Introduction

In 1999–2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security [1]. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot [2]. The latter has recently been updated [3]. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA) [4]. That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. A concomitant requirement was that data availability and veracity had to be assured. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This was made clear at the recent SIIM annual meeting in Portland OR where several speakers regaled the audience with tales of possessed car auto-pilots and homicidal infusion pumps [5, 6]. Unfortunately, faced with such a complex topic, the typical medical center management response in employee training stresses complex passwords (changed quarterly) and being careful about what emails they open. This has led leaders in the field to define “security theater” [7].

To understand the complexity of the issues requires a structured treatment. Towards that end (and with a nod to Mr. Schneier), this paper treats cyber-security as dramatic play with actors, their motivations, and plot arcs. Thus, the following sections can be considered as the parts of a screenplay.

  1. (a)

    The human cast of characters involved in the cyber-security drama—and their motivations

  2. (b)

    The props used by those actors, noting that some can be used by different groups for diametrically opposed purposes

  3. (c)

    Illustrate the above cast and props with a couple of real-world scenarios

  4. (d)

    Conclude with some recommendations

Finally, the gritty details about some of the tools are relegated to Appendix A. In addition, capitalized terms that are not defined in the text body are defined in a Glossary

The Cast

Computer security, and more generally all Internet connected devices (cars, refrigerators, home heating and air conditioning, phones, etc.), is subject to competing interests—both innocent and otherwise. It helps to enumerate the various actors in the drama:

  1. (a)

    Black hats: Are human agents that seek to gain control over other persons computers or devices for nefarious purposes

  2. (b)

    White hats: Are human agents who seek to thwart Black Hats. They may be employees in your organization, contractors, or if at home—you.

  3. (c)

    Users: The average person who is just trying to do their job at work or relax on their home computer (and/or other Internet connected devices) using the available software. They are not seeking to write new applications or subvert other person’s devices.

  4. (d)

    Developers: The authors of the software used by all the above.

  5. (e)

    Service Providers: Your employer, the companies that host cloud services, or the broadband providers that we all use to reach the Internet.

Now, as intimated above, each of these actors has one or more motivations. It is helpful to consider them in more detail.

… and their Motivations

Black Hats

Black Hats come in three main types. The Thief wants to steal data, be it intellectual property, passwords, or credit cards. The Vandal seeks havoc and destruction—often via something called a Denial of Service Attack that stops a service from functioning or a defacement attack that alters the appearance of a company website [8]. The Soldier/Assassin goes the Vandal one step better and seeks to cause death/damage via attacks on critical infrastructure, by either disabling it or altering intended behavior (think remotely opening the flood gates on a large dam). It is important to realize that the same prop (i.e., a computer virus) can be used singly (or in combination with other props) to satisfy any or several of the above-mentioned motivations.

A basic principle in successfully mitigating risk is to make sure the risks are worth the prize [9]. In symbolic terms, we have

$$ \begin{array}{l}\mathrm{if}\ \left(\ \mathrm{difficulty} + \mathrm{risk} < \mathrm{reward}\right)\ \mathrm{then}\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill \hfill \end{array}\mathrm{attack}\hfill \\ {}\mathrm{else}\hfill \\ {}\begin{array}{cc}\hfill \hfill & \hfill \hfill \end{array}\mathrm{don}'\mathrm{t}\_\mathrm{attack}\hfill \end{array} $$
(1)

“Difficulty” here means how much time, money, and effort the Black Hat will have to invest to conduct the attack. “Risk” means how likely it is that the Black Hat will be discovered—by law enforcement, other criminals, or the victim. “Reward” can be many things depending on the Black Hat’s objective: money, revenge, trade secrets, terrorism, etc. Predators that often ignore Eq. 1 either end up in jail or are removed from the gene pool. Equation 1 is also important because it helps a White Hat think about how to make a given computer less attractive to Black Hats; devalue the reward of the target or make it difficult and risky enough to persuade the Black Hat to move elsewhere.

It is helpful to organize the types of attacks used by Black Hats. Some are related to the “difficulty” term of Eq. 1, others are related to the “risk” term of Eq. 1. They can basically be summed up in the following groups [10, 11].

