You are on page 1of 13

No 1 | 2017

Crypto SmartProtect
The highest level of cyber defence
Focus

Attacks from cyberspace


3 | FOCUS
Attacks from
cyberspace
IT system operators have to arm themselves against a growing variety of attacks from cyberspace that
also applies to organisations with highly professional defence systems. After all, the larger the number of
networked devices and the more complex the structures, the more difficult it is to provide effective protection
6 | INTERVIEW
against dangers. Besides attack entry points on the technical side, employees must also be prevented from
Interview with Bernhard Hmmerli, becoming risk factors.
IT professor at Lucerne University
of Applied Sciences and Arts
The increase in networking, automation, digitisation, and Multifaceted attacks
10 | The enemy in the system digital transformation is also driving the rapid expansion of Attacks from cyberspace come in a variety of forms. Basically,
cyberspace the virtual space that encompasses all IT systems all aspects of information security are affected. Advanced
14 | Crypto SmartProtect for total  that are globally connected over the Internet or similar net- persistent threats (APTs), for example, are attacks on the
Information Security and works. Attack surfaces for information, applications, processes, confidentiality of information. They are targeted attacks on
maximum ease of use and communication between all these systems are constantly organisations or government authorities. In the process, the
Dear Readers increasing as a result. attacker gains permanent access to a victim network and
18 | Government-supported successively expands that access. APTs require excellent tech-
Cyber defence therefore involves the struggle for information nical expertise plus the use of extensive resources and are ge-
Digital transformation is moving full steam ahead as protection systems
security, i.e. for the availability, authenticity, integrity and confi- nerally difficult to detect. Incidents in which non-authorised
is the networking based on public networks that is 21 | Chat securely dentiality of digital data and systems that process data. Organi- parties gain access to data are designated as data losses or data
associated with it. That is why the threats from cyber- sations, companies and government authorities in particular leaks this applies both to serious cases such as APTs and to
space are likewise increasing worldwide. This trend 22 | SUCCESS STORY are making efforts to prevent data outflows. Yet the frequency less far-reaching penetration into IT systems.
affects not just companies but public authorities and of innovation is high both among those attacked, who have to
Document exchange in
organisations as well. In many cases, the attackers protect themselves constantly against new attacks, and among
government contexts with the attackers.
target the terminal equipment of the employees. This
end-to-end protection
approach enables, for instance, customised malware to
be smuggled into a government ministry, data to be
drawn out, and great harm to be done. To be guarded
against these highly professional cyberattacks, multi-
ple-level security elements are required to protect the
primary attack targets, the computing platforms.
CryptoSmartProtect, the unique high-security com-
puting technology developed by Crypto AG, elimi-
nates this security risk and reliably wards off cyberat-
tacks. At the same time, work can proceed with its
usual convenience in the familiar user environment.

In this issue of CryptoMagazine, you will find more on


this new technology as well as on important fields of
action in cyber defence and possible systems of
protection.
Publication details

Published twice a year | Print run | 4,200 (German, English,


French, Spanish, Russian, Arabic)

Publisher | Crypto AG, P.O. Box 460, 6301 Zug, Switzerland,


www.crypto.ch

Editor-in-chief | Anita von Wyl, Crypto AG, T +41 41 749 77 22,


F +41 41 741 22 72, anita.vonwyl@crypto.ch
Giuliano Otth Reproduction | Free of charge with the consent of the editorial office.
Courtesy copies requested. Copyright by Crypto AG

President and Illustrations/photo credits | Crypto AG: Cover, pp. 2, 14, 21, 22 |
Keystone: p. 18 | Prof. Dr. Bernhard M. Hmmerli: p. 7 |
Chief Executive Officer Shutterstock: pp. 3, 8, 9, 10, 13, 20

CryptoMagazine 1/17 | 3
Focus Focus

Cyber war

IT system
Digitisation

exploitation
Computer
network
Cyber crime
Botnet
Cyberattack
Social engineering
Defacement Denial-of-Service
Critical infrastructure
Distributed Denial-

Resilience

Phishing
Advanced persistent threats Cyber risk Ransomware
Cyberspace
of-Service

Malware Social media


Computer Computer network attacks
network
Command and Control Servers Crime in cyberspace In actual practice, it is often difficult to distinguish between
defence Digital space is limitless, which often makes it difficult, or in cyber war and cyber crime. For one thing, the attackers are
many cases hardly possible, to identify attackers. Nonetheless, often impossible to identify; for another, attacks against private
various types are recognisable, both among victims and companies can also be in pursuit of military goals. These goals
among attackers. The latest highly professional attacks show include, for instance, interfering with the everyday social and
the following: In many cases, the attacks are undertaken by economic life of a country. They can be pursued by means of
groups that act systematically to pursue political, economic attacks against private companies responsible for providing the
or anti-governmental goals. power supply or similar critical infrastructure.

