EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/2013 1.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Philippine Cybercrime Efforts
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
Community Based Cyber Security Program Technical Assistance Package Nicholas Corea Program Director G&H International Services for Donald Lumpkins, Program.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
David A. Brown Chief Information Security Officer State of Ohio
National Infrastructure Protection Plan
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
Ray Greenlaw, School of Computing Armstrong Atlantic State University 1 Regional Center for Cyber Security Education and Training January 2003.
DHS, National Cyber Security Division Overview
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
National Cybersecurity Awareness Campaign 11
South Carolina Cyber.
InfraGard Update SSA John V. Gillies SA Matthew E. Morin.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Identity, Privacy, and Security: Higher Education Policy and Practice Rodney Petersen Government Relations Officer Director of Cybersecurity Initiative.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
June 9, 2003 Updated July 2004 Slide 1 Critical Infrastructure Assurance: The US Experience.
National CIRT - Montenegro “Regional Development Forum” Bucharest, April 2015 Ministry for Information Society and Telecommunications.
Session 121 National Incident Management Systems Session 12 Slide Deck.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
HSGP Funding for Security Efforts Presented by Michele Robinson.
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
Robert Arnold Federal Highway Administration Director, Office of Transportation Management.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Seán Paul McGurk National Cybersecurity and Communications
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Citizen Corps Mission To have everyone in America participate in making themselves, our communities, and our nation safer We all have a role in hometown.
Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
“History is a set of lies agreed upon.” Napoleon Bonaparte.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Federal Bureau of Investigation Cyber Program Cyber Online Resources and Training Links FBI Boston UNCLASSIFIED.
Critical Infrastructure: Commerce/NTIA Lead Agency Role by Shirl Kinney Deputy Assistant Secretary, NTIA October - November, 1998 A Composite of Recent.
Wrap-up. Goals Have fun! Teach you about Cyber Defense so that you can: –Interest your students in Cyber Defense –Teach your students about Cyber Defense.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC John Hicks TransPAC2/Indiana University
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Food and Agriculture Sector A Collaborative Path to Agriculture Security and Food Defense LeeAnne Jackson, HHS/FDA Multistate Partnership Meeting Madison,
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
1 Update from the ANSI Homeland Security Standards Panel (HSSP) Presented by Matt Deane Director, Homeland Security Standards American National Standards.
Emergency Management Open House What Is Emergency Management? An inter-disciplinary field that focuses on saving lives, preserving the.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
The Role of The ISACs in Critical Infrastructure Protection and Resiliency Denise Anderson Vice Chair-National Council of ISACs Vice President FS-ISAC,
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
National Emergency Communications Plan Update National Association of Regulatory Utility Commissioners Winter Committee Meeting February 16, 2015 Ron Hewitt.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
Cyber Threat Intelligence Program Primer NASCUS August 1, 2016 Chicago, IL Christina Saari, Senior Cyber Intelligence Officer National Credit Union Administration.
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Cybersecurity Education & Awareness Overview
California Cybersecurity Integration Center (Cal-CSIC)
John M. Felker Director, NCCIC.
Infragard national 2019 Strategic direction & plans
Presentation transcript:

EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/2013 1

Contents Department of Justice –CCIPS Department of Justice – FBI National Security Agency – NSA Department of Homeland Security CMU/SEI Coordination Center Conclusion 2

Department of Justice - CCIPS Computer Crime and Intellectual Property Section CCIPS prevents, investigates, and prosecutes computer crimes. Goal is to protect Intellectual Property (IP) Case highlights include U.S. v. Microsoft Antitrust case and Author’s Guild, INC. v. Google INC. Provides IP Victim Guide on how to report intellectual property crimes as well as a manual for prosecuting IP crimes and computer crimes. Leadership is John Lynch, Chief Computer Crime & Intellectual Property Section. 3

Department of Justice - FBI InfraGard program developed in 1996 as partnership between private and public sectors to protect U.S. critical infrastructure and resources. InfraGard works well since most Infrastructure components like utility companies, transportation, telecomm, water, and food suppliers are privately owned. InfraGard began with a focus on cyber crime but now encompasses computer, physical and other security breaches. FBI agent serves as coordinator between companies to evaluate threats and impacts on their respective companies. Companies use FBI resources such as an encrypted website, webmail, list serves, and message boards to communicate and share case information. 4

