Cyberterrorism. Critical Infrastructure Vulnerability.

Slides:



Advertisements
Similar presentations
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Advertisements

Department of Homeland Security Site Assistance Visit (SAV)
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Chapter 2 Digital Terrorism.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
National Infrastructure Protection Plan
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
Network Security of The United States of America By: Jeffery T. Pelletier.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
HSGP Funding for Security Efforts Presented by Michele Robinson.
Tradition CIA FBI. Commissions US Commission on National Security in the 21 st Century (USCNS) Hart- Rudman Commission (see Phase 1 Report, p. 7) US Commission.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
1. Organization. Tradition CIA FBI Commissions US Commission on National Security in the 21 st Century (USCNS) Hart-Rudman Commission (see Phase 1 Report,
Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador.
Critical Infrastructure Protection: Program Overview
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
1 Washington State Critical Infrastructure Program “No security, No infrastructure” Infrastructure Protection Office Emergency Management Division Washington.
Created by: Ashley Spivey For Department of Homeland Security All information from:
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
FOR OFFICIAL USE ONLY 1 National Critical Infrastructure Prioritization Program Tier 1 and Tier 2 Program Overview Office of Infrastructure Protection.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Disaster and Emergency Management
HSGP Funding for Security Efforts
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
State Board of Elections Computers
Critical Infrastructure Protection Policy Priorities
BSS 482 Innovative Education-- snaptutorial.com
BCC 403 Education for Service-- tutorialrank.com
Computers and Homeland Security
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Securing Critical Chemical Assets: The Responsible Care® Security Code
Institution and Capacity- Building
Deborah Housen-Couriel, ADV.
Presentation transcript:

Cyberterrorism

Critical Infrastructure Vulnerability

Cyberspace: The New Realm of Warfare

1. Distributed Denial of Service (DDOS) Attack

2. Potential Attacks

Threats in Cyberspace 1.Hacktivism 2.Cybercrime 3.Cyberespionage 4.Cyberwar 5.Cyberterrorism

Cyberterrorism Definition 1.Political agenda 2.Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3.Civilians as targets 4.Publicity 5.Non-state actors Traditional Terrorism definition: 2. Use of violence

Al-Qaeda Younis Tsouli Irhabi 007

Two Questions 1.Can anyone do significant damage with a cyber attacks? Cyber 9/11?

2. What does a terrorist group achieve with a cyberattack that they can’t with a conventional attack?

The Nature of the Internet: Strength and Weaknesses Resiliency Redundancy Wireless Vulnerabilities and flaws can be corrected Vulnerabilities Flaws Espionage Reliance on private sector

Cybersecurity 1998: PDD-63 Critical Infrastructure protection (For more, see PDD-63 addendums here)PDD-63here 2003 US National Strategy to Secure CyberspaceUS National Strategy to Secure Cyberspace 2003 HSPD-7 Critical Infrastructure Identification, Prioritization, and ProtectionHSPD-7

2008 Comprehensive National Cybersecurity Initiative (CNCI)(CNCI) 1.Identify attacks 2.Public-Private partnerships 3.Information sharing 4.Exercises 5.Vulnerability assessments 6.Coordination 7.Counterintelligence

US Cyberspace Policy ReviewUS Cyberspace Policy Review, 2009 National Security Adviser Deputy Nat’l Security Adviser Special Assistant for Cybersecurity Homeland Security Council National Security Council National Security Staff NSC Principals Committee NSC Deputies Committee Information and Communications Interdepartmental Policy Committee

Other US Policy Documents US National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, 2/2003US National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, US National Strategy to Secure Cyberspace, 2003US National Strategy to Secure Cyberspace US Department of Homeland Security National Infrastructure Protection Plan, 2006 National Infrastructure Protection Plan Cyberterror, White Paper 1999, Center for the Study of Terrorism and Irregular Warfare (excellent US government-sponsored research on the issue)Cyberterror

Exercises Cyberstorm I berstormreport_sep06.pdf berstormreport_sep06.pdf Cyber Storm II sd_cyber_stormII_final09.pdf sd_cyber_stormII_final09.pdf Cyber Storm III September 2010Cyber Storm