained in proper cyber incident response protocols, the effectiveness of the overall response could potentially be hindered. Adequate training programs, drills, and constant assessment of response protocols at the local level are a critical component to the success of a cyber incident response. 41 Through the application of the NCIRP framework, local government agencies are provided a support system that can be leveraged during a cyber incident response. DHS acts as the coordinating agency during a cyber incident, with the NCCIC acting as the point of integration for all information from federal departments and agencies, state, local, tribal, and territorial governments, and the private sector related to situational awareness, vulnerabilities, intrusions, incidents, and mitigation activities (DHS, 2010). The NCIRP (2010) states: Preparedness is a basic responsibility of all federal, state, local, tribal, territorial, and private sector organizations. Each organization plays a unique role in preparing for a cyber incident with respect to its distinct mission and authorities. All organizations are responsible for the following preparedness activities: engage, plan, organize, equip, train, exercise, and evaluate and improve. Because the onus of preparedness is placed on each individual entity, each local, tribal, and territorial government agency needs to be proactive to ensure personnel are familiar with cyber response frameworks and the mechanisms that can be leveraged to be as prepared for a cyber-attack and subsequent response action as possible. Steps to improve cyber incident response training are already underway. The upcoming Cyber Storm exercise, Cyber Storm IV, will have a different structure than the previous three Cyber Storm exercises. According to Brett Lambo, director of the Cybersecurity Exercise Program with DHS’s National Cyber Security Division, “for the fourth Cyber Storm, the format will feature an ongoing series of events, not just one main event, and the series of events will be broken up by different constituency groups.” Lambo further explains that this could be a building-block event, where the initial event would shape the nature and prosecution of subsequent events in the middle and latter 42 stages of Cyber Storm IV. The building blocks, he says, will be based on specific cybersecurity topics and the interests of the varied constituencies represented by the diverse roster of participants in Cyber Storm (Cacas, 2012). By breaking up the exercise into different constituency groups, the new format could potentially provide a more detailed assessment of specific groups, helping to identify specific strengths and weaknesses among the participants, including local government agencies. Focusing on smaller groups and their respective roles during a cyber incident response could detect potential weaknesses at the local levels of government and reinforce the need for more vigorous training programs implemented at that level. Other recommendations to create a more robust cyber incident response framework and response cycle are constantly being proposed. One recommendation from the United States federal government proposes to enhance the information sharing process among public and private sector agencies and the federal government. The Strengthening and Enhancing Cybersecurity by Using Research, Education, Information and Technology Act of 2012, or SECURE IT Act (S.2151), introduced by Sen. John McCain (R-Ariz.) on March 1, 2012, notes that public and private-sector information sharing is critical to strong cybersecurity (Bernhart Walker, 2012). S.2151 states: An entity providing electronic communication services, remote computing services, or cybersecurity services under contract to a federal agency or department shall immediately provide to such agency or department, and may provide to a cybersecurity center, any cyber threat information directly related to such contract that is obtained, identified, or otherwise possessed by such entity 43 (S.2151, 2012). The legislation would encourage industry to voluntarily share threat information through antitrust exemptions and create liability protections so companies can more easily secure their networks in the event of a cyber-attack (Bernhart Walker, 2012). The Strengthening and Enhancing Cybersecurity by Using Research, Education, Information and Technology, is the latest effort by lawmakers to confront the question of how best to defend the vital Internet backbones on which the nation’s military, commerce and industry all rely (Waterman, 2012). Public and private sector agencies play a critical role in the execution of cyber incident response plans. Overall, the majority of critical infrastructures are operated and/or owned by private sector companies (DHS, n.d.). Further research could be conducted to determine what mechanisms and methods could be implemented to enhance and improve the interaction among public and private sector agencies and the federal government agencies that hold key roles within the cyber incident response framework. Information sharing, key roles and responsibilities, and the ability of public and private sector companies to leverage the NCCIC are key areas that could be researched to discover techniques that could be implemented to improve these areas to create a more effective response plan. Further research could also be conducted at the lower levels of government to accurately assess the preparedness of local, tribal, and territorial government agencies to participate in a cyber incident response. The research conducted for this paper primarily focused on existing response frameworks, their overall structure, and the core concepts and components that they contain. Additional research that focused on how well the 44 agencies at the lower levels of government are prepared