Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador.

Slides:



Advertisements
Similar presentations
Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.
Advertisements

Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
The U.S. Coast Guard’s Role in Cybersecurity
Cyberterrorism. Critical Infrastructure Vulnerability.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
DHS, National Cyber Security Division Overview
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
South Carolina Cyber.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Network Security of The United States of America By: Jeffery T. Pelletier.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
(Geneva, Switzerland, September 2014)
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
James Ennis, Department of State, USA ITU-D Question 22/1 Rapporteur.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
August 2011Beyond the Border1 Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness CSG-ERC Canada-U.S. Relations Committee.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Cracking down on international cyberterrorism
Public-Private Partnerships in Action: Emergency Response
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
CITIZEN CORPS & CERT ORGANIZATIONS. What is Citizen Corps? Following the tragic events that occurred on September 11, 2001, state and local government.
A Combat Support Agency Defense Information Systems Agency Expanding Non-DOD Partnerships 17 August 2011.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
1 Improving Federal Rights-of-Way Management to Spur Broadband Deployment Meredith Attwell Senior Advisor to the Assistant Secretary National Telecommunications.
PD 5 & 8 Created By: Ashley Spivey.  A form of executive order issued by the President with consent from the National Security Council  Carries the.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Warfare Playgrounds to Battlegrounds.
Information Sharing Challenges, Trends and Opportunities
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Infrastructure Protection
Information Warfare Playgrounds to Battlegrounds.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
1 Thoughts on ERCOT-Wide Critical Infrastructure Protection Committee Bill Muston October 31, 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Chapter 17: Foreign Policy and National Defense Section 2.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Integrating Virtual Public- Private Partnerships Into Local Law Enforcement For Enhanced Intelligence-Led Policing By Gil Chavez.
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
U. S. Department of Homeland Security. Office for Civil Rights
8 Building Blocks of National Cyber Strategies
Computers and Homeland Security
Group Meeting Ming Hong Tsai Date :
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Presentation transcript:

Critical Infrastructures CJ416 Unit 7 Seminar Eric Salvador

Current Events - Threat Anonymous Hacker Havittaja Takes Down US Department of Justice Website LEO.gov 4/16/12: A member of the Anonymous hacking group has taken down the website of the US Department of Justice with a Distributed Denial of Service (DDoS) attack. Following a similar attack on the CIA website, which had reportedly been offline for 45 minutes, Brazilian hacker Havittaja launched an assault on the department’s homepage. On Twitter, he claimed responsibility for the DDoS, saying it was done for the “lulz“, which refers to the popular online abbreviation “for laughs“. The collective targeted the department of justice in January as part of Operation Megaupload, in a retaliatory attack against the US government’s decision to close the popular file-sharing site. Along with the Department of Justice, Anonymous launched a DDoS against the FBI — the largest attack to date. Hacktivists have hit the CIA website twice before. In June 2011, LulzSec, an offshoot of Anonymous, temporarily brought down the agency’s homepage. Hackers affiliated with Anonymous launched a “Tango down” of the CIA site in February 2012, taking it offline for several hours. Five hacktivist member of Anonymous offshoot Lulzsec were arrested in March by law enforcement officials in Europe and the US, who acted on information leaked by the group’s prominent leader, Hextor Xavier Mensegu, called Sabu. LulzSec is allegedly responsible for billions of dollars in damage to governments, international banks and corporations through coordinated cyber-attacks.

FBI Warns Smart Meter Hacking May Cost Utility Companies $400 Million A Year The FBI has seen an increase of smart meter hacks which allow consumers to reduced power bills by 50-75%. Crazy hacking skills are not required and can be accomplished by using a magnet to fake readings or hiring hackers to attack smart meters. The FBI warned the cost of smart meter fraud may cost utility companies $400 million per year. While smart meters going dumb has been called an "urban myth," and some Americans have padlocked their dumb meters to stop smart meters from being installed, others have happily welcomed and hacked smart meters in order to significantly reduce power bills by 50-75%. The FBI warned that hacking smart meters and the resulting fraudulent power bills may end up costing utility companies about $400 million per year. meter-hacking-may-cost-utilities-400-million-year?t51hbcalledAmericans have padlocked their dumb meters

Unit 7 Project Preview The assignment for this unit requires you to develop a cyber crime Attack Tree for the Adrian Lamo case against The New York Times. Attack tree must be completed in outline format. See Unit 2 Seminar for guidance, or see the sample posted in the docshare.

