I Hacked Your Network: Assessing I Hacked Your Network
Transcription
I Hacked Your Network: Assessing I Hacked Your Network
I Hacked Your Network: Assessing Risks and Applying Standards Steve Surfaro Axis Communications www.axis.com Perspective. www.axis.com 2 If you had one choice for security… REACTIVE? PROACTIVE? Typical yp unanimous reply by N.A. Public Safetyy and Securityy Typical unanimous reply by N.A. Campus Safety Security www.axis.com 3 Physical and Cyber Security are related Intel from physical site vulnerabilities www.axis.com 4 E l it ffrom Exploits within! Physical and Cyber Security are related www.axis.com 5 Top Ten. www.axis.com 6 Top Trends in Physical and Cyber Security www.axis.com 7 Trend Process, Examples Edge Devices In-Camera Recording, PACS Video Content Anal Analysis sis Abnormal Detection, Detection Synopsis S nopsis Device Authentication Security at Edge Devices Video Verification Event Clips, Video with PERS Clo d Computing Cloud Comp ting Managed Services Ser ices Efficient Video Compression h.264, sophisticated encoding Low Light Imaging Real Time Image Processing, Thermal Imaging IR LED Imaging, High Definition Imaging HDTV, Video Quality for Real Time Viewing and Forensics Wireless Networks LTE, MESH MIMO, FCC Spectrum Reallocation Mobile Devices Display Video, Info, Location Top Trends: Standards Progress and Cloud Impact Trend Edge Devices Video Content Analysis Device Authentication Emergency Comm/Mass Notification/Health IT Cloud Computing/Managed Services Efficient Video Compression Low Light Imaging Hi h Definition High D fi iti IImaging i Infrastructure/Broadband/Wireless Networks Mobile Devices/NFC/ www.axis.com 8 Standards Progress Cloud Impact Top Cloud-based Physical and Cyber Security Apps www.axis.com 9 Top Cloud-based Physical and Cyber Security Apps Trend Physical Access Control (PACS) Visitor Management g Managed Video as a Service Identity Management / Logical Access Control (LACS) Intercommunication/Mass Notification/Emergency Comm Storage/Backup/Lifecycle Management/Upgrade Activity Tracking/Security Force Management Video Content Analysis Business Intelligence / BIG (Meta, Feature) Data Search www.axis.com 10 Network Device Provisioning and Monitoring PHYS CYBER View 24 hrs in 2 minutes: Video Synopsis in the Cloud www.axis.com 11 Analyze Scene; detect Abnormalities www.axis.com 6 12 11/16/11 Analysis Maturation: People counting, Trip Wire, LPR, ANPR • LPR/LPC • Utilize LPR or vehicle counting for access / gate control • Greet and speed transaction times for known vehicles • Track offenders to vehicle – provide greater information to law enforcement Threats. www.axis.com 14 www.axis.com 15 16 17 • • 2011 Security Breaches xxx Litany y of significant, g widely y reported breaches in first half – Most victims presumed operationally ti ll competent t t • Boundaries of infrastructure are being extended and obliterated – Cloud, mobility, social business big data business, data, more • Attacks ac s a are e ge getting g more oe and more sophisticated. Trojan Creator Kits Remote Desktop Webcam Streaming Audio Streaming Remote passwords MSN Sniffer Remote Shell Advanced File Manager Online & Offline keylogger Information about remote computer 19 Security Top Ten #8 Device Authentication, Credentialing of non non-person person entities • Maximum endpoint security • Reduce R d possibility ibilit off exploits l it off cameras on public networks www.axis.com 21 C d ti li Credentialing Authority Credentialed High Assurance Video Encryption (CHAVE) Problem Statement Today, Federal agencies are struggling to Today comply with agency mandates for the use of Personal Identity Verification (PIV) and strong multi-factor authentication, especially in access control areas such as IT based surveillance solutions that have not fully matured. Currently, the Federal Government does not Currently have a mature understanding of non-person entities like secure video surveillance applications for secure Homeland Security and public safety Operations. 