SIX Ms
CYBER SECURITY SYSTEMS
I, a total non technical person, initiated and suggested
this way back in the early 2000 along with a cyber security specialist, my neighbor,
who being a specialized cyber security architect ad auditor and was a trainer
on cyber security to top police officials and he also laid the entire cyber
security system for Mauritius Government central bank etc along with some other
top soft ware professionals.
It was much before mobile and internet banking of this scale
started in India.
I even made detailed presentation on this along with these
specialists to some professional companies which were doing back office work to
leading International Banks but since no one showed any real interest or came
forward to invest. We gave up the project, subsequently, recently we have
colleges which have churned out post graduates in cyber security with in depth knowledge
and are being employed and used by foreign banks.
At least now I think someone must and can think seriously
about this.
The beauty is I have forwarded this to some directors of IT
departments of big government corporations. All are sitting on it.
I even named it as 6Ms
CSS
SIX Ms CYBER SECURITY SYSTEMS-
THE COMPREHENSIVE AND COMPLETE
CYBER SECURITY SYSTEMS
Monitor, Measure, Map, Make
specific architecture, Make the installation and Maintain.
Monitor
Why?
“The most vital systems of our
society are all dependent on technology and computers. As a nation, we are only
as strong as the security on the weakest link on these interconnected and
interoperable systems... If cybersecurity is not a priority, then our economy
and our infrastructures are at risk. Government, the private sector, and
academia should all work together to develop a culture of security in
cyberspace.”
n Protecting Cyberspace, House of Representatives Committee on Homeland Security
Whom?
Tech savvy high-tech criminals, using the latest and most
sophisticated technologies.
Where?
All sectors where systems are used which means our entire
life support systems i.e. all activities involved in growth and development of
our economy especially the whole gamut of infrastructure these systems support and operate.
WHAT?
All Windows
Platform
& UNIX Platform
Hypertext
Transfer Protocol
Application Server
Vulnerabilities
When?
Throughout the entire incident timeline; pre-incident
(prior to something bad actually happening), during an incident (when all heck
is breaking loose) and post-incident (when everyone is sitting around wondering
what the hell happened?)
Measure
When you can measure what you are speaking about, and
express it in numbers, you know something about it. But when you cannot measure
it, when you cannot express it in numbers, your knowledge is of a meager and
unsatisfactory kind.
— Lord Kelvin (British Physicist)
— Lord Kelvin (British Physicist)
WHY?
Honestly if we cannot measure something we cannot hope to improve it. the yard stick must be there to evaluate any improvement or
development. So security must be measured because with security metrics we can measure
adherence to compliance initiatives, provide information on involvement of
security in various operational efforts, and get insights that can be used for
allocation of resources.
How to measure?
“The only man who behaves sensibly is my tailor; he
takes my measurements anew every time he sees me, while all the rest go on with
their old measurements and expect me to fit them”
George Bernard Shaw
George Bernard Shaw
It is imperative
that the measurement is industry specific, threat specific,vulnerability
specific ,technology specific .
there cannot be
any universal or static measurement that can be expeced to be valid at all time
and for all verticles.
Map
"The scientific method is at base analytic
scrutiny, exact measuring, careful recording, and judgment on the basis of
observed fact. Science in education is not a body of information, but a method,
and its object is to find out and to learn how."Leonard P. Ayres (1918) History and present status of educational measurements. In G. M. Whipple (Ed.), 17th NSSE Yearbook. Bloomington IL: Public School Pub. Co. p. 14
So after having done the monitoring [i.e. analytic scrutiny]
and measuring [i.e. exact measuring] we move on to mapping [i.e. careful
recording, and judgment on the basis of observed fact]
Map what?
The areas of
vulnerability. Fence the borders of vulnerability from the attackers and
protect the territory of our operations with appropriate and adequate security to
ensure safe and smooth functioning.
Make
specific architecture
Science in education is not a body of information, but a
method, and its object is to find out and to learn how."
Leonard P. Ayres (1918)
Leonard P. Ayres (1918)
All science is concerned with the relationship of cause
and effect. Each scientific discovery increases man's ability to predict the
consequences of his actions and thus his ability to control future events.
Lawrence J. Peters
What type of architecture?
It is again industry
specific, threat specific, vulnerability specific , technology specific
especially with the growing number of focussed attackers as well as frustrated
insiders.
It must be
compatible to the existing systems and software in operation as you cannot have
doors permanently closed just to avoid unwanted guests.
Make the installation
Few will have the greatness to bend history itself; but
each of us can work to change a small portion of events, and in the total of
all those acts will be written the history of this generation. Robert F.
Kennedy
Once the security aspects, threats, failures,
vulnerabilities are monitored, measured, mapped and suitable architecture made,
then, the appropriate remedial measures must be installed in place to write the
history of safe, modern and secured cyber generation driven by information
technology and living on internet.
Maintain
Not everything that is faced can be changed; but nothing
can be changed until it is faced. James Baldwin
Even well researched and
authentic installations have to be scrupulously and constantly maintained as
attackers and their equipments constantly try to disturb the installations. So
only as and when new attacks are faced the modifications and maintenance of
installations take place. It requires constant vigil because the time to
develop countermeasures is longer than time to attack.
No comments:
Post a Comment