+ All Categories
Home > Documents > CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!|...

CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!|...

Date post: 05-Jan-2016
Category:
Upload: shon-oscar-ross
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
13
CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!
Transcript
Page 1: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBERSECURITYWrite your response papers!| Paper Drafts Due Tuesday!

Page 2: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBER SECURITY

• Warfare v. espionage? • State AND non-state actors• Russian-Georgia War

(2008)– Estonia removing the statue

• 2002- radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”

Page 3: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

RESPONSES

• Why are cyber attacks so difficult to deal with?

• What interests are at play?

• What actors are involved?

• Is cyber security a “new” threat?

Page 4: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

NOTHING NEW UNDER THE SUN

• Sources of power; economic wealth, military forces, ideas, and information

• Speed of communication • WWII Allies broke German

and Japanese codes• 2003 Invasion of Iraq

– Text messages

• Quantity of information – Accessibility becomes

important

Page 5: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

DIFFICULTIES

• Often unreported – Don’t want to frighten

stockholders– unaware

• Actors are hard to track

• Expensive• Offensive advantage

Page 6: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

TYPES OF CYBER ATTACKS• Botnet

– Denial of service attack (DDOS)

– Botmaster/botherder – Spam (please send me $$$ so I

can repay you)

• “packet sniffers”– Data blocks = packages– Tracking those data for specific

things (ex. passowords)– Argentinian guy breaking into

DOD Naval Research Lab

• “IP Spoofing”– Not really at the IP address you

think you are

• Worms/viruses– Trojan Horse

Page 7: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBERCRIME

• 2000 “ILOVEYOU”– Undergrad thesis project in

Philippines– 45 million CPUs, $10B– Never charged with a crime

• 2007- TJ Maxx lost $130 M– Attacks from US, Ukraine,

Belarus, Estonia, China

• 2010 US, UK, Ukraine– Zeus- getting bank account

passwords ~$70M

• Almost all cyber crime are transnational

Page 8: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBER-ESPIONAGE• NATO HQ attacked ~100X

per day• Moonlight Maze (US v.

Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003)– These computers weren’t

connected to the internet– “air gap” for US military =

SIPRNET– Thumb drives/physical

help to jump gap

• PRC as perpetrator

Page 9: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

ARTICLE DISCUSSION

Page 10: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

MICHAEL ANTI (ZHAO JING)

• http://www.ted.com/talks/michael_anti_behind_the_great_firewall_of_china.html (18 min. )

• China’s internet policy is both international and domestic

• What are the outcomes of these policies?

• What kind of power is displayed in his story?

Page 11: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBER-TERRORISM

• How is the internet useful for terrorists?

• Communication• Gathering information• Money raising• Attacking networks• Is the internet a “good”

place for a terrorist attack? Importance of spectacle?

Page 12: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

CYBER WAR

• 1981, Soviet KGB “Farewell” started working for the French– US fed him bad technology intel

• Soviets were building a huge pipeline for natural gas– CIA tampered with it– Boom

• Does attribution matter when we talk about war?

Page 13: CYBERSECURITY Write your response papers!| Paper Drafts Due Tuesday!Write your response papers!| Paper Drafts Due Tuesday!

WHAT TO DO?

• How do you attack this security threat?

• Domestic efforts• International efforts– Dual use technologies– Easy to hide– Privacy rights/

intellectual property rights


Recommended