International Conflict & Cyber Security

Slides:



Advertisements
Similar presentations
By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
Advertisements

Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber-Warfare: The Future is Now!
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Maritime Cyber Risks – What is real, what is fiction?
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Cyber Warfare Case Study: Estonia
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 4 E-Commerce Threats.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
AP CSP: Cybercrime.
Securing Information Systems
Industrial Control System Cybersecurity
GENI, Pen Testing, & other stories
What they are and how to protect against them
Cyber Warfare and Importance of Cyber Awareness
Stuxnet By Shane Serafin.
Xenia Mountrouidou (Dr. X)
Intro to Malware Attacks
Source: Ecommerce (Chapter 5) Pearson Education
Network Security Fundamentals
CYBER SECURITY...
Computer Network Security
Unit 32 – Networked Systems Security
FYE Cybersecurity Dr. X.
Introduction to Computer Security
Cybersecurity Case Study STUXNET worm
Cyber Security By: Pratik Gandhi.
White Hat vs. Black Hat White Hat Black Hat
Answer the questions to reveal the blocks and guess the picture.
The Best Way To Secure U R Self
COMPUTER CRIME.
Securing Information Systems
Unit 32 – Networked Systems Security
Today’s Risk. Today’s Solutions. Cyber security and
Risk of the Internet At Home
CyberPaths Interdisciplinary Modules
Week 7 Securing Information Systems
Forensics Week 12.
The Internet of Unsecure Things
Object Oriented Programming and Software Engineering CIS016-2
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Prepared By : Binay Tiwari
The vulnerability of the modern society
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
The Internet: Encryption & Public Keys
WJEC GCSE Computer Science
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
SECURITY IN THE DIGITAL AGE
CyberPaths Interdisciplinary Modules
Presentation transcript:

International Conflict & Cyber Security Project: Cybersecurity & Liberal Arts Dr. Xenia Mountrouidou

Outline Cyberwarfare Malware Malware Case Study: Stuxnet Network attacks Network Attack Case Study: DDoS

Cyberwar What is cyberwar (cyberwarfare)?

Cyberwarfare Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems -- among many other possibilities. Give at least one example of cyberwarfare in recent news that you have read.

Malware Software that is intended to damage or disable computers and computer systems. Can you think of any examples? It can be transferred through computer networks. How do you think this is done? Examples: virus, ransomware, worms, trojans, backdoors, etc. https://en.wikipedia.org/wiki/Malware Students can research what these software does. How? Via emails, software that can move through internet cables (worm), clicking on an infected site, etc.

Malware Case Study: Stuxnet Stuxnet is a famous computer worm that was first discovered in June of 2010. It was used to sabotage Iran’s nuclear enrichment facilities. In cyber security, an undisclosed vulnerability in a system is called a “zero day.” Stuxnet exploited several different zero days to change the way nuclear facilities were operating while reporting that everything was operating normally. https://youtu.be/7g0pi4J8auQ June 2011

Malware Case Study: Stuxnet Stuxnet is rumored to be the product of a collaboration between the US and Israel to sabotage Iran. What are the implications of this? How likely is it for an attack like Stuxnet to happen again in your opinion? Justify your answer. Stuxnet: a cyber biological weapon? https://www.youtube.com/watch?v=CS01Hmjv1pQ&t=82s Since the attacks, Iran has amassed a group of hackers to get more involved in cyber warfare, and has been rumored to be behind several attacks on US banks in retaliation.

Computer Network Attacks Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle https://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks Students can research and discuss about different attacks

Case Study Computer Network Attacks: DDoS Distributed Denial of Service Traffic flood Makes resources (e.g. websites) unavailable to users Can target small and large businesses Stuxnet had a very specific target, and an average business or computer user is not likely to have problems with it. But DDoS attacks are much more common. A DDoS attack is when a flood od traffic is sent to a target to make its resources unavailable to its users. Like when a crowd of people all try to go through a door at once. DDoS attacks are used to shut down businesses websites temporarily, causing them to lose traffic.

Case Study Computer Network Attacks: DDoS Mirai Botnet Large distributed denial of service attack – GBps, one billion bytes per second Weaponized the Internet of Things devices: web cameras etc. Took down websites such as: Amazon, Spotify, Twitter, Reddit Code was distributed openly in hack forums Mirai means “the future” in Japanese

Mirai on Oct. 21 2016 What does this mean for you? What are the implications four our society? What are the consequences of connecting more devices to the internet? Are there any positive effects of interconnected devices or should we just disconnect these?

Case Study Computer Network Attacks: DDoS In a survey of 270 North American companies, 45% said they have experienced a DDoS attack at some point in time About 2/3 of DDoS attacks last 6 hours or more Cost of a DDoS attack estimated at $40,000/hr Non-financial costs Hardware Customer trust Loss of data DDoS attacks are fairly common and can last for several hours. Because hey cost around $40,000/hr, the average cost of a DDoS attack is around $500,000. DDoS attacks also cause damage that is not financial. You may have to replace hardware, lose your customer’s trust, or even have theft of important data.

Case Study Computer Network Attacks: DDoS http://www.digitalattackmap.com/ http://map.norsecorp.com/#/ Watch the attacks for a while. What trends do you notice? What do they show? The second map is the live one. After watching it for a while, it should become obvious that the US is the top attacker and victim. This may be because many big global corporations are in the US, and the US has many political enemies who want to attack the US. The importance of this is to show that DDoS attacks are global, and that attacks are often from one country to another. Remember Iran hiring an “army” of hackers to counterattack the US?

Rules of cyberwarfare When does a nation engage in cyber warfare? When does a nation engage in actual warfare caused by a cyber incident? Who are the non combatant in a cyber war? Governments & cyberwarfare https://www.youtube.com/watch?v=_nSHsb5xKPo Implications of cyberwar https://www.youtube.com/watch?v=JSWPoeBLFyQ

Works Cited Cybercrime 2016 - https://www.boxcryptor.com/it/blog/post/cybercrime- 2016-the-worst-cases-so-far/ Kushner, David. "The Real Story of Stuxnet." IEEE Spectrum: Technology, Engineering, and Science News. IEEE, 26 Feb. 2013. Web. 30 May 2016. Marciano, Christine. "How Much Does Cyber/data Insurance Cost?" Data Breach Insurance. Data Breach Insurance, 1 Feb. 2016. Web. 29 May 2016. Matthews, Tim. "Incapsula Survey : What DDoS Attacks Really Cost Businesses." © Incapsula, Inc. 2014 All Rights Reservedontents (n.d.): n. pag. 2014. Web. 29 May 2016. Sanger, David E. "Obama Order Sped Up Wave of Cyberattacks Against Iran." The New York Times. The New York Times, 31 May 2012. Web. 29 May 2016. The hacked world Pax Technica, Phillip Howard