{"id":2570,"date":"2017-12-20T13:36:58","date_gmt":"2017-12-20T16:36:58","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2570"},"modified":"2017-12-20T13:36:58","modified_gmt":"2017-12-20T16:36:58","slug":"los-angeles-cybercenter-espera-ser-un-modelo-para-las-ciudades-en-todo-usa","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2570","title":{"rendered":"Los Angeles CyberCenter espera ser un modelo para las ciudades en todo USA"},"content":{"rendered":"<p>Los \u00c1ngeles se ha convertido en un caso de estudio sobre c\u00f3mo una ciudad puede usar modelos desarrollados en el gobierno federal y sectores industriales para proteger no solo redes municipales sino tambi\u00e9n mejorar las ciberprotecciones para las empresas locales.<!--more--><\/p>\n<p><span class=\"caps\"><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/cdn.defenseone.com\/media\/img\/upload\/2017\/12\/08\/AP_17046095751450\/defense-large.jpg\" alt=\"A woman walks on a bridge as heavy traffic moves along the 110 Freeway during rush hour Tuesday, Feb. 14, 2017, in Los Angeles.\" width=\"356\" height=\"163\" \/>LOS<\/span>\u00a0<span class=\"caps\">ANGELES<\/span>\u00a0\u2014 Four years ago, cybersecurity operations for the city of Los Angeles were divided between four centers that didn\u2019t regularly share information with each other. When they did communicate, it was a managed through phone calls and emailed\u00a0spreadsheets.<\/p>\n<p>Cybersecurity awareness among the city\u2019s 48,000 employees was mixed. Protections at the city\u2019s 40 departments were hit or miss. Top department officials often didn\u2019t know all the computer systems they were running, making it impossible to defend\u00a0them.<\/p>\n<p>Despite these deficiencies,\u00a0<span class=\"caps\">L.A.<\/span>\u00a0was a high-tech city and believed it was reasonably well defended. \u201cWe thought we were secure, but we just didn\u2019t know,\u201d the city\u2019s Chief Information Security Officer Timothy Lee told\u00a0<em>Nextgov<\/em>\u00a0this\u00a0week.<\/p>\n<p>The truth, Lee said, was that city computer systems were far from secure. When the city flipped the switch on a cyber scanning tool from the company FireEye in February 2015, it turned up about 15,000 instances of malware sitting on city\u00a0systems.<\/p>\n<p>Now, Los Angeles has become a case study for how a city can use models developed in the federal government and industry sectors to not only protect municipal networks but also improve cyber protections for local\u00a0businesses.<\/p>\n<p>Las Vegas sent about 40 city officials to examine\u00a0<span class=\"caps\">L.A.<\/span>\u00a0cyber protections last week, Lee said, and Chicago officials visited this week. Officials from New York also plan to visit, he\u00a0said.<\/p>\n<p>At the heart of\u00a0<span class=\"caps\">LA<\/span>\u2019s cybersecurity surge is its integrated strategic operations center, or\u00a0<span class=\"caps\">ISOC<\/span>, a bank of computers and human operators located in a small chunk of downtown\u00a0<span class=\"caps\">L.A.<\/span>\u00a0office space next to the Los Angeles Police Department\u2019s emergency response division and just a few blocks from City\u00a0Hall.<\/p>\n<p>The\u00a0<span class=\"caps\">ISOC<\/span>\u00a0processes cyber threat information from the Homeland Security Department, the\u00a0<span class=\"caps\">FBI<\/span>\u00a0and various private sector and non-profit sources and feeds it out to its member operations centers and to city\u00a0departments.<\/p>\n<p>Those four operations centers that formerly didn\u2019t speak to each other\u2014at the city\u2019s\u00a0<span class=\"caps\">IT<\/span>\u00a0office, the Water and Power Department, the Port of Los Angeles and Los Angeles International Airport\u2014now all have precisely the same\u00a0picture.<\/p>\n<p>They\u2019re also far less burdened by redundant busy work. Instead of each of the centers poring through thousands of raw threat indicators separately, the\u00a0<span class=\"caps\">ISOC<\/span>\u00a0only forwards a handful of indicators that it has verified pose a danger to city systems, Lee\u00a0said.