Difference between revisions of "Student Projects:Cyber Insecurity"

From CSEP590TU
Jump to: navigation, search
Line 12: Line 12:
 
   Web use by terrorist networks
 
   Web use by terrorist networks
 
   Cyber terrorism and outsourcing
 
   Cyber terrorism and outsourcing
 
 
  Cyber terrorism, the responibility of government or private sector
 
  Response & containment after a successful attack
 
  Survey of methods for countering cyber terrorism
 
 
  
 
----
 
----

Revision as of 16:14, 8 November 2004

Homeland Cyber-(In)Security

Group Members:

 Becky Chen
 Jonathan Weinberg
 Jeremy Chiu
 Tim Pevzner

Sub-Topics:

 Survey of cyber threats
 Real threat or just hype?
 Web use by terrorist networks
 Cyber terrorism and outsourcing


Project Description and Summary (Edited 11/08/2004 8:00AM Jon):

The recent war on terror has ushered in with it a heightened awareness of cyber insecurity. Barry Colin of the Institute for Security and Intelligence defines cyber terrorism as "the union of cyberspace and terrorism in politically or socially motivated efforts to cause grave harm including but not limited to loss of life or serious economic damage." Cyber terrorism has drawn real concern by both politicians and computer scientists. Even the 9/11 attackers made devastating use of technology in the form of email encryption and internet networking to coordinated their attack. This brief will address several topics in cyber terrorism including an introduction to the area, technology and internet use by terrorist organizations, an analysis of threats to critical national infrastructure, and security concerns introduced by modern outsourcing trends.


1. Introduction: Real Threat or Hype?

Cyber terrorism was on the mind of President Bill Clinton, when in 1997, he created the President's Commission on Critical Infrastructure Protection. This commission found:
  1. As computers become more powerful and prevalent, the country is relying more heavily on computer critical infrastructure.
  2. Regarding cyber threats, the commission found that as the prevalence of computer knowledge increases, the likelihood of a cyber attack also increases, especially given the standardization of protocols. A cyber attack will require much less knowledge and expertise to perpetrate than an equally damaging physical attack if the attack is directed towards the critical infrastructure of the country. An attacker can use a computer located anywhere in the world to disrupt America’s communications or energy infrastructure at little to no cost at all.
  3. As the country expands its energy and communications requirements, integrated systems makes an attack ever more likely to create a cascading failure effect.


The commission concluded that a cyber attack is a lot more likely to happen if perpetrated by an enemy nation than a physical attack and recommended a number of steps to help protect the US from potential cyber attacks, including isolating critical systems, better access control, and better accountability through logging usage and access. Another recommendation was to increase sharing of information among the various agencies regarding cyber threats. The Department of Homeland Security was established for this purpose. However it has given very little notice to the vulnerability of the country’s cyber infrastructure. Part of this paper will discuss potential improvement to cyber security and further identify the threats that have gone unaddressed from the 1997 presidential commission.

2. Internet/Technology Use by Terrorist Organizations

Increasingly terrorists are becoming internet savvy. Groups ranging from those like Hamas and Al Qaida to white supremacist groups have found that the internet provides a multitude of advantages over traditional terrorist methods. Their activities range from simple propaganda to information sharing or gathering to planning to direct attacks. Compounding the problem is that a cyber operative tends to last longer than traditional operatives. In the old world, terrorists would be trained, would go out on a mission, and with some probability they would not return. Cyber operatives have a much higher chance of return and reuse. This means that training and resources spent on a cyber operative yield a much higher return to the terrorist group. As a part of this paper we will survey the benefits terrorists gain from the internet, how they exploit them, and how their usage of the internet in turn can make them vulnerable. We know that they communicate via the internet. Can we trace their communications or even read them? We know they post propaganda online. Can we use the hosts of such sites as leads to finding the criminals themselves? If they share software and information can we not plant faulty or bugged tools in places where such software is shared and exchanged? These are some of the things we will discuss in this chapter of the paper.


3. Critical National Infrastructure at Risk

On the other hand, Information infrastructure with significant economic, political or symbolic value is mostly likely target for cyber attacks. Power grids, dams and other industrial facilities monitored by SCADA (Supervisory Control and Data Acquisition systems) should be carefully protected since any failure to these system will result in panic and mass hysterical among the population in addition to the significant economic lost. Many reports have indicated that SCADA systems such as water supply, wastewater and similar systems are particularly vulnerable as they have been “outside” the realm of consideration as critical protection. With 40% of SCADA were connected to the Internet, and 60% of them being accessible by modem, the system could possibly be hacked by insider or attacked through computer worms or virus. Previously, computer worms and virus are normally developed by hobbyists who are seeking fun to see other computer users suffer. However, computer worms and virus with political agenda are slowly showing up on the horizon. In 2001, the Code Red worm had quickly inflected many web servers around the world to conduct an organized Denial of Service (DOS) attack against the White House web site to disable a political symbol of the American government. A worm similar to Code Red could easily be modified to do much more serious damage, and worms are cost effect way to significantly disrupt the United State national information infrastructure. Government and private companies should be better prepared against any break-in or destruction to their information systems. In this paper we will survey different potential threads to our information infrastructures. How can we protect ourselves from malicious hackers? How can we make sure that the system would be break-in by insiders? Can we protect the systems from computer worms and virus? How do we determined whether the system has been compromised? How do we recover from destruction?


