cyberterrorism. critical infrastructure vulnerability

16
Cyberterrorism

Upload: homer-terry

Post on 17-Dec-2015

222 views

Category:

Documents


2 download

TRANSCRIPT

Critical Infrastructure

Vulnerability

Cyberspace: The New Realm of Warfare

1. Distributed Denial of Service (DDOS) Attack

2. Potential Attacks

Threats in Cyberspace

1. Hacktivism

2. Cybercrime

3. Cyberespionage

4. Cyberwar

5. Cyberterrorism

Cyberterrorism Definition1. Political agenda

2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths)

3. Civilians as targets

4. Publicity

5. Non-state actors

Traditional Terrorism definition:

2. Use of violence

Al-Qaeda

• Younis Tsouli

• Irhabi 007

Two Questions

1. Can anyone do significant damage with a cyber attacks?

• Cyber 9/11?

2. What does a terrorist group achieve with a cyberattack that they can’t with a conventional attack?

The Nature of the Internet:Strength and Weaknesses

• Resiliency• Redundancy• Wireless• Vulnerabilities and

flaws can be corrected

• Vulnerabilities• Flaws• Espionage• Reliance on private

sector

Cybersecurity

• 1998: PDD-63 Critical Infrastructure protection (For more, see PDD-63 addendums here)

• 2003 US National Strategy to Secure Cyberspace

• 2003 HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection

2008 Comprehensive National Cybersecurity Initiative (CNCI)

1. Identify attacks

2. Public-Private partnerships

3. Information sharing

4. Exercises

5. Vulnerability assessments

6. Coordination

7. Counterintelligence

US Cyberspace Policy Review, 2009

National Security Adviser

Deputy Nat’l Security Adviser

Special Assistant for

Cybersecurity

Homeland Security Council

NationalSecurity Council

National Security Staff NSC PrincipalsCommittee

NSC DeputiesCommittee

Information and Communications

Interdepartmental Policy Committee

Other US Policy Documents• US National Strategy for the Physical Protection

of Critical Infrastructures and Key Assets, 2/2003

• US National Strategy to Secure Cyberspace, 2003

• US Department of Homeland Security National Infrastructure Protection Plan, 2006

• Cyberterror, White Paper 1999, Center for the Study of Terrorism and Irregular Warfare (excellent US government-sponsored research on the issue)

Exercises

• Cyberstorm I 2006 http://www.dhs.gov/xlibrary/assets/prep_cyberstormreport_sep06.pdf

• Cyber Storm II 2008 http://www.dhs.gov/xlibrary/assets/csc_ncsd_cyber_stormII_final09.pdf

• Cyber Storm III September 2010