critical infrastructures cj416 unit 7 seminar eric salvador

26
Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Upload: allen-skinner

Post on 30-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Critical Infrastructures

CJ416Unit 7 SeminarEric Salvador

Page 2: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Current Events - Threat• Anonymous Hacker Havittaja Takes Down US Department of Justice Website LEO.gov

4/16/12: A member of the Anonymous hacking group has taken down the website of the US Department of Justice with a Distributed Denial of Service (DDoS) attack. Following a similar attack on the CIA website, which had reportedly been offline for 45 minutes, Brazilian hacker Havittaja launched an assault on the department’s homepage. On Twitter, he claimed responsibility for the DDoS, saying it was done for the “lulz“, which refers to the popular online abbreviation “for laughs“.

• The collective targeted the department of justice in January as part of Operation Megaupload, in a retaliatory attack against the US government’s decision to close the popular file-sharing site. Along with the Department of Justice, Anonymous launched a DDoS against the FBI — the largest attack to date. Hacktivists have hit the CIA website twice before. In June 2011, LulzSec, an offshoot of Anonymous, temporarily brought down the agency’s homepage. Hackers affiliated with Anonymous launched a “Tango down” of the CIA site in February 2012, taking it offline for several hours. Five hacktivist member of Anonymous offshoot Lulzsec were arrested in March by law enforcement officials in Europe and the US, who acted on information leaked by the group’s prominent leader, Hextor Xavier Mensegu, called Sabu. LulzSec is allegedly responsible for billions of dollars in damage to governments, international banks and corporations through coordinated cyber-attacks.

Page 3: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

FBI Warns Smart Meter Hacking May Cost Utility Companies $400 Million A Year

The FBI has seen an increase of smart meter hacks which allow consumers to reduced power bills by 50-75%. Crazy hacking skills are not required and can be accomplished by using a magnet to fake readings or hiring hackers to attack smart meters. The FBI warned the cost of smart meter fraud may cost utility companies $400 million per year.

While smart meters going dumb has been called an "urban myth," and some Americans have padlocked their dumb meters to stop smart meters from being installed, others have happily welcomed and hacked smart meters in order to significantly reduce power bills by 50-75%. The FBI warned that hacking smart meters and the resulting fraudulent power bills may end up costing utility companies about $400 million per year.

http://www.networkworld.com/community/blog/fbi-warns-smart-meter-hacking-may-cost-utilities-400-million-year?t51hb

Page 4: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Unit 7 Project Preview

The assignment for this unit requires you to develop a cyber crime Attack Tree for the Adrian Lamo case against The New York Times.

Attack tree must be completed in outline format. See Unit 2 Seminar for guidance, or

see the sample posted in the docshare.

Page 5: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Critical Infrastructure

Page 6: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What do we refer to when we say Critical Infrastructure?

Page 7: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What is Critical Infrastructure?

Page 8: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Which critical infrastructure do you feel is the MOST vulnerable?

Page 9: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Which critical infrastructure do you feel requires the least

training, planning, and experience?

Page 10: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Which critical infrastructure do you feel the government needs to focus most upon securing?

Page 11: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What is responsible for what?

Page 12: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

President’s Directive PDD-63

(1998) President Clinton recognized a threat to telecommunications and through the PDD-63, he required that “No Later than 2000, the United States shall have achieved an initial operating capability and no later than May 2003, the United States shall have achieved and shall maintain the ability to protect the nation’s critical infrastructures from intentional acts that would significantly diminish the abilities of : . . .

Page 13: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

President’s Directive PDD-63

... the private sector to ensure the orderly functioning of the economy and the delivery of essential telecommunications, energy, financial and transportation services."

Page 14: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

• (2001) Cyber security grows as a national security interest The President's Critical Infrastructure Protection Board - with cabinet-level representation and chaired by the Special Advisor to the President for Cyberspace Security within the National Security Council.

• (2002) Electronic Government Act

Page 15: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Changing the scope of the PDD

2003, President Bush introduces a National Strategy to Secure Cyberspace that recognized the increased threat of attacks on national information technology infrastructure and established three objectives:

1. Prevent cyber attacks against America’s critical infrastructures.

2. Reduce national vulnerability to cyber attacks.3. Minimize damage and recovery time from cyber

attacks that do occur.

Page 16: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Then what? (December 2003)Homeland Security Presidential Directive 7 (HSPD-7) creates the Department of Homeland Security as the focal point for the security of cyberspace.

The directive of HSPD7 established a national policy for federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks.

Page 17: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

So where did we go next? January 2008: Bush signed HSPD-23 which establishes a National Cyber Security Center within DHS

May 2009: President Obama identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter.

- Shortly after taking office, the President ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America’s digital infrastructure.

Page 18: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

The Comprehensive National Cybersecurity Initiative

• To establish a front line of defense against today’s immediate threats– Creating or enhancing shared situational

awareness of network vulnerabilities, threats, and events within the Federal Government

• To defend against the full spectrum of threats– Enhancing U.S. counterintelligence capabilities

and increasing the security of the supply chain for key information technologies.

Page 19: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

The Comprehensive National Cybersecurity Initiative

• To strengthen the future cybersecurity environment– Expanding cyber education; coordinating and

redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.

Page 20: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What are the initiatives?

• Manage the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections

• Deploy an instrusion detection systems of sensors across the Federal enterprise• Pursue development of intrusion prevention systems across the Federal enterprise• Coordinate and redirect research and development efforts• Connect current cyber ops centers to enhance situational awareness• Develop and implement a government-wide cyber counterintelligence plan• Increase the security of our classified networks• Expand cyber education• Define and develop enduring “lead-ahead” technology, strategies, and programs.• Define and develop enduring deterrence strategies and programs.• Develop a multi-pronged approach for global supply chain risk management• Define the Federal role for extending cybersecurity into critical infrastructure

domains.

Page 21: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What has changed since 9/11?

Generally speaking, a lot has changed..

Page 22: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What has changed since 9/11?http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/print/

•Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.

•An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.

•In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of space.

Page 23: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What has changed since 9/11?http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/print/

•Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.

* Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - a volume so large that many are routinely ignored.

Page 24: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

What hasn’t changed since 9/11 relative to computers and network

security?

http://www.informationweek.com/news/security/management/232200029

Page 25: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

According to the US Government Accountability Office (July 2011 report), despite recent actions taken, a number of significant challenges remain to enhancing the security of cyber-reliant critical infrastructures, such as:

•implementing actions recommended by the president’s cybersecurity policy review; •updating the national strategy for securing the information and communications infrastructure; •reassessing DHS’s planning approach to critical infrastructure protection; •strengthening public-private partnerships, particularly for information sharing; •enhancing the national capability for cyber warning and analysis; addressing global aspects of cybersecurity and governance; •and securing the modernized electricity grid, referred to as the “smart grid.”

http://www.gao.gov/search?q=critical+infrastructure

Page 26: Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Questions?