Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

Similar presentations


Presentation on theme: "CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!"— Presentation transcript:

1 CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

2 CYBER SECURITYCYBER SECURITY Warfare v. espionage? State AND non-state actors Russian-Georgia War (2008) – Estonia removing the statue 2002- radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”

3 RESPONSES Why are cyber attacks so difficult to deal with? What interests are at play? What actors are involved? Is cyber security a “new” threat?

4 NOTHING NEW UNDER THE SUNNOTHING NEW UNDER THE SUN Sources of power; economic wealth, military forces, ideas, and information Speed of communication WWII Allies broke German and Japanese codes 2003 Invasion of Iraq – Text messages Quantity of information – Accessibility becomes important

5 DIFFICULTIES Often unreported – Don’t want to frighten stockholders – unaware Actors are hard to track Expensive Offensive advantage

6 TYPES OF CYBER ATTACKSTYPES OF CYBER ATTACKS Botnet – Denial of service attack (DDOS) – Botmaster/botherder – Spam (please send me $$$ so I can repay you) “packet sniffers” – Data blocks = packages – Tracking those data for specific things (ex. passowords) – Argentinian guy breaking into DOD Naval Research Lab “IP Spoofing” – Not really at the IP address you think you are Worms/viruses – Trojan Horse

7 CYBERCRIME 2000 “ILOVEYOU” – Undergrad thesis project in Philippines – 45 million CPUs, $10B – Never charged with a crime 2007- TJ Maxx lost $130 M – Attacks from US, Ukraine, Belarus, Estonia, China 2010 US, UK, Ukraine – Zeus- getting bank account passwords ~$70M Almost all cyber crime are transnational

8 CYBER-ESPIONAGE NATO HQ attacked ~100X per day Moonlight Maze (US v. Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003) – These computers weren’t connected to the internet – “air gap” for US military = SIPRNET – Thumb drives/physical help to jump gap PRC as perpetrator

9 ARTICLE DISCUSSIONARTICLE DISCUSSION

10 MICHAEL ANTI (ZHAO JING)MICHAEL ANTI (ZHAO JING) http://www.ted.com/tal ks/michael_anti_behind_ the_great_firewall_of_chi na.html (18 min. ) http://www.ted.com/tal ks/michael_anti_behind_ the_great_firewall_of_chi na.html China’s internet policy is both international and domestic What are the outcomes of these policies? What kind of power is displayed in his story?

11 CYBER-TERRORISM How is the internet useful for terrorists? Communication Gathering information Money raising Attacking networks Is the internet a “good” place for a terrorist attack? Importance of spectacle?

12 CYBER WARCYBER WAR 1981, Soviet KGB “Farewell” started working for the French – US fed him bad technology intel Soviets were building a huge pipeline for natural gas – CIA tampered with it – Boom Does attribution matter when we talk about war?

13 WHAT TO DO?WHAT TO DO? How do you attack this security threat? Domestic efforts International efforts – Dual use technologies – Easy to hide – Privacy rights/ intellectual property rights


Download ppt "CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!"

Similar presentations


Ads by Google