Typical attacks on the integrity and authenticity of data, Workplaces in the sights of attackers Rapid developments expected
two further aspects of information security, are known as de- There has been an upsurge in attacks on terminal equipment. Two developments are accelerating the spiralling attacks and
facements. The content of a website is changed and falsified Some are used as a springboard to penetrate further levels of Attacks from cyberspace countermeasures. One is the proliferation of electronic devices
in the process to mislead visitors to the defaced Internet pages. an IT system. It is therefore crucial that organisations and affect all aspects of information and their networking. The other is the growing complexity of
This tactic is also common in connection with attempts to
use phishing to access passwords. Attackers try to employ fake
government authorities maintain high standards of workplace
security. That is true regardless of location but to a special
security. the tasks that these devices can perform. Industry 4.0 entails
process-integrated cooperation across companies and organi-
websites, e-mail addresses or short messages to obtain a users extent particularly for employees active outside their usual sations and is creating whole new dimensions of networking.
personal data and thereby commit identity theft. The term is work environment, for instance, travelling or at home. It is Attacks primarily aimed at enrichment or economic harm are A look at this and similar trends clearly shows that not only a
derived from "password" and "fishing", and means "fishing precisely the employees who must be reachable at all times known as cyber crimes. Offences such as identity theft or wealth of possibilities is opening up but that new attack
for passwords". who need especially secure infrastructure. In this context, it is business espionage generally fall into this case group as well. surfaces are also being created.
important to keep in mind that the required safety processes
All aspects of information security affected must be kept as convenient as possible, so employees are But cyberspace is likewise a place where war is waged. It is In the development of effective protective mechanisms, it is
The availability of data is prevented, say, through launch of not tempted to disregard security standards for reasons of uncontested that warfare in the information age always also all the more important not only to create measures aimed at
denial-of-service (DoS) attacks that render individual services, practicality. involves digital components. In mid-2016, NATO officially protecting data during transmission but likewise to keep an eye
websites or entire networks unreachable for users. If a DoS declared cyberspace to be a war zone. That means attacks on the growing number of terminals. Not least, privately used
attack is undertaken by several systems at the same time, it Conversely, the use of private applications at work say, social conducted there can trigger consequences akin to attacks on devices must be taken into account in security considerations
is known as a distributed DoS or a DDoS attack (distributed media open entry points for attacks. Social engineering is the ground, in the air or by sea. so that even the tiniest loopholes can be closed before attackers
denial-of-service attack). DDoS attacks are characterised by the employed to mislead victims into divulging data of their own gain access through them to entire systems.
large number of computers and services in use as a rule, accord, circumventing protective measures or installing mal- A cyber war can therefore cause an enormous amount of
botnets are used. A botnet is a group of computers, all of which ware. The perpetrators exploit human weaknesses such as damage. Military conflicts conducted with IT resources in
are compromised by a malicious code. The code turns them curiosity or fear to manipulate the victims. Consequently, the cyberspace are often categorised as being of three types: If an
into bots a term taken from "robot". The affected computers latter click on links that covertly install malware, for example, attacker's aim is to paralyse or destroy the opponents network
are monitored and controlled by botnet operators through a or they divulge passwords and other sensitive information. capacities, the actions are known as computer network attacks
command and control server. Another method of impairing (CNAs). Computer network exploitation (CNE), for its part,
the availability of data is to use ransomware i.e. malicious pertains to actions aimed at obtaining intelligence information
software that installs itself unnoticed. It restricts the availability from the opposing sides computers. Actions taken to protect
of the data until the user of a system pays a ransom or satisfies ones own computers and computer systems are known as
another demand from the attacker. computer network defence (CND).

4 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 5


INTERVIEW

"A promising approach is for


organisations to pursue diverse
strategies at the same time."
A massive upsurge in attacks from cyberspace has been observed along with a dramatic rise in the profession-
alism of attackers. In this interview, Bernhard Hmmerli, IT professor at Lucerne University of Applied Sciences
and Arts, classifies the attacks and their perpetrators and examines ways in which organisations and govern-
ment authorities can efficiently protect themselves.

