Download presentation
Presentation is loading. Please wait.
Published byClarissa Andrews Modified over 8 years ago
1
January 6, 2003 A Gathering of Networks
2
Network Security Issues & Developments
3
1.56k/cable/DSL/satellite/802.11b 2. Networking security? 3. Security focus? 4. Robert Morris? 5. Defcon 1 – 10? 6. 2600 7. Computer Security Quiz
4
1971 Capt. Crunch
5
Threat Development 2000 Sophistication of Attacker Tools Required Knowledge of Attackers 19901980 Low High Password Guessing Self-replicating Code Disabling Audits Password Guessing Backdoors Sniffers Packet Spoofing Tools with GUI Highjack Sessions Exploiting Known Vulnerabilities
6
Wire Tap Central Kevin Poulsen, Aka “Dark Dante” Pacific Telephone & KIS Radio - 1991
7
Statistics 2001 Computer Security Incidents/ Vulnerabilities Doubled 52,658 incidents 2,437 vulnerabilities (CERT) 2002 82,094 incidents 4,129 vulnerabilities
8
Bank Robbery via Modem Vladimir Levin Citibank, 1994 $10 million stolen 36 months prison restitution
9
Statistics 2001 12% of Online Corporate Databases Breached 27% were banking and financial services databases 18% were medical/healthcare & telecommunications (Evans Data Corp)
10
SQL Slammer 24 January, 2003 Bank of America ATMs Infected 250,000 servers Seattle Emergency Call Center Continental Airlines online ticketing system Microsoft
11
Almost sparked a war Ehud Tenebaum, aka The Analyzer, Solar Sunrise, 1998
12
Statistics August 2002 AT&T Business Continuity Survey 1 in 4 companies have NO business continuity plan 19% of companies with plans – untested (Digital Research)
13
April 2002 - Princeton, NJ Stephen LeMenager, Associate Dean & Director of Adminisions, Princeton University Victims: 8 students, Yale University, Princeton University Just doing his job??? (an aside)
14
GOALS & Targets 1. Secret info: government, business 2. Control: Infrastructure 3. Proprietary information 4. Financial information 5. Personal information 6. Cover, bandwidth: anyone
15
Anatomy of an Attack 1. reconnaissance 2. the attack
16
1. online - web site 2. trash dumpster 3. telephone call(s) 4. walk in 5. steal a laptop 6. compromise a home computer 7. online - probes 8. online - telnet Reconnaissance
17
Various Attacks 1. guessed or stolen password 2. Trojan Horse access 3. Buffer Overflow 4. MANY other software attacks
18
122.48.32.97 163.50.82.5 30.21.176.51 23.56.11.37 245.229.62.67 233.198.15.84 Looping For Cover
19
Air Force NIPRNET Attack December 25 and 26, 2001
20
opponents 1. recreational hackers 2. disgruntled insiders 3. hacktivists 4. lone criminals 5. organized crime 6. terrorist organizations 7. intelligence services 8. information warfare units
21
diagnosis 1. big problem, but incomplete understanding 2. potential for great danger is significant
22
prescription 1. security standards promoted a. VOLUNTARILY b. regulation AND/OR c. civil litigation, insurance 2. information sharing a. vulnerabilities, threats b. attacks
23
NIPC promotes best practices Best practices computer policy stand alone boxes to Internet onsite & telecommuting Network banner Awareness checklist – employee signs every six months Network security position - patches Virus protection software Firewall Intrusion detection software Disaster Recovery Plan - redundancy
24
ISO 17799 Security Policy Security Organization Asset classification and control Personnel Security Physical and environmental security Communications and operations management Access Control Systems Development and maintenance Business Continuity Management Compliance (HIPAA) (Gramm-Leach-Bliley)
26
www.nipc.gov Publications: Cybernotes (Bugs, Holes, Patches) Highlights Password Protection 101 Seven Simple Computer Security Tips A Guide to Using E-mail Correspondence
28
72 chapters – 56 FBI offices 1000 + companies 7000 + members Information Sharing Through InfraGard
32
Web Sites www.fbi.gov www.nipc.gov www.infragard.net
33
SA Tom Liffiton FBI Phoenix E-mail: tliffiton@fbi.gov infragard-px@leo.gov Telephone: (602) 279-5511 x3105 Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.