About Us Our Work Employment News & Events
MITRE Remote Access for MITRE Staff and Partners Site Map
The MITRE Digest

Follow Us:

Visit MITRE on Facebook
Visit MITRE on Twitter
Visit MITRE on Linkedin
Visit MITRE on YouTube
View MITRE's RSS Feeds
View MITRE's Mobile Apps

 

Home > News & Events > MITRE Publications > The MITRE Digest >

Building with Cyber-Steel to Protect Computer Networks


November 2008

Building with Cyber-Steel to Protect Computer Networks

Probably the last thing the average American—not to mention any political, military, or business leader—wants to hear is that a growing number of predators are trying to break down the doors of our nation’s computer networks. It’s a threat that potentially endangers the information systems that support our nation’s defense, economy, and practically everything else.

"Our infrastructure is made of cyber-straw," says Bill Neugent, a chief engineer for MITRE's Information Security Division and a nationally recognized authority on cybersecurity. "We need to be building it out of cyber-steel."

According to Neugent, more substantial measures are required to protect our nation's computer networks. "We've got to change the rules of the road for our networks so that predators can't so readily run free," he says.

The Threat Has Changed

The private sector, including power plants, refineries, and banks, has long been a popular target for cyber attacks. As government agencies and the intelligence community have increasingly become dependent on information technology, they've also become more vulnerable. Recent press reports have recounted an increasing number of attacks against the government, including the Department of Defense (DoD) and other agencies. "The threat has changed; it's gotten more severe," says Neugent. "This is a singular year for change."

A MITRE initiative known as Mission Assurance Against Advanced Cyber Threats has been developed to help defend the government's computer systems and ensure "mission assurance"—the ability to get the job done even under compromised conditions. This mission assurance initiative was launched in 2007 in response to the increase in cyber attacks against the government and private sector. "Over the last few years, the sophistication of 'the bad guys' has grown substantially," Neugent says. "They're quite successful at breaking into things, and they can cause a lot of damage."

It's not just a lack of network security that's causing a problem—it's hardware, software, and device drivers, many of which are mass-produced overseas. According to Neugent, hackers, organized crime, and even hostile nation-states have ample opportunity to do harm. "In an attack situation, the attacker's probably going to win the first battle," Neugent says. "Our challenge is to win the war."

Offense and Defense


Three Levels of Cyber Threat

1. Low-end—Typically involves hackers and email phishing. In a recent attack on two U.S. science labs, hackers used phishing emails with malicious attachments to gain access to a database of lab visitors that included their Social Security numbers and dates of birth.

2. Mid-range—Often state-sponsored, mid-range threats involve low-end techniques to target vulnerabilities, but may also include zero-day attacks (an attack that takes advantage of the delay between when vulnerabilities are discovered and when they are reported and corrected), social engineering (manipulating online users into giving up personal information), and reconnaissance to gain knowledge of weaknesses and vulnerabilities. Mid-range threats may also include malware (viruses, worms, adware, or spyware that can threaten a network), denial of service attacks, and hidden software modifications.

3. High-end—Includes all of the above, but may also involve the capacity to circumvent physical security measures, implant hardware and software modifications, plant insiders in the target organization, and use full-spectrum intelligence to identify vulnerabilities.

 

To advance the initiative, Neugent's colleagues Harriet Goldman and John Woodward drafted a paper, "Defending Against Advanced Cyber Threats," that represents the MITRE position on the topic. The paper takes a strategic approach to cyber conflict. "The most critical thing is to change the way of thinking—to think offensively as well as defensively," says Goldman, corporate director of integration for mission assurance. "It's not all about protection technology. It's also about risk management."

Goldman and Woodward, executive director of information operations, are collaborating to help the DoD navigate around potential threats. "The DoD needs to think about this as more than just patching vulnerabilities in their systems," Woodward says. He compares mission assurance to the aviation concept of "graceful degradation."

"Think about the air traffic control system—one of the threats is bad weather," Woodward says. "But the weather can't be controlled, so the system preplans how to gracefully degrade the flow of planes. We're trying to encourage the DoD to think the same way."

Thought Leader

In their paper, Goldman and Woodward outline a series of recommendations to defend against cyber threats. "We're developing an entire strategy for improving the state of practice at MITRE, as well as in the government and industry, in this area," Goldman says. "It's allowing MITRE the opportunity to work with customers to showcase best practice and to set direction on improving an organization's mission assurance posture."

Ultimately, says Neugent, cyber security depends on global cooperation. "The people, the companies, the organizations, the nations that win the information technology [IT] game are going to be the ones that harness the whole globe, not just our own 300 million people," he says. "There are a lot of smart people around doing really great IT work. The more we can harness the fruits of their labors, the better off we're going to be."

—by Tricia C. Bailey


Related Information

Articles and News

Technical Papers and Presentations

Websites

 

Page last updated: November 25, 2008   |   Top of page

Homeland Security Center Center for Enterprise Modernization Command, Control, Communications and Intelligence Center Center for Advanced Aviation System Development

 
 
 

Solutions That Make a Difference.®
Copyright © 1997-2013, The MITRE Corporation. All rights reserved.
MITRE is a registered trademark of The MITRE Corporation.
Material on this site may be copied and distributed with permission only.

IDG's Computerworld Names MITRE a "Best Place to Work in IT" for Eighth Straight Year The Boston Globe Ranks MITRE Number 6 Top Place to Work Fast Company Names MITRE One of the "World's 50 Most Innovative Companies"
 

Privacy Policy | Contact Us