Cryptographic Attacks

The purpose of this class of attack is to reveal the content of a victim’s encrypted transactions: either messages sent over the wire, files at rest on a server, or User passwords via a password cracker (i.e., LophtCrack L0pht Holdings, LLC Burlington MA). Alternately, the crypto-attacker may seek to encrypt the User’s unencrypted files, thereby rendering them inaccessible to the User—the so-called ransom-ware attack [12, 13].

Cybercrime

Broadly is the term for all crimes committed on computers, but it also includes a more specific item not addressed elsewhere. That is, as a term for methods used to remove any trace that crime has been committed—the realm of anti criminal forensic-software (i.e., BCWipe, Jetico Inc, Espoo Finland).

Denial-of-Service Attacks

The goal of the DOS is to stop or hobble access to services or data on the target machine(s). Depending on the severity, this class of attack can be the domain of either the Vandal (who seeks to embarrass a victim) or the Soldier/Assassin if the service denied is critical to life support. Ransom-ware is an example of a DOS attack that uses cryptographic methods to deny access to data.

Injection Exploits

Use intentionally bad data or code input into a service that subverts the intended operation of the system. Usually, these exploits target vulnerabilities resulting from insufficient data validation on input; they are most often used against web servers and databases [14]. This is often due to Developers creating software that does not validate and effectively deal with rogue inputs.

Malware

Simply, any software that is installed without the User’s informed consent that alters the normal behavior of the computer in a way that the User would not allow if they knew (think Trojan Horse programs that capture keystrokes, credit cards, etc.). While the Denial-of-Service attack seeks to actually stop access to a service or data, the objective of much Malware is to take over a service for either immediate reward or as an intermediate step towards a larger goal (like privilege escalation). Users often infect themselves unknowingly via opening bad emails are visiting bad web sites.

Privilege Escalation

As hinted above, the goal here is to elevate a normal User account on a system to one with administrative rights—usually as a precursor to installing Malware that a modern operating system would prevent a normal User account from doing.

Web Security Exploits

Often when a User points their web browser at a web site, a lot more is going on then the User is aware of. The web server can learn a great deal about the User’s computer by exploiting browser weaknesses, and if scripting is enabled on the browser, the Black Hat can even execute arbitrary software on the User’s computer [15].

White Hats

The aforementioned SCAR Primer and ACR documents extolled at length the goals and motivations of the White Hat and Providers. The bias for those actors in all these documents was due primarily to the HIPAA concerns surrounding the duties and responsibilities of medical center staff. To the authors’ credit, the content of all those works was very similar and not surprisingly sought to negate the Black Hat’s goals. The high-level goals are as follows:

  1. (a)

    Audits

    1. a.

      Of devices (what is running what service, and where)

    2. b.

      Of Users (who touched what patient record, when, and did what)

    3. c.

      Of policies and procedures (including downtime plans)

    4. d.

      Of network traffic

  2. (b)

    Authentication

    1. a.

      Is the User who they claim to be?

    2. b.

      Non-repudiation (is there a strict chain of evidence to make claiming “I didn’t do it” an unsustainable claim?)

  3. (c)

    Authorization (is the User approved to access this service or data?)

  4. (d)

    Data privacy

    1. a.

      If data contains PHI, is it transferred and stored as an encrypted payload?

    2. b.

      If possible, PHI should be de-identified (i.e. for research)

  5. (e)

    Reliability and performance (are services/data available when needed)

  6. (f)

    Data reliability

    1. a.

      Integrity (has data been altered in nefarious ways)

    2. b.

      Recoverable in event of failures

It is worth noting that while White Hats do several things mainly to thwart Black Hats (i.e., authentication, authorization, encrypting PHI), they are also tasked with broader concerns. For example, server downtime is not always caused by DOS Black Hats; they may also be caused by hardware failure, software upgrades gone awry, or acts of God. Similarly, data can be lost if steps are not taken to prevent it. This broader mission is often overlooked by White Hat IT professionals whose only motivation is information security; often a point of contention in a medical center.

Further, it is interesting to note that similar props can be used by both Black and White Hats for opposing goals; the Black Hat may use some decryption tools to alter data and then re-encrypt it to fool Users, but the White Hat could detect such alterations with another encryption tool (a digitally signed message digest—described in the Appendix).

