internet threats, u.s. strategy to secure cyberspace, & education: how do they all fit together?...

21
Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government Relations This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Upload: vernon-walters

Post on 23-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together?Tiffany JonesDirector, North and Latin American Government Relations

This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 2: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

2

Attack Trend Highlights from Symantec’s Internet Security Threat Report (March 2004)

• Financial services, healthcare and power & energy were among the hardest hit by severe events. Critical infrastructure and businesses with significant financial resources tend to experience a relatively high severe attack rate. Universities still largely being used as the launching pad for attacks.

7.8

6.2 6.1

5.45.1

3.02.7

2.5 2.4

1.9

0

3

6

9

FinancialServices

BusinessServices

Healthcare Power &Energy

Media/Ent. Nonprofit E-Commerce

Mfg High Tech Teleco

Industries

Se

ve

re e

ve

nts

Severe Events Experienced by Industries Per 10,000 Events

Page 3: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

3

Vulnerability Trend Highlights

• Symantec documented 2,636 new vulnerabilities in 2003.

• This is an average of seven per day.

• This is a less than 2% increase over 2002, indicating that a plateau may have been reached.

• Perhaps more worrisome is the fact that the period of time between the announcement of a vulnerability and the release of an associated exploit is shrinking.

• Client-side vulnerabilities in Microsoft® Internet Explorer are on the rise. These may allow attackers to compromise the systems of client users who unwittingly visit malicious Web sites. In the past six months, researchers discovered 34 vulnerabilities in Internet Explorer.

Page 4: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

4

Trend Highlights

• Backdoors: Attackers and blended threats increasingly targeted backdoors left by other attackers and worms. By leveraging existing backdoors to gain control of a target system, attackers can install their own backdoor, or use the compromised system to participate in a distributed denial of service attack (DDoS).

• Peer-to-Peer: A large number of attackers targeted common peer-to-peer file sharing ports, which occupy three out of ten positions in the ranking. This reflects on the increased popularity of peer-to-peer file sharing and the tendency for organizations to filter this traffic.

• Newly discovered vulnerabilities are increasingly severe. Accordingly, the number of low severity vulnerabilities is decreasing. High-severity vulnerabilities give increased privileges and access to more prominent targets.

• From 2002 to 2003, the volume of confidential data threats in the top 50 submissions increased 148%. Previously, 22% of Symantec’s top ten malicious code submissions were a threat to privacy and confidentiality of data. In the past six months, the volume of such submissions has risen to 78%.

Page 5: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

5

Future Trends

• The decreasing time between vulnerability disclosure and widespread exploitation is discussed in this and previous reports. The likelihood of blended threats that exploit unpublished vulnerabilities (otherwise known as “zero-day” blended threats) is increasing. Symantec believes that “zero-day” threats are imminent. A “zero-day” blended threat could target such a vulnerability before that vulnerability is announced and a patch made available. If such an outbreak occurs, widespread damage could occur before users are able to effectively patch their systems.

• companies/entities that practice "good" cybersecurity do in fact receive less attacks and damage than others who don't?

Page 6: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

6

New technologies fuel the fire

Projected by 2005:

Broadband

1/3 of all G7 households

Set-top Boxes

400M in use worldwide

Instant Messaging

1B users in the world

Wireless

2B Internet-enabled devices worldwide

Page 7: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

7

White House Cover Letter Key Points

• “Securing cyberspace is an extraordinarily difficult strategic challenge that requires a coordinated and focused effort from our entire society – the federal government, state and local governments, the private sector and the American people.”

• “The cornerstone of America’s cyberspace security strategy is and will remain a public-private partnership.”

Page 8: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

8

National Strategy to Secure Cyberspace Objectives

1. Prevent cyber attacks against America’s critical infrastructures;

2. Reduce national vulnerability to cyber attacks; and

3. Minimize damage and recovery time from the cyber attacks that do occur.

Page 9: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

9

National Strategy to Secure Cyberspace Priorities

• Priority I: A National Cyberspace Security Response System

• Priority II: A National Cyberspace Security Threat and Vulnerability Reduction Program

• Priority III: A National Cyberspace Security Awareness and Training Program

• Priority IV: Securing Governments’ Cyberspace

• Priority V: National Security and International Cyberspace Security Cooperation

Page 10: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

10

Priority III:Awareness, Education & Training with four major actions/initiatives

• Promote a national awareness program to empower all levels of the American population to secure their own parts of cyberspace (home users, small businesses, enterprises, sectors, etc)

• Foster adequate training and education programs

• Increase the efficiency of existing federal cybersecurity training programs

• Promote private-sector support for well-coordinated, widely recognized professional cybersecurity certifications

Page 11: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

11

Individual’s Actions Directly Impact Risks

Behavior

• Opening unsolicited email

• Not installing personal firewall

• Trusting all websites on the Internet

Risk

• Becoming infected with virus or worm – causing wide spread infections, etc.

