Network Security of The United States of America By: Jeffery T. Pelletier.

Slides:



Advertisements
Similar presentations
By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
Advertisements

Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Chapter 2 Digital Terrorism.
SCADA Security, DNS Phishing
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Cyberterrorism. Critical Infrastructure Vulnerability.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lecture 11 Reliability and Security in IT infrastructure.
(Geneva, Switzerland, September 2014)
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
The Fight Against Terrorism
Norman SecureSurf Protect your users when surfing the Internet.
Critical Information Infrastructure Protection: Urgent vs. Important Miguel Correia 2012 Workshop on Cyber Security and Global Affairs and Global Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Submitted by: Abhashree Pradhan CA (1)
Social impacts of the use of it By: Mohamed Abdalla.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Internet Security for Small & Medium Business Week 6
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
South Korea Cyber-Attacked. Facts  When: March 20, 2013  Three major banks Shinhan Bank NongHyup Bank Jeju Bank  Two largest broadcasters Korean Broadcasting.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Information Security: Current Threats Marc Scarborough Information Security Officer
Chapter 17: Foreign Policy and National Defense Section 2.
DDoS Things You Need To Know About DDoS Attacks DDoS.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Securing Interconnect Networks By: Bryan Roberts.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Network Monitoring Kathryn Hockman. What is Network Monitoring Network Monitoring involves the use of a system that is constantly monitoring a network.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Securing Information Systems
Nation State Actors Lex Dunlap.
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Security Risk Profiles – Tips and Tricks
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Security in Networking
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Computer Emergency Response Team
was not invented by Al Gore…
Presentation transcript:

Network Security of The United States of America By: Jeffery T. Pelletier

Table of Contents Internet Governance United States Military Technology Cyber-Attacker Al-Quida’s threat Methods of Cyber-Attacker Information Warfare Attacks Conclusion Questions??????

Internet Governance United Nations Working Group on Internet Governance (WGIG) – Created in 2004 by Kofi Anon Establish Internet governance Identify key responsibilities and roles of Governments to police the Internet United States is only an advisor to this group. – Wants world to allow freedom of expression – Policing of Cyber-Crime – Domain Name and Addressing System WGIG tackles certain important issues – Economical Development on the Internet – Political Development on the Internet

United States Military Technology Department of Defense had a hand in many technology inventions: – First Computer – Internet – Global Positioning System Defense And Research Products Agency (DARPA) New technology: – Global Information Grid Newest network for US Military to communicate with each component Connects military leaders to troop in many different ways Going to take over 100% of US military network Critics argue that this can be hacked or penetrated with a virus.

Cyber-Attacker No clear profile US concerned about important industry infrastructure: – Financial infrastructure – Electrical infrastructure – Oil infrastructure Increasing Complexity of these infrastructures makes them more vulnerable for attacks. US Government has to rely more on civilian sector for safeguards.

Cyber-Attacker Specific Attacks: – One of the first was in year old college student Robert Morris created the Morris Worm. – One of the worst was in 1999 Melissa Virus attacked Word97, and Word2000. Attacked through the means of and word documents. – One of the most costly was in 2001 Code-Red Virus cost the World $2.6 billion. $200 million a day. – One of the quickest movers was in 2004 Witty Virus infected 110 hosts immediately and in 60 seconds, hit 160 hosts. In 45 minutes, it had infected all of the vulnerable hosts.

Al-Quida Leader Osama Bin-Laden In 1993 Al-Quida soilder Ramzi Yousef bombed World Trade Center – FBI found plans to attack airliners on Yousef’s personal laptop. Plans were encrypt US worried that Al-Quida uses Internet to communicate – Sends s about planned attacks – Sends encrypted messages of planned attacks In 2002, FBI learned of Al-Quida searching for information on US nuclear power plants. Critics are worried US is not ready for a major Cyber-Attack

Information Warfare Attacks Smaller/Weaker adversaries of the US – Cannot beat US Militarily Use of Information Warfare is a better method – Think US is weak in this area of Defense Structure – Could lead to a potential quick victory for adversary Countries leading threat in Information Warfare: – Russia – North Korea – China – Iran – Cuba US has to rely more on private-sector to help in defense against this type of attack

Methods of Cyber Attacks Hactivisim – Overloading of servers or networks in order to make political stance Denial of Service Attacks – Overwhelming attacks on hosts and servers in order to crash them – Multiple messages sent to overwhelm a weak host. Domain Name Server Attacks – Sends users in wrong direction – Blocks certain websites Web Defacement and Semantic Attacks – Change information slightly – Produces false information for the user Combined Attacks – An example is if a terrorist group sets of a bomb, then disables the 911 mechanism of that particular area

Conclusion Clinton Administration: – In 1996 Bill Clinton signed President’s Commission on Critical Infrastructure Protection Studied problems with Network Security Gave potential solutions to problems – In 1998 General Attorney Janet Reno signed into effect The National Infrastructure Protection Center to combat cyber-terrorism from US infrastructures. September 2001 revealed some weaknesses of the US – One is weak Network Security There has to be more of an effort by the United States Government to combat this ever increasing threat.

Questions?????