Users

Put simply, the user just wants things to work. If they can do their job, go home on time, and watch Netflix on their tablet without any hiccups—that is a good day (Netflix Inc, Los Gatos CA). Multi-factor authentication is a nuisance to them. And yet, a large part of the exploits that are launched into our medical centers are enabled by Users just doing what they do: visiting web sites and opening inviting emails.

Developers

This group of characters is fairly nuanced. Depending on the applications they are developing, they can be thought of as Black or White Hats (if they are developing the kinds of props described below) or more like Users if they are developing the next word processor. This distinction is important. A Developer who identifies with one or the other color of Hat is acutely aware of programming practices that lead to security issues (aka exploits). The User application Developer may be completely ignorant of basic secure coding programming practices (e.g., what a buffer overrun is and why it should be avoided) [16].

Providers

As customers of the Providers, most Users rarely have direct contact with the Developers or White Hats. Rather, we have chats with the faceless “Help Desk” and the public face(s) of the corporation represented by the C-suite (CEO, CFO, etc.). These are the dramatic leads of the play, and as in any good drama, they bear the nail-biting responsibility to answer to the shareholders/customers if the services go offline or a database breach has exposed a million patient histories to Black Hat identity thieves. Too much security enrages Users with slowness and causes customers to go elsewhere. Too little, and the medical center ends up as front page news [17].

Props for the Play

This is where the plot thickens. It is difficult to defend against attacks one has never seen, the mantra “know thine enemy” is particularly relevant to cyber security; without knowing Black Hat methods, one cannot take effective countermeasures. This leads to the question, “What are we doing today?” Most medical centers have a policy about having complex and routinely changed passwords; but are they effective? Many of us have heard of “rooting” or “jailbreaking” a smartphone to gain administrative access and install software the cellular Providers never intended [18]. Those rooting exploits never need a password to function, yet they gain administrative access. In addition, most hospitals have a firewall which prevents the agents on the Internet from connecting to devices within the hospital firewall. But, does that mean the only way medical center devices can be attacked is for a Black Hat to walk in the door, plug into a network connection, and try to guess thousands of account passwords? No. Certainly some of that occurs, but the vast majority of medical centers are penetrated by Trojan Horses that the employees themselves brought inside the fortress—and the Black Hat never needs a password for this to happen. How? By Users naively opening outside emails and visiting compromised web sites.

To build an effective defense, it is useful to see the statistics on penetration methods the Black Hats are actually using. The Computer Emergency Response Team (CERT) at Carnegie Mellon University ranks the Top 30 exploits by frequency. Table 1 summarizes these data for May 2015 [19]. It is also interesting to note in Table 1 that none of the listed exploits rely on cracking passwords, and 15 of the 30 are browser related.

Table 1 Carnegie Mellon’s Computer Emergency Response Team track the most often reported computer exploits. The top 30 in May 2015 are given in this table broken out by: vendor, total exploits related to that vendor, and then application category

The Remote Black Hat Penetration Process

Consider the following steps a Black Hat would take to attack a large, firewalled corporate target (medical center, bank, etc.) remotely. In general, the process is as follows:

  1. 1.

    Establish a presence on the target’s network. We assume a firewall exists, so an external Black Hat achieves this by a User visiting a compromised web site (and downloading a Trojan Horse) or opening an email that installs the “beachhead” agent on the User’s device.

  2. 2.

    Black Hat then begins an inventory scan of the corporate network; identifying the devices and what they do. High value targets are as follows: the User account credential store (think Microsoft domain controllers), the Electronic Medical Record servers, treatment devices, and the Billing systems. This information can be inferred from a network scanning tool [20].

  3. 3.

    Once high value targets have been identified, Black Hat scans the identified services for vulnerabilities (e.g., Nessus, Tenable Network Security Inc., Columbia MD). Also, it begins monitoring the network traffic to them.

  4. 4.

    Exploit the vulnerabilities seen in 3 and either

    1. a.

      Begin harvesting data (the Thief)

    2. b.

      Cripple them (the Vandal)

    3. c.

