Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Terrorism: Strategic Problem Solving and Fresh Insights Yu Chien Siang Ministry of Home Affairs Singapore.

Similar presentations


Presentation on theme: "Cyber Terrorism: Strategic Problem Solving and Fresh Insights Yu Chien Siang Ministry of Home Affairs Singapore."— Presentation transcript:

1 Cyber Terrorism: Strategic Problem Solving and Fresh Insights Yu Chien Siang Ministry of Home Affairs Singapore

2 Agenda Introduction Cyber-terrorism – why be concerned? Some Attack Scenarios Singapore Experience Sharing and Insights Conclusion

3 Cyber-terrorism: Why be concerned? The main targets have been the websites of: –the Estonian presidency and its parliament –almost all of the country‘s government ministries –political parties –three of the country‘s six big news organisations –two of the biggest banks; and firms specializing in communications

4 Cyber-terrorism: Why be concerned? DDoS attack involved systems: –More then 300 Systems worldwide –There is one System, coordinating the DDOS attacks , known as a US Spamserver –Russian Systems seems to be involved as Command Server Impact Assessment –Cyber attack on Estonia was significant - the first time that a country’s Internet system had been attacked over a period of time, and users were not able to access the Internet across a range of functions and services. –Impact on real world - simultaneous disruption to various parts of society, causing some inconvenience and probably financial costs. However, there have been no known direct fatalities or permanent loss of information or data so far.

5 Cyber-terrorism: Why be concerned?

6 SCADA Supervisory, Control And Data Acquisition Sys Or Industrial Control System (ICS) Critical Infrastructure –Traffic control system (air, land, sea) –The MRT –The water in your country –The energy generators and distribution –…

7 SCADA Incidents Incident Worcester Air Traffic Communications –In March 1997, a teenager in Worcester, Massachusetts disabled part of the public switching network using a dial-up modem connected to the system. This knocked out phone service at the control tower, airport security, the airport fire department, the weather service, and carriers that use the airport.

8 SCADA Incidents Incident Davis-Besse –In August 2003, the Nuclear Regulatory Commission confirmed that in January 2003, the Microsoft SQL Server worm known as Slammer infected a private computer network at the idled Davis-Besse nuclear power plant in Oak Harbor, Ohio, disabling a safety monitoring system for nearly five hours. –In addition, the plant’s process computer failed, and it took about six hours for it to become available again. Slammer reportedly also affected communications on the control networks of at least five other utilities by propagating so quickly that control system traffic was blocked.

9 SCADA Incidents Incident CSX Train Signaling System –In August 2003, the Sobig computer virus was blamed for shutting down train signaling systems throughout the east coast of the U.S. The virus infected the computer system at CSX Corp.’s Jacksonville, Florida headquarters, shutting down signaling, dispatching, and other systems

10 SCADA Threat Simulation Report

11 It’s a Digital LifeStyle! Social Networks

12 Cyber security – Why be concerned? Mobile Devices – lost and stolen notebooks, PDAs, storage devices (e.g. USB devices) VOIP – eavesdropping of communications, backdoor into our network Spam/Phishing – never-ending s! Wireless Network – unauthenticated devices, spoofed APs, MITM-attack, theft of credentials USB Devices– proxy for data theft and propagation of malwares

13 Example of Trojan Poison Ivy –‘Remote Administration’ software (Trojan?) –Free for download Capabilities –Bypass of Anti-virus & Firewall –Monitoring of User’s Screen –Key logging –File Transfer –Killing of Processes –Cleaning of traces Demo …

14 Mpack – New Generation of Malware Malware kit produced by Russians, DTC (Dream Coders’ Team), and sold as commercial software –First released in December 2006, currently version 0.94 –Approximately US$ –Technical support & regular updates of exploit codes. –Customised exploits, e.g. evade AV software (US$50-150) Built-in intelligence –Selective attacks, based on targeted country domain –Highly efficient. No brute-force, target browser type –Systematic. Keep track of its victim (e.g. compromised websites)

15 Layered Attack (Demo) Victim MPack & 6 1.Victim visits YouTube video recommended by unknown person. 2.He finds the video interesting and decides to click on one of the links to a blog site that has more to say about the video. 3.This blog turns out to be injected with an iframe that points to an MPack server. 4.Without his knowledge, the iframe will request for a page from the MPack server. 5.A downloader file is pushed to the victim’s web browser. 6.Downloader file will then download a malicious payload from MPack Server.

