cyber security in-the-large ed lazowska bill & melinda
TRANSCRIPT
1
Cybe
r Se
curi
ty I
n-Th
e-La
rge
Ed L
azow
ska
Bill
& M
elin
da G
ates
Cha
ir in
Com
pute
r Sc
ienc
e &
Engi
neer
ing
Uni
vers
ity
of W
ashi
ngto
n
Oct
ober
12,
200
5
2
Cybe
r se
curi
ty in
thi
s co
urse
❚O
ctob
er 5
: co
mpu
ter
secu
rity
pri
mer
❚O
ctob
er 1
2: c
yber
sec
urit
y an
d cr
itic
al
infr
astr
uctu
re p
rote
ctio
n(f
inan
cial
, urb
an,
port
)❚
�Red
Tea
m�p
roje
ct❚
Nov
embe
r 9:
att
acks
(ddo
s, e
xtor
tion
, ph
ishi
ng, s
pam
, bot
net
rese
lling
, spy
ware
)❚
Nov
embe
r 16
: de
fens
es(in
cent
ive-
base
d st
rate
gies
, sup
pres
sing
Int
erne
t ou
tbre
aks,
in
trus
ion
dete
ctio
n sy
stem
s)
3
❚N
ovem
ber
23:
defe
nses
(sof
twar
e qu
alit
y,
whit
e-ha
t at
tack
s, e
xpos
ing/
publ
iciz
ing
vuln
erab
iliti
es)
❚N
ovem
ber
30:
info
rmat
ion
awar
enes
s(I
T an
d in
telli
genc
e)❚
Dec
embe
r 7:
cyb
erfo
rens
ics
(wha
t co
nsti
tute
s ev
iden
ce o
f cy
berc
rim
e, a
nd h
ow
can
it b
e ob
tain
ed)
❚[T
erm
Pro
ject
]
4
Toni
ght
❚Cy
ber
Secu
rity
In-
The-
Larg
e❙
Ed L
azow
ska,
UW
❚Th
e Re
silia
ntEn
terp
rise
❙Ph
il Ve
nabl
es, G
oldm
an S
achs
❚Cy
ber
Secu
rity
at
the
Loca
l Lev
el:
The
City
of
Sea
ttle
and
the
Por
t of
Sea
ttle
❙Ki
rk B
aile
y, U
W (e
x-
City
of
Seat
tle)
and
Erni
e H
ayde
n, P
ort
of S
eatt
le
5
Cybe
r Se
curi
ty I
n-Th
e-La
rge
6
7
❚Fo
cus:
cat
astr
ophi
c te
rror
ist
acts
❙Th
ousa
nds
of li
ves
❙Bi
llion
s of
dol
lars
❙Pa
tien
t, s
mar
t, d
isci
plin
ed a
dver
sari
es w
ith
ampl
e re
sour
ces
(peo
ple,
mon
ey, t
ime)
8
❚IT
is e
ssen
tial
to
all o
f th
e na
tion
�s cr
itic
al
infr
astr
uctu
res
❙nu
clea
r po
wer
plan
ts, d
ams,
ele
ctri
c po
wer
grid
, air
tr
affi
c co
ntro
l sys
tem
, fin
anci
al in
stit
utio
ns❙
corp
orat
e op
erat
ions
❙di
stri
buti
on o
f fo
od a
nd e
nerg
y❙
embe
dded
com
puti
ng in
all
devi
ces
and
envi
ronm
ents
; net
work
ing
of t
hese
sys
tem
s❙
tech
nolo
gica
l und
erpi
nnin
g of
all
com
mun
icat
ion
syst
ems
9
❚IT
als
o is
a c
riti
cal i
nfra
stru
ctur
e it
self
❚IT
is a
cri
tica
l com
pone
nt in
res
pond
ing
to
atta
cks
❙Em
erge
ncy
resp
onse
, inf
orm
atio
n di
ssem
inat
ion
❚IT
can
ser
ve a
s an
am
plif
ier
of p
hysi
cal
atta
cks
❙W
iden
dam
age
(fal
se in
form
atio
n, d
elay
ed
resp
onse
)❙
Hei
ghte
n te
rror
(mis
info
rmat
ion)
❚IT
can
hel
p pr
even
t at
tack
s❙
Info
rmat
ion
awar
enes
s
10
❚Th
us, I
T ca
n be
:❙
a ta
rget
❙a
vehi
cle
for
laun
chin
g or
exa
cerb
atin
g an
att
ack
on o
ther
cri
tica
l inf
rast
ruct
ures
❙a
way
to in
terf
ere
with
att
empt
s to
res
pond
(in
clud
ing
spre
adin
g FU
D)
❙a
way
to p
reve
nt, d
etec
t, a
nd m
itig
ate
atta
cks
❚A
tar
get,
a w
eapo
n, a
def
ense
❚A
key
com
pone
nt o
f ou
r �in
fras
truc
ture
sy
stem
��in
clud
ing
the
orga
niza
tion
al c
onte
xt
11
❚Sh
ort-
term
rec
omm
enda
tion
1:
Dev
elop
a
prog
ram
tha
t fo
cuse
s on
the
com
mun
icat
ions
an
d co
mpu
ting
nee
ds o
f em
erge
ncy
resp
onde
rs❙
Stat
e of
the
art
IT
❙C3
I (c
omm
and,
con
trol
, com
mun
icat
ions
, and
in
telli
genc
e) s
yste
ms
upgr
ades
for
em
erge
ncy
resp
onde
rs
12
❚Sh
ort-
term
rec
omm
enda
tion
2:
Prom
ote
the
use
of b
est
prac
tice
s in
sec
urit
y in
all
rele
vant
pub
lic a
nd p
riva
te o
rgan
izat
ions
❙D
eplo
y ad
equa
te s
ecur
ity
tool
s❙
Uti
lize
red-
team
pen
etra
tion
att
acks
❙Re
quir
e st
rong
aut
hent
icat
ion
❙Em
ploy
impr
oved
con
figu
rati
on v
alid
atio
n to
ols,
et
c.❙
Mod
el g
ood
secu
rity
beh
avio
r in
the
fed
eral
go
vern
men
t
13
❚Lo
ng-t
erm
rec
omm
enda
tion
: In
vest
in R
&D in
:❙
Info
rmat
ion
and
netw
ork
secu
rity
❙IT
and
C3I
for
em
erge
ncy
resp
onse
❙In
form
atio
n fu
sion
❙Pr
ivac
y an
d co
nfid
enti
alit
y❙
Robo
ts, s
enso
rs, s
imul
atio
n❙
Org
aniz
atio
nal a
spec
ts o
f se
curi
ty❙
Hum
an-c
ente
red
desi
gn
14
❚Th
e co
ncer
n is
not
tha
t eB
ay
will
be in
acce
ssib
le!
