Network Security of The United States of America By: Jeffery T
Download
Report
Transcript Network Security of The United States of America By: Jeffery T
Network Security of The
United States of America
By: Jeffery T. Pelletier
Table of Contents
Internet Governance
United States Military Technology
Cyber-Attacker
Al-Quida’s threat
Methods of Cyber-Attacker
Information Warfare Attacks
Conclusion
Questions??????
Internet Governance
United Nations Working Group on Internet Governance (WGIG)
– Created in 2004 by Kofi Anon
Establish Internet governance
Identify key responsibilities and roles of Governments to police the Internet
United States is only an advisor to this group.
– Wants world to allow freedom of expression
– Policing of Cyber-Crime
– Domain Name and Addressing System
WGIG tackles certain important issues
– Economical Development on the Internet
– Political Development on the Internet
United States Military
Technology
Department of Defense had a hand in many technology inventions:
– First Computer
– Internet
– Global Positioning System
Defense And Research Products Agency (DARPA)
New technology:
– Global Information Grid
Newest network for US Military to communicate with each component
Connects military leaders to troop in many different ways
Going to take over 100% of US military network
Critics argue that this can be hacked or penetrated with a virus.
Cyber-Attacker
No clear profile
US concerned about important industry infrastructure:
– Financial infrastructure
– Electrical infrastructure
– Oil infrastructure
Increasing Complexity of these infrastructures makes them more vulnerable
for attacks.
US Government has to rely more on civilian sector for safeguards.
Cyber-Attacker
Specific Attacks:
– One of the first was in 1982
23 year old college student Robert Morris created the Morris Worm.
– One of the worst was in 1999
Melissa Virus attacked Word97, and Word2000.
Attacked through the means of e-mail and word documents.
– One of the most costly was in 2001
Code-Red Virus cost the World $2.6 billion.
$200 million a day.
– One of the quickest movers was in 2004
Witty Virus infected 110 hosts immediately and in 60 seconds, hit 160 hosts.
In 45 minutes, it had infected all of the vulnerable hosts.
Al-Quida
Leader Osama Bin-Laden
In 1993 Al-Quida soilder Ramzi Yousef bombed World Trade Center
– FBI found plans to attack airliners on Yousef’s personal laptop.
Plans were encrypt
US worried that Al-Quida uses Internet to communicate
– Sends e-mails about planned attacks
– Sends encrypted messages of planned attacks
In 2002, FBI learned of Al-Quida searching for information on US
nuclear power plants.
Critics are worried US is not ready for a major Cyber-Attack
Information Warfare Attacks
Smaller/Weaker adversaries of the US
– Cannot beat US Militarily
Use of Information Warfare is a better method
– Think US is weak in this area of Defense Structure
– Could lead to a potential quick victory for adversary
Countries leading threat in Information Warfare:
–
–
–
–
–
Russia
North Korea
China
Iran
Cuba
US has to rely more on private-sector to help in defense against this
type of attack
Methods of Cyber Attacks
Hactivisim
–
Denial of Service Attacks
–
–
Sends users in wrong direction
Blocks certain websites
Web Defacement and Semantic Attacks
–
–
Overwhelming attacks on hosts and servers in order to crash them
Multiple messages sent to overwhelm a weak host.
Domain Name Server Attacks
–
–
Overloading of servers or networks in order to make political stance
Change information slightly
Produces false information for the user
Combined Attacks
–
An example is if a terrorist group sets of a bomb, then disables the 911 mechanism
of that particular area
Conclusion
Clinton Administration:
– In 1996 Bill Clinton signed President’s Commission on Critical
Infrastructure Protection
Studied problems with Network Security
Gave potential solutions to problems
– In 1998 General Attorney Janet Reno signed into effect The National
Infrastructure Protection Center to combat cyber-terrorism from US
infrastructures.
September 2001 revealed some weaknesses of the US
– One is weak Network Security
There has to be more of an effort by the United States Government to combat
this ever increasing threat.
Questions?????