<\/p>\n<p>\u201cOur overall security posture and situational awareness has improved dramatically,\u201d he\u00a0said.<\/p>\n<p class=\"wysiwyg\"><strong>Know Yourself; Know Your\u00a0Enemy<\/strong><\/p>\n<p>Lee compares the\u00a0<span class=\"caps\">ISOC<\/span>\u2019s mission to a lesson from the 5th century\u00a0<span class=\"caps\">B.C.<\/span>\u00a0Chinese military strategist Sun Tzu in his treatise \u201cThe Art of\u00a0War.\u201d<\/p>\n<p>\u201cIf you want to win the battle, you need to know your enemy and you need to know yourself,\u201d Lee said. \u201c\u2018Know yourself\u2019 applied to cybersecurity is situational awareness, and \u2018know your enemy\u2019 is threat intelligence\u00a0sharing.\u201d<\/p>\n<p>A bank of display monitors at the front of the\u00a0<span class=\"caps\">ISOC<\/span>\u00a0demonstrated just how well the city now knows\u00a0itself.<\/p>\n<p>One screen tallied digital security events. That could mean anything from a phishing email sent to a city email address to a curious request to a city system.<\/p>\n<p>The figure typically hovers between 800 million and 1 billion events every 24 hours but was only around 300 million during the Monday morning when\u00a0Nextgov\u00a0spoke with Lee because hackers, like everyone else, prefer to take weekends\u00a0off.<\/p>\n<p>Another screen listed the countries these security events originated from. The U.S., Russia and China led the list, as usual, Monday morning with the\u00a0<span class=\"caps\">U.S.<\/span>\u00a0on top. Attempts from Russia and China tend to rise during normal business hours in those countries and fall during their sleeping hours, he\u00a0said.<\/p>\n<p>Another screen tracked activity on city websites for possible attempts to overwhelm them with distributed denial of service\u00a0attacks.<\/p>\n<p>There had been 4.5 million failed attempts to log into city accounts that day, according to yet another screen. When that figure rises above 6 or 7 million, Lee begins to pay attention, he\u00a0said.<\/p>\n<p>One of the most important screens at the\u00a0<span class=\"caps\">ISOC<\/span>\u00a0tracks activity on 104 particular city assets that are considered highly critical, such as its payroll\u00a0system.<\/p>\n<p>\u201cAnything that targets those, we focus on that and we\u2019re in an elevated threat space,\u201d Lee said. Three of those systems were being targeted that Monday\u00a0morning.<\/p>\n<p>The\u00a0<span class=\"caps\">ISOC<\/span>\u00a0monitors city networks using a system of sensors developed for state and local governments by the Homeland Security Department and based on the federal government\u2019s own threat detection system called Einstein. The\u00a0<span class=\"caps\">ISOC<\/span>\u2019s system, called Albert (get it?), detects malicious traffic coming in and out of city\u00a0networks.<\/p>\n<p>The\u00a0<span class=\"caps\">ISOC<\/span>\u00a0also continuously monitors activity on employee computers and networks and receives alerts about anomalies that suggest someone other than a city employee is inside the system. Those alerts could come when someone accesses a system late at night, for example, or copies an excessively large number of\u00a0files.<\/p>\n<p>Knowing itself is only half the battle, though. The\u00a0<span class=\"caps\">ISOC<\/span>\u00a0also struggles to know its\u00a0enemy.<\/p>\n<p>Lee\u2019s office receives streams of threat data from the Homeland Security Department\u2019s automated indicator sharing program, which includes threat intelligence from the government\u2019s own sensors and intelligence services as well as information companies share with the government under a 2015 law that guarantees them legal indemnification for doing\u00a0so.<\/p>\n<p>The center also receives threat information from a government-backed cybersecurity information sharing program for state and local governments, known as the Multi-State Information Sharing and Analysis Center, and subscribes to a feed of private sector threat\u00a0data.