Battles in Cyber Space Dr Richard E Overill Department of Informatics.

Slides:



Advertisements
Similar presentations
Chapter 2 Digital Terrorism.
Advertisements

SCADA Security, DNS Phishing
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Targeted Cyberattacks: A Superset of Advanced Persistent Threats Published in: Security & Privacy, IEEE (Volume:11, Issue: 1 ), Jan.-Feb. 2013,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
Cyber Security and the Smart Grid Eric Lipinski Energy Law Fall 2010 Chicago-Kent College of Law.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Stuxnet Malware Attribution Mike Albright CS 591 Fall 2010.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Network Security of The United States of America By: Jeffery T. Pelletier.
National Security Brittany Haga Sean Bevans Kelsey Splinter.
Toward Open Source Intrusion Tolerant SCADA Trevor Aron JR Charles Akshay Srivatsan Mentor: Marco Platania.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Cyber-Warfare: The Future is Now!
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
SCADA and Telemetry Presented By:.
How Stuxnet changed the landscape for plant engineers Richard Trout, Director for Client Solutions, Trout I.T.
A sophisticated Malware Arpit Singh CPSC 420
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Viruses & Destructive Programs
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Information Technology Software. SYSTEM SOFTWARE.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
Topics of presentation
Scenario: Internet Attack Eunice Huang. What is DDoS? A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to.
Hackers And Hacking.
Topic 5: Basic Security.
1 Introduction and Definitions. 2 Purpose of the Course This course is designed to provide students with hands on experience on identifying places where.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Stuxnet.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
NEXT GENERATION ATTACKS & EXPLOIT MITIGATIONS TECHNIQUES ID No: 1071 Name: Karthik GK ID: College: Sathyabama university.
LECTURE PRESENTATION FOR Thomas Rid, Cyberwar will not take place Manjikian
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
October 28, 2015 Cyber Security Awareness Update.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
International Conflict & Cyber Security
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
What is Cyber Security Cyber War Cyber Power?
Stuxnet By Shane Serafin.
A lustrum of malware network communication: Evolution & insights
CYBER SECURITY...
How SCADA Systems Work?.
Cybersecurity Case Study STUXNET worm
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Network Intrusion Responder Program
Propagation, behavior, and countermeasures
INTERNET OF THINGS CYBERSECURITY
Object Oriented Programming and Software Engineering CIS016-2
Dominic DeSoto, Jay Jackson IA 455 Oct. 23, 2017
Introduction to Internet Worm
Presentation transcript:

Battles in Cyber Space Dr Richard E Overill Department of Informatics

Nature of Warfare - Clausewitz Violent – potentially lethal Instrumental – a means to an end Political – Intention & attribution In addition: a war is usually composed of several battles a battle is usually composed of several attacks

Domains of Warfare Land – tanks, etc. Sea – battleships, submarines, etc. Air – aircraft, helicopters, UAVs, etc. Space – rockets, satellites, etc. Cyber – computers, networks, digital infrastructure, etc. Most wars involve several domains

A definition of Information Warfare “The deliberate, unauthorised and systematic attack on critical information activities to exploit information, deny services to the authorised user, modify and corrupt data.” – UK MoD

Infrastructure Attacks “The most advanced society is really only four meals away from anarchy, and if you could attack a society through its computers to cause a breakdown of the mechanisms, the infrastructure, which cause it to run, you will bring about mass deaths.” – Stephen Badsey Royal Military Academy Sandhurst, UK

Supervisory Control And Data Acquisition (SCADA) Monitoring and controlling: – Water purification and distribution systems – Electricity generation and distribution systems – Nuclear reprocessing plants – etc. Typically connected to the Internet for efficiency of operation.

H(ackers) 2 O 8 November 2011, Springfield, IL, USA. Hackers remotely accessed the online SCADA system of Curran-Gardner Township Public Water District. They burned out a well pump that serviced about 2,200 households by repeatedly turning it on and off. Later reported as a false alarm caused by a contractor remoting into the system while on holiday in Russia. 18 November 2011, Houston, TX, USA. Pr0f hacked into Harris County water plant and took screenshots but did no damage.

“Stuxnet” Discovered in June/July Malicious software (“malware”) intended to sabotage nuclear reprocessing plants in Iran. Targets and reprograms a specific model of Siemens PLC (used to control ultracentrifuges) to operate outside their specified parameters. Replays previously sampled normal ultracentrifuge behaviour to the operators’ console. Propagates itself and hides its code modifications Involved 3-5 skilled person-years’ development

“Duqu” Discovered in September Malicious software (“malware”) intended to gather intel such as system information and user profiles Source code highly similar to Stuxnet yet not specifically targeting SCADA/PLC Unknown whether it is a prequel or a sequel to Stuxnet

US DoE “Aurora” demo (March 2006)

US DoE “Aurora” demo (cont’d)

Questions? Ideas? Contact Dr Richard Overill with any questions on