cyberterrorism. critical infrastructure vulnerability
TRANSCRIPT
Cyberterrorism Definition1. Political agenda
2. Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths)
3. Civilians as targets
4. Publicity
5. Non-state actors
Traditional Terrorism definition:
2. Use of violence
2. What does a terrorist group achieve with a cyberattack that they can’t with a conventional attack?
The Nature of the Internet:Strength and Weaknesses
• Resiliency• Redundancy• Wireless• Vulnerabilities and
flaws can be corrected
• Vulnerabilities• Flaws• Espionage• Reliance on private
sector
Cybersecurity
• 1998: PDD-63 Critical Infrastructure protection (For more, see PDD-63 addendums here)
• 2003 US National Strategy to Secure Cyberspace
• 2003 HSPD-7 Critical Infrastructure Identification, Prioritization, and Protection
2008 Comprehensive National Cybersecurity Initiative (CNCI)
1. Identify attacks
2. Public-Private partnerships
3. Information sharing
4. Exercises
5. Vulnerability assessments
6. Coordination
7. Counterintelligence
US Cyberspace Policy Review, 2009
National Security Adviser
Deputy Nat’l Security Adviser
Special Assistant for
Cybersecurity
Homeland Security Council
NationalSecurity Council
National Security Staff NSC PrincipalsCommittee
NSC DeputiesCommittee
Information and Communications
Interdepartmental Policy Committee
Other US Policy Documents• US National Strategy for the Physical Protection
of Critical Infrastructures and Key Assets, 2/2003
• US National Strategy to Secure Cyberspace, 2003
• US Department of Homeland Security National Infrastructure Protection Plan, 2006
• Cyberterror, White Paper 1999, Center for the Study of Terrorism and Irregular Warfare (excellent US government-sponsored research on the issue)