for their involvement in a cyber incident response could be used to implement new training programs, amend existing frameworks to better develop and leverage the strengths of local government agencies, and provide key personnel with a better understanding of their roles and responsibilities during a response to a cyber-attack. Local government agencies may potentially be at the forefront of a response to a cyber-attack. However, these agencies may not have the resources that the federal government has and may be the least prepared when responding to a cyber incident. Another area of research that could be explored is the examination of other response frameworks or response plans that do not have their origins at the federal level. Private sector agencies that are heavily invested in technology, or operate a critical national infrastructure, may have internal response frameworks that are leveraged when responding to a cyber-attack. These internal frameworks could potentially reveal different methods of approach when faced with a cyber-attack. The organizational structures, key components and guidelines, roles and responsibilities, and methods of communication could be examined to discover new approaches that could be integrated into existing federal response frameworks, or provide key amendments that could possibly strengthen existing cyber response plans. This paper examined existing response frameworks and their key components, guidelines, and principles to determine the requirement for a national response framework specifically addressing cyber incidents. Historically, response frameworks, such as the NRF and NIMS, have been used for real-world catastrophes. The development of the National Strategy to Secure Cyberspace and the NCIRP emphasizes 45 the need to have frameworks in place to prevent, protect against, respond to, recover from, and mitigate the damage that can be inflicted to critical infrastructures through a cyber-attack. Response frameworks have been implemented for real-world events such as Hurricane Katrina and the BP oil rig explosion and spill. The lessons learned from these events, both the successes and failures, can be applied to newly developed frameworks like the NCIRP. Because these frameworks share similar concepts and components, the failures of one can be turned into the strengths of another. Although the frameworks differ in the types of incidents that they address, the response plans themselves have been developed with enough flexibility and standardization that any weaknesses identified in one framework can be addressed in another. Cyber-attacks have become more frequent, more devastating, and are poised to affect a wider range of infrastructures due to the increased dependency on technology. Technology has not only enabled critical infrastructures, government agencies, and other organizations to become more interconnected, but has also increased the interdependency of each of these entities on one another. Due to the increased interconnectivity of critical infrastructures, the effects of a cyber-attack on one infrastructure can have damaging effects on another. The ability to prevent, protect against, respond to, recover from, and mitigate the effects from a cyber-attack is critical to protecting the security and economic prosperity of this nation. This findings related to this paper also showed a direct effort to address the need for a cyber incident response plan. The NCIRP provides agencies and personnel at all levels of government and within the private sector with a robust framework that can be 46 leveraged when confronted with a cyber incident. The core components and concepts contained within the NCIRP, in conjunction with the NCCIC, provide a robust and flexible organizational structure that will equip agencies with the tools necessary to execute an effective incident response. Technology has enabled the enemies of this nation to carry out stealth attacks on the critical infrastructures that citizens of this country rely upon every day. Any disruption to these infrastructures can have a devastating effect on this nation’s ability to provide economic stability and security for its citizens. The inability to effectively respond to a significant cyber incident could potentially encourage more attacks that could cripple this nation. A new brand of warfare now confronts this nation. Cyberattacks can be carried out from anywhere in the world and they do not require substantial financial backing or a large army to execute a devastating attack. It is vital that this nation is adequately prepared to respond to cyber-attacks of any magnitude in order to protect the way of life that all citizens of this country have come to depend on. 47 Appendix Acronyms and Definitions Acronym BP CIKR DHS DOD FEMA FIRESCOPE ICS IT LOSHEP MS-ISAC NCCIC NCIRP NGO NIC NIMS NIPP NRF NRP PLC SCADA US-CERT Definition British Petroleum Critical Infrastructure and Key Resources Department of Homeland Security Department of Defense Federal Emergency Management Agency Firefighting Resources of Southern California Organized for Potential Emergencies Incident Command System Information Technology Louisiana Office of Homeland Security and Preparedness Multi-State Information Sharing and Analysis Center National Cybersecurity and Communication Integration Center National Cyber Incident Response Plan Nongovernmental Organization National Integration Center National Incident Management System National Infrastructure Protection Plan National Response Framework National Response Plan Programmable Logic Controller Supervisory Control and Data Acquisition United States Computer Emergency Readiness Team 48 References Baker, S. (2006). The Federal Response To Hurricane Katrina: Lessons Learned. Retrieved January 6, 2012, from library.stmarytx.edu/acadlib/edocs/katrinawh.pdf