<\/p>\n<p>The Homeland Security data is, by far, the most useful and voluminous data source, Lee said. He echoed a\u00a0<a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2017\/11\/dhs-cyber-info-sharing-focuses-quantity-over-quality-ig-says\/142372\/\" target=\"_blank\" rel=\"noopener noreferrer\">criticism<\/a>\u00a0made by private companies, though, that the Homeland Security data often lacks context that would make it easier to determine which threat indicators are most important and how they apply to city\u00a0systems.<\/p>\n<p class=\"wysiwyg\"><strong>Securing the\u00a0Community<\/strong><\/p>\n<p>In August last year, Los Angeles launched a cyber threat sharing initiative with the\u00a0<span class=\"caps\">FBI<\/span>\u00a0and Secret Service, which investigates many financial cyber crimes. The initiative, called\u00a0<a href=\"https:\/\/www.lacyberlab.org\/what-los-angeles-cyber-lab\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Lab<\/a>, also includes the University of California, Los Angeles, the University of Southern California and California State University as well as numerous large businesses including Cisco and\u00a0<span class=\"caps\">IBM<\/span>.<\/p>\n<p>In addition to sharing cyber threat information with each other, the consortium produces a feed of information that other organizations can subscribe to for free, including the city\u2019s many small and medium-sized\u00a0businesses.<\/p>\n<p>Eventually, Cyber Lab hopes to shift to an automated threat sharing model similar to how Homeland Security shares threat information with top national companies, Lee said, rather than compiling and emailing data\u00a0files.<\/p>\n<p class=\"wysiwyg\"><strong>The Weakest\u00a0Link<\/strong><\/p>\n<p>All this security work, however, can\u2019t overcome insecure employees. Lee\u2019s office sent phony phishing emails to city employees in early 2016 to test who would open them. They were disheartened when about 40 percent of employees clicked the seemingly malicious\u00a0links.<\/p>\n<p>After a concerted retraining effort, the percentage of people clicking the email links dropped to 20 percent and then 10 percent and then further during the course of the\u00a0year.<\/p>\n<p>When a threat sneaks through these defenses, such as ransomware that an employee recently downloaded from her personal\u00a0<span class=\"caps\">AOL<\/span>\u00a0email account,\u00a0<span class=\"caps\">ISOC<\/span>\u00a0staff has some power to remotely lock users out of systems and can immediately share information with an agency about how to prevent the threat from\u00a0spreading.<\/p>\n<p>In the case of that ransomware attack, the attacker was able to move within about 20 seconds from the employee\u2019s computer to a shared system and encrypt about 270,000 files. It took Lee\u2019s staff and the department about 24 hours to restore those files from backups. It was one of about 40 ransomware attacks across seven departments the city suffered last year, he\u00a0said.<\/p>\n<p>After each significant attack, Lee\u2019s office compiles a report that it shares back with the department staff describing precisely what happened in layman\u2019s terms, moment by moment, and how to prevent it from happening\u00a0again.<\/p>\n<p>\u201cI always train my team to not just do detection and investigation and remediation,\u201d he said. \u201cI also want them to be able to tell the story back to the customers so they really understand what\u2019s going\u00a0on.\u201d<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"http:\/\/www.defenseone.com\/technology\/2017\/12\/la-cyber-center-hopes-be-model-cities-nationwide\/144413\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.defenseone.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los \u00c1ngeles se ha convertido en un caso de estudio sobre c\u00f3mo una ciudad puede usar modelos desarrollados en el gobierno federal y sectores industriales&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2570"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2570"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2570\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}