Cyber risks have risen markedly in recent years. How would What is the appropriate response to these developments? What are common types of attacks on companies and
you describe the status quo of the cyber security situation There are two fundamental strategies: One is to rely on government authorities?
for companies and government authorities? deterrence at the policy level, through strict penalties for There is a whole range of attacks. Often, the point is to tempt
The World Economic Forum estimates that the cost of cyber instance. The second is for the organisation to be prepared if users into clicking on something be it a link or an attachment
crime in 2015 as applied to Switzerland totals about US$ 5 billion. something does happen. This latter strategy is summarised sent by e-mail. This is a way of installing malware that can be
This figure is four times as large as in 2013. By contrast, the with the catchwords "detection and response". In other words, used, say, to extract data. Malware of this kind is often the first
outlays for national precautionary measures in Switzerland attacks must be detected promptly and countermeasures taken springboard for penetrating the IT system of an entire organi-
amount to only about US$ 70 million. The trend in estimated quickly. In addition, the security architecture must be designed sation. Besides surveillance, attacks may also be aimed at
damage from cyber incidents indicates, on the one hand, so that an attack on one workstation does not render the entire impairing functionality. Prof. Dr. Bernhard M. Hmmerli has been teaching
dramatic growth, and on the other, in my opinion, a discre- IT system vulnerable in one fell swoop. information technology since 1992 at the Lucerne Univer-
pancy between the estimated losses and the investments made What types of attacks are particularly heinous and why? sity of Applied Sciences and Arts and since 2009 also at
in countermeasures. Could you comment on the perpetrators of attacks and There are no hard and fast rules on that. It depends on the the Norwegian University of Science and Technology.
their motives? activities of an organisation and the goals of an attack. What He focuses on teaching and research in the fields of
What is the reason for this trend? For one thing, there is a financial motive; for another, attacks is uncontested, however, is that serious problems can arise if a communication, networks and information security. He is
On the one hand, the level of professionalism among attackers from cyberspace pursue political goals. It is not uncommon to hack into an IT system goes undetected for an extensive period a specialist in the protection of critical infrastructures.
has risen enormously in recent years. The point is no longer have a subset of motives combining financial and political goals. of time. On the one hand, the activities of an organisation Since 2012, he has headed up the ICT Security Platform
recognition, as it was with the first hackers, but rather tangible could be monitored in this way over a longer period of time; of the Swiss Academy of Engineering Sciences (SATW).
financial gains. And dominance in cyberspace especially Could you describe a typology of the most frequent victims, on the other, attackers would be able to wait for the optimum
with respect to governmental action in this area. also with an eye to making a distinction between cyber war time to attack their target. That is why a "detection and res-
and cyber crime? ponse" team is so pivotal. There are known cases of attackers
How is effective protection against cyber risks structured? This distinction is difficult because combinations are com- having access to critical IT systems for years on end.
Until about a decade ago, many organisations assumed that monplace. Among victims, all conceivable players can be
investments in protective measures would suffice to prevent found, from private individuals who get taken in by a phish- How can government authorities protect themselves
damage from attacks. The assumption was correct for a long ing e-mail, or companies whose business secrets have been and national companies?
time. Yet the attacks have increased massively. In the mean- spied into, to countries who are watching each other in cyber- This task requires situation centres that continuously monitor
time, government authorities and large organisations are space to base their actions on the information they glean. activities in cyberspace and provide information about dangers:
under almost constant attack. And these attacks involve Efforts in this area should be intensified in Switzerland. With
substantial risks for information security in other words, the Reporting and Analysis Centre for Information Assurance,
they endanger the availability and authenticity of digital data known by its German acronym MELANI for short, we already
as well as its integrity and confidentiality. have a centre in Switzerland focused mainly on reporting
incidents and subsequently analysing them. Moreover, inter-
national collaboration on communicating about threats and
vulnerabilities is to be further intensified.

6 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 7


When the level of information security is high, user conveni-
ence is frequently limited. Do IT security managers have no
choice but to live with this compromise?
The situation in the past actually was that nearly all IT security
measures were subsequently retrofitted and it was often quite
unpleasant for users to follow them. Usability is given a lot of
attention nowadays and the products currently on the market
have integrated security functions virtually free of restrictions
on operating convenience.

Where do you think the key areas of action will be in the


future when it comes to cyber defence?
There are a number of starting points. I would like to cite an
example briefly. To my mind, it is crucial that forensic skills be
expanded at national level. In other words, attacks should be
able to be investigated on site more efficiently and effectively.
Particularly smaller countries, such as Switzerland, regularly
have to resort to private providers of forensic services in some
cases from abroad even in cases where questions of national Crypto cSeminars
security are at stake. For companies and organisations, I think
it is important to pursue a holistic approach that takes into With its Crypto cSeminars, Crypto AG addresses specialists
account the different dimensions of information security. Users entrusted with the information security of companies
should not see their ease of use be restricted despite a high level and organisations. Experienced experts convey profound
of information security. Instead, they should be able to work expertise about information security, cyber crime, and
efficiently, comfortably and very securely in their familiar user cryptography. In this age of digitisation, solid expertise
environment wherever possible. regarding cyber defence is crucial. Participants in the
Crypto cSeminars have this expertise and can use it for
comprehensively protecting sensitive information and the
ICT infrastructure within a company.

