Conceptually, cyber ballistics is not that different from its physical-world cousin. Both need a safe and controlled environment for evaluation, practice and study, relevant equipment and necessary knowledge. We specialize in just that.
Compliant enclaves for regulated data processing in the cloud (AWS, Azure), on-premises, or hybrid
Cyber ranges
Courses, events, curricula, practicums.
Cybersecurity is a new discipline, which is neither well-defined nor sensibly delineated. In different settings, it means different things to different people. Beneath its grand label hides a jumble of electrical engineering, networking, cryptography, psychology, and social sciences.
Creating and maintaining environments where Cybersecurity of complex systems with integrated cyber-physical devices*, can be safely and reliably tested is not trivial. Cyber Ballistics aims at giving every aspect of cybersecurity full attention in an integral manner, by combining technology, practice, analytics and education.
* Devices that are difficult to virtualize because of their interactions with the physical world. e.g. Industrial Control Systems (ICS), IoT or medical devices devices; actuators and sensors.
Cyber Ranges
(cloud-based or on-premises, bare-metal)
Cyberinfrastructure Targets • Exploit Libraries • Hacker Toolsets • Analytical Systems
Calibration • Testing • Forensics • Offense • Defense • Events
Workforce Training or Academic Programs • Curricula • Practicums
Cybersecurity
> platforms for evaluation and training <
> platforms for regulated data processing <
> on-premises specialized hardware or cloud environments <
> cyber-physical, embedded, or fully virtualized systems <
Bare-metal or virtual environments for cybersecurity target practice
Design and cybersecurity evaluation
Sensors, embedded systems
Cloud-based, on-premises, or hybrid data processing enclaves
Embedded design, development, and prototyping
CRACR at the College of Professional Studies
The George Washington University
Professor,
Just wanted to personally thank you for that midterm exam. While I’m disappointed in my performance, I am excited that we FINALLY got an exceptional technical examination. Thats [sic] the challenge I was looking for in this program. I wish there was more of this in the program and that we had you as a Professor sooner. I know where my weaknesses are now and what I need to work on. I am very excited to see what you have in store for us the rest of this semester. Bravo, Professor!!
Hi Professor,
I just wanted to say that I’m very grateful to have had the opportunity to learn from you these past two years. I’m sorry that this semester has been extremely difficult for you surrounding the class but it has truly been a pleasure and I really had fun in your classes. I wish more professors would adopt your approach to teaching. Thanks to the awesome learning environment we were given, it has sparked my curiosity into learning how to automate configuration management and the deployment of multiple servers/environments. :)
Wish you the best,
CTO and Founder
Veteran engineer and entrepreneur with two decades of hands-on experience in delivering complex solutions in cybersecurity, electrical engineering, embedded devices design, programming, and networking to clients and collaborators from the government sector (e.g., DoD, DARPA, DoE, NSF), industry and academia.
Please direct your inquiry to:
info@<this site's domain without www>
We are located in Arlington, Virginia.
We design, build, deploy, and operationalize Cyber Ranges, develop curricula and practicums, provide workforce training.
In the workforce training mode, Cyber Range provides a powerful and adaptable platform where the students learn Cybersecurity techniques, such as attacks, defenses, incident mitigation, or forensics. Cybersecurity concepts are taught and practiced in a secure environment but with actual production tools and cyber weaponry and are applied to real-world cyberinfrastructure scenarios.
For Cybersecurity professionals, Cyber Range serves as a workbench where new equipment - both physical and digital - can be tested, calibrated, and benchmarked.
- design and rapid deployment of arbitrary cyberinfrastructures mirroring the functionality of their physical-world equivalents
- isolated in secure environments
- a single user or a multi-user, replicated modes
- a wide range of secure accessibility options (from the classroom, lab, or a remote location
- training environments ranging from a simple practicum designed to illustrate a Cybersecurity concept, to a full-scale, complex system such as a hospital, a power plant, or a government facility
NOTES:
We use our own, in-house developed software to orchestrate the range and to run exercises, practicums, and events. We have a large portfolio of cybersecurity curricula and practicums addressing everything from Attack Tools and Techniques to Network Security and Operating Systems Defenses. These resources were developed during our previous workforce training engagements and helped hundreds of students acquire advanced cybersecurity knowledge.
