*

Copyright © 2012, Elsevier Inc. All Rights Reserved

Chapter 3

Separation

Cyber Attacks

Protecting National Infrastructure, 1st ed.

Copyright © 2012, Elsevier Inc. All Rights Reserved

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

  • Using a firewall to separate network assets from intruders is the most familiar approach in cyber security
  • Networks and systems associated with national infrastructure assets tend to be too complex for firewalls to be effective

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Introduction

Copyright © 2012, Elsevier Inc. All rights Reserved

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

  • Three new approaches to the use of firewalls are necessary to achieve optimal separation
  • Network-based separation
  • Internal separation
  • Tailored separation

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Introduction

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Fig. 3.1 – Firewalls in simple and complex networks

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Copyright © 2012, Elsevier Inc. All rights Reserved

*

  • Separation is a technique that accomplishes one of the following
  • Adversary separation
  • Component distribution

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

What Is Separation?

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

  • A working taxonomy of separation techniques: Three primary factors involved in the use of separation
  • The source of the threat
  • The target of the security control
  • The approach used in the security control

(See figure 3.2)

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

What Is Separation?

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.2 – Taxonomy of separation techniques

*

  • Separation is commonly achieved using an access control mechanism with requisite authentication and identity management
  • An access policy identifies desired allowances for users requesting to perform actions on system entities
  • Two approaches
  • Distributed responsibility
  • Centralized control
  • (Both will be required)

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Functional Separation?

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.3 – Distributed versus centralized mediation

*

  • Firewalls are placed between a system or enterprise and an un-trusted network (say, the Internet)
  • Two possibilities arise
  • Coverage: The firewall might not cover all paths
  • Accuracy: The firewall may be forced to allow access that inadvertently opens access to other protected assets

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

National Infrastructure Firewalls

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.4 – Wide area firewall aggregation and local area firewall segregation

*

  • Increased wireless connectivity is a major challenge to national infrastructure security
  • Network service providers offer advantages to centralized security
  • Vantage point: Network service providers can see a lot
  • Operations: Network providers have operational capacity to keep security software current
  • Investment: Network service providers have the financial wherewithal and motivation to invest in security

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

National Infrastructure Firewalls

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.5 – Carrier-centric network-based firewall

*

  • Network-based firewall concept includes device for throttling distributed denial of service (DDOS) attacks
  • Called a DDOS filter
  • Modern DDOS attacks take into account a more advanced filtering system

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

DDOS Filtering

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.6 – DDOS filtering of inbound attacks on target assets

*

  • SCADA – Supervisory control and data acquisition
  • SCADA systems – A set of software, computer, and networks that provide remote coordination of control system for tangible infrastructures
  • Structure includes the following
  • Human-machine interface (HMI)
  • Master terminal unit (MTU)
  • Remote terminal unit (RTU)
  • Field control systems

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

SCADA Separation Architecture

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.7 – Recommended SCADA system firewall architecture

*

  • Why not simply unplug a system’s external connections? (Called air gapping)
  • As systems and networks grow more complex, it becomes more likely that unknown or unauthorized external connections will arise
  • Basic principles for truly air-gapped networks:
  • Clear policy
  • Boundary scanning
  • Violation consequences
  • Reasonable alternatives

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Physical Separation

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.8 – Bridging an isolated network via a dual-homing user

*

  • Hard to defend against a determined insider
  • Threats may also come from trusted partners
  • Background checks are a start
  • Techniques for countering insider attack
  • Internal firewalls
  • Deceptive honey pots
  • Enforcement of data markings
  • Data leakage protection (DLP) systems
  • Segregation of duties offers another layer of protection

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Insider Separation

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.9 – Decomposing work functions for segregation of duty

*

  • Involves the distribution, replication, decomposition, or segregation of national assets
  • Distribution: creating functionality using multiple cooperating components that work together as distributed system
  • Replication: copying assets across components so if one asset is broken, the copy will be available
  • Decomposition: breaking complex assets into individual components so an isolated compromise won’t bring down asset
  • Segregation: separation of assets through special access controls, data markings, and policy enforcement

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Asset Separation

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.10 – Reducing DDOS risk through CDN-hosted content

*

  • Typically, mandatory access controls and audit trail hooks were embedded into the underlying operating system kernel
  • Popular in the 1980s and 1990s

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Multilevel Security (MLS)

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

*

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

Fig. 3.11 – Using MLS logical separation to protect assets

*

  • Internet separation: Certain assets simply shouldn’t be accessible from the Internet
  • Network-based firewalls: These should be managed by a centralized group
  • DDOS protection: All assets should have protection in place before an attack
  • Internal separation: Critical national infrastructure settings need an incentive to implement internal separation policy
  • Tailoring requirements: Vendors should be incentivized to build tailored systems such as firewalls for special SCADA environments

