Cyber terrorism

Download Report

Transcript Cyber terrorism

WHAT IS CYBER TERRORISM?
•
Cyber terrorism is defined by the FBI as “any premeditated, politically motivated
attack against information, computer systems, computer programs, network and
data, which results in violence, disruption, or damage against non-combatant
targets by sub-national groups or clandestine agents.”
•
Cyber attacks are often facilitated with readily available and easy to use software
tools. These tools are often free online.
TYPES OF CYBER TERRORISM
•
Computer Viruses
• Computer program that spreads by inserting copies of itself into executable code
or documents
•
Denial of Service Attacks
• Assault on a network that floods it with so many additional requests or
transactions that regular traffic is slowed or halted.
•
Software Vulnerability Exploitation
• Software vulnerabilities are exploited with software containing code that can be
used in a malicious fashion.
WHAT IS AFFECTED?
•
According to the U.S. Commission of Critical Infrastructure Protection, possible
targets include the banking industry, military installations, power plants, air traffic
control centers, and water systems.
•
This could allow terrorists to take out central parts of our nations networks.
POTENTIAL CYBERATTACKS
•
No catastrophic cyberterroristic attack has yet to occur
ZDNet cited worst-case scenarios
 Train collisions by hijacking of operations
 Hijacking of major utility networks
 Attack on major water providers
 Major financial networks
• Cyberterroristic activities could have rippling effects throughout the world
•
LIKELIHOOD OF ATTACKS
•
At this point, no catastrophic event has taken place
•
In 2002, CSIS noted that more than 3,000 vulnerabilities would need to be found
within the public and private sector utility providers’ systems to take over major
infrastructure entities
•
In 2006, US Dept. of Homeland Security issued a warning that al-Qaeda might be
planning an attack against stock market and banking systems.
 Attack never came
PREVENTING CYBERTERRORISTIC ATTACKS
•
In 1997, President Clinton created Commission on Critical Information Protection
•
This created Presidential Decision Directive 63, which named 15 critical
infrastructure sectors – still in use today.
•
Also encouraged establishment of Information Sharing and Analysis Centers to
streamline federal, state, and local efforts.
•
After Sept. 11 attacks President signed executive order making Office of
Homeland Security responsible for nation’s critical infrastructure protection
 Dept. of Homeland Security took over responsibility on Nov. 25, 2002
RECENT GOVERNMENT ACTION
•
President Obama has taken a strong stand against cyber attacks
He signed a secret directive permitting military to act more aggressively in
response to cyber attacks on nation’s private and govt. computer networks
 Named Policy Directive 20
 Established broad and strict set of standards to guide the operation’s of federal
agencies in confronting threats in cyberspace
• Rumored that President Obama will sign an executive order, pushing stronger
cybersecurity protection
• Senate failed to pass Cyber Security Act of 2012 for a second time
• EO will implement at least some elements from CSA 2012.
• EO will create council that will determine which govt. agencies regulate the sects of
our nation’s critical infrastructure
•
RECENT GOVERNMENT ACTION, CONT.
•
Govt. will also mandate:
 Govt. information sharing about threats
 Draft voluntary standards for critical infrastructure industries to follow
 Strenghten cybersecurity oversight by regulatory agencies
 Pressure private firms to increase security through federal standards
CONCLUSION
• Cyberterrorism is a growing concern in today’s society.
• According to Dr. Edward Maggio in his article
Terrorism: Cyber Terrorism, “in the past minute there
have been approximately 54,000 serious computer
attacks reported to hackerwatch.org”
• Businesses and policy makers, as well as us as
individuals need to work to find a solution to not only
combating but preventing this problem in the future.
REFERENCES
"9/11 10 Years Later: Protecting Critical Infrastructure." Homeland Security Digital Library (HSDL).
The Naval Post Graduate School for Homeland Defense and Security, 23 Aug. 2011. Web. 02
Dec. 2012. <https://www.hsdl.org/hslog/?q=node/6318>.
Armerding, Taylor. "Demise of Cybersecurity Bill Means Executive Order on the Way." CSO. CXO
Media, Inc., 21 Nov. 2012. Web. 02 Dec. 2012.
<http://www.csoonline.com/article/721979/demise-of-cybersecurity-bill-means-executiveorder-on-the-way>.
Arvidson, Erik. "What Does Cyberterrorism Affect?" EHow. Demand Media, 30 July 2011. Web. 02
Dec. 2012. <http://www.ehow.com/info_10011378_cyberterrorism-affect.html>.
Maggio, Edward J. "Survival Insights." Survival Insights. N.p., 07 Feb. 2012. Web. 27 Nov. 2012.
<http://www.survivalinsights.com/modules.php?name=News>.
Nakashima, Ellen. "Obama Signs Secret Directive to Help Thwart Cyberattacks." Washington Post.
The Washington Post, 14 Nov. 2012. Web. 02 Dec. 2012.
<http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecuritydirective-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac21c61452669c3_story.html>.
Roberts, Adam. "The Changing Faces of Terrorism." BBC News. BBC, 27 Aug. 2002. Web. 02 Dec.
2012. <http://www.bbc.co.uk/history/recent/sept_11/changing_faces_02.shtml>.