How big is the risk emanating from human beings? Studies The Crypto cSeminars are held at the Crypto Academy
shows that more than 50 percent of the primary attack entry Cyberattacks involve substantial in Steinhausen/Zug, Switzerland. Further information
points are attributable to employees behaving incorrectly.
In fact, the success of the initial infection of an IT system can
risks for information security is available at www.crypto.ch/seminars.

quite often be traced to an exploitation of incorrect human be- they endanger the availability and
haviour. Assume we have a government agency with 10,000 em- authenticity of digital data as well
ployees. Within one year, they all receive 100 e-mails from an
attacker sent with the objective of initiating the download of as its integrity and confidentiality.
malware. That means a total of one million attacks, which can
be carried out with relatively little effort. If just one employee
clicks a single time on the link, the attacker has achieved his Existing security systems often fail to stop customised attacks
objective. Now, the probability of an error occurring in one on terminal equipment. How can we assure information
out of one million cases is quite high. security in terminal equipment?
The problems involve several components: Each user no longer
What is the best way to keep the "human factor" has just one device but often has two to as many as five devices
under control? in use. With mobile device management (centralised manage-
A promising approach is generally for organisations to pursue ment) and virtual desktops (virtualising the PC desktop in the
diverse strategies at the same time. On the one hand, the point data centre), the security situation in a company can be im-
on the technical side is to create largely self-contained spaces proved enormously. Once again, the employees play a role in
within the IT system so damage caused by penetration in an this process. Continuous training on correct behaviour helps in
IT system remains clearly limited. It is also recommended to this context, as was already mentioned. Nonetheless, it can be
virtualise activities whenever possible. Finally, a central factor assumed that even those efforts will not achieve one hundred
is to sensitise employees continuously with an eye to awareness, percent security. To attain a higher level of protection, all as-
attitudes and behaviour. pects of a security architecture must be taken into account. That
way the confidentiality of the information is assured at all times.

8 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 9


The enemy
in the system
Even organisations keenly aware of IT security are
not immune from cyberattacks. Attacks that amaze
experts and the general public alike keep getting
publicised. That is because supposedly highly secure
companies or government authorities became victims
of attackers who targeted the terminal equipment of
the employees. For IT security architecture, one rule
applies more than ever: Pay attention to the terminal
equipment of the employees and keep them consist-
ently separate from public networks.

No one expected this situation. The government authorities


wrongly believed they were secure. People were convinced
of being fully protected against any kind of cyberattacks.
The shock was all the greater when IT security managers were
forced to realise that cyber criminals had been entering and
exiting their supposedly secure IT system at will for months or
perhaps even years on end. What remained behind were mostly
question marks. In retrospect, it was no longer possible to re-
construct all the details involved in the attack. One can only
speculate which information and data was taken, how the
attackers gained access to the internal networks, and which
systems were infected.

An investigative report commissioned by the government was


written and published. Its object was to enable other companies
and government authorities to arm themselves more effectively
against attacks of these kinds. The identity of the perpetrators
still remains a mystery.

Using known software to enter an internal network undetected


The cyber criminals in this case proceeded with the utmost
care. It is therefore not known for sure when they commenced
activity. What is certain is that they utilised known malware for
years consisting of different Trojans. The good camouflage in
the system is a feature of this technology. For example, it does
not require any administrator rights, which causes many classic
anti-virus programmes to start up.

Attackers proceed with the utmost


care and move undetected.

10 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 11


The attackers were also extremely patient. They confined During actual infection, the perpetrator moves in the network
their attacks within the government authority to victims they via various attack tools. Often, an initial reconnaissance tool
could expect something from. They found that out by closely with modest capabilities is installed for this purpose. It is later
observing the computer activities of the individual employees replaced by a comprehensive malware that entrenches itself
through the malware they had smuggled in. Moreover, the in the system. The attacker can use this malware to move
perpetrators probably obtained further information from the laterally in the system and look for information. Typical of
status of the observed individuals in the organisation for this lateral movement is that the attacker obtains additional
instance, also information that is freely accessible on social permissions and privileges over time by spying out pass-
media networks. words, for example. To avoid detection by monitoring tools,
the data flows are often sent indirectly rather than directly.
The main target of the attack was initially the active directory For the actual theft, the data is often sent compressed and
of the IT system. It is the central address book and from there, fragmented and to a certain extent, encrypted so the attack
other applications and devices can be accessed. The attackers is not discovered during this crucial stage.
were also careful when it came to actual theft. To avoid creating
any anomalies in network traffic, there were times during the

The goal is to make life as difficult


attack when the level of activity was high but also ones when
it was low.
as possible for the attackers. The
From a technical standpoint, something called command and
control servers were utilised for the attack. They activated
decisive aspect is that ones own
what are known as waterholes. This term refers to Internet sites system is monitored constantly
manipulated by the hackers that are frequently visited by the and closely to discover traces of
victims and therefore trusted by them. The report said that jobs
were sent to the infected devices from these servers a large ongoing attacks immediately.
number of them were in operation. It was an ingenious system
comprising a host of non-locatable servers, a feature which
likewise prevented the attacks from being noticed for quite IT security intensified through the exchange of information
some time. The authors of the investigative report concluded that attacks of
this kind can hardly be prevented. The goal, however, has to be
Professional data theft to make the life of the attackers as difficult as possible. The de-
The investigative report called the attack on the government cisive aspect is that ones own system is monitored constantly
authorities exemplary. Experts distinguish the following and closely to discover traces of ongoing attacks immediately.
general stages in large-scale hacker attacks: victim evaluation, It is likewise important to share information about infections
the initial infection and infection, and the actual exfiltration. that have occurred or been attempted.

