Network Security of The United States of America By: Jeffery T

Download Report

Transcript Network Security of The United States of America By: Jeffery T

Network Security of The
United States of America
By: Jeffery T. Pelletier
Table of Contents








Internet Governance
United States Military Technology
Cyber-Attacker
Al-Quida’s threat
Methods of Cyber-Attacker
Information Warfare Attacks
Conclusion
Questions??????
Internet Governance

United Nations Working Group on Internet Governance (WGIG)
– Created in 2004 by Kofi Anon
 Establish Internet governance
 Identify key responsibilities and roles of Governments to police the Internet

United States is only an advisor to this group.
– Wants world to allow freedom of expression
– Policing of Cyber-Crime
– Domain Name and Addressing System

WGIG tackles certain important issues
– Economical Development on the Internet
– Political Development on the Internet
United States Military
Technology

Department of Defense had a hand in many technology inventions:
– First Computer
– Internet
– Global Positioning System


Defense And Research Products Agency (DARPA)
New technology:
– Global Information Grid
 Newest network for US Military to communicate with each component
 Connects military leaders to troop in many different ways
 Going to take over 100% of US military network

Critics argue that this can be hacked or penetrated with a virus.
Cyber-Attacker


No clear profile
US concerned about important industry infrastructure:
– Financial infrastructure
– Electrical infrastructure
– Oil infrastructure
 Increasing Complexity of these infrastructures makes them more vulnerable
for attacks.

US Government has to rely more on civilian sector for safeguards.
Cyber-Attacker

Specific Attacks:
– One of the first was in 1982
 23 year old college student Robert Morris created the Morris Worm.
– One of the worst was in 1999
 Melissa Virus attacked Word97, and Word2000.
 Attacked through the means of e-mail and word documents.
– One of the most costly was in 2001
 Code-Red Virus cost the World $2.6 billion.
 $200 million a day.
– One of the quickest movers was in 2004
 Witty Virus infected 110 hosts immediately and in 60 seconds, hit 160 hosts.
 In 45 minutes, it had infected all of the vulnerable hosts.
Al-Quida


Leader Osama Bin-Laden
In 1993 Al-Quida soilder Ramzi Yousef bombed World Trade Center
– FBI found plans to attack airliners on Yousef’s personal laptop.
 Plans were encrypt

US worried that Al-Quida uses Internet to communicate
– Sends e-mails about planned attacks
– Sends encrypted messages of planned attacks


In 2002, FBI learned of Al-Quida searching for information on US
nuclear power plants.
Critics are worried US is not ready for a major Cyber-Attack
Information Warfare Attacks

Smaller/Weaker adversaries of the US
– Cannot beat US Militarily
 Use of Information Warfare is a better method
– Think US is weak in this area of Defense Structure
– Could lead to a potential quick victory for adversary

Countries leading threat in Information Warfare:
–
–
–
–
–

Russia
North Korea
China
Iran
Cuba
US has to rely more on private-sector to help in defense against this
type of attack
Methods of Cyber Attacks

Hactivisim
–

Denial of Service Attacks
–
–

Sends users in wrong direction
Blocks certain websites
Web Defacement and Semantic Attacks
–
–

Overwhelming attacks on hosts and servers in order to crash them
Multiple messages sent to overwhelm a weak host.
Domain Name Server Attacks
–
–

Overloading of servers or networks in order to make political stance
Change information slightly
Produces false information for the user
Combined Attacks
–
An example is if a terrorist group sets of a bomb, then disables the 911 mechanism
of that particular area
Conclusion

Clinton Administration:
– In 1996 Bill Clinton signed President’s Commission on Critical
Infrastructure Protection


Studied problems with Network Security
Gave potential solutions to problems
– In 1998 General Attorney Janet Reno signed into effect The National
Infrastructure Protection Center to combat cyber-terrorism from US
infrastructures.

September 2001 revealed some weaknesses of the US
– One is weak Network Security
 There has to be more of an effort by the United States Government to combat
this ever increasing threat.
Questions?????