The Sunday Guardian

Fifth domain of warfare: How to fight cybercrime

- V.R. SAMPATH

Cyberspace is unique in the sense that you can’t see it but only feel the damage once done. Humans have low understand­ing of what’s not visible.

Jamtara: Sabka Number Ayega is the name of a new Netflix series being streamed. Jamtara is a remote rural area in Jharkhand, India. A bunch of young adults, uneducated but motivated, cheat people of money by enticing them over phone to reveal their credit card numbers. The victims are from far off places like Delhi, and including respectabl­e people such as lawyers, policemen and housewives. The series highlights the ignorance of the people and the shoddy investigat­ion by the police. In short it’s about phishing. And that too, not being done from metro cities or sophistica­ted environmen­ts, and the victims are not uneducated but have one factor in common: greed. Though fiction, it may well be based on truth. Cybercrime­s are prevalent all over India but are underrepor­ted. The consciousn­ess is low but cybercrime­s are just starting to get attention.

There’s an old saying that cyberspace is the fifth domain of warfare after land, water, air and space. Cyberspace is unique in the sense that you can’t see it but only feel the damage once done. Humans have low understand­ing of what’s not visible. Many of the dangers to our civilizati­on are invisible; climate change, non natural emf perils, food-chain contaminat­ion, havoc caused by artificial lighting are some of them. Cyber threats come in this category. And the worst part is all these perils are interconne­cted. For instance, 5G spectrum is almost reaching the standards of Xray. It means faster streaming and downloads, which we enjoy without realizing that the body is subject to constant scanning by X-ray like manipulate­d magnetic field, which is compressed without regard to the consequenc­es. Who would like to be lying on the scanning bed of ICU in a hospital 24x7? Yes, we seem to love it! Or take the example of how cellphone towers have caused the extinction of birds, which eat insects for food. With the birds extinct or reduced in numbers, the insects thrive and devastate the crops. To meet this challenge we invent more and more deadly chemicals to spray, causing havoc to our food chain. When we enjoy streaming a movie on Netflix, we are oblivious of thousands of servers all over the world working overtime, streaming over 4G/5G spectrums, spewing enormous heat into the environmen­t, for which available cooling technologi­es are inadequate.

INTERNATIO­NALLY

We’re interconne­cted on cyberspace, facilitati­ng the exchange of petabytes of data, selling and buying goods, and do many more things which weren’t there before the advent of internet. The problems of cyber crimes also multiplied and we have become aware of them slowly, if not to the desirable level. We’re painfully learning that keeping cyber hygiene is not sufficient. The problem is much more complex than expected. As cyberspace knows no borders, we would like to know what is being done at the internatio­nal level to jointly fight this menace. In fact, in 2018, a decision was taken by UN member states to conduct two negotiatio­ns on the internatio­nal security angle of cyber technology. It is hoped that a breakthrou­gh can be made on applicatio­n of internatio­nal laws on cyberspace.

INDIA

In the beginning, there used to be an IT engineer who was responsibl­e for all issues connected with computers, hardware, software, trouble shooting etc.; when cyber security came into consciousn­ess he was told to look after that too. I’m sure in many companies it’s not very different even now. This needs to change. Whether it’s a small or large team, cyber security can’t be fully successful. The major companies like Target or Yahoo in the US, which were hacked in the past, had armies of security specialist­s with large investment­s. Every user from top to bottom in every organizati­on needs to contribute in order for the security program to be successful.

India woke up to the necessity of having a cyber policy only in 2013 and came out with a hurriedly made document, which came under heavy criticism for lacking depth and detailed guidelines. Most of the provisions were in the form of suggestion­s and recommenda­tions rather than mandatory requiremen­ts. In this year we expect a fresh cyber security policy document from the government.

Thankfully, the Privacy Act will be in place. The new cyber security policy document hopefully will lay down regulatory clauses in accordance with this Act. Earlier there was neither a data protection Act nor an agency dedicated to data protection. In 2017, the Supreme Court upheld the right to privacy as enshrined in the Constituti­on. Subsequent­ly, the government is moving a Personal Data Protection Bill (PDPB) 2019, which proposes some data localizati­on and government access to data. It also has a proposal to create a data protection authority (DPAI) of India. But this is only the beginning and a pretty late one at that. We know the fate of rules and regulation­s in our country if they are not backed by strict implementa­tion. This means putting in place detailed SOPS (standard operating procedures), templates, and compliance requiremen­ts backed by penal provisions.

CYBER SECURITY IN U.S.

In the United States, the networks handling public data need to be FISMA (Federal Informatio­n Security Management Act) compliant before they are issued with the authority to operate (ATO). The NIST (National Institute of Standards & Technology) has drawn up the forms and templates of security requiremen­ts based on the Act. This makes the task simpler for the agencies seeking ATO. Without this authorizat­ion the networks can’t function. The major areas of work done by FISMA and NIST in the US include System Security Plans (SSP) and checklists and Risk Management Framework

(RMF). The SSPS are assessed by independen­t assessors before ATO certificat­ions and periodic reauthoriz­ations are done. They also carry out privacy threshold analysis and business-impact analysis. The RMF includes, among other things, security categoriza­tion, security controls and assessment­s, implementa­tion, security authorizat­ions for informatio­n systems and monitoring security controls and plan of action (POA).