The point of the evaluation stage is to collect as much This assessment is also conveyed by the experts from Crypto AG.
information as possible about the target of the attack. That Effective system monitoring is deemed an essential part of a The high-security zone is an isolated zone and does not have the direct integration of hardware-based components with which
includes a collection of IP addresses and diagrams as to comprehensive defence arrangement. It provides the opportunity access to the Internet. From the secure zone, the Internet can myriad secure VPN tunnels can be created. These tunnels, in
how the potential victims move within the IT system. This to detect illogical connections or other anomalies. To be able be accessed securely only via protection at the perimeter. turn, can be individually encrypted with keys that are independ-
information can initially be collected passively but later also to assure maximum IT security, there are also ways of building ent of each other. Until now, if sensitive data was edited on a
actively. Prior to the actual attack, the perpetrators must set IT systems today so they are fully protected against attacks of this Experts believe the key problem in the hacker attack mentioned terminal device, this task was done with minimum protection
up the waterholes, i.e. tamper with the Internet pages fre- kind, thanks to major ICT advances. above was that although different security zones had been de- and offered an easy target for cyber criminals.
quently visited by victims. Alternatively, they can also pre- fined, there were probably "holes" between them. The attackers
pare e-mails as a means by which to conduct the attack. The decisive factor in these efforts is that different security levels exploited this fact. These gaps were the only reason they were Crypto AG has now succeeded in closing this security gap by
are assigned within an organisation and communication occurs able to advance laterally through the system and become privy protecting terminal equipment with a combination of several
The initial infection stage is characterised by waterhole exclusively within these zones. Classified information at the top to company secrets step by step. hardware and software security elements. Crypto SmartProtect is
activation or manipulated e-mails. The actual attack begins. secret level, for example, is never allowed to leave the high-secu- the new technology for this purpose and furnishes full protection
If it succeeds the victims behaviour is carefully examined and rity zone. In addition, as few users as possible should have access Experts from Crypto AG say it has been no problem for quite for sensitive information in civilian and military fields of appli-
a suitable attack tool is selected based on the findings. These to this information. For subordinate security zones, the data that some time to assure highly secure communication within a cation. For more on Crypto SmartProtect, check out the
actions are referred to as social-manipulative attacks. is present is less sensitive and the security aspect is consequently security zone. Even if people are working externally on a laptop, following article on page 14.
less central. However, these zones, too, must be sealed so as not for instance, data can still be transported through protected
to endanger the security of the overall system. virtual private network (VPN) tunnels. This is achieved through

12 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 13


Crypto SmartProtect for
total Information Security and
maximum ease of use
"Complexity is the worst enemy of security," is a favourite saying of IT experts. But IT systems of organisations, A scenario of this kind poses major challenges not only
companies, and government authorities are in fact becoming more and more complex. IT security managers for employees but also for the IT security manager. He is Crypto SmartProtect reliably
are increasingly facing a dilemma between demands involving information security on the one hand and ease responsible for providing the key staff with IT infrastructure shields against cyberattacks
of use on the other. Crypto SmartProtect resolves this apparent contradiction. and workplaces that are user friendly but also highly secure.
Until now, this balancing act between security and ease of
and enables secure and con-
use required compromises. Not least, the scenario called for venient work in a familiar
The circumstances of given situations require quick action: sation. He modifies the data and then sends it over the multiple systems true to this principle: "Only physical environment.
Say, an employee is travelling abroad when headquarters Internet. In the process, the object is to follow the restrictive separation assures maximum information security."
sends classified top secret data to him on his computer. His security regulations of the organisation while also assuring
task now is to make excerpts of this classified information the confidentiality, integrity, and authenticity of the sensitive With Crypto SmartProtect, Crypto AG makes a technology
available to other individuals with the same level of authori- information. available that satisfies all the demands of highly secure, Attack patterns change
local data processing on terminal equipment and its secure In the past, all IT systems were generally assigned to a common
transport while also taking into full account the tough network, whose interface with the Internet comprised a central
requirements and needs of todays working world. During security gateway solution that was responsible for information
development the main focus was on maximum ease of use, security. This security architecture may have met the demand
including maximum security, with the ease of use remaining for simplicity but it provided insufficient information security
unrestricted by the security requirements that have risen (refer to the article on page 10). Once an attacker overcame this
sharply due to increasing cyberattacks which will continue security gateway, the entire network and all its components
due to the trend towards digital transformation. were open to him. For this reason, different security zones were
set up allowing data to be assigned according to classification;
Until now, IT security managers had to be careful, on the one i.e. a three-level model consisting of a high-security zone, a
hand, not to put overly tight constraints on users. If restric- secure zone and a trusted zone. The classification is there to
tions are too stringent, they impair efficiency or, in extreme enable information to be filed according to its importance
cases, are circumvented altogether. On the other hand, many or confidentiality.
employees need secure access to sensitive information at all
times, regardless of their location or the platform they are Access across zone lines is banned, ensuring additional
using. The crux in such cases is that classified, unclassified security. This principle prevents attackers from being able
and public information can be handled simultaneously and to exploit a compromised system with weaker security
conveniently, in particular also utilising the familiar user measures as a springboard into the entire network. If an
environment. In addition, direct access from the workplace IT system is compromised, only the IT systems belonging to
to external sources of information, say the Internet, must be the same zone and organisational entity are in danger. This
provided in order to furnish employees with an efficient and architecture delivers a high level of information security, but
familiar work environment. allows access to classified and unclassified information only
via separate notebooks or PCs, an arrangement that does not
promote user friendliness and tends to be cumbersome.

