cred-c.org
Security Through Examples
Exploring Cyber Security in Critical Infrastructure
Tim Yardley, University of Illinois Urbana-Champaign yardley@illinios.edu Introduction Material September 30, 2016
Security Through Examples Exploring Cyber Security in Critical - - PowerPoint PPT Presentation
Security Through Examples Exploring Cyber Security in Critical Infrastructure Tim Yardley, University of Illinois Urbana-Champaign yardley@illinios.edu Introduction Material September 30, 2016 cred-c.org Se Settin ing T The St Stage 1
cred-c.org
Tim Yardley, University of Illinois Urbana-Champaign yardley@illinios.edu Introduction Material September 30, 2016
Categories, properties, and constraints
3
equipment/infrastructure from damage
difficult to replace
employees/people
systems
influencing data)
4
constraints
messages (LAN)
every 33ms
Security Principles
5
6
The basics of how to approach a security assessment
training.
intermediate-level boot camp.
7
http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter7.html
8
9
10
11
12
13
14
(http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf)
Fraud and Abuse)
computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter.” 18 U.S.C. § 1030(e)(6).
insiders (e.g., employees using a victim’s corporate computer network), while persons who access computers “without authorization” will typically be outsiders (e.g., hackers).
15
16
17
18
19
20