Department of Justice – FBI cont. FBI provides an Internet Crime Complaint Center (IC3) targeting internet crime investigations IC3 is a partnership between the FBI and the National White Collar Crime Center (NW3C) IC3 handles complains regarding IP rights, computer intrusions, economic espionage, online extortion, internet money laundering, identity theft, and more. IC3 offers Internet Crime Prevention Tips and Schemes as well as a FAQ and Consumer Alerts. IC3 website allows visitors to file a complaint online to the FBI and have their claim investigated. 5

National Security Agency - NSA The National Security Agency (NSA) operates an Information Assurance Directorate (IAD) to protect National Security Information Systems (any system critical to military or intelligence activities) The IA program provides guidance to businesses as well as the TEMPEST Certification Program which tests and certifies products. IA features an Academic Outreach program which focuses on promoting higher education an research in IA to protect the nation’s infrastructure. The IA provides a Business Affairs Office and has many partnerships with the private industry. Provides the Commercial COMSEC Evaluation Program (CCEP) for product development to meet IA standards. 6

Department of Homeland Security The National Protection and Programs Directorate is developed to protect and enhance the resilience of the nation’s physical and cyber infrastructure. NPPD has four divisions: Federal Protective Service (FPS), Office of Cybersecurity and Communications (CS&C), Office of Infrastructure Protection (IP), and US-VISIT. National Infrastructure Protection Plan (NIPP) is operated by DHS to protect the nation’s critical infrastructure by providing a framework for security efforts. Mission is to lead the federal government in securing civilian and industry computer systems as well as government and critical infrastructure systems. 7

Department of Homeland Security cont. DHS created a Stop.Think.Connect Campaign effort in 2009 for public awareness of cyber threats and to provide resources and effective tips for preventing attacks. Obama designated the month of October as National Cyber Security Awareness Month (NCSAM) to promote awareness of cyber threats. Stop.Think.Connect provides a toolkit with tipsheets, presentations, videos, press releases, fact sheets, and social media contacts for educators, industry, and both young and older Americans. US CERT (United States Computer Emergency Readiness Team) provides information and tips for cyber security as well. 8

Department of Homeland Security cont. US-CERT’s mission is to improve the nation’s cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting constitutional rights of Americans. US-CERT provides a feed of current industry activities relating to cyber security as well as recent vulnerabilities and methods to mitigate the vulnerabilities. US-CERT provides a hotline and 24x7 operations center to respond to security incidents as well as provide technical assistance and notifications. US-CERT partners with both private sector, academic institutions, federal agencies and the Information Sharing and Analysis Centers (ISACs) 9

Department of Homeland Security cont. The National Security Telecommunications Advisory Committee (NSTAC) was created by the DHS to provide the U.S. Government the best possible industry advice in the areas of the availability and reliability of telecommunications services. The NSTAC has been around for over 30 years with partnerships in the telecommunications and aerospace companies. Addresses such issues as the convergence of traditional and broadband networks, the changing global threat environment, and the continuing global expansion of provider and user communities. Five key themes: strengthening national security, enhancing cybersecurity, maintaining the global communications infrastructure, assuring communications fro disaster response, and addressing critical infrastructure interdependencies. 10

CMU/SEI CERT Coordination Center CERT Coordination center is located at Carnegie Mellon University and studies internet security vulnerabilities, researches long-term changes in networked systems, and develops information and training for improved security. CERT.org offers both training courses and certifications for professionals interested in cyber security. CERT.org will analyze programming code that is submitted to identify vulnerabilities in the early stages of development saving time and effort for programmers. CERT.org also provides information on securing network systems as well as managing risk and governance of organizational security. Similar to the DHS Cert team CERT.org also provides a response team available to assist with security issues. 11

Conclusion There are many agencies and websites that are both government and private sector that provide valuable resources for cyber security. Learn how to use the tools provided and contact the agencies in the event of a cyber crime. 12