14 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 15


Technology architecture for full protection In the event that one and the same terminal device requires
against cyberattacks access to different security zones or separate networks, multiple
The compromises between information security and ease of use protected Compartments that are mutually isolated from each The Crypto SmartProtect computing platform comprises
are not the only continuing source of irritation for IT manag- other can be operated simultaneously. Thus a person can work user environments in isolated Compartments along with
ers. The ever greater complexity of off-the-shelf operating in one Compartment in a self-contained, trustworthy user a security operating system and protected hardware
systems and applications pose problems as well. These systems environment online and offline while at the same time utilising
are geared to compatibility, functionality and performance and public networks in a second Compartment. The two user
are based on codes several millions of lines long. Needless to environments are completely separate from each other and the
say, massive security risks lie dormant in these types of information in the trustworthy Compartment remains protect- Compartment A Compartment B Compartment C
architectures. A workplace today would be inconceivable ed at all times.
without modern operating systems and applications. For these

User environments
operating environments to be able to be run securely, they The Crypto SmartProtect Security Module is at the core part of
must be contained in a secure Compartment that effectively the hardware. It contains the boot image of the Crypto Smart-

Application

Application

Application

Application

Application

Application

Application

Application

Application
protects them against attacks from the outside. This protection Protect OS plus all encryption and authentication services.
is achieved with the secure operating system Crypto Smart- These security elements are all fully protected by the Crypto
Protect OS. The security operating system provides fully Security Architecture and are therefore unassailable. The four
insulated Compartments. The user environments in these fundamental security goals of confidentiality and integrity, Standard Standard Standard
Compartments are executed on the same processor by means availability and authenticity can be assured. Included are tried- operating system operating system operating system

of the security operating system and under the watchful eye of and-tested features such as secure boot, secure login, and disk
the microkernel, with consistent separation prevailing. The encryption. The first-named executes a comprehensive security
Virtualisation Virtualisation Virtualisation
architecture of the security operating system is based on the check on every boot. Booting is continued only if this check

Security operating system


principle of security by design. All components are structured, confirms the integrity of the entire hardware and software. Crypto SmartProtect OS
isolated, and independently verifiable. The authorisations for The second feature, secure login, assures unequivocal evidence
using the services of the individual components are unchange- of identity based on multi-factor authentication. Finally, disk
ably anchored, a feature consistently enforced by the microker- encryption performs automatic and permanent encryption on
nel. This approach averts all attacks on the Crypto Smart- all data. Depending on application requirements, the Crypto
Protect OS and thus also on the user environments. SmartProtect Security Module can be enhanced by the addition
of IP VPN encryption or file encryption.
Microkernel
Back to the cited scenario: When using Crypto SmartProtect,
When using Crypto SmartProtect, employees can create, edit, save, delete and send data on their
employees can create, edit, save, computers simultaneously in different security zones in

delete and send data on their com- consistently separate Compartments yet still access public Crypto SmartProtect Security Module Encrypted disk

networks. Consequently, employees work in their familiar and


puters simultaneously in different absolutely secure user environments without having to make

Hardware
Monitor Touchpad
security zones in consistently any sacrifices in terms of ease of use or being limited in data A
Keyboard Processor
handling by restrictive security precautions. Tasks can be
separate Compartments. performed in a manner that is not only highly secure but
B
Mouse RAM
also efficient and convenient. C

Optional

Crypto Security Architecture Secure login Secure boot IP VPN encryption

Crypto SmartProtect OS Disk encryption File encryption

16 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 17


Nuclear power stations are among
the best protected kinds of industrial
property and have comprehensive
protection plans.

