Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Its a new digital world with new digital dangers….
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cyber Security R&D Challenges: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D
DHS, National Cyber Security Division Overview
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
1 Telstra in Confidence Managing Security for our Mobile Technology.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Introduction to Security Computer Networks Computer Networks Term B10.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Welcome to EECS 354 Network Penetration and Security.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Threats and Attacks Principles of Information Security, 2nd Edition
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
APA of Isfahan University of Technology In the name of God.
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
A First Course in Information Security
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Internet Security Aspects Dr. Gulshan Rai Director Indian Computer Emergency Response Team (CERT-In) Department of Information Technology.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
INFORMATION SECURITY GOVERNANCE READINESS IN GOVERNMENT INSTITUTION
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Malicious Software.
Ingredients of Security
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Information Systems Week 7 Securing Information Systems.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Botnets A collection of compromised machines
Managing Windows Security
Internet Quarantine: Requirements for Containing Self-Propagating Code
Instructor Materials Chapter 7 Network Security
Botnets A collection of compromised machines
Internet Worm propagation
Networking for Home and Small Businesses – Chapter 8
Intrusion Detection system
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Introduction to Internet Worm
Presentation transcript:

Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010

Issues Protection of Infrastructure Protection of Resources ◦ Governments ◦ Industry ◦ Individuals Protection of Intellectual Property Identity Theft Enabling Criminal Investigation

Malware Malicious Software ◦ Viruses ◦ Worms ◦ Trojans ◦ Root Kits ◦ Spyware

Malware

US-CERT Incident Categories CAT 1: Unauthorized Access CAT 2: Denial of Service (DoS) CAT 3: Malicious Code CAT 4: Improper Usage (based on Policy) CAT 5: Scans, Probes, or Attempted Access CAT 6: Under Investigation

US-CERT Reported Cyberspace Security Incidents by Category Quarterly Trends FY09 Q1 (June 2009) Quarterly Trends FY06 Q3 (June 2006)

US-CERT Reported Cyberspace Security Incidents Quarterly Trends FY09 Q1 (June 2009) Quarterly Trends FY07 Q4 (December 2007)

DDoS Attacks DDoS Attacks (Last Two Years)

Infection Rates Code Red ◦ 150,000 computers in 14 hours NIMDA ◦ Nationwide in 1 hour

Example: Spread of the Witty Worm Figure 2: The exponential spread of the Witty worm. The number of active machines in five minutes (green line) stabilized after 45 minutes, indicating that almost all of the vulnerable machines had been compromised. After that point, dynamic addressing (e.g. DHCP) caused the cumulative IP address total (the red line) to continue to rise. We estimate the total number of hosts infected by the Witty worm to be 12,000 hosts at most. Shannon, Colleen and David Moore. “The Spread of the Witty Worm”, CAIDA,

Uses of Botnets Distributed Denial of Service Attacks Spamming Sniffing Traffic Keylogging Spreading New Malware Leveraging Advertising Manipulating Polls and Games Mass Identity Theft

Spam by Botnet Type

Example: Rustock

Botnet Statistics September 2006: Botnets capable of generating10-20Gbps of junk data Davos 2007: Up to 25% (150 million hosts) may be participants in a botnet Last two year trends [ShadowServer]

Hosts on the Internet

Quality of Software US CERT [ Through Q3 2008

Zero AV Detection

IPV4 Network Routing

IPV4 Packet Fields

IPV4 Infrastructure RIPE NCC (January 2010)

National Policy National Strategy to Secure Cyberspace, 2003 ◦ Public-private engagement through DHS ◦ Federal Priorities I.A National Cyberspace Security Response System II.A National Cyberspace Security Threat and Vulnerability Reduction Program III.A National Cyberspace Security Awareness and Training Program IV.Securing Governments’ Cyberspace V.National Security and International Federal Information Security Management Act, 2002 (FISMA)

National Strategy to Secure Cyberspace, p. 9

Guiding Principles A national effect Use government to facilitate / communicate Protect privacy and civil liberties Regulations and market forces Leverage market forces Accountability and responsibility Ensure flexibility Multiyear planning

Government Involvement II. A National Cyberspace Security Threat and Vulnerability Reduction Program Include efforts to ◦ Identify and remediate existing vulnerabilities ◦ Develop systems with fewer vulnerabilities With goals and objectives including ◦ Securing mechanisms of the internet ◦ Improving the security and resilience of key internet protocols ◦ Promoting improved internet routing ◦ Improve management (of the internet)

DHS NIPP-Cyber Security (National Infrastructure Protection Plan) Industry-specific partnership: IT Sector ◦ IT SCC Sector Coordinating Council ◦ IT GCC Government Coordinating Council ◦ IT ISAC Information Sharing and Analysis Center ◦ US-CERT U.S. Computer Emergency Readiness Team

Security Industry 2005: $4 billion with 13.6% Growth (Gartner)