Download presentation
Presentation is loading. Please wait.
Published byHomer Terry Modified over 9 years ago
1
Cyberterrorism
2
Critical Infrastructure Vulnerability
3
Cyberspace: The New Realm of Warfare
4
1. Distributed Denial of Service (DDOS) Attack
5
2. Potential Attacks
6
Threats in Cyberspace 1.Hacktivism 2.Cybercrime 3.Cyberespionage 4.Cyberwar 5.Cyberterrorism
7
Cyberterrorism Definition 1.Political agenda 2.Use of computers and cyberspace to disrupt or destroy (may or may not lead to deaths) 3.Civilians as targets 4.Publicity 5.Non-state actors Traditional Terrorism definition: 2. Use of violence
8
Al-Qaeda Younis Tsouli Irhabi 007
9
Two Questions 1.Can anyone do significant damage with a cyber attacks? Cyber 9/11?
10
2. What does a terrorist group achieve with a cyberattack that they can’t with a conventional attack?
11
The Nature of the Internet: Strength and Weaknesses Resiliency Redundancy Wireless Vulnerabilities and flaws can be corrected Vulnerabilities Flaws Espionage Reliance on private sector
12
Cybersecurity 1998: PDD-63 Critical Infrastructure protection (For more, see PDD-63 addendums here)PDD-63here 2003 US National Strategy to Secure CyberspaceUS National Strategy to Secure Cyberspace 2003 HSPD-7 Critical Infrastructure Identification, Prioritization, and ProtectionHSPD-7
13
2008 Comprehensive National Cybersecurity Initiative (CNCI)(CNCI) 1.Identify attacks 2.Public-Private partnerships 3.Information sharing 4.Exercises 5.Vulnerability assessments 6.Coordination 7.Counterintelligence
14
US Cyberspace Policy ReviewUS Cyberspace Policy Review, 2009 National Security Adviser Deputy Nat’l Security Adviser Special Assistant for Cybersecurity Homeland Security Council National Security Council National Security Staff NSC Principals Committee NSC Deputies Committee Information and Communications Interdepartmental Policy Committee
15
Other US Policy Documents US National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, 2/2003US National Strategy for the Physical Protection of Critical Infrastructures and Key Assets, US National Strategy to Secure Cyberspace, 2003US National Strategy to Secure Cyberspace US Department of Homeland Security National Infrastructure Protection Plan, 2006 National Infrastructure Protection Plan Cyberterror, White Paper 1999, Center for the Study of Terrorism and Irregular Warfare (excellent US government-sponsored research on the issue)Cyberterror
16
Exercises Cyberstorm I 2006 http://www.dhs.gov/xlibrary/assets/prep_cy berstormreport_sep06.pdf http://www.dhs.gov/xlibrary/assets/prep_cy berstormreport_sep06.pdf Cyber Storm II 2008 http://www.dhs.gov/xlibrary/assets/csc_nc sd_cyber_stormII_final09.pdf http://www.dhs.gov/xlibrary/assets/csc_nc sd_cyber_stormII_final09.pdf Cyber Storm III September 2010Cyber Storm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.