Government-supported
protection systems
Malfunctions and failures of critical infrastructures (CIs) have serious consequences. Comprehensive protec- or interrupting their availability. Among their goals, the Keener awareness for cyber risks
tive measures are all the more important, especially to minimise cyber risks. With the "National strategy for attackers want to impair the confidentiality or authenticity of Basically, the attitude taken in the strategy is that the indivi-
Switzerlands protection against cyber risks (NCS)", the Confederation points out where action needs to be the information with their actions enabling them to read, delete dual stakeholders are responsible themselves for implementing
taken and offers government bodies, assistance for CI operators. and modify data, overburden connections or server services, and optimising protective measures against cyber risks. Accor-
spy on information channels, or intentionally tamper with ding to the strategy, this has the following consequences for
monitoring or performance systems. CI operators: The risks are not allowed to be handled according
The infrastructures of a country are its lifelines. Their proper in information security. In light of the complex types of digital to solely economic principles. Instead, CI operators must make
and reliable operation guarantees stability, order, and security networking under way in various areas, it no longer suffices to efforts above and beyond that to minimise the risks.
basic requirements for the smooth functioning of society, protect these areas separately. Integrated protection approaches
business and government. There is a special focus in this are called for instead in order to minimise the ramifications of 90 percent of the important The Confederation notes, however, that there is still a lack of
context on critical infrastructures (CIs) from the sectors of incidents on the economy and the general public and to restore infrastructure areas depend on awareness in several sectors as to the threats emanating from
government authorities, energy, transport, public security,
waste disposal, finance, health, food, industry as well as
life to normal as quickly as possible.
IT and protected communication cyber risks. Integral thinking is likewise not yet established
everywhere. This approach says that cyber risks can be reduced
information and communication. CI protection is considered Attack on information systems technology. not just with technical measures such as fail-safe, alternative
extremely important. Along with strictly physical protection, The "National strategy for Switzerlands protection against and specially protected means of communication, and that
suitable protection against cyber risks has really come to the cyber risks (NCS)" was passed by the Swiss Confederation in information and data must be explicitly protected. Equally
fore in recent years. 2012 and reads as follows: "Cyberattacks on critical infrastruc- The effects of cyberattacks could have horrendous consequenc- important, are organisational issues (such as the classification
ture can have particularly severe consequences, as they can es for the entire population and the economy. For instance, of information or the regulation of access rights) and staff
It is estimated that 90 percent of key infrastructure areas in compromise vitally important functions or trigger fatal chain after a cyberattack, a blackout in the power supply would issues (i.e. security checks or behavioural training).
industrialised countries rely on information technologies (IT). reactions. Therefore, (often private) CI operators play a key role paralyse critical infrastructures as well as the entire national
The use of IT improves efficiency on the one hand, not least as providers of important services with overriding security economy. The ensuing effects for the general population would
due to networking among the different areas. On the other implications." include, for instance, failure of lighting, heating and other
hand, there is rapid growth in dependency and increased electronically controlled articles of daily use without which
susceptibility to malfunctions and manipulations. All in all, Cyberattacks are launched on computers, networks and data. everyday life would be inconceivable.
business, society, even whole countries have become more These attacks are aimed at interfering with the integrity of the
vulnerable, boosting the need for effective protective measures data or the functioning of the infrastructure as well as limiting

18 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 19


Government providing subsidiary aid
With regard to the role of the Condederation in protecting
against cyber risks, the strategy states the following: "The state
The increasing digitisation and automation plus the standard-
isation of the technologies used (e.g. the concentration on
IP protocols) will bring along new and additional dangers.
Chat securely
provides subsidiary services to protect against cyber risks, The affected sectors are called on to consider the possible new
e.g. through the exchange of information and intelligence risks in developing their systems and products and in designing
findings." The Reporting and Analysis Centre for Information their processes. At the same time, the Swiss Confederation Voice and text messages have long been a part of everyday life. For the last several months, providers
Assurance (MELANI) has a chief role to play. MELANI is notes that absolute protection against cyberattacks is unachiev- of messaging applications have been offering protected ways of exchanging messages. How do they work
operated jointly by the Federal IT Steering Unit (FITSU) able. Well-functioning and far-sighted cooperation between and how secure are they? This article also delves into the high-security solutions Crypto AG has developed
and the Federal Intelligence Service (FIS). government authorities and the operators of critical infrastruc- on this subject.
tures is all the more important. It enables quick and secure
The task of this body is to give operators of critical infrastruc- responses to be made to real cyber threats as they emerge and
tures subsidiary assistance with the information security the necessary groundwork to be laid for a protected and robust Encryption is a subject on everyones lips these days since The customer operates his infrastructure autonomously, so his
process. It does so by collecting and evaluating information information security system. various providers of messaging applications have made avai- data is always under his control. The encryption is carried out
about incidents and threats and then sharing the resulting lable end-to-end encryption for their services. The descriptions in the ruggedised mobile phone in a secure hardware environ-
findings with CI operators. MELANI offers, among other on the various applications being promoted say that neither ment where the customer uses his own encryption algorithm.
things, situational assessments and analyses of early detection providers nor third parties can read the messages. The pro- Only the customer himself possesses and manages his keys that
of attacks or incidents, evaluates their ramifications, and viders claim that encryption is available to everyone with the were created by a true random generator.
examines malicious programmes if the need arises. latest version of the applications.

