Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Security of The United States of America By: Jeffery T. Pelletier.

Similar presentations


Presentation on theme: "Network Security of The United States of America By: Jeffery T. Pelletier."— Presentation transcript:

1 Network Security of The United States of America By: Jeffery T. Pelletier

2 Table of Contents Internet Governance United States Military Technology Cyber-Attacker Al-Quida’s threat Methods of Cyber-Attacker Information Warfare Attacks Conclusion Questions??????

3 Internet Governance United Nations Working Group on Internet Governance (WGIG) – Created in 2004 by Kofi Anon Establish Internet governance Identify key responsibilities and roles of Governments to police the Internet United States is only an advisor to this group. – Wants world to allow freedom of expression – Policing of Cyber-Crime – Domain Name and Addressing System WGIG tackles certain important issues – Economical Development on the Internet – Political Development on the Internet

4 United States Military Technology Department of Defense had a hand in many technology inventions: – First Computer – Internet – Global Positioning System Defense And Research Products Agency (DARPA) New technology: – Global Information Grid Newest network for US Military to communicate with each component Connects military leaders to troop in many different ways Going to take over 100% of US military network Critics argue that this can be hacked or penetrated with a virus.

5 Cyber-Attacker No clear profile US concerned about important industry infrastructure: – Financial infrastructure – Electrical infrastructure – Oil infrastructure Increasing Complexity of these infrastructures makes them more vulnerable for attacks. US Government has to rely more on civilian sector for safeguards.

6 Cyber-Attacker Specific Attacks: – One of the first was in 1982 23 year old college student Robert Morris created the Morris Worm. – One of the worst was in 1999 Melissa Virus attacked Word97, and Word2000. Attacked through the means of e-mail and word documents. – One of the most costly was in 2001 Code-Red Virus cost the World $2.6 billion. $200 million a day. – One of the quickest movers was in 2004 Witty Virus infected 110 hosts immediately and in 60 seconds, hit 160 hosts. In 45 minutes, it had infected all of the vulnerable hosts.

7 Al-Quida Leader Osama Bin-Laden In 1993 Al-Quida soilder Ramzi Yousef bombed World Trade Center – FBI found plans to attack airliners on Yousef’s personal laptop. Plans were encrypt US worried that Al-Quida uses Internet to communicate – Sends e-mails about planned attacks – Sends encrypted messages of planned attacks In 2002, FBI learned of Al-Quida searching for information on US nuclear power plants. Critics are worried US is not ready for a major Cyber-Attack

8 Information Warfare Attacks Smaller/Weaker adversaries of the US – Cannot beat US Militarily Use of Information Warfare is a better method – Think US is weak in this area of Defense Structure – Could lead to a potential quick victory for adversary Countries leading threat in Information Warfare: – Russia – North Korea – China – Iran – Cuba US has to rely more on private-sector to help in defense against this type of attack

9 Methods of Cyber Attacks Hactivisim – Overloading of servers or networks in order to make political stance Denial of Service Attacks – Overwhelming attacks on hosts and servers in order to crash them – Multiple messages sent to overwhelm a weak host. Domain Name Server Attacks – Sends users in wrong direction – Blocks certain websites Web Defacement and Semantic Attacks – Change information slightly – Produces false information for the user Combined Attacks – An example is if a terrorist group sets of a bomb, then disables the 911 mechanism of that particular area

10 Conclusion Clinton Administration: – In 1996 Bill Clinton signed President’s Commission on Critical Infrastructure Protection Studied problems with Network Security Gave potential solutions to problems – In 1998 General Attorney Janet Reno signed into effect The National Infrastructure Protection Center to combat cyber-terrorism from US infrastructures. September 2001 revealed some weaknesses of the US – One is weak Network Security There has to be more of an effort by the United States Government to combat this ever increasing threat.

11 Questions?????


Download ppt "Network Security of The United States of America By: Jeffery T. Pelletier."

Similar presentations


Ads by Google