23 : Opportunity Enhance E h the h operational i l ffeatures off existing i i NPE NPEs to meet the most stringent IT security capabilities. introduce a standard based approach to meet Federal ICAM objectives. j Meet Authentication, Credentials validation, revocation, ti D t att Rest, Data R t Data D t in i Motion, M ti Nonrepudiation, and Audit. 24 Use case applications for Secure Remote Monitoring/Surveillance Facilities Protection Perimeter Protection Executive Protection Aerial Observation Mobile Communications Law Enforcement Tactical Operations Military Operations Emergency Management P bli Safety Public S f t Secure Covert/Overt Wireless Deployments CHAVE Technical Diagram (Simplified Workflow) • • • • • • • • • User inserts PIV Card Certificate checked for valid expiration p date Certificate checked against CA Server IF CA not present, establish indicator flag in camera to accept or reject access PIV uses PKI to establish and decrypt kerberos session key Session key used to obtain client/server ticket to access Active Directoryy using g LDAP User attributes to camera is parsed from AD User provided with web link containing attributes linked to ADFS Kerberos Pkinit used with extended key attributes to provide information beyond client name and realm CHAVE Back Office Architecture CRL Update Path (ldap/ ldaps http/https) Credential Validation Service Validation Paths (OCSP/SCVP) 20 + Federally 50 + Federally Compliant PKI Compliant CRLs Directories Cloud Storage 3. Authenticated SSL VPN Inside and/or Outside the LAN Video Server Farms 1 Authenticated https 1. Client/WS Mobile 2. OCSP/SCVP Repeater 2/4. OCSP/SCVP 6 Mobility. www.axis.com 29 Access Mobility at work! NFC enabled Mobile Keys Platform Video Mobility …at work! Mobile Viewer for local NVRs, Servers and Hosted Services • Hi Higher h compression i • Lower bandwidth • Lower L fframe rate required for observation REQ’D F FRAME RATE FO OR HQ • Image quality requirements i t decrease d with screen size: SCREE EN RESOL LUTION Video Mobility Top Platforms, user behavior > Android continues to over 51%, up 3.7% > 74.3 74 3 percent of U U.S. S mobile subscribers used text messaging > Downloaded Apps used by 50 percent of subscribers,, while browsers were used by 49.3 percent (up 1.8 percentage points) Connected Health ~ MPERS > Wearable sensors become a lifestyle accessory > Smartphones can be the initiating device > Applications can gather basic location information to vital signs, use network video in the cloud for better diagnoses What’s next for mobile devices? > Near field communications – Physical Access Control transactions – Campus pilots: NFC-enabled mobile devices in place of smartcards – Financial transactions – Ex. Ex Google Wallet, Wallet which allows users to store credit and loyalty cards on their mobile device – A phone equipped with an NFC chip can be pp on any y PayPass-enabled y terminal at tapped checkout to make a purchase. > Trend towards financial instrument in the cloud, with mobile device providing simple accessibility Community. www.axis.com 37 Community Cyber Security Maturity Model > Developed by the CIAS – Based on our experience across the nation – Development supported by Congress and DHS > Multi-dimensional – Collaboration is key > Phases connect levels > Provides – Common reference – Roadmap © Center for Infrastructure Assurance and Security www.axis.com A Framework for Cyber Security © Center for Infrastructure Assurance and Security www.axis.com A Framework for Cyber Security © Center for Infrastructure Assurance and Security www.axis.com A Framework for Cyber Security © Center for Infrastructure Assurance and Security www.axis.com A Framework for Cyber Security © Center for Infrastructure Assurance and Security www.axis.com www.axis.com megapixel camera innovation environment protect leader globa al safe thermall Thank you! image usability www.axis.com easy installation focus inttellig gent open lleader d network video worldwide co onvergence A i Axis competence HDTV parrtner n netwo ork Get the Axis picture. Stay one step ahead. outdoor ease of use H.264 integration video id encoder d