Bernhart Walker, M. (2012, March 5). McCain cybersecurity bill aims for legal frameworks, updates, not structural changes. Retrieved from http://www.fierce governmentit.com/story/mccain-cybersecurity-bill-aims-legal-frameworksupdates-not-structural-chan/2012-03-05 Bhaskar, R. (2006, February). State and local law enforcement is not ready for a cyber Katrina. Association for Computing Machinery. Communications of the ACM, 49(2), 81. Cacas, M. (2012, March). An Approaching Cyber Storm Includes New Threats. Retrieved from http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp ?articleid=2895&zoneid=342 Coleman, K. (n.d.). The Cyber Attack Danger. Retrieved January 9, 2012, from http:// defensetech.org/2008/10/20/the-cyber-attack-danger/ Department of Defense (2011, July). Department of Defense Strategy for Operating in Cyberspace. Washington, D.C. : Department of Defense. Department of Homeland Security. (2003, February). National Strategy to Secure Cyberspace. Retrieved January 6, 2012, from http://www.dhs.gov/files/ publications/editorial_0329.shtm Department of Homeland Security. (2003, February 28). Homeland Security Presidential Directive 5: Management of Domestic Incidents. Retrieved January 10, 2012, from http://www.dhs.gov/xabout/laws/gc_1214592333605.shtm 49 Department of Homeland Security. (2004, December 2). NIMS Integration Center Discusses NIMS Incident Command System (ICS) In New Paper Online At (fema.gov/nims). Retrieved January 4, 2012, from http://www.fema.gov/news /newsrelease.fema?id=15556 Department of Homeland Security. (2006). Cyber Storm Exercise Report. Washington, D.C.: Department of Homeland Security. Department of Homeland Security. (2008). Cyber Storm II Final Report. Washington, D.C.: Department of Homeland Security. Department of Homeland Security. (2008, January). NRF Resource Center. Retrieved January 3, 2012, from http://www.fema.gov/pdf/emergency/nrf/nrf-core.pdf Department of Homeland Security. (2008, December). NIMS Resource Center. Retrieved January 11, 2012, from http://www.fema.gov/pdf/emergency/nims/nims_core.pdf Department of Homeland Security. (2009). National Infrastructure Protection Plan. Washington, D.C.: Department of Homeland Security. Department of Homeland Security. (2010). National Cyber Incident Response Plan. Washington, D.C.: Department of Homeland Security. Department of Homeland Security. (2011). Cyber Storm III Final Report. Washington, D.C.: Department of Homeland Security. Department of Homeland Security. (n.d.). Critical Infrastructure Protection. Retrieved February 28, 2012, from http://www.dhs.gov/files/programs/critical.shtm Department of Homeland Security. (n.d.). Critical Infrastructure Sector Partnerships. Retrieved from http://www.dhs.gov/files/partnerships/editorial_0206.shtm 50 Department of Homeland Security. (n.d.). Cybersecurity. Retrieved February 28, 2012, from http://www.dhs.gov/files/cybersecurity.shtm Department of Homeland Security. (n.d.). Cyber Storm: Securing Cyber Space. Retrieved from http://www.dhs.gov/files/training/gc_1204738275985.shtm Epperson, R. C. (2011, January). A Perspective from Within Deepwater Horizon’s Unified Command Post Houma. Retrieved January 12, 2012, from http://www.ccrm.berkeley.edu/pdfs_papers/DHSGWorkingPapersFeb162011/PerspectiveFromWithinDeepwaterHorizon_s-UnifiedCommandPost_ Houma-RCE_DHSG-Jan2011.pdf Farwell, J., & Rohozinski, R. (2011, February/March). Stuxnet and the Future of Cyber War. Survival, 53(1), 23. Glenny, M. (2011, October 31). The Cyber Arms Race Has Begun. Nation, 293(18), 1720. Hoffman, D. E. (2011). The New Virology. Foreign Policy(185), 77-80. Hughes, J. (2010). China's Place in Today's World. The Journal of Social, Political, and Economic Studies, 35(2), 167-233. Lieberman, J. (2010, November 17). Public, Private Sectors Must Partner On Cyber Security To Defeat "Game Changer". FDCH Press Releases. Lindsay, B. R. (2008, November 20). Federation of American Scientists. Retrieved January 12, 2012, from http://www.fas.org/sgp/crs/homesec/RL34758.pdf 51 Lutz, L., & Lindell, M. (2008, September). Incident Command System as a Response Model Within Emergency Operation Centers during Hurricane Rita. Journal of Contingencies & Crisis Management, 16(3), 122-134. Retrieved February 1, 2012 Miller, R. (n.d.). Hurricane Katrina: Communications & Infrastructure Impacts. Retrieved from http://www.carlisle.army.mil/DIME/documents/Hurricane%20 Katrina%20Communications%20&%20Infrastructure%20Impacts.pdf Montalbano, E. (2011, March 23). Federal Cyber Attacks Rose 39% In 2010. Retrieved January 12, 2012, from http://www. informationweek.com/news/government/ security/229400156 Montalbano, E. (2012, January 4). Federal Cybersecurity Incidents Rocket 650% In 5 Years. Retrieved December 12, 2011 from http://www.informationweek.com/ news/government/security/231700231 Moynihan, D. (2010, March 18). The Response To Hurricane Katrina. Retrieved from http://www.irgc.org/IMG/pdf/Hurricane_Katrina_full_case_study_web.pdf Piggin, R. (2010, November 13). The Reality of Cyber Terrorism. Engineering & Technology, 5(17), 36-38. Roberts, P. (2012, January 29). UPDATE: Why Stuxnet-Like Attacks Aren't Going Away. Retrieved January 30, 2012, from https://threatpost.com/en_us/blogs/why-stuxnetattacks-arent-going-away-012912 Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012, S. 2151, 112th Cong., 2d. Sess. (2012) The White House. (2006). The Federal Response to Hurricane Katrina: Lessons Learned. Washington, D.C.: The White House. 52 Waterman, S. (2012, March 1). GOP senators present cybersecurity bill. Retrieved from http://www.washingtontimes.com/news/2012/mar/1/gop-senators-presentcybersecurity-bill/ Wortzel, L. M. (2009, January/February). China Goes on the Cyber-Offensive. Far Eastern Economic Review, 172(1), pp. 56-59. 53
© Copyright 2026 Paperzz