u s national u s national
play

U.S. National U.S. National Why are we talking about Cybersecurity - PDF document

U.S. National U.S. National Why are we talking about Cybersecurity Cybersecurity cybersecurity? William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Spring 2004 Stanford University U.S. National Cybersecurity


  1. U.S. National U.S. National Why are we talking about Cybersecurity Cybersecurity cybersecurity? William J. Perry Martin Casado • Keith Coleman • Dan Wendlandt MS&E 91SI Spring 2004 Stanford University U.S. National Cybersecurity March 31, 2004 Case 1: Internet Under Siege Case 2: Slammer Worm • February 7 - 9, 2000 • January 2003 Yahoo!, Amazon, Buy.com, CNN.com, eBay, E*Trade, ZDNet Infects 90% of vulnerable computers within 10 websites hit with massive DOS minutes • Attacks received the attention of president Clinton and • Effect of the Worm Attorney General Janet Reno. - interference with elections - canceled airline flights • “A 15-year-old kid could launch these attacks, it - 911 emergency systems affected in Seattle doesn’t take a great deal of sophistication to do” - 13,000 Bank of America ATMs failed – Ron Dick, Director NIPC, February 9 • No malicious payload! • U.S. Federal Bureau of Investigation (FBI) officials have • Estimated ~$1 Billion in productivity loss estimated the attacks caused $1.7 billion in damage * The Yankee Group, 2000 U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 Case 3: WorldCom Case 4: It’s a Jungle Out There • July 2002 • The Internet is highly, globally connected WorldCom declares bankruptcy • Problem WorldCom carries 13% - 50% of global internet traffic. • Viruses/worms are legion on the Internet About %40 of Internet traffic uses WorldCom’s network at some point and continue to scan for vulnerable hosts • October 2002 Outage affecting only 20% of WorldCom users snarls traffic around the globe • Hackers scan looking for easy targets to • Congressional Hearings With Live Demo! attack Congress considers, but rejects, extension of FCC regulatory powers to prevent WorldCom shutdown Vulnerabilities are not just technical U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 1

  2. Increasing Dependence We are increasingly dependent on the Internet: Directly – Communication (Email, IM, VoIP) – Commerce (business, banking, e-commerce, etc) What’s really going on here – Control systems (public utilities, etc) – Information and entertainment – Sensitive data stored on the Internet Indirectly – Biz, Edu, Gov have permanently replaced physical/manual processes with Internet-based processes * Based on slides by David Alderson, CalTech U.S. National Cybersecurity March 31, 2004 Security Not A Priority An Achilles Heel? Other design priorities often trump security: Combination of dependence and vulnerability make the Internet a target for asymmetric attack Cost Cyberwarfare Speed Cyberterrorism Convenience Cyberhooliganism* Open Architecture Backwards Compatibility and a weak spot for accidents and failures * Coined by Bruce Schneier, Counterpane U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 Hard to Manage Security The Challenge • No metrics to measure (in)security A solution to this problem requires both the right technology and the right public policy . • Internet is inherently international • Private sector owns most of the This is the cybersecurity challenge. infrastructure • Cost/incentive disconnect? – Businesses will pay to meet business imperatives – Who’s going to pay to meet national security imperatives? U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 2

  3. Some Definitions According to the U.S. Dept of Commerce: n. cybersecurity : See “ information security” What is “cybersecurity?” n. information security : The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. U.S. National Cybersecurity March 31, 2004 Some Definitions Some Definitions According to H.R. 4246 “Cyber Security Information According to S.I. 1901 “Cybersecurity Research and Act”: Education Act of 2002”: cybersecurity : “ information assurance, including scientific, technical, management, cybersecurity : “The vulnerability of any computing system, or any other relevant disciplines required to ensure computer and network security, software program, or critical infrastructure to, or their ability to including, but not limited to, a discipline related to the following functions: resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, (A) Secure System and network administration and operations. public or private telecommunications systems or other similar (B) Systems security engineering. conduct that violates Federal, State, or international law, that (C) Information assurance systems and product acquisition. (D) Cryptography. harms interstate commerce of the United States, or that threatens (E) Threat and vulnerability assessment, including risk management. public health or safety.” (F) Web security. (G) Operations of computer emergency response teams. (H) Cybersecurity training, education, and management. (I) Computer forensics. (J) Defensive information operations. U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 Some Definitions One way to think about it According to S.I. 1900 “Cyberterrorism cybersecurity = security of cyberspace Preparedness Act of 2002 ”: cybersecurity : “information assurance, including information security, information technology disaster recovery, and information privacy.” U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 3

  4. One way to think about it One way to think about it cybersecurity = security of cyberspace cybersecurity = security of information systems and networks information systems and networks U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 One way to think about it One way to think about it cybersecurity = security of information cybersecurity = security of information systems and networks systems and networks in the face of attacks, accidents and failures security in the face of attacks, accidents and failures U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 One way to think about it One way to think about it cybersecurity = security of information cybersecurity = security and reliability of systems and networks in the face of information systems and networks in the attacks, accidents and failures face of attacks, accidents and failures security and reliability (Still a work in progress.) U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 4

  5. In Context Cybersecurity as a Discipline corporate cybersecurity = security and Now we have our goal. How do we achieve it? reliability of corporate information systems and networks in the face of attacks, Must understand the four factors that play into the cybersecurity equation: accidents and failures – Technology national cybersecurity = security and – Public Policy reliability of the nation’s information – Economics (of stakeholders and incentives) systems and networks in the face of – Social Influences (e.g. Big Brother fears) attacks, accidents and failures U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 Goal of the Class Answer the question: Is today’s Internet is an appropriate platform What This Class is All About on which to operate critical infrastructure services that affect U.S. national security? U.S. National Cybersecurity March 31, 2004 How We’ll Get There What You Will Come Away With • Understand threats to today’s Internet • Working knowledge of how the Internet infrastructure infrastructure operates and who the major cybersecurity policy actors are. • Develop a framework for analyzing the factors in the Cybersecurity equations • Frameworks within which to understand and analyze cybersecurity issues. • Explore and analyze not only the technical options for securing the Internet but also • Knowledge about current salient issues in consider political, legal, and economic cybersecurity. means able to combat the problem • Connections and resources to help you in cybersecurity related research. U.S. National Cybersecurity March 31, 2004 U.S. National Cybersecurity March 31, 2004 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend