用户名/邮箱
登录密码
验证码
看不清?换一张
您好,欢迎访问! [ 登录 | 注册 ]
您的位置:首页 - 最新资讯
Olympic-Caliber Cybersecurity
2018-10-08 00:00:00.0     美国兰德公司-赛博战专栏     原网页

       Research Questions What does the cybersecurity threat landscape of the Tokyo 2020 Olympics look like? What lessons can be learned from previous Olympic Games? Which actors pose a cybersecurity threat to Tokyo 2020, and what policy options can help planners mitigate these risks?

       The Olympic Games are a target-rich environment for cyberattackers, drawing athletes, attendees, and media coverage from around the world. Japan's vision to become the most advanced urban technology metropolis in the world underpinned its bid to host the 2020 Olympics, but an increasing dependence on technology with each successive Olympic Games signals a shift toward an unpredictable, complex, and contested cyber threat environment. More than ever, security planners must consider the cybersecurity threat landscape if they are to effectively mitigate threats, apportion limited resources, and host a resilient, safe, and secure Olympic Games.

       To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games and presents a series of policy options to guide planners and other stakeholders in addressing them. The analysis involved a risk assessment synthesizing qualitative and quantitative data on the threat landscape and lessons from prior Olympic Games. Underlying the risk assessment is a threat actor typology — a classification and ranking of a range of threats to the security of the games. A key contribution of this research is a visualization of this threat actor typology that provides an at-a-glance overview to guide Olympic security planners, computer emergency response teams, and policy- and decisionmakers as they prioritize and address cybersecurity threats in the lead-up to Tokyo 2020.

       Key Findings Cyber threats are a growing concern for Olympic planners, and past games hold valuable lessons for Tokyo 2020 The increasing dependence on technology and a proliferation of adversary tools to exploit vulnerabilities in systems and networks make the Olympic Games a target-rich environment for cyberattackers. The consequences of a cyberattack on the Olympic Games include financial losses, physical harm to participants and attendees, property damage, the compromise of personal information, and damage to the host country's reputation. There have been no successful large-scale, high-impact attacks on prior Olympic Games; experiences from these and other international events offer potential lessons for Tokyo 2020 planners. A key characteristic of past Olympic cybersecurity planning efforts has been coordination and collaboration among a range of stakeholders, including the private sector. Understanding Japan's cybersecurity threat landscape will help planners mitigate threats The typology of threat actors revealed six types of actors with the potential to pose a risk to the Tokyo 2020 games: cyber criminals, insider threats, foreign intelligence services, hacktivists, cyberterrorists, and ticket scalpers. Motivations vary with the type of actor, but a streamlined classification of profit, ideology, and revenge captures the motivations for most attacks. Foreign intelligence services and other state-sponsored attackers rank at the top in terms of sophistication and level of risk to the games. The risk analysis methods and threat actor typology developed for Tokyo 2020 offer a valuable basis for future research to support the cybersecurity goals of other high-profile international events.

       Recommendations Plan early to ensure ample time to assess event-specific threats, shape a community of stakeholders and build trust among them, and establish mechanisms and processes for information sharing, incident reporting, and problem resolution. Cooperate and share information with all cybersecurity stakeholders, including the private sector, to effectively mitigate cybersecurity risks. Ensure that all stakeholders understand the mission and work toward a common goal, bolstering trust and a commitment to information sharing. Define stakeholder roles and responsibilities, and revisit them throughout the planning process, to help stakeholders understand how best to contribute and whom to contact when changes or incidents arise. Allocate resources appropriately to reduce cybersecurity risks, prioritizing threat types and threat actors as needed to apportion these investments. Deter the riskiest adversaries with a targeted cyber defense campaign. For example, a publicly documented cybersecurity exercise to showcase defensive preparations might deter attacks altogether or convince attackers that the costs of executing an attack are too high, the chances of success are too low, and the prospective retaliatory costs are unbearable.

       Related Products

       Report

       Violent and Antisocial Behaviours at Football Events and Factors Associated with these Behaviours: A rapid evidence assessment Jul 23, 2018

       Lucy Strang, Garrett Baker, et al.

       Report

       Report

       Violent and Antisocial Behaviour at Football Events: Review of interventions Jul 23, 2018

       Table of Contents Chapter One

       Introduction

       Chapter Two

       Policy Context

       Chapter Three

       The Cybersecurity Threat Landscape in Japan

       Chapter Four

       Lessons from Prior Olympic Games

       Chapter Five

       A Risk Assessment of Japan's Cybersecurity Landscape

       Chapter Six

       Conclusions and Policy Options

       Appendix A

       Methods

       Appendix B

       Interview Protocol

       Appendix C

       JPCERT/CC Incident Categories

       Research conducted by RAND International

       This project is a RAND Venture. Funding was provided by gifts from RAND supporters and income from operations. The research was conducted by the Center for Asia Pacific Policy (CAPP) within RAND International Programs.

       This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

       Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

       The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.

       


标签:综合
关键词: typology     Tokyo     previous Olympic Games     threats     threat     stakeholders     cybersecurity     planners     policy    
滚动新闻