MMasera Presentation Uppsala May42001

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 27

Information Infrastructures

and Risks
Marcelo Masera

International Expert Workshop on


National Approaches to Risk Profiling
May 4th, 2001

Joint Research Centre


European Commission
Contents
• Institutional context and initiatives
– Joint Research Centre – European Commission
– The Dependability Initiative (EC R&D Framework Programme)
– The eEurope Initiative
• Some results of JRC work:
– Trust, Dependability and Information Infrastructure
• Workshop 27-28 March
– The challenge of information assets
– Interdependencies and vulnerabilities
– The concept of Co-Security
• What could be done at the international level?

4 May 2001 Information & Risk - Uppsala 2


JRC’s Mission
The Joint Research Centre is a Directorate
General of the European Commission.

The JRC mission is:


”.. to provide customer-driven scientific and
technical support for the conception, development,
implementation and monitoring of EU policies…
...Close to the policy-making process, it serves
the common interest of the Member States, while being
independent of special interests, whether private or
national."

4 May 2001 Information & Risk - Uppsala 3


JRC’s institutes

4 May 2001 Information & Risk - Uppsala 4


JRC
• Guiding principle:
– Citizen concerns and the public interest
• Support EU policies - focus areas:
– Raise profile of technology issues and challenges
– Promote and participate in relevant R&D
– Complement the implementation of EU R&D (IST programme)
• Foster European R&D
– networks of research, industry, customers
– knowledge integration
– technology trials & demonstrators
– knowledge dissemination

4 May 2001 Information & Risk - Uppsala 5


JRC & Information Society
• Focus on assuring trust and confidence in the
Information Society
– Provide S&T support to the conception & implementation of
EU policy

• Current activities:
– Dependability of critical information infrastructures
– Online privacy and filtering
– Online out-of-court dispute settlement systems
– Combating cyber abuse
– Trial infrastructure: TRINIDAD

4 May 2001 Information & Risk - Uppsala 6


Focus areas
Technical context (ICT) Policy context Social context
•Multimedia communications •eEurope •Commerce
•Mobile and configurable systems •eCommerce •Education and Training
•Embedded & RT systems •eLearning •Health care
•Data protection •Energy & information
•New business processes/ intermediaries •Consumer protection •On-line financial services
•Standards, CC •Cybercrime communication •Government and public services
Complexity & dependability •.EU top level domain Trust & Confidence

The eCitizen

Challenges addressed by JRC

Safeguarding citizen rights User empowerment and access to Well-founded trust in the
reliable knowledge resources information infrastructure
enabler enabler

Redress Online Content Web access Trust Vulnerabilities,


mechanisms privacy evaluation tools intermediaries threats
and filtering

4 May 2001 Information & Risk - Uppsala 7


5th Framework Programme
• Trust and dependability: horizontal concerns

• Dependability Initiative:
– IST 2000/1 CPA4: Towards dependable and survivable
systems and infrastructures
• dependability and survivability of the global information
infrastructure
– IST 1999 CPA2: Dependability in services and
technologies

• On-line Forum: http://deppy.jrc.it

4 May 2001 Information & Risk - Uppsala 8


eEurope
• Policy framework
• “An Information Society for all”
– one of the objectives:
• secure electronic access (Secure networks and smart cards)

• Stockholm European Council (23-24 March 2001)


– “…the Council together with the Commission will develop a
comprehensive strategy on security of electronic networks
including practical implementing action. This should be
presented in time for the Göteborg European Council.” (June
2001)

4 May 2001 Information & Risk - Uppsala 9


Information infrastructure
• No universally accepted definition…
• Agreement:
– Comprising all data/voice communications means
– Comprising all intermediate services

Sector
Value-added services specific
Generic end-user services

Network management services Information


Basic transport services Infrastructure
Network
Transmission Local access

4 May 2001 Information & Risk - Uppsala 10


New requirements
• Exploring ideas for rethinking the concept of
dependability in the frame of complex information
infrastructures, and for supporting the trust on
information services

– New issues for networked systems


• Information infrastructure
• Interdependencies with other infrastructures
• Emerging vulnerabilities
• Information assets assurance
• Enforcement of dependability attributes

4 May 2001 Information & Risk - Uppsala 11


Workshop
• “Interdependencies and Vulnerabilities in
Information Infrastructures”
– 27-28 March, Brussels
– Sessions:
• Telecommunications
• Information assets
• Health care
• Energy and utilities
• Finance
– Result:
• Report (available at deppy.jrc.it)
• Working Group to be set (information exchange)
• Scenario exercises to be launched

4 May 2001 Information & Risk - Uppsala 12


Drivers
• From monolithic proprietary systems to open systems-
of- systems with greater interconnectivity and complexity
• The pressure to produce cost effective systems places
increasing reliance on COTS, reuse and the evolution of
legacy systems, tap open source components
• Convergence is increasing the refinement (e.g. multiple
technologies, stringiest attributes) and the complexity of
systems
• Rapid evolution of standards (mainly de facto)
• Implicit urgent need to establish an interoperable
infrastructure of trustworthy services

4 May 2001 Information & Risk - Uppsala 13


Motivation
General risk concerns arising from:
• complexity and interrelationships of infrastructures (systems-of-
systems)
• dependence on ICT and especially on open communications
networks
• widening of threat base (malicious, accidental)