MELANI supports risk management of critical infrastructures The scenario for sending encrypted messages is as follows: Voice and text messages are
in the process, thereby helping to strengthen their resilience.
Viewed overall, the resilience of critical infrastructures is
First, the recipient creates his own pair of keys. The public key
is conveyed to the sender over the server, so the latter can use it
protected at all times and places
composed of four components: the robustness of the systems, to encrypt the message. With his own private key, the recipient with the Crypto Mobile HC-9100.
the availability of redundancies, the ability to mobilise support- can then decrypt the message. A possible weakness, however, is
ing measures, and the speed and efficiency of supporting that the provider can assign the sender a new public key, say,
measures if the worst comes to the worst. when equipment is replaced or re-installed. That would mean, For the exchange of text messages, the message of up to
for instance, that the sender would then use the key generated 1,000 characters in length is encrypted in the worlds tiniest
by the supplier to encrypt messages not yet received by the high-security encryption device integrated directly in the
recipient. This would put the provider in a position to decrypt phone and sent directly to the recipient. The sender promptly
Blackout in a major city possibly the messages with his new private key. Further, the terminal finds out that the message has arrived at the recipient. As soon
triggered by a cyberattack equipment itself could have potential entry points for attacks. as the message is handed over to the security application,
Key terms indicate this fact, such as the lack of integration security is assured not only for the transmission but also in
protection for the application, the lack of a genuine random both terminal devices. The message is saved in the secure data
number generator or also overly short key pairs. store of the HC-9100, specifically only in the sending and
receiving devices. This feature of the high-security solution
Encrypted chat from Crypto AG marks a major difference from the off-the-shelf models.
Crypto AG has offered an appealing and highly secure com-
munication solution for several years with a specially rugge-
dised mobile phone. Ruggedised means that an unauthorised
modification of the device is reported immediately. Voice and
text messages are protected at all times and places with the
Crypto Mobile HC-9100.

20 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 21


SUCCESS STORY
Government

Document exchange in Mobile office (President) administration

government contexts with


end-to-end protection Internet /
Private IP Network

HC-7835
HC-9300

A government minister is told that secure communication between himself and his staff and the heads of the
various government ministries is protected against third parties without compromise and constantly guaran-
teed. An exchange of editable documents subject to the top level of encryption meets these requirements.

The cooperation with various offices in a government ministry Highly secure exchange of editable documents
takes a variety of forms: The government minister is supported The Internet or also a private IP network can be used for the
by his staff in exercising his political duties. Offices of the highly secure communication of the stationary or mobile
ministry must be supervised but everyday administrative tasks office of a head of state for government administration or the HC-9300
also have to be performed. In the performance of all these government ministers. IP telephony has won the day through
CMS-1200
responsibilities, the highly secure transmission of classified the global expansion of data networks and the performance
documents and information must be assured for all employees. capabilities associated with it. The confidential e-mailing of Crypto
The suitable security platform is used based on the location of encrypted and editable documents is assured with the use of Small office (Minister) Management
the given individuals. Central security management to control the multi-application platform Crypto Desktop HC-9300 and
the communication relationships and user groups is essential in the security application Message / File Encryption HA-6650. Highly secure communication is constantly
this process. assured for stationary or mobile offices over
the Internet or over a private IP network

Even when travelling, the government minister can also If need be, a backup communication channel based on satellite
encrypt data and send it securely to his staff using Crypto communication can be set up to assure constantly available and
The highly secure exchange of Mobile Client HC-7835. The Crypto Management Suite fail-safe capabilities. The Crypto Deployable Secure Mobile
classified information is possi- CMS-1200 assures the centralised security management of Office provides a compact office infrastructure that can be
ble at all times and in all places the Crypto platforms. Furthermore, the CMS-1200 has a operated by satellite communication at any desired location
customised user and authorisation management system and that covers the customary office components.
with authentication mechanisms.
With this product, Crypto AG offers a security solution for
communication and collaboration with end-to-end protection
that meets the highest standards.
Highly secure transmission of
classified documents and infor-
mation must be assured for all
employees at all times.

22 | CryptoMagazine 1/17 CryptoMagazine 1/17 | 23


Zug

Abu Dhabi
Muscat

Kuala Lumpur

Rio de Janeiro

Crypto cSeminars

cSeminar Information Security Specialists


2 to 6 October 2017

cSeminar Technical Vulnerability Testing


Restricted Crypto AG. All rights reserved. 672029/EN/1704

9 to 13 October 2017

Crypto AG cSeminar Contemporary Cryptography


P.O. Box 460 16 to 20 October 2017
6301 Zug
Switzerland The seminars are held at the Crypto Academy
T +41 41 749 77 22 in Steinhausen / Zug, Switzerland.
F +41 41 741 22 72
crypto@crypto.ch Contact and further information
www.crypto.ch www.crypto.ch/seminars

You might also like