      Exploit them and alter their behavior (the Soldier/Assassin). All the above missions are accomplished using a suite of penetration tools (e.g., Metasploit Framework, Rapid7, Boston MA).

White Hat Countermeasures

For each step above, we listed potential props (tools) that the Black Hat could use to “penetrate” the target. Below, we list props the White Hat could use to thwart it.

  1. A.

    First, it is critical to deny Black Hat a beachhead on any network with PHI. Several methods can be used for this.

    1. (a)

      The simplest, and likely unpopular method with Users, is firewall outbound web access to only white listed sites that are known to be free of Web Security Exploits; there are appliances with annual subscriptions that can achieve this (e.g., Barracuda Web Security Gateway, Barracuda Networks Inc., Campbell CA).

    2. (b)

      Similarly limit incoming email to white listed sources (e.g., Barracuda Essentials for Email Security, Barracuda Networks Inc., Campbell CA).

    3. (c)

      To avoid a User revolt the above may cause, a site could segregate the PHI devices to a network segment that is not directly accessible to any computer that can reach the Internet. Then Users on the Internet side could browse and email with less restraint, but be unable to pass an agent onto the PHI network.

    4. (d)

      Restrict what devices can connect to the cooperate network to only those known to the network itself (Cisco Identity Services Engine, Cisco Systems Inc., San Jose CA). While this is a laudable goal, the agent installed in Black Hat Penetration Step 1 is on an already approved User computer. Thus …

    5. (e)

      White Hats must implement policy controls on computers that do not allow a User account access to the privilege escalation required to install applications.

  2. B.

    White Hat should also have an accurate inventory of approved devices, so new devices can be detected and investigated [20]. White Hat can detect Black Hat scans with network surveillance, intrusion prevention, and detection tools (e.g., FireEye Inc., Milpitas CA).

  3. C.

    White Hats should also perform vulnerability scans on their own equipment and strive to mitigate them (Nessus op cit, Rapid7 op cit ).

  4. D.

    Detect compromised systems via deviations from known reference baselines (e.g., Tripwire File Integrity Monitoring, Tripwire Inc., Portland OR).

Scenarios

In “Remote Black Hat Penetration Process,” we outlined the potential steps used by Black Hats to compromise systems. Note that we did not mention a password cracker to get a User’s account credentials. Depending on how vulnerable the User’s computer is, it may be possible for the Black Hat agent to install itself using just the User accounts rights (which it inherits) if it was pulled down from a Web Security Exploit-infected web site. This is worth mentioning because if that agent can run vulnerability scans on other systems—the Black Hat can exploit site assets without ever knowing any User credentials!! This dramatically lowers the “difficulty” term in Eq. 1 because decryption of strong passwords is a very computationally intense exercise. If it can be avoided, it radically increases the likelihood that the Black Hat will choose to attack a target.

Screenplay 1

User

Downloads a file conversion program to turn Word documents into PDFs from a compromised web site. Unknown to them the converter program is a Trojan Horse containing Malware that installs a beachhead on their computer [21]. The Malware now has the credentials and rights of the User account.

Black Hat

Agent installed itself and reports “home.” Black Hat instructs agent to replicate by sending fake email to all User’s Outlook Contacts

User2-N: Open the email and spread agent

Black Hat

Instructs agent to Monitor the site’s network and send reports to home. Black Hat finds critical business documents and attempts to encrypt them with the privileges of all the User accounts it has compromised.

Providers

Realizing several thousand documents are inaccessible, they are hopelessly lost and pay the ransom via BitCoin. Clinical care was impacted for a week. The IT leadership is fired.

Screenplay 2

As above, but when Provider realizes the problem …

White Hats

Kill the site’s Internet access and start rebuilding all PC’s and file servers from write once media (like CD-ROMs). Once rebuilt, off-site encrypted backups are restored onto the file servers, and the new workstation policy disables normal Users from having the administration rights to install programs.

Providers

Public relations nightmare, cost in millions, lost 2 business days; final scene White Hat going to board room sweating

Screenplay 3

White Hat

Workstation policies prevent normal User’s from installing software. User still downloads the program, but cannot install it. Threat averted.