¾ New, unknown vulnerabilities


• Asymmetric exposure
• Single points of failure
¾ Not fully understood interdependencies
• Possibility of great disruptions
¾ Too many actors and dispersed responsibility
• Definition and allocation of requirements

4 May 2001 Information & Risk - Uppsala 14


Workshop conclusions
1. Short-term actions (2001-2002)
• European Working Group on Interdependencies and
Vulnerabilities
• Information collection and exchange
• Scenario exercises
• Elicitation of R&D challenges
2. Medium-term actions (2003-2007)
• R&D challenges (Dependability Initiative in 6th Framework
Programme)
• Interdisciplinary & complexity
• Dependency loops & non-linearity
• Modelling and simulation, risk models
• Migration to new technologies
• Benchmarking
• Prevention, tolerance, removal, prediction

4 May 2001 Information & Risk - Uppsala 15


Issues
Assets Î value Î potential damage
Thus, the main issue is Risk:
…for society at large (e.g. national security)
…for the individual citizen (e.g. privacy)

– It should dominate the Trust & Confidence debate,


• policy, standards
• evolution of the applications and technologies

But the perception of benefits and risks


is not clearly delineated
for developers and users

4 May 2001 Information & Risk - Uppsala 16


Analysing risk
• Likelihood:
– Difficulties in considering threats & vulnerabilities:
• Sources and means of problems, and weaknesses mutually
define each other and evolve continually
• Attributes degrade over time

• Consequences:
– Novelty of information assets and interdependencies
• Complexity brings emerging and cascading effects

4 May 2001 Information & Risk - Uppsala 17


The value of information
• Information:
– …is estimated to constitute 50% of the value of corporations,
and this percentage is growing rapidly with the growth of the
Internet and of e-commerce.
– The on-line citizen will put its more valued information at risk
(identify, health, finance, home security…)
• Threats:
– Growing (more manifest)
– For counteractions: imperative information assurance and
security.

Information is an asset

4 May 2001 Information & Risk - Uppsala 18


Vulnerabilities, threats
• Threats:
– Too many definitions
• Agent, means, circumstances, event…
– Scarce understanding
• Taxonomy, motivation, capabilities

• Vulnerabilities:
– any fact about a computer system that is a legitimate security
concern
– Maturing at the technical component level:
• Dictionary: Common Vulnerabilities and Exposures (Mitre)
• DBs: CERTs, companies, universities…
• Life-cycle: discover, analyse, collect, protect, detect, handle

4 May 2001 Information & Risk - Uppsala 19


Threats to information
Internal ⇒ Identifiable, measurable, preventable
“My garden”

External ⇒ Independent variables


“Public square”
Identifiable, measurable ⇒ Disturbances
Unanticipated
Unintentional

All the rest

Threat concerns should influence system design

4 May 2001 Information & Risk - Uppsala 20


Information assets
• Not just raw data
From
– Not a commodity
commodity

• But assured information


– Contents
– Digital envelope:
• Univocal identification
• Life-cycle events To assured
• Trust properties product
Ref: ISTPA framework

4 May 2001 Information & Risk - Uppsala 21


IA attributes
• IA Attributes:
– Access control
– Authorisation Interfacing
– Availability
Security
– Identification Control Life-cycle
Integrity
– Authentication
– Confidentiality Exception
– Integrity processing
© ISTPA
– Non-repudiation
– Timeliness
– Privacy (!)

4 May 2001 Information & Risk - Uppsala 22


Interdependencies
• Interdependencies:
– Growing dependencies intra- and inter-infrastructures
– Increasing use of the II for remote data access, operations and
transactions

• Concerns:
– Complex systems with interdependency loops and non-linearity
– Emergent adverse behaviour
– Fault propagation and cascading
– Interactions security-reliability-availability
– Unexpected and/or undesirable side effects on adjacent systems
– Effects on other unrelated applications sharing the same resources

4 May 2001 Information & Risk - Uppsala 23


Interdependencies /2
• New Risks for:
– Energy
• power grid, electricity on-line markets, services over power
lines, remote control…
– Healthcare
• tele-medicine, remote access to records, pharmaceutical
value-chain, automatic trolleys…
– Finance
• on-line services, payments, transactions…
– Transport
• …

4 May 2001 Information & Risk - Uppsala 24


Security, survivability
Security
• Traditionally: barrier to isolate application from intentional (&
accidental) threats that could harm information assets

• Now: Tolerance of application/information to the presence of


intentional (& accidental) threats
• Threats to the application/information
• Threats to the communications system

Survivability
• Ability to provide essential services in the presence of
attacks and failures, and recover full services in a timely
manner

Security: information assets Survivability: mission

4 May 2001 Information & Risk - Uppsala 25


Co-Security
• In unbounded networked environrments:
– Interdependencies
– Reliance on external parties
– Connections through multiple jurisdictions
impossibility of “autonomous” security

New concept:
Co-Security
Co-Security is the security at the system-of-systems
level that emerges from the Collaboration and
Consensus of all implied parties

4 May 2001 Information & Risk - Uppsala 26


To do at international level
• Evidence gathering and data exchange on risks, threats,
vulnerabilities, interdependencies related to Information
Infrastructures
• Consideration of the policy, legislative and technology
implications of information assets and interdependencies
• Discussion of new, appropriate security concepts
• Collaborative R&D on Risk assessment/management of
information infrastructures
• Support to co-operation on emergency response, training
and awareness raising about Information Infrastructure
incidents

4 May 2001 Information & Risk - Uppsala 27

You might also like