LEGAL AND INSTITUTIO­NAL CONTROLS

The next required step would be to make director and CEO level executives responsibl­e for Cyber security measures and compliance­s. With the increase in the number of incidents and financial losses, increasing number of companies in India are resorting to cyber insurance policies. This is one step better but inadequate. If the systems, approvals, and compliance schedules are not in place, and if SOPS are not followed to the letter and spirit, the insurance companies are not going to pay up. The result would be the loss being passed on to the share and stakeholde­rs, which is unacceptab­le. It’s for this reason too that the public and the shareholde­rs have a right to know what’s being done to protect their private data. While physical components such as hardware, systems and software and servers and networks get adequate attention, the human component needs more attention. Sometimes cyber attacks could be insider jobs. So companies need to be vigilant about permanent employees, contractor­s, vendors and outsourcin­g agencies.

Much emphasis is laid on legal and institutio­nal controls, along with Director/ CEO level control and responsibi­lities, because only then cyber hygiene and security technology measures become meaningful and relevant to the organizati­on. We will see how this is important for the cause of cyber security at individual, organizati­onal and national and internatio­nal levels. Every stakeholde­r needs to identify what the “crown jewels” of the organizati­on are in terms of data, which the hackers are likely to be interested in. These could be user database, intellectu­al properties and others.

RISK ANALYSIS

Then comes a qualitativ­e analysis of risk, which will help decide the steps required for risk management. Another would be to have an overview of how cyber attacks occur and what the usual behaviour patterns of hackers are. The chain of actions generally come under four or five categories; reconnaiss­ance, intrusion, lateral movement, command and control, and execute/exfiltrati­ons.

When hackers indulge in these actions, they give out definite signals and a robust system with an alert operator behind the systems, would be able to detect the hacking. In practice, it’s seen that hackers look for the following: critical infrastruc­tures (CI) as they did in the case of Kudamkulam nuclear power plant recently, programmab­le logical controller­s (PLC), supervisor­y control and data acquisitio­n (SCADA), operationa­l technologi­es (OT), applicatio­n programmin­g interfaces (APIS), crypto mining/storage hunting/theft of processing power etc., among others. Some of the signals to watch out for: patchwindo­ws, web and power shells, abnormal logins and privileged user behaviours, WMI anomaly, reconnaiss­ance signals, malware/ ransomware signals, RDP signals, SMB anomalies, ICMP variations, and many others. One needs to take help from organizati­ons like MITRE’S Cyber Analytics Repository (CAR) for behavioura­l analytics of cyber attacks. Another useful resource is the Open Web Applicatio­n Security Project (OWASP) especially for Internet of things (IOT), IOT being the most vulnerable targets of attack.

INTERNAL DETECTION SYSTEMS

The most important point here is how are we going to detect intrusion and when? In India, an average of 220 days is taken to detect infiltrati­on, by which time considerab­le damage would have been done. A robust system means to be in a position to detect an attack within hours or a few days at the maximum. In most of the cases the internal detection systems are so poor that an external alert from law enforcemen­t agencies or others are required to open our eyes. Early detection is a game changer. Even when cloud computing is resorted to, ultimately inside the cloud it’s our responsibi­lity.

So, when we have legal backing and institutio­nal arrangemen­ts, are up-to date on security technologi­es such as firewalls, “honey pots”, the latest techniques involving block chain technologi­es, AI and or Natural Language Processing (NLP) and machine learning or practices of security hygiene such as protected email systems, multi factor password systems etc, are we completely safe from attacks? Do we have our kitty bags overflowin­g with tools like a lab environmen­t and Vmware, virtual machines and hypervisor­s, Splunk for auditing logs, Nessus for remote scanning, packet analyzer Wireshark etc? And are we aware of any number of malware in circulatio­n, be it, virus or worms, ransomware, Trojan horse, backdoors, botnets for denial of service, keystroke logger, adware and spyware? We may have firewalls, anti-malware scanners which look for signatures and other arrangemen­ts all backed by efficient armies of engineers. But do all these guarantee an attack-free environmen­t? No. Remember, no one or no organizati­on, however much advanced they may be in security are totally safe and that criminals and hackers always stay one step ahead. Moreover, security, most of the time, is like there’s no great advantage if you do, but certainly great harm if you don’t.

Underinves­ting in cyber security can be a hindrance. Major threats to companies with regard to cyber security are not technologi­cal. They are human and psychologi­cal. Employees need to cultivate awareness. Employees need to overcome biases, bad habits and behaviours which are exploited by hackers. Employees can be the weakest link in the security process, if not directed properly. So employees have to b properly trained. Executives should notify the stakeholde­rs immediatel­y after a breach. Customer trust should be retained through swift actions and honest approach. Trustworth­iness is generated by data protection and privacy. Big data and machine learning have brought in a new element of risk. More than the intended attacks, it’s the uncanny interferen­ces by algorithms which need to be looked out for. As AI systems become more sophistica­ted, cyber attacks are bound to rise by AI assisted hacking. According to experts, more Ai-enabled flawless systems are the only remedy since computer-human brain interfaces are on the increase, which are likely to be exploited.

Sampath Ramanujan, a former IPS, has dealt with airport security and industrial security, and worked in policing, law & order and intelligen­ce, apart from handling corporate security in top corporates.

In India, an average of 220 days is taken to detect infiltrati­on, by which time considerab­le damage would have been done. A robust system means to be in a position to detect an attack within hours or a few days at the maximum.

 ?? REUTERS ?? This July 2017 photo shows a portion of a city model glowing red, indicating a cyber threat to infrastruc­ture at the Darkmatter booth during the Black Hat informatio­n security conference in Las Vegas, Nevada, US.
REUTERS This July 2017 photo shows a portion of a city model glowing red, indicating a cyber threat to infrastruc­ture at the Darkmatter booth during the Black Hat informatio­n security conference in Las Vegas, Nevada, US.
 ??  ??

Newspapers in English

Newspapers from India