• PC data is unsecured, including personal information, potentially financial information. PC may become accessible to unauthorized individuals

• Potential of unknowingly downloading malicious code, identity/credit theft, cyber-stalking

Page 12: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

12

$0

$20

$40

$60

$80

$100

$120

$140

$160

$180

Mil

lio

ns 2000

2001

2002

Theft of proprietary information

Financial Fraud

Virus Attacks

Denial of Service Attacks

Laptop Theft

$171 M

$116 M

$50 M

$18 M$12 M

Source: 2002 CSI/FBI Computer Crime and Security Survey

Why Awareness and Education:Rising Costs to Businesses

Page 13: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

13

Forces

Page 14: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

14

Large Organizations - Employees Directly Impact Information Security Risks

– Poor password protection

– Fail to maintain positive control of laptops and PDAs

– Lax telephone security

– Unable to appropriately respond to social engineers or fraudulent actors

– Fail to update virus protection software and scan files

– Launch email attachments

– Surf web and download files from Internet

– More open to network attack

– Loss of proprietary information; costs to replace equipment

– High costs from telephone fraud

– Organization vulnerable to exploitation and attack

– High rate of virus infection; lost productivity due to down time

– High rate of virus re-infection

– Reduced network bandwidth;loss of worker productivity

Inappropriate Behavior Operational Impact

Page 15: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

15

Security Awareness, Training and Education

• Awareness:

– Information given to people to be mindful or conscious of; change a behavior

– Designed for large numbers of people

• Training:

– To make or become proficient with specialized instruction and practice

– Designed for specific individuals

• Education

– Knowledge or skills obtained through training and practice

– Designed for specific individuals

Page 16: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

16

Principles of a Security Awareness Program

• Designed for specific audience based on demographics; much like a marketing campaign

• Perceived as useful to audience

• Motivational – people must feel compelled or motivated to participate

– Fun, interesting, benefits, mandated, etc.

• Information “floods” the consciousness of audience

– Information is “pushed” to audience

– Initially little to no action is required of the audience to obtain information

Page 17: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

17

Essentials of a GoodSecurity Awareness or Training Program

A successful security awareness program:

– Arouses interest and conveys the importance of information protection – the “Why”

– Informs people on information security essentials – the “How”

– Informs people of acceptable behaviors – the “What and Where”

– Evaluates message retention

– Ensures lasting change in peoples behavior

– A training program has the same essentials as an awareness program, with the addition of more detailed and in-depth information; Provides all or most information on a subject necessary for predefined competency (For example: passwords awareness vs. access management training)

Page 18: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

18

Programs Available

• Public Programs

– Mainly designed for Children, Consumer and Small Business

– Excellent information – some provide “one stop shopping”

– Primarily “Awareness” focused

– Free

• Private Programs

– Awareness, Training and Education programs available through companies like Symantec

– Excellent: customized courses

– Nominal cost

Page 19: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

19

National Cyber Security Alliance (NCSA) Objectives/Goals

– Unique partnership among the Federal government, leading private sector companies, trade associations, educational organizations (Educause) and others. Through the NCSA’s Web site, www.staysafeoneline.info, this NCSA aims to educate individuals and small businesses on the need for computer security and encourage all computer users to protect their home and small business systems.

– Foster a “culture of security” where every individual and organization recognize their responsibilities related to personal information and make its protection part of their day-to-day routine;

– Conduct national awareness campaign (PSA, tool-kits, surveys, etc)

– National Cybersecurity Awareness Day/Month

– Support the Department of Homeland Security and FTC campaign to implement a national cyberspace security awareness and training program;

Page 20: Internet Threats, U.S. Strategy to Secure Cyberspace, & Education: How do they all fit together? Tiffany Jones Director, North and Latin American Government

20

Stay Safe Online: Top Ten Cybersecurity Tips

• 1. Use "anti-virus software" and keep it up to date.

• 2. Don't open email or attachments from unknown sources. Be suspicious of any unexpected email attachments even if it appears to be from someone you know.

• 3. Protect your computer from Internet intruders -- use "firewalls".

• 4. Regularly download security updates and “patches” for operating systems and other software.

• 5. Use hard-to-guess passwords. Mix upper case, lower case, numbers, or other characters not easy to find in a dictionary, and make sure they are at least eight characters long.

• 6. Back up your computer data on disks or CDs.

• 7. Don't share access to your computers with strangers. Learn about file sharing risks.

• 8. Disconnect from the Internet when not in use.

• 9. Check your security on a regular basis. When you change your clocks for daylight-savings time, reevaluate your computer security.

• 10. Make sure your family members and/or your employees know what to do if your computer becomes infected.