Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.

Similar presentations


Presentation on theme: "COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD."— Presentation transcript:

1 COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD

2 The Problem After infiltrating Natanz's industrial-control systems, Stuxnet automatically ordered subsystems operating the centrifuge motors to spin too fast and make them fly apart. At the same time, Stuxnet made it appear random breakdowns were responsible so plant operators would not realize a nasty software weapon was behind it. -Ralph Langner German industrial control system expert

3 The Problem Simplified We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them? -FBI

4 The Domain 5 BILLION MOBILE PHONES 60% in developing countries AT&T volume in 2010 will be exceeded in first 7 weeks of 2015 Commoditization of base stations Model No.: 900MHz&DCS 1800MHz Standard: ISO9001, ISO9002, CE Trademark: HELIOS Origin: China

5 The Domain 2 BILLION INTERNET USERS 107 Trillion Emails sent – 89% spam 255 Million websites 202 Million domain names 2015: more hosts than people Hundreds of thousands of SERVERS Tens of thousands Layer 1 & 2 SWITCHES

6 Threats to DoD 20K malicious email/month targeted at DoD networks 40K pieces of malware/year detected phoning home from DoD networks 1K attempts/month to compromise DoD systems using public exploits 1200 XSS attempts launched against DoD systems last year

7 Threats to You Web-based applications fastest growing target 75% of companies reported cyber attacks. 92% incurred costs averaging $2M per company McAfee identifies 55K unique new pieces of malware each day That’s more than one piece of malware every second

8 Blah, Blah, Blah So what to do?

9 Make Big Small, Private Public Number of Internet Appliances is small (billions) IPv6 assigns everything an identity Compute Clouds are cheap, effective, and scale Profile appliances, not people. s There is no security through obscurity – go open source Create the Internet’s analytic engine(s) as a common good SE Linux  SE Android Edge to core with heterogenous diversity Mature the legal framework Attribution as a last resort


Download ppt "COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD."

Similar presentations


Ads by Google