❚Ra
ther
, the
con
cern
is t
hat
IT s
yste
ms
are
in t
he c
ontr
ol
loop
of
ever
y el
emen
t
of t
he n
atio
n�s c
riti
cal i
nfra
stru
ctur
e�
the
elec
tric
pow
er g
rid,
the
air
tra
ffic
con
trol
gr
id, t
he f
inan
cial
gri
d, e
tc.
❚Th
is c
onst
itut
es a
sig
nifi
cant
vul
nera
bilit
y
Orig
inal
text
: �T
he c
omm
ittee
find
s th
at th
e U
.S. g
over
nmen
t is
larg
ely
faili
ng in
its
resp
onsi
bilit
ies
in th
is re
gard
.�
21
❚Th
e na
tion
is p
erilo
usly
und
er-in
vest
ed in
fu
ndam
enta
l res
earc
h in
civ
ilian
cyb
er
secu
rity
❙W
ork
that
dis
cove
rs f
unda
men
tally
new
sec
urit
y ar
chit
ectu
res,
rat
her
than
impr
oved
ban
d-ai
ds❙
Wor
k th
at t
akes
adv
anta
ge o
f th
e ta
lent
of
the
nati
on�s
full
rese
arch
com
mun
ity
❙W
ork
that
impa
cts
the
civi
lian
infr
astr
uctu
re a
nd
its
tech
nolo
gies
(upo
n wh
ich
all e
lse,
incl
udin
g th
e m
ilita
ry, r
elie
s)
22
❚D
HS
❙Si
mpl
y do
esn�t
get
it!
❘90
% o
f S&
T bu
dget
is f
or d
eplo
ymen
t, v
s. r
esea
rch
�D
HS
is g
ener
ally
igno
ring
res
earc
h❘
<2%
of
budg
et is
for
cyb
er s
ecur
ity
❙D
HS
is g
ener
ally
igno
ring
the
nat
ion�s
in
fras
truc
ture
❘Th
e ag
ency
is f
ocus
ed a
lmos
t en
tire
ly o
n W
MD
th
reat
s (b
io, c
hem
, rad
) aga
inst
indi
vidu
als
23
❚D
ARP
A❙
New
pro
gram
sta
rts
in c
yber
sec
urit
y ha
ve b
een
clas
sifi
ed❘
Prec
lude
s pa
rtic
ipat
ion
by t
he u
nive
rsit
y co
mm
unit
y�
Elim
inat
es m
any
of t
he b
est
rese
arch
ers
�N
o st
uden
ts❘
Redu
ces
impa
ct o
n co
mm
erci
al n
etwo
rks
and
syst
ems
�up
on w
hich
muc
h of
the
gov
ernm
ent,
and
muc
h of
the
na
tion
�s cr
itic
al in
fras
truc
ture
, and
muc
h of
the
mili
tary
, re
ly
24
❚N
SF❙
FY04
Cyb
er T
rust
pro
gram
, 9/2
1/20
04❘
Fund
ed 8%
of p
ropo
sals
�32
of
390
�2
of 2
5 Ce
nter
pro
posa
ls�
12 o
f 13
5 Te
am p
ropo
sals
�18
of
230
Smal
l Gro
up p
ropo
sals
❘A
ward
ed 6%
of r
eque
sted
fun
ds�
$31.5
M o
f $5
10M
25
Mul
ti-a
genc
y co
ordi
nati
on is
not
wor
king
!
❚Th
e Fe
dera
l IT
coor
dina
ting
pro
cess
(NCO
, et
c.) s
houl
d re
cogn
ize
the
gaps
tha
t ex
ist,
an
d co
mpe
nsat
e
26
Beyo
nd I
T
27
Basi
c re
sear
ch
has
flat-l
ined
!
28