Critical Infrastructure

What do we refer to when we say Critical Infrastructure?

What is Critical Infrastructure?

Which critical infrastructure do you feel is the MOST vulnerable?

Which critical infrastructure do you feel requires the least training, planning, and experience?

Which critical infrastructure do you feel the government needs to focus most upon securing?

What is responsible for what?

President’s Directive PDD-63 (1998) President Clinton recognized a threat to telecommunications and through the PDD-63, he required that “No Later than 2000, the United States shall have achieved an initial operating capability and no later than May 2003, the United States shall have achieved and shall maintain the ability to protect the nation’s critical infrastructures from intentional acts that would significantly diminish the abilities of :...

President’s Directive PDD the private sector to ensure the orderly functioning of the economy and the delivery of essential telecommunications, energy, financial and transportation services."

(2001) Cyber security grows as a national security interest The President's Critical Infrastructure Protection Board - with cabinet-level representation and chaired by the Special Advisor to the President for Cyberspace Security within the National Security Council. (2002) Electronic Government Act

Changing the scope of the PDD 2003, President Bush introduces a National Strategy to Secure Cyberspace that recognized the increased threat of attacks on national information technology infrastructure and established three objectives: 1.Prevent cyber attacks against America’s critical infrastructures. 2.Reduce national vulnerability to cyber attacks. 3.Minimize damage and recovery time from cyber attacks that do occur.

Then what? (December 2003) Homeland Security Presidential Directive 7 (HSPD-7) creates the Department of Homeland Security as the focal point for the security of cyberspace. The directive of HSPD7 established a national policy for federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks.

So where did we go next? January 2008: Bush signed HSPD-23 which establishes a National Cyber Security Center within DHS May 2009: President Obama identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. - Shortly after taking office, the President ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America’s digital infrastructure.

The Comprehensive National Cybersecurity Initiative To establish a front line of defense against today’s immediate threats – Creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government To defend against the full spectrum of threats – Enhancing U.S. counterintelligence capabilities and increasing the security of the supply chain for key information technologies.

The Comprehensive National Cybersecurity Initiative To strengthen the future cybersecurity environment – Expanding cyber education; coordinating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace.

What are the initiatives? Manage the Federal Enterprise Network as a single network enterprise with Trusted Internet Connections Deploy an instrusion detection systems of sensors across the Federal enterprise Pursue development of intrusion prevention systems across the Federal enterprise Coordinate and redirect research and development efforts Connect current cyber ops centers to enhance situational awareness Develop and implement a government-wide cyber counterintelligence plan Increase the security of our classified networks Expand cyber education Define and develop enduring “lead-ahead” technology, strategies, and programs. Define and develop enduring deterrence strategies and programs. Develop a multi-pronged approach for global supply chain risk management Define the Federal role for extending cybersecurity into critical infrastructure domains.

What has changed since 9/11? Generally speaking, a lot has changed..

What has changed since 9/11? world-growing-beyond-control/print/ Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances. In Washington and the surrounding area, 33 building complexes for top- secret intelligence work are under construction or have been built since September Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of space.

What has changed since 9/11? world-growing-beyond-control/print/ Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks. * Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year - a volume so large that many are routinely ignored.

What hasn’t changed since 9/11 relative to computers and network security?

According to the US Government Accountability Office (July 2011 report), despite recent actions taken, a number of significant challenges remain to enhancing the security of cyber-reliant critical infrastructures, such as: implementing actions recommended by the president’s cybersecurity policy review; updating the national strategy for securing the information and communications infrastructure; reassessing DHS’s planning approach to critical infrastructure protection; strengthening public-private partnerships, particularly for information sharing; enhancing the national capability for cyber warning and analysis; addressing global aspects of cybersecurity and governance; and securing the modernized electricity grid, referred to as the “smart grid.”

Questions?