Epilogue

No angst, no explosions. No one comes to see the movie based on screenplay 3

Admittedly, the above screenplays are somewhat contrived. They were constructed to illustrate the threat/countermeasure steps as the White Hat learned more about the Black Hat methods. In reality, the Black Hats also adapts and the exploit used in later attacks would likely not require the User to have local administration rights to install software. Rather, weaknesses in the Browser itself could be used to run the Malware (often scripting engines and media players). The agent would run in the browser, survey the local machine for vulnerable services, and exploit them to form the beachhead.

Discussion and Recommendations

As has already been said, much of employee training regarding cyber-security revolves around complex passwords that are regularly changed. That is of some value, but brute force password cracking is slow and computationally expensive. Dictionaries of commons password hashes (called Rainbow tables) can accelerate this a bit, but it is still a difficult process [22]. It is much easier to trick Users into opening infected emails (aka phishing) or visiting compromised web sites and having them download Trojan Horses which in turn bootstrap up more sophisticated Malware.

Given that any corporation has thousands of devices to defend, one has to adopt some triage algorithm to assign risk and assign surveillance resources accordingly. A useful model to facilitate this was described in [2 op cit]. Table 2 recreates the concept here with suggested categorizations. Clearly, a double HIGH item (RIS or EMR) merits greater attention then a double LOW (a data-mining system with only de-identified data). The National Institute for Standards and Technology has a similar multi-parameter view of risk assessment [23].

Table 2 A two parameter matrix to assign risk to various components in the medical center; in this case the two parameters are Protected Health Information (PHI) and criticality of the system to the business. In this model a HIGH/HIGH is seen as a high-value target to Black Hats, whether their motivation is to steal patient data or cripple the business

The following steps can harden systems from the vast majority of even experienced Black Hats:

  1. A.

    Install network firewalls, segregate PHI networks from ones that can reach the Internet directly, and implement network auditing (to detect if the PHI network is reaching the Internet).

  2. B.

    Set policies on computers that prevent ordinary Users from being able to install software.

  3. C.

    Remove unneeded services from all servers; wrap remaining services to both restrict traffic and log traffic (incoming and outgoing).

  4. D.

    Write system logs to “append only” media that cannot be wiped by Black Hats

  5. E.

    Perform regular checksums of all critical server files, store results on append only media, and cross-check with the live system (e.g., Tripwire—Tripwire Inc., Portland OR).

  6. F.

    Penetration test critical servers to test for exploits using tools like Nessus/Metasploit. Given the results, consult with the Developers to mitigate the vulnerabilities, and learn programming practices that avoid them in the future (i.e., defend against Injection Exploits).

Bear in mind, while one can raise the bar significantly, to a determined Black Hat willing to pit significant resources against a single target, and given the likelihood that some required service has an undocumented and exploitable bug, no networked computer can ever claim to be completely bulletproof. Constant vigilance is required. To that point, the single best action that any site can take is to conduct information security drills. Several important points to consider on those drills are as follows [24, 25]:

  1. (a)

    Creation of a “Red Team” made up the sites own information security IT staff, assume the role of Black Hats for the exercise, and attack the site’s network

  2. (b)

    A “Blue Team” which are just the other employees: Users, Developers, and other IT staff.

  3. (c)

    Some example drills

    1. a.

      Patient data has gone poof: rebuilding the file-systems or databases

    2. b.

      Bad software rollout: either a commercial or custom developed program has been upgraded and is now broken

    3. c.

      Unauthorized device on network: How long to locate and neutralize?

    4. d.

      Building on c), a device that sniffs PHI traffic on the network and sends out to persons unknown on the Internet.

    5. e.

      Phishing expeditions: how many Users are fooled?

  4. (d)

    Perform post-drill reports that are shared with IT, Providers and the C-suite. Re-test the scenario in a couple of months to assess if mitigations have been deployed.

Initially, these exercises should be broadly communicated to the entire site staff to avoid panic. But as the site gains maturity and resilience in handling the “attacks,” they should be shared with a minimum of staff to increase realism.

Unfortunately, cyber-security is not a movie; it’s more like a deadly serious arms race, with Black and White hats alternately countering each other’s moves. There is unlikely to be a cease-fire anytime soon.