Cyberterrorism: The Bloodless War? Pat Mcgregor Chief Information Security Architect Intel Corporation 3 October 2001.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Chapter 2 Digital Terrorism.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Computer Security Fundamentals
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
National Security Brittany Haga Sean Bevans Kelsey Splinter.
MINISTRY OF SOCIAL AFFAIRS AND HEALTH 1 Introduction to corporate security Teemupekka Virtanen Helsinki University of Technology Telecommunication Software.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Hewlett Packard (HP) Open.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
DIGITAL SECURITY Information Security and data protection Facilitator: Yvonne Oluoch.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
How does Singapore manage conflict and ensure national security?
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Scott Charney Cybercrime and Risk Management PwC.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Computer Security By Duncan Hall.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Chapter 17: Foreign Policy and National Defense Section 2.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
Securing Information Systems
Nation State Actors Lex Dunlap.
Disaster and Emergency Management
Cyber Security Policy Analysts
French Port Cybersecurity Initiative
Securing Information Systems
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Prepared By : Binay Tiwari
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

Cyberterrorism: The Bloodless War? Pat Mcgregor Chief Information Security Architect Intel Corporation 3 October 2001

Cyberterrorism/P McGregor2 The threat of terrorist attacks against U.S. citizens and U.S. interests around the world has become the nation’s most pressing national security issue. … This aggression may include cyber attacks by the terrorists themselves or by targeted nation-states.

3 October 2001Cyberterrorism/P McGregor3 Even more likely are cyber attacks by sympathizers of the terrorists, hackers with general anti-US or anti-allied sentiments, or thrill- seekers with no particular political motivation. Cyber Attacks During the War on Terrorism: A Predictive Analysis Dartmouth Institute for Security Technology Studies

3 October 2001Cyberterrorism/P McGregor4 What Do We Know? Cyber attacks immediately follow physical attacks Cyber attacks are increasing in volume, sophistication, and coordination Cyber attackers are attracted to high- value targets Many, if not most, targets would probably be commercial computer and communications systems

3 October 2001Cyberterrorism/P McGregor5 Cyberwar Strategies The basic elements are: Hacking Virus writing Electronic snooping Old-fashioned human spying Mass disruption can be unleashed over the internet, but Attackers first must compromise private and secure networks

3 October 2001Cyberterrorism/P McGregor6 InfoWarriors are not Scrip Kiddies Funded by foreign military organizations and terrorist groups Likely to have more people and deeper pockets Can devote more resources – people and time They can crack systems that might withstand casual assault Likely to be more experienced Will use more sophisticated tactics Serious IW attackers would not reveal their activities until it is absolutely necessary

3 October 2001Cyberterrorism/P McGregor7 Commercial Sector a Key Target Communication systems News organizations Telephony suppliers Corporations Component suppliers (boots, food, radios, etc.) Civilian consulting companies Financial institutions Government funds tied up in commercial banks Healthcare industry Pharmacies, hospitals, clinics Drug companies (vaccines, antibiotics)

3 October 2001Cyberterrorism/P McGregor8 But Companies Not the Only Targets Power grids For 11 days in Feb 2001, a development server at cal-ISO electricity exchange was left connected to the internet and was being quietly hacked Transportation systems “A foreign adversary could significantly hinder U.S. Forces in reaching, say, the Persian gulf or Taiwan straits by attacking the computers at commercial harbor facilities used to ship ammunition or the air traffic control system that would be needed to support and airlift personnel and supplies” (Bruce Berkowitz) Water authorities

3 October 2001Cyberterrorism/P McGregor9 Why Use Cyber Warfare? Low barriers to entry – laptops cost a lot less than tanks Complex societies are dependent on computers and networks Computer disruption has economic, logistical, and emotional effect Paralysis caused by computer outages levels the playing field for less-well- equipped countries

3 October 2001Cyberterrorism/P McGregor10 What Can We Do? Go on the defensive now Educate senior management on risks of cyberwarfare Make infosec a top priority Beef up your security technology Insist on flawless execution: compliance to security standards in all areas Work with other companies, government agencies NIPC IT ISAC SAINT

3 October 2001Cyberterrorism/P McGregor11 Some Specifics: Be Prepared Maintain high alert & vigilance Update OS and applications regularly Enforce strong passwords “Lock down" systems Keep anti-virus software installed and up-to-date Employ intrusion detection systems and firewalls

3 October 2001Cyberterrorism/P McGregor12 Questions?

3 October 2001Cyberterrorism/P McGregor13 Thank you! Pat McGregor

3 October 2001Cyberterrorism/P McGregor14 Selected Sources Berkowitz, Bruce, “Information Warfare: Time to Prepare.” Issues in Science and Technology, Winter, Gaudin, Sharon, “ Protecting a net in a time of terrorism”, Network World, 09/24/ html html “Cyber Attacks During the War on Terrorism: A Predictive Analysis.” Dartmouth Institute for Security Technology Studies. Bickers, Charles, “Innovation, Cyberwar, Combat on The Web”. Far Eastern Economic Review, August 16, 2001 Risks Digest.