22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

417<br />

In this article, the formalised sheet for collecting factual data related to cyberspace<br />

is introduced. The data from such a sheet would in turn constitute one<br />

record in a repository of past incidents from cyberspace (Figure 1). Some number<br />

of incidents collected in a repository will evidence information about security<br />

breaches in telecommunication <strong>and</strong> IT systems – namely cyber security incidents.<br />

For sake of clarifying nomenclature used in this article the following concepts<br />

definitions are given:<br />

• factual data – is a set of facts <strong>and</strong>/or activities in the area of: collection, selection<br />

<strong>and</strong> assessment of usability of information being stored <strong>and</strong> further<br />

used in respect of reflecting past incidents in an overall picture;<br />

• cyber security incident – this notion should be understood as an overall set<br />

of events that threatens network security, that is each activity that results<br />

in a direct threat to security level.<br />

Especially the following list of events is considered here:<br />

• threats to the availability of networked services (e.g. DoS attacks),<br />

• intrusion <strong>and</strong>/or attempt of intrusion to telecommunication <strong>and</strong> information<br />

technology system,<br />

• spamming,<br />

• spreading of malicious codes, viruses.<br />

It is important to notice that only limited set of (carefully processed) past cyber<br />

events registered in a repository will eventually get the status of security incidents.<br />

This paper is structured as follows – first authors introduce motivation that<br />

has led them towards publication of this paper. In chapter III the subject of “cyber<br />

incidents collection” for military is introduced. Eventually the collection process<br />

of factual data is proposed in chapter IV. Methodology of collecting information<br />

about cyber incidents is introduced in Chapter V. Finally conclusions are drawn <strong>and</strong><br />

a sample cyber observation sheet is delivered filled with exemplary information.<br />

II. Motivation<br />

In the process of designing the Cyber Tool software component in the EDA<br />

Athena project authors have faced serious exploitation-oriented challenges related<br />

to the lack of data about vulnerabilities required as an input for the tool. In order<br />

to be able to deliver expected benefits attributed to the tool, the following showstoppers<br />

need to be resolved:<br />

• lack of (ready-to use) repositories containing verified knowledge about<br />

vulnerabilities of IT systems used in military. On the other h<strong>and</strong>, existing<br />

civil repositories of vulnerabilities (e.g. SCADA systems – Supervisory<br />

Control And Data Acquisition) are publicly available. However, it is difficult<br />

to determine their relevance to the military domain<br />

• unavailability of knowledge (or lack thereof) about existing methodology,<br />

that would allow gathering of information about cyber threats in the mili-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!