Assessing Actions Along the Spectrum of Cyberspace Operations

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Cyber Conflict Research Rain Ottis UNCLASSIFIED.
Revision from last week  Assumptions are potential failure points in a project. They need to be monitored and managed. At the start of the project they.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Computer Security Fundamentals
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
South Carolina Cyber.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Welcome to New Hire Orientation Information Security
Wars Games By: Chris Hill. What is a Cyberwar? Cyberwar is a type of warfare that is all electronic attach instead of a physical attack which involves.
Network Security of The United States of America By: Jeffery T. Pelletier.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
A sophisticated Malware Arpit Singh CPSC 420
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Computer & Network Security
Jeong, Hyun-Cheol. 2 Contents DDoS Attacks in Korea 1 1 Countermeasures against DDoS Attacks in Korea Countermeasures against DDoS Attacks in.
Cyber Warfare Case Study: Estonia
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
Cybersecurity: Expanding the Front Lines of Defense Dr. George K. Kostopoulos Professor Electrical and Computer Engineering Cybersecurity New York Institute.
CYBER WARFARE What is it and what does the future hold?
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Virtualisation in Education: Information Security Lab in Your Pocket Alexandre Karlov, JINR
Medicine medical imaging patient monitoring record keeping surgery diagnostics pharmaceuticals prosthetics remote care nanotechnology Art digital.
Industrial Control System Cybersecurity
Nation State Actors Lex Dunlap.
International Conflict & Cyber Security
Executive Director and Endowed Chair
Stuxnet By Shane Serafin.
Intro to Malware Attacks
Cybersecurity Case Study STUXNET worm
How to Solve Hard-Drive Failure in Laptop? by I FIX PC.
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Internet Security Threat Status
Object Oriented Programming and Software Engineering CIS016-2
Unit# 5: Internet and Worldwide Web
LO1 - Know about aspects of cyber security
Deborah Housen-Couriel, ADV.
Cyber Security For Civil Engineering
Presentation transcript:

Assessing Actions Along the Spectrum of Cyberspace Operations Unclassified Assessing Actions Along the Spectrum of Cyberspace Operations Presented by USCYBERCOM/JA This presentation does not necessarily reflect the position of the US Government. Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Cyber Attack Use of force Physical damage or destruction Physical injury or death Interrupt the flow of information or function of information systems Change, delete, manipulate data, (e.g., changing a word in a document); Modify software to cause system glitches, (e.g., causing a reboot or causing a file to close); Disrupting communications, or command and control (e.g. blocking emails, web forums, telephone communication) Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations With that background, we will discuss several real world and exercise examples of cyber operations to determine where they fall on the spectrum of cyber operations Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Cyber Attack Use of force Physical damage or destruction Physical injury or death Interrupt the flow of information or function of information systems without physical damage or injury Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Operation Buckshot Yankee Implant Code embedded in flash drive Downloaded when inserted into computer (Ran code to enable exfiltration) Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Change Data with No Physical Damage to Gain Access Erase admin logs Cause reboot to upload or activate program Install program Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Cyber Shock Wave—Move One Malware downloaded to cell phones during basketball game Designed to spread to linked computers Botnet ready to order Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Small scale Denial of Service against Non-Government Adversary Block adversary publication of a magazine or pamphlets (e.g. Inspire) Block email communications Block access to website Very stealthy Less stealthy Unclassified t

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Delete or Change Data of Non-Govermental Adversary (with no physical damage or injury to persons) Delete web documents or files from computer Change information in articles or propaganda Manipulate information to render instructions ineffective Change location of tactical rendezvous Very stealthy Less stealthy Unclassified t

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Operation Aurora Access to systems of Google and more than 20 other companies, including web security, defense industry Google attributed to China Politburo officials and assisting organizations Actions lasted several months Data stolen Security codes modified Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Cyber Disruption Interrupt the flow of information or function of information systems Access Operations Digital intelligence (e.g., stealthy implant) U.S. and South Korea 2009 27 Government and commercial sites hit with a denial of service Estimated over 50K+ computers in botnet sending requests Targeted NY Stock Exchange, NASDAQ, Yahoo financial, Dept of Transportation, Treasury, FTC, White House, Secret Service DDOS lasted from hours to a few days Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Cyber Disruption Interrupt the flow of information or function of information systems Access Operations Digital intelligence (e.g., stealthy implant) Estonia 2007 Intermittent DDOS against government and businesses over the course of a month Botnets used; actions transited over 170 countries Online banking down for most of the month Government unable to send emails for days at a time Data changed on websites including defacement and propaganda Primarily economic impact and degraded communications Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Cyber Disruption Interrupt the flow of information or function of information systems Access Operations Digital intelligence (e.g., stealthy implant) Estonia 2007 NOTE: Estonia and NATO stated these actions did not constitute a use of force We may consider actions less than Estonia as less than a use of force Many cyber disruption actions fall below this threshold (Month long DDOS against banking, government web-sites, communication) Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Cyber Shock Wave—Move 2 Botnet spread through malware-generated emails Civilian SCADA outage with no physical damage 40 Million lost electricity in Eastern U.S. for hours to days 60 Million lost cell phone access for days Wall Street down for 1 week Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Cyber Storm SCADA outage with no physical damage Affects Government and critical infrastructure Air Traffic Control lost for limited period Loss of government communications for days D.C. Metro shut down for days Gray area: may be viewed as attack depending on severity Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Cyber Disruption Interrupt the flow of information or function of information systems Access Operations Digital intelligence (e.g., stealthy implant) Stuxnet Precision-Effect Code infiltrated Iran’s nuclear facilities for uranium enrichment Cyber code altered rotation speed of centrifuges Over 1000 centrifuges damaged Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Cyber Disruption Interrupt the flow of information or function of information systems Deleting or Manipulating Data (causing physical damage and injury) Alter subway data to cause trains to collide Altering flight paths causing planes to collide Altering or deleting information in medical and pharmaceutical records causing serious illness and death when patients treated Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Cyber Attack Physical damage to property or injury to persons Cyber Disruption Interrupt the flow of information or function of information systems Access Operations Digital intelligence (e.g., stealthy implant) Cyber Attack During Conflict Damage command and control systems Cause in-flight failure on military aircraft Cause detonation at military fuel depot Very stealthy Less stealthy Unclassified

Spectrum of Cyber Operations Unclassified Spectrum of Cyber Operations Ping, Map or Probe Buckshot Yankee CSW Move One Implant malware Create botnet Degrade Service or access to info Delete or change adversary data with no phys. damage or injury US/ROK DDOS with minor impact Estonia Govt & Banking down for most of a month Cyber Shock Wave SCADA outage with no physical damage Primarily private systems Cyber Storm SCADA outage with no physical damage Effected Govt & critical systems Change Data Causes injury or damage Stuxnet Damage 1000 centri-fuges Erase logs Install code Attack in conflict Destroy C2, fuel, planes, ships China & Google Cyber Disruption Interrupt the flow of information or function of information systems without physical damage or injury Cyber Attack Physical damage to property or injury to persons Access Operations Digital intelligence (e.g., stealthy implant) Very stealthy Less stealthy Unclassified