13-02-2013, 10:31 AM
Cyber-Terrorism
Cyber.ppt (Size: 1.27 MB / Downloads: 75)
Introduction
FBI Agent – 28 years
Counter-terrorism
Counterintelligence
Information Security
Private computer security company (2 yrs)
Topics of Discussion
What is Cyber-terrorism?
Internet
Cyber-crime (terrorism) incidents
What is the potential threat
Cyber-Terrorism tools
Defending against the threat
Cyber-Terrorism
The FBI defines terrorism as the
“unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.“
Use of computer resources……
Internet Growth
ARPANET – Advanced Research Projects Agency (DOD) 2000 users in ’73
1988 – Morris Worm incident affects 6,000 of 60K Internet users
World Wide Web released in 1991
Dial-ups begin service in 1995
140 million users by 2004
Frederick the Great allegedly said "He who defends everything, defends nothing."
“If you’re connected to the Internet, there’s no such thing as security. It’s called controlled access. If you control the access, everything should be fine. However. If you lose control of the access, that’s when there are problems.”
Current Security Challenges
“Always on” connections: Cable Modems & DSL
Dial-in access for remote users
Expanded use of web services: Internet, Extranets & Intranets
Dramatic growth of eMail, Internet phone services
Distributed data access
Switched networks, High-speed networks
Increased use of VPNs
Computer Crime and Security Survey (2001)
85% of respondents detected security breaches over last 12 mos
74% of respondents reported theft of proprietary info, financial fraud, DDoS, data or network sabotage (2000)
Losses from 186 respondents totaled over $377M
71% of respondents detected unauthorized access by insiders (2000)
94% detected computer viruses
70% cited Internet connection as “point of attack”
Why Internet Security?
Hackers can reside anywhere in the world
Most countries don’t have anti-hacking laws
Economic espionage encouraged by some countries
Legal jurisdictions hard to determine
Companies are being forced to use Internet for B2B to remain competitive.
Regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and Office of Controller of Currency (OCC), Gramm-Leach-Bliley Act, mandating industries to implement security.
Why is the Internet Vulnerable?
Internet was not originally designed to be secure
U.S. Information Infrastructure is vulnerable
“Data at Rest” – New product information, credit card numbers, social security numbers, etc.
This vulnerability will increase in the future because of the growing ties between the Internet and the critical infrastructures