U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR. WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Cyber and Maritime Infrastructure
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
September 28, 2006U.S. National Cybersecurity Martin Casado Keith Coleman Sponsored by William J. Perry MS&E 91SI Fall 2006 Stanford University.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
September 30th, 2004U.S. National Cybersecurity William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Fall 2004 Stanford University.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Topic 5: Basic Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Safe’n’Sec IT security solutions for enterprises of any size.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Advanced Income Tax Law
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Cyber Security: State of the Nation
Cyber Security & IT: What’s Next?
Lecture 14: Business Information Systems - ICT Security
Securing Information Systems
Cybersecurity Awareness
Risk of the Internet At Home
Home Internet Vulnerabilities
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
The Global Challenges of Cybersecurity and Digital Terrorism
AVI AFRIQUE October 2018 Tshepo Peege
Cyber security Policy development and implementation
Tax Crime and Compliance Issues
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Faculty of Science IT Department By Raz Dara MA.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Forensic and Investigative Accounting
Computer Security By: Muhammed Anwar.
Security Trends and Threats Affecting Innovations in Technology
Presentation transcript:

U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR

WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney General Janet Reno. “A 15-year-old kid could launch these attacks, it doesn’t take a great deal of sophistication to do” – Ron Dick, Director NIPC, February 9 U.S. Federal Bureau of Investigation (FBI) officials have estimated the attacks caused $1.7 billion in damage

January 2003 Infects 90% of vulnerable computers within 10 minutes Effect of the Worm - Interference with elections - Cancelled airline flights emergency systems affected in Seattle - 13,000 Bank of America ATMs failed No malicious payload! Estimated ~$1 Billion in productivity loss Continue…

Wireless Tower on Top of Trade Center Destroyed AT&T has record call volumes “Flash” usage severely limits availability Rescue efforts hampered Continue…

The Internet is highly, globally connected Viruses/worms are legion on the Internet and continue to scan for vulnerable hosts Hackers scan looking for easy targets to attack Continue…

WHAT ’ S REALLY GOING ON HERE?

We are increasingly dependent on the Internet: Directly Communication ( , IM, VoIP) Commerce (business, banking, e-commerce, etc) Control systems (public utilities, etc) Information and entertainment Sensitive data stored on the Internet Indirectly Biz, Edu, Gov have permanently replaced physical/manual processes with Internet-based processes

SECURITY NOT A PRIORITY Other design priorities often trump security: Cost Speed Convenience Open Architecture Backwards Compatibility

THE CHALLENGE A solution to this problem will require both the right technology and the right public policy. This is the cybersecurity challenge.

WHAT IS “ CYBERSECURITY? ” According to the U.S. Dept of Commerce: The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.

ADDITIONAL INFORMATION Corporate cybersecurity = availability, integrity and secrecy of information systems and networks in the face of attacks, accidents and failures with the goal of protecting a corporation’s operations and assets. National cybersecurity = availability, integrity and secrecy of the information systems and networks in the face of attacks, accidents and failures with the goal of protecting a nation’s operations and assets.

CYBERSECURITY AS A DISCIPLINE How to achieve cybersecurity “success”? How to overcome the cybersecurity problem? Must understand four factors that play into the cybersecurity equation: Technology Economics (of stakeholders and incentives) Social Influences (e.g. Big Brother fears) Public Policy

AUSTRALIAN CYBER SECURITY CENTRE THREAT REPORT 2015 The cyber threat to Australian organisations is undeniable, unrelenting and continues to grow. If an organisation is connected to the internet, it is vulnerable. The incidents in the public eye are just the tip of the iceberg.

AUSTRALIA CYBER SECURITY  Australia must be vigilant and proactive in its approach to cyber security, investing resources to meet the challenges of a complex cyber environment.  Compromise is expensive. It can include financial losses, damage to reputation, loss of intellectual property and disruption to business. Australia cannot afford this.  To combat the threats detailed in this report and reduce the risk of compromise, organisations must move now to implement cyber security measures to make Australia a harder target, increase the confidence of Australians when they are online, and maximise the benefits of the internet for Australian organisations.

PREDICTIONS  The number of state and cyber criminals with capability will increase.  Due to the limited number of quality software developers, cybercrime-as-a-service is likely to increase, reducing the barriers for entry for cybercriminals.  The sophistication of the current cyber adversaries will increase, making detection and response more difficult.  Spear phishing will continue to be popular with adversaries, and the use of watering-hole techniques will increase.  Ransomware will continue to be prominent.  There will be an increase in the number of cyber adversaries with a destructive capability and, possibly, the number of incidents with a destructive element.  There will be an increase in electronic graffiti, such as web defacements and social media hijacking, which is designed to grab a headline.

CONCLUSION Cyber security efforts should aim to make Australia a harder target and thereby increase the trust and confidence of all Australians to engage in the benefits the internet brings. Effective cyber security requires a partnership between government and the private sector, with organisations and their users taking greater responsibility for the security of their networks and information.