DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Chapter 2 Digital Terrorism.
Mark Carey, CPA, CISA President Toll free: x101 International: x101 Enterprise Risk Management:
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Cyberterrorism Dorothy Denning. Defined Cyberterrorism is terrorism in cyberspace Generally understood to mean: unlawful attacks and threats of attack.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cracking down on international cyberterrorism
Submitted by: Abhashree Pradhan CA (1)
Securing Information Systems
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Information Warfare Playgrounds to Battlegrounds.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
IS Network and Telecommunications Risks Chapter Six.
CJ 499 Unit 9. International Crime and What is it ?
The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
MIS323 – Business Telecommunications Chapter 10 Security.
Chapter 17: Foreign Policy and National Defense Section 2.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Disaster and Emergency Management Security Services.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber crime and security issues
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Securing Information Systems
Proactive Incident Response
Securing Information Systems
Disaster and Emergency Management
Network Security Fundamentals
Understanding the Threats of and Defenses Against Cyber Warfare
Computer Security Fundamentals
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Network Intrusion Responder Program
Disaster and Emergency Management
Chapter 13 Globalization and Terrorism: Our Small World
Internet Vulnerabilities & Criminal Activity
Networking for Home and Small Businesses – Chapter 8
Chapter 17: Foreign Policy and National Defense Section 2
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
Presentation transcript:

DoD and Cyber-Terrorism Eric Fritch CPSC 620

What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents". -FBI "The use of computer network tools to shut down critical national infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population".-Center for Strategic/Int’l Studies

Types Denial of Service Distributed Denial of Service Exploit Tools Logic Bombs Phishing Sniffer Trojan Horse Virus Vishing War Driving Worm Zero-Day Exploit

The cyber threat As our nations critical infrastructure becomes more reliant on computer networks in order to operate, there is an increased concern that these are desired targets. Examples Electric Power System Water Supply System Air Traffic Control Systems Healthcare Systems

Why cyber threats? Cyber terrorist prefer using the cyber attack methods because of many advantages for it. It is Cheaper than traditional methods. The action is very Difficult to be tracked. There are no physical barriers or check points to cross. They can hide their personalities and location. They can use this method to attack a big number of targets. They can do it remotely from anywhere in the world. They can affect a large number of people.

Cyber-terrorism Examples Started about mid1990s around the time of the internet boom : Web site set up for Zapatistas, a Mexican rebel group, to lead attacks against U.S. military from 1,500 locations in 50 different countries : NATO computers are blasted with bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo : Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours.

Who Defends Us? U.S. Strategic Command - Responsibilities for information operations (such as information warfare), missile defense, intelligence, surveillance, and reconnaissance, and combating weapons of mass destruction. U.S. Cyber Command – Responsible for protecting DoD information networks and the cyberspace infrastructure as well as supporting weapons system platforms from disruptions, intrusions and attacks.

Expanding the Cyber Fight Thousands of qualified people will be needed over the next couple of years. In addition to the Cyber Command, the following organizations are seeking qualified personnel. NSA, Cyber Crime Center, AF. Incident handling; malware/vulnerability analysis; cyber risk and strategic analysis; cyber vulnerability detection and assessment; intelligence analysis; cyber incident response and network and system engineering.

President’s Plan The presidents administration has declared use of the DoD’s cyber warfare capabilities on vital U.S. networks, not just DoD networks. The system would act almost identical to how FEMA would operate in a time of a natural disaster such as a hurricane flood. The Department of Homeland Security will also assist in the process.

Questions?

References Kathryn Stephens. Cyber-related Government Jobs. 2 Aug Nov GAO. Types Of Cyber Attacks. 5 May Nov Matson Breakey. Cyber-Terrorism: Its Origins and Impacts. 7 Mar, Nov Dr. Mudawi Mukhtar Elmusharaf. Cyber Terrorism : The new kind of Terrorism. 4 Apr Nov