• No results found

The TREsPASS project

N/A
N/A
Protected

Academic year: 2021

Share "The TREsPASS project"

Copied!
14
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

The TREsPASS project

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security Dr. Lorena Montoya

Services, Cyber-security and Safety Dept. University of Twente

(2)

2

Motivation

Sony suffers an estimated $ 1.25 billion damage through hacking attack May 9, 2011

Cost of cyber attacks triples in a year April 23, 2013

New York times infiltrated by Chinese hackers Jan 30, 2013

Social engineering a key factor in 92 % of industrial

espionage attacks DBIR 2013

(3)

3

Complex attacks cost

billions

Barclays hacking attack: unusual pairing of physical

deception (i.e. bogus IT guys) and advanced surveillance via a KVM switch – 1.3 million UK pounds

(4)

4

Goal

Which are the possible attacks?

- currently field works on basis of checklists/experience

Which attacks to block?

-attacks need to be ranked (financial, reputation).

Develop a toolkit for enterprise risk management

- lightweight version of the toolkit aimed at SMEs

rapidly changing infrastructure, including physical security and human behaviour

(5)

How to get the

data?

(6)
(7)

Outside Building Room Remote server PC Sales data Emplo-yee Dongle Malware

(8)

8

TREsPASS Model Chain

Outside

-world Companybuilding- Office

Remote server PC Sensitive data Emplo- -yee USB drive Hacker Malware ArchiMate EA model Attacker profile Navigator map Attack/ defense tree Analysis model

Terrorist, criminal, insider Skill level

(9)

9

Key project goals

Predict complex attack scenarios spanning digital, physical and social engineering steps

Prioritise these scenarios via a planning tool that tells  defenders where to expect the most serious issues

Prevent attacks by calculating and comparing

(10)

10

The project combines

Technical sciences how vulnerable are protocols and software?

Social sciences how likely people are to succumb to social engineering?

(11)

11

In order to

Enable informed decisions on security investments

Reduce security incidents Increase resilience

(12)

12

The TREsPASS partners

• 16 partners

• From 8 European countries University of Twente, NL

Technical University of Denmark, DK

Cybernetica, EE GMV, PT & ES

Royal Holloway, Univ. of London, UK

itrust, LU

Goethe University Frankfurt, DE

IBM Research Zürich, CH

Delft University of Technology, NL

Hamburg University of Technology, DE University of Luxembourg, LU Aalborg University, DK Consult Hyperion, UK BizzDesign, NL Deloitte, NL Lust, NL

(13)

13

Key Year 1 Achievement

From hand-crafted attack tree to

Explicit navigator map which automatically generates an attack tree

(14)

Contact

www.trespass-project.eu

Email: contact@trespass-project.eu

Contact us to join our public mailing list!

@TREsPASSproject trespass-project

The research leading to these results has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 318003 (TREsPASS). This publication reflects only the author’s views and the Union is not liable for any use that may be made of the information contained herein.

Referenties

GERELATEERDE DOCUMENTEN

We show how finite difference (or finite element) time domain computations can be accelerated by employing recent advances in the matrix exponential time integration and Krylov

As for the other two rules, the rule ID:18 (also shown in the last row in Table 1) performs Hebbian/anti- Hebbian learning, as it increases/decreases the synaptic weights

Through the matching of three sets of European scenarios with the global SSPs, we developed Ext-SSPs that possess very detailed narratives in multiple sectors such as

As both operations and data elements are represented by transactions in models generated with algorithm Delta, deleting a data element, will result in removing the

Met uitzondering van deze op de binnen- en buitenrand zijn de bakstenen zo gemetseld dat hun langste zijde naar het middelpunt van de toren gericht is.. Langs

Tussen fundering 1) en de zuidfundering was een bouwnaad. Fundering 1) bestaat op haar beurt uit twee koud tegen elkaar gezette funderin- gen (fig. Een door de eigenaar

Deze boog werd verstevigd door een zware steunbeer, spoor 2, die tegen en onder de fundering werd aangebouwd en eveneens gemetseld werd met bakstenen en een witte kalkmortel net

Tijdens fase 2, die werd uitgevoerd op donderdag 19 november, werden sleuf 13 tot en met sleuf 27 gegraven aan de Poelstraat, rond het clubhuis voor senioren en aan de voorzijde