CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Chapter 2 Digital Terrorism.
The Internet.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Trend Towards Supranationalism: Good? Bad? Somewhere in between? Contemporary World MZI.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Cyberterrorism. Critical Infrastructure Vulnerability.
Computer Security Fundamentals
International Relations
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Introduction to Security Computer Networks Computer Networks Term B10.
Cyber-Warfare: The Future is Now!
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
CYBER CRIME AND SECURITY TRENDS
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Internet Security facilities for secure communication.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Social impact of using I.T Fahimul Hoque. Local Community Development in IT have lead to changes in the way local communities work. IT has changed the.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Information Warfare Playgrounds to Battlegrounds.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
7 Information Security.
Cyber Warfare Case Study: Estonia
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Understanding the Threats of and Defenses Against Cyber Warfare.
Information Warfare Playgrounds to Battlegrounds.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Presented by Presented by Daniel Lawrence Delgado CITCS BSIT 1-D.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
IT Security  .
Homeland Security v. Homeland Defense: The Big Gap
What IS ?.
COMPUTER SAFTEY IS IMPORTANT….
Marcial Quinones-Cardona
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBER SECURITYCYBER SECURITY Warfare v. espionage? State AND non-state actors Russian-Georgia War (2008) – Estonia removing the statue radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”

RESPONSES Why are cyber attacks so difficult to deal with? What interests are at play? What actors are involved? Is cyber security a “new” threat?

NOTHING NEW UNDER THE SUNNOTHING NEW UNDER THE SUN Sources of power; economic wealth, military forces, ideas, and information Speed of communication WWII Allies broke German and Japanese codes 2003 Invasion of Iraq – Text messages Quantity of information – Accessibility becomes important

DIFFICULTIES Often unreported – Don’t want to frighten stockholders – unaware Actors are hard to track Expensive Offensive advantage

TYPES OF CYBER ATTACKSTYPES OF CYBER ATTACKS Botnet – Denial of service attack (DDOS) – Botmaster/botherder – Spam (please send me $$$ so I can repay you) “packet sniffers” – Data blocks = packages – Tracking those data for specific things (ex. passowords) – Argentinian guy breaking into DOD Naval Research Lab “IP Spoofing” – Not really at the IP address you think you are Worms/viruses – Trojan Horse

CYBERCRIME 2000 “ILOVEYOU” – Undergrad thesis project in Philippines – 45 million CPUs, $10B – Never charged with a crime TJ Maxx lost $130 M – Attacks from US, Ukraine, Belarus, Estonia, China 2010 US, UK, Ukraine – Zeus- getting bank account passwords ~$70M Almost all cyber crime are transnational

CYBER-ESPIONAGE NATO HQ attacked ~100X per day Moonlight Maze (US v. Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003) – These computers weren’t connected to the internet – “air gap” for US military = SIPRNET – Thumb drives/physical help to jump gap PRC as perpetrator

ARTICLE DISCUSSIONARTICLE DISCUSSION

MICHAEL ANTI (ZHAO JING)MICHAEL ANTI (ZHAO JING) ks/michael_anti_behind_ the_great_firewall_of_chi na.html (18 min. ) ks/michael_anti_behind_ the_great_firewall_of_chi na.html China’s internet policy is both international and domestic What are the outcomes of these policies? What kind of power is displayed in his story?

CYBER-TERRORISM How is the internet useful for terrorists? Communication Gathering information Money raising Attacking networks Is the internet a “good” place for a terrorist attack? Importance of spectacle?

CYBER WARCYBER WAR 1981, Soviet KGB “Farewell” started working for the French – US fed him bad technology intel Soviets were building a huge pipeline for natural gas – CIA tampered with it – Boom Does attribution matter when we talk about war?

WHAT TO DO?WHAT TO DO? How do you attack this security threat? Domestic efforts International efforts – Dual use technologies – Easy to hide – Privacy rights/ intellectual property rights