Our platform of choice is an on-premises, bare-metal deployment. Such an environment allows for arbitrary configuration of network, storage, and computational resources thus providing the most optimal and flexible substrate for the desired scenarios. In addition, it makes it possible to include actual cyber-physical components such as ICS PLCs, or medical devices. The downside of this approach is its large, upfront cost both in equipment, collocation, and expertise. Typically, we deploy OpenStack running on top of Cisco UCS platform integrated with the ceph storage clusters.
A potentially cheaper alternative is an instantiation of the range in Public Cloud environments such as AWS or Azure. Its downside is the scope of the exercises or toolsets allowed by the underlying cloud infrastructure. Having their own cybersecurity in mind, the limitations imposed by the cloud could be severe. Last but not least, when used intensively - e.g., ~500 virtual machines per class - and at a high duty cycle, the cost would rise very rapidly and match the cost of the on-premises, bare-metal systems.
In the context of Cyber Range or standalone, we deploy ICS systems and evaluate cybersecurity of their interfaces and communication protocols.
First and foremost, Industrial Control Systems are the most critical components of the national infrastructure. Yet, its cybersecurity has always been an afterthought resulting in somewhat haphazard approach to its deployment and integration with other commodity cyberinfrastructures. To evaluate it correctly is a challenging task, especially because of the wide range of technologies hiding behind the label.
ICS is a general term that encompasses several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations that are often found in the industrial sectors and critical infrastructures, such as programmable logic controllers (PLC). An ICS consists of combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective (e.g., manufacturing, transportation of matter or energy).
Components of an ICS system - SCADA, PLCs, sensors, and actuators - employ a multitude of interfaces and communication protocols. Some are common and widely used (e.g., Bluetooth, USB, Ethernet) while others, such as modbus, profinet, or RJ485 are proprietary or legacy ones. Often, in order to integrate with modern communication infrastructures, the proprietary and legacy protocols are encapsulated in the current, commodity ones. A good example would be modbus over TCP/IP, profinet over Ethernet, or RJ485 over an arbitrary network protocol.
We focus is on the evaluation of these interfaces and communication protocols in the context of their cybersecurity posture with respect to the interaction with general cyberinfrastructures from the perspective of cybersecurity.
We provide and evaluate cybersecurity of devices that are capable of connecting to the network.
Sensors • Smart Devices • Embedded Systems
The problem space is very similar to that of ICS. Like in the ICS case, IoT uses a wide variety of interfaces and communication protocols. Unlike ICS, these devices are ubiquitous and their lowest-common-denominator communication protocols and interfaces use cheap commodity components. Quite often, cybersecurity of these devices has never been addressed. Even though IoT devices tend not to play critical roles in the national infrastructure directly, they do provide a large attack surface and can be exploited to gain control of systems that are much more important.
We architect and deploy data processing environments that meet regulatory compliance standards.
We focus on delivering and deploying accreditation-eligible infrastructures.
Environments: Cloud (AWS, Azure), on-premises (bare-metal, OpenStack, or their combination (hybrid)
Standards: HIPAA, CUI, FISMA, NIST SP 800 family
Because some organization-specific controls lie outside of the scope of what can be addressed externally, we can assist the client with the accreditation process but are not able to complete it independently
Design and prototyping of embedded devices to the client's specification
For projects that explore new approaches to cybersecurity of ICS or IoT, we can design project-specific embedded devices to the client's specification and prototype them. Whenever necessay, we will write drivers for these devices.
We have a limited capacity to design electronic circuitry based on client's specifications, produce the corresponding PCBs, assemble and test the resulting prototypes. In general, we limit ourselves to simple circuits with microcontrollers, embedded processors, SoC, and their corresponding interaces.