Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.

Slides:



Advertisements
Similar presentations
INTERNET SAFETY Maureen Baron, M.A. English Montreal School Board.
Advertisements

Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Social Networking Brian Oswald
Jingjing Gao Department of Computer Science and Engineering April 16 th,
Lecture 12 Page 1 CS 111 Online Devices and Device Drivers CS 111 On-Line MS Program Operating Systems Peter Reiher.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Speaker: Tamar Shapatava
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
WHAT CAN ROCK OUR WORLD? 1. 2 …but very dangerous!!! ….but very dangerous!!!
Cyber Bullying BEAT BULLYING.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
David I. McGeown "Where's the value in on site generation? Can real time metering and dispatch make a difference?
Lecture 4 Page 1 CS 236 Online Prolog to Lecture 4 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Page 1 Credits to Page 2 what happened What you don’t know CAN hurt you s o p l e a s e t a k e a moment to get to know around the world recently E-Rule:
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
Lecture 13 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Lessons learned and not learned Enn Tyugu Leading research scientist NATO Cooperative Cyber Defense Center of Excellence.
Air Force Strategy to Resources
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture 17 Page 1 CS 236 Online Prolog to Lecture 17 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 2: 25 March 2006.
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Lecture 8 Page 1 CS 236 Online Prolog to Lecture 8 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Lecture 19 Page 1 CS 236 Online Privacy Privacy vs. security? Data privacy issues Network privacy issues Some privacy solutions.
Cyber security: Lithuanian National Regulatory Authority expertise in monitoring national networks resilience Dr. Rytis Rainys | rrt.lt at TAIEX Multi-beneficiary.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Is the Domain Name System the heart of the internet?
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Brian Marks COSC 380. Cyber War  What is Cyber War?  What attacks have happened?  Could this happen to us?  What defenses are in place to stop it?
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Server Machines By Brett Gunder COSC 101.
DDoS In the Real World Do DDoS attacks really happen?
Information Technology Sector
Understanding the Threats of and Defenses Against Cyber Warfare
Secure Software and the Law
Dark Web – the modern threat for the Internet Security
DDoS In the Real World Do DDoS attacks really happen?
Matthew Allen Comp 2903 October 28th 2010
CRITICAL INFRASTRUCTURE CYBERSECURITY
Business Intelligence
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
Web Page Design and Development I Standards
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Mandatory Access Control and the Real World
Presentation transcript:

Lecture 19 Page 1 CS 236 Online Prolog to Lecture 19 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

Lecture 19 Page 2 CS 236 Online Cyber Warfare and Critical Infrastructure There’s lots of talk about cyber warfare And lots of talk about dangers to the nation’s critical infrastructure Is this, well, critical? Or is it just a bunch of hype and fear mongering?

Lecture 19 Page 3 CS 236 Online Cyber Warfare Is cyber space another realm for future warfare? Some recent limited cases –Estonia, Georgia, Israel –Some small contributions to hot wars –Stuxnet and maybe Duqu and Flame But what is cyber space’s real role in wars?

Lecture 19 Page 4 CS 236 Online The Answer How the hell should I know? Less flipply, nobody is too sure Major questions unanswered –What is a war in cyber space like? –Only supportive of other domains? –Is the Internet subject to deterrence? –How does one defend in cyberspace? Nobody knows, but lots of people would like to know

Lecture 19 Page 5 CS 236 Online Critical Infrastructure The modern economy is information-driven The Internet is the major “utility” that delivers information to us Everything from to database access to unstructured web browsing How long can your business operate with no network connectivity? –And how well?

Lecture 19 Page 6 CS 236 Online Threats to Internet Infrastructure Weaknesses in core Internet elements –DNS, routing, physical cables, security services Weaknesses in individual providers –Information infrastructure is composed of many independent sources –Many are not well protected/provisioned Weaknesses to natural/man-made disasters –Much of the infrastructure has “choke points” –E.g., One Wilshire Boulevard

Lecture 19 Page 7 CS 236 Online The Internet as Supporting Infrastructure Many other infrastructure systems increasingly depend on the Internet –Even for basic control of their systems –Banking –Electric power –Telephony –Gas and oil –Water and sewage What happens to these if the Internet fails?

Lecture 19 Page 8 CS 236 Online How Does the Internet Stack Up As an Infrastructure? Not too well Not highly secure Subject to unexpected large scale failures Not very well understood Not carefully regulated by governments We’re not too sure what it will do today And if it will keep working tomorrow

Lecture 19 Page 9 CS 236 Online What To Do About It? Too complex a question to answer quickly Generally, –Better awareness of risks and defenses –More secure Internet infrastructure –Better governmental understanding and support –Better international cooperation Consider how your company will be affected if the Internet stops working suddenly...