26
SIMOC PLATFORM

Plataforma de Operação e Simulação Cibernética

Embed Size (px)

Citation preview

Page 1: Plataforma de Operação e Simulação Cibernética

SIMOC PLATFORM

Page 2: Plataforma de Operação e Simulação Cibernética

Agenda

o About RustCon

o Introduction to CyberSecurity

o CyberSecurity - Concepts

o SIMOC as a platform to build and manage a cyber safety environment

o DEMO

Page 3: Plataforma de Operação e Simulação Cibernética

About RustCon

• Founded on 2011, RustCon is a Brazilian Consulting Company

• Focus on Defense and Security Industry

• We are a Strategic Defense Company (or EED in Portuguese), certified by the Brazilian Ministry of Defense

Page 4: Plataforma de Operação e Simulação Cibernética

INTRODUCTION TO CYBERSECURITY

Page 5: Plataforma de Operação e Simulação Cibernética

What would happen if the electrical system of this city was shutting down?

Page 6: Plataforma de Operação e Simulação Cibernética

... And if all air systems of that country stops?

Page 7: Plataforma de Operação e Simulação Cibernética

... and also if the data of Social Security is hacked?

What can we expect if we face situations like these?

CHAOS

ECONOMIC LOSSES

Page 8: Plataforma de Operação e Simulação Cibernética

Delivery of a Safety Cybernetic EnvironmentCHALLENGES

It is a LONG process...

require COMPLEX tasks

Manual process is error-prone

and non-repeatable

Page 9: Plataforma de Operação e Simulação Cibernética

Safety Cybernetic EnvironmentACTIVITIES

Require multiples IT planning meeting

Define applications, middleware and

budget

Coordination across teams

Design Architecture Design Deployment and Configuration Setup Network

Create VMs Create Applications Assemble Workflow

Generate the traffic Test and qualify Manage the App lifecycle

Several weeks to be complete

Page 10: Plataforma de Operação e Simulação Cibernética

Value Proposition

Design Provisioning Execute

provides agility to create a complete Software Defined Environment

Catalog of Scenarios which will support you to perform security tests.

Page 11: Plataforma de Operação e Simulação Cibernética

CYBERSECURITY - CONCEPT

Page 12: Plataforma de Operação e Simulação Cibernética

Cyber Security Concept

to PROTECT and to ENSURE the availability

of NETWORK SERVICES

in charge to the management and control of

the CRITICAL INFRASTRUCTURE

of an ORGANIZATION

Page 13: Plataforma de Operação e Simulação Cibernética

“customized” cyber attack modes for specific

Company.

Current Scenario

Increasing number of cyber incidents against

government organizations

Increasing networks interconnections. 50 Billon de

devices with the Internet of Things till 2020.

GAP of 2.2 Millon security professionals till 2017

source: Websense Security Labs

source: Websense Security Labs

Page 14: Plataforma de Operação e Simulação Cibernética

Fast Growth in Number of Incidents

Page 15: Plataforma de Operação e Simulação Cibernética

Main Threatso violation of the National Securityo Sabotageo DDOSo Data theft

Energy, Oil&GasTelecommunicationsBanks

Targets

Page 16: Plataforma de Operação e Simulação Cibernética

How to Act

Capability It’s all about to build knowledge into the team.

Prevent To define safety process in order to implement new cyber infrastructures

ActionMonitoring cyber infrastructues and put in place the plan for defence, to fix the issues and to recover the disasters

Unsafe environment

Safe Environment

Page 17: Plataforma de Operação e Simulação Cibernética

Point-of-View

PreventMonitor Quick Response

Regulation Capability

Infrastructure

Decision Support System

Inteligence

Page 18: Plataforma de Operação e Simulação Cibernética

THE SIMOC Simulador de Operações Cibernéticas

Page 19: Plataforma de Operação e Simulação Cibernética

What is The SIMOC?It is a platform that allows the creation of cyber environments, with focus on security.

SIMOC

Capability

Assessment

Operations of Security Services

Page 20: Plataforma de Operação e Simulação Cibernética

Capability

How to

• Scenarios already designed in Cyber attack and defense

• Real-time monitoring and the possibility of interfering in the progress of the training (pause, fast forward, rewind)

• Possibility of recording the training for further evaluation of students.

Benefits

• Training expertise from an environment that reflects the specifications of your own network

• knowledge Leveling with significant reduction of OPEX and CAPEX

• Capability development Continuously

Its goals are to form, train and update cyber analysts.

Page 21: Plataforma de Operação e Simulação Cibernética

AssessmentAssessment of services and network elementsVulnerability and Risk Analysis

How to

• Create of a replica of the TIC infrastructure in a seggregated environment

• Emulate links (ADSL / Satelital / Ethernet / Customized)

• Traffic generation• Automated Cyber attacks and

defence

Benefits

• Support to Change Management• Support to Capacity

Management (Stress Test)• Support to Quality Management

(Regulation/certification)• Agility• OPEX / CAPEX reduction

Page 22: Plataforma de Operação e Simulação Cibernética

Operations of Security ServicesCreation of Secure Services to be used in a production environmen

How to• Utilization of pre-configured

secure service packages (Templates)

• Integration with real and virtualized networks

Benefits• OPEX / CAPEX optimization• Services with high-level of

security

Page 23: Plataforma de Operação e Simulação Cibernética

23

Catalog of Scenarios

Page 24: Plataforma de Operação e Simulação Cibernética

Catalog of ScenariosThe SIMOC platform brings along a list of more than 50 ready-to-use

scenarios. And additionally allows the operator to add new scenarios. Check a few examples of scenarios in the catalog:

o Overcome protections (networks with Snort, Firewall and Squid)o Execute an SQL Injection attacko Modify the content of a web page with an FTP server vulnerable to Buffer Overflowo Obtain access to source code in execution on the web server and find flaws in the codeo Attach a client machine through sending a malicious link in an e-mail. The installed

malware will send files with confidential information from the client via e-mailo Attack a network with DHCP service, depleting the IP addresses of the official DHCP

server to personify the servero Overcome the access control, passing the conection through a DNS tunnel DNS to have

acccess to blocked services

Page 25: Plataforma de Operação e Simulação Cibernética

Scenario of a power plant invasion - network

Page 26: Plataforma de Operação e Simulação Cibernética

Hamilton OliveiraBusiness Developer Manager - CyberSecurity

mailto:[email protected]:+552135543181