Copyright © 2012, Elsevier Inc. All rights Reserved

Chapter 3 – Separation

National Separation Program

The University of Adelaide, School of Computer Science

The University of Adelaide, School of Computer Science

*

Chapter 2 — Instructions: Language of the Computer

*

Chapter 2 — Instructions: Language of the Computer

Rubic_Print_Format

Course Code Class Code Assignment Title Total Points
ELM-580 ELM-580-O501 Literary Genres 50.0
Criteria Percentage No Submission (0.00%) Insufficient (69.00%) Approaching (74.00%) Acceptable (87.00%) Target (100.00%) Comments Points Earned
Content 100.0%
Fiction and Nonfiction Genres 25.0% Not addressed. Matrix includes insufficient and incomplete examples and definitions of fiction and nonfiction genre along with poorly researched and weak examples of grade cluster appropriate texts for grades 1-3, 4-5, and 6-8. Examples and definitions of fiction and nonfiction genre in the matrix are marginal and inconsistent along with irrelevant examples of grade cluster appropriate texts for grades 1-3, 4-5, and 6-8. Matrix includes detailed and clear examples and definitions of fiction and nonfiction genre along with coherent examples of grade cluster appropriate texts for grades 1-3, 4-5, and 6-8. Matrix includes well-researched and thoughtful examples and definitions of fiction and nonfiction genre along with proficient examples of grade cluster appropriate texts for grades 1-3, 4-5, and 6-8.
Literary Genre Integration 25.0% Not addressed. Examples included in matrix are missing components of strategies of how to integrate each selected text into reading, writing, and listening instruction along with a poor and undeveloped description of how to integrate each text with a technology application. Matrix includes inconsistent and inadequate examples of strategies of how to integrate each selected text into reading, writing, and listening instruction along with beginning-level description of how to integrate each text with a technology application. Matrix includes credible and direct examples of strategies of how to integrate each selected text into reading, writing, and listening instruction along with an adequate and detailed description of how to integrate each text with a technology application. Matrix includes meaningful and insightful examples of strategies of how to integrate each selected text into reading, writing, and listening instruction along with a skillful and well-researched description of how to integrate each text with a technology application.
Reflection 20.0% Not addressed. Reflection poorly addresses how multiple forms of literary genre can be implemented in your future classroom and is missing components of an explanation of the strategies for student comprehension in reading and how selecting the appropriate text supports a positive attitude toward reading and comprehension skills. Reflection includes a partially proficient summary on how multiple forms of literary genre can be implemented in your future classroom, a vague explanation of the strategies for student comprehension in reading, and a marginal description on how selecting the appropriate text supports a positive attitude toward reading and comprehension skills. Reflection includes a logical and relevant summary on how multiple forms of literary genre can be implemented in your future classroom, a solid explanation of the strategies for student comprehension in reading, and a successful description on how selecting the appropriate text supports a positive attitude toward reading and comprehension skills. Reflection includes an exceptional and thoughtful summary on how multiple forms of literary genre can be implemented in your future classroom, an insightful explanation of the strategies for student comprehension in reading, and a meaningful description on how selecting the appropriate text supports a positive attitude toward reading and comprehension skills.
Mechanics of Writing (includes spelling, punctuation, grammar, language use) 15.0% Not addressed. Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice or sentence construction are used. Frequent and repetitive mechanical errors distract the reader. Inconsistent language or word choice is present. Sentence structure is lacking. Submission includes some mechanical errors, but they do not hinder comprehension. Varieties of effective sentence structures are used, as well as some practice and content-related language. Submission is virtually free of mechanical errors. Word choice reflects well-developed use of practice and content-related language. Sentence structures are varied and engaging.
Documentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style) 15.0% Not addressed. Documentation of sources is inconsistent or incorrect, as appropriate to assignment and style, with numerous formatting errors Sources are documented, as appropriate to assignment and style, although several minor formatting errors are present. Sources are documented, as appropriate to assignment and style, and format is mostly correct. Sources are completely and correctly documented, as appropriate to assignment and style, and format is free of error.
Total Weightage 100%

Literary Genre Matrix

Part 1: Matrix

Fiction

Non-fiction

Definition:

1.

2.

1.

2.

Examples:

K-2

1.

2.

3-5

1.

2.

6-8

1.

2.

K-2

1.

2.

3-5

1.

2.

6-8

1.

2.

Text Integration Strategies:

1.

2.

1.

2.

Technology Application Strategies:

1.

2.

1.

2.

Technology Tools:

Part 2: Reflection

© 2018. Grand Canyon University. All Rights Reserved.

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com