16 Attacks on Legitimate Websites

17 MITM Attack New Phishing Attacks using “Man in the Middle (MITM)” technique –WSNPOEM are the new Generation worm –Successful attacks against Banks like ABN Amro –All these Banks used 2 Factor Authentication with Hardware token

18 MITM Attack Bank Server Victim Redirected Network Traffic Original Flow Attacker

19 Implications Can terrorist groups make use of malware to their advantage? –Gather funds –Build up botnets (cyber-army?) for DDoS against critical networks –Hack into critical systems SCADA Financial systems Etc –Many other unthinkable possibilities Underground economy making it easy to acquire capabilities –Hackers for hire –Malware toolkits for sale $

20 Singapore Experience IT Security Masterplan –Formulated to combat cyber-threats Hacking, Virus attacks, Cyber-terrorism –Some Key Initiatives National Cyberthreat Monitoring Centre (NCMC) National Authentication Framework (NAF) National Infocomm Security Awareness Programme Critical Infocomm Infrastructure Surety Assessment (CII-SA) Business Continuity Readiness Assessment Framework

21 Innovative Problem Solving Economics of Security Post Regulatory State Personal Security System and Responsive Regulation Training and Security Awareness

22 Economics of Security People have realized that security failure is caused at least as often by bad incentives as by bad design. Systems are particularly prone to failure when the person guarding them is not the person who suffers when they fail. Is this like the Global Warming problem? Government cannot micromanage the information security business, most of which is in any case outside the UK. What it can do, and should do, is to ensure that people and companies have the necessary incentives to take responsibility for the consequences of their actions, online as well as offline. Ross Anderson, Cambridge,

23 Lose-lose As the network is interdependent, a successful attack on one system is then likely to succeed on other systems as well since they typically share the same vulnerabilities via a common platform. This means that one organization’s security is negatively affected by the poor security behaviour of another member of the network. Companies could never achieve 100% security on their own because their risks are often created by the behaviors of others who also lack the incentive to heighten security. Theoretically, it follows that an organization’s “perverse incentives” not to invest drive others to underinvest as well.

24 Perverse Incentives An incentive that has an unintended and undesirable effect. E.g. –In Hanoi, under French colonial rule, a program paying people a bounty for each rat pelt handed in was intended to exterminate rats. Instead it led to the farming of rats. –Internet airline tickets sale via credit card promotes air travel, but allows a Sep 11 attack to be executed quasi-free. Users are encouraged to use long passwords that are difficult for an attacker to guess. However, such strong passwords are hard to remember, leading users to write them down rather than memorizing them. Digital Rights Management schemes are often used to discourage illegal piracy by preventing copying of content, which also has the effect of reducing its utility to paying customers who want to play their purchased material on multiple machines, or make backups. Since pirated content usually does not contain DRM, user who do not want DRM restrictions on their content will then pirate it.

25 Post Regulatory State Law’s capacity is limited. Control based on law is marginal. State law is only effective if linked to other processes. People do what they do, not because of the law but because of : education, training, habit and incentive etc. Regulations can’t work if against economic benefits. Form: variety in norms, control mechanisms, controller, controllees. Colin Scott, Regulation in the Age of Governance: The Rise of the Post- Regulatory State, June 2003, pdf pdf

26 Personal Security System Digital Online Registration and Identification System (DORIS) –Our first vision of a Personal Security Device in hardware. –The core of DORIS is a smart chip that supports tri-interface, meaning contact, contactless and USB. –Multi form factor - plastic cards, watches, key fobs, flash drives, SIM- overlay and other handheld devices such as mobile phones. –Provides Authentication Digital Signature Stores personal records (eg. Medical) etc

27 Personal Security System Dynamic Isolation of Virtualised Applications (DIVA) –The enhanced vision of a Personal Security System that can support soft or hard tokens like DORIS –Trusted applications auto run from any storage media under a ‘sandbox’ environment –No requirements for administrator privileges –Compatible with any flash storage

28 Responsive Regulation The Personal Security strategy is a clever way of exercising Responsive Regulation by bringing in a new key actor, namely the citizen user. When the citizen becomes a principal part of the regulatory community, it creates –the opportunity of contractual agreements with negotiated but enforceable conditions, and –his need for diverse public services like e- government would create the possibility of a hierarchy of sanctions, to match the degree of infringement, which could be cost effectively monitored using electronic means based on government standard protocols. Ian Ayres and John Braithwaite, Oxford University Press, Responsive Regulation, Transcending the Deregulation Debate.

29 Training & Security Awareness Training –Annual Governmentware Seminar Into its 16 th year Brings together professionals from government, academia and industry Raises awareness of latest security threats –CXO Training Instil within senior management the need for security First-hand experience of cyber- threats

30 Conclusion Issues of Cyber-terrorism are related to: –Infocomm convergence, hence dependency increases –Transnational cybercrime, new forms e.g. cyber attacks leading to cyber-extortion, cyber espionage which could be the prelude to discovering infrastructure weaknesses and social engineering, credit card attacks which could lead to a massive financial system assault, money laundering via electronic payments etc. Signals a need for greater cooperation and knowledge sharing between countries A good way to network would be Governmentware 2008 –Theme: Positive Security: Empowering Business Models for the Future –Venue: Singapore –See you there!


Download ppt "Cyber Terrorism: Strategic Problem Solving and Fresh Insights Yu Chien Siang Ministry of Home Affairs Singapore."

Similar presentations


Ads by Google