4. Homeland Security and IT Outsourcing

In order to compete in today’s high-tech markets, private sector as well as government institutions are increasingly turning to outsourcing as a means by which to reduce operating cost and sharpen focus on core competencies. Inherent in this practice is a vulnerability to cyber terrorist threats in the form of deliberate software or hardware sabotage, backdoor exploits, ill-controlled intellectual property leaks, and the inadvertent introduction of security vulnerabilities stemming from deteriorated quality assurance practices. In this brief we will survey and categorize the threats to national cyber-infrastructure introduced by IT outsourcing (particularly offshore), current practices and contracting policies employed by government agencies dealing with sensitive security information, the benefits, shortcomings, omissions, and effectiveness of those policies, and the degree to which such practices can or should be extended to private sector organizations dealing in critical national infrastructure.







Outsourcing (Jon): In order to compete in today’s high-tech markets, private sector as well as government institutions are increasingly turning to outsourcing as a means by which to reduce operating cost and sharpen focus on core competencies. Inherent in this practice is a vulnerability to cyber terrorist threats in the form of deliberate software or hardware sabotage, backdoor exploits, ill-controlled intellectual property leaks, and the inadvertent introduction of security vulnerabilities stemming from deteriorated quality assurance practices. In this brief we will survey and categorize the threats to national cyber-infrastructure introduced by IT outsourcing (particularly offshore), current practices and contracting policies employed by government agencies dealing with sensitive security information, the benefits, shortcomings, omissions, and effectiveness of those policies, and the degree to which such practices can or should be extended to private sector organizations dealing in critical national infrastructure.


Is cyber terrorism real threat or just hype? (Tim)

Cyber terrorism is a real threat. For example, law enforcement officials reported that the 9/11 attackers used technology to communicate and coordinate the attacks. They used email encryption and the internet to fulfill their highly coordinated attack. Barry Colin of the Institute for Security and Intelligence defines cyber terrorism as "the union of cyberspace and terrorism in politically or socially motivated efforts to cause grave harm including but not limited to loss of life or serious economic damage."
Cyber terrorism was on the mind of President Bill Clinton, when in 1997, he created the President’s Commission on Critical Infrastructure Protection. This commission found: 1. As the computers become more and more powerful and prevalent, the country is relying more and more on “electrical energy, communications, and computer”.
2. Regarding cyber threats, the commission found that as the prevalence of computer knowledge increases, the likelihood of a cyber attack also increases, especially given the standardization of the protocols. A cyber attack will require a lot less knowledge and expertise to perpetrate than an equally damaging physical attack, if the attack is directed towards the critical infrastructure of the country. An attacker can use a computer located anywhere in the world to disrupt America’s communications or energy infrastructure at little to no cost at all.
3. As the country expands it’s energy and communications requirements, an attack is ever more likely to create a cascading failure effect, since a potential overload on the unaffected systems might produce these systems’ failures.
The commission concluded that a cyber attack is a lot more likely to happen if perpetrated by an enemy nation than a physical attack.
Commission recommended a number steps to better protect the US from potential cyber attacks, including isolating critical systems from the rest of the world, better access control, and better accountability through logging usage and access.
Another recommendation was to better share information among the various agencies regarding cyber threats.
The Department of Homeland Security was established just for this purpose. The department was established to protect the nation from physical threats of terrorist attacks, among other things; however, very little notice is given to the vulnerability of the country’s cyber infrastructure.
Part of this paper will discuss potential improvement to the cyber security, and further identify the various threats that are still not addressed from the 1997 presidential commission.


How terrorists use the internet & what to do about it.

 Increasingly terrorists are becoming internet savvy.  Groups ranging from those like Hamas and Al Qaida to white supremacist groups have found that the internet provides a multitude of advantages over traditional terrorist methods.  Their activities range from simple propaganda to information sharing or gathering to planning to direct attacks.  Compounding the problem is that a cyber operative tends to last longer than traditional operatives.  In the old world, terrorists would be trained, would go out on a mission, and with some probability they would not return.  Cyber operatives have a much higher chance of return and reuse.  This means that training and resources spent on a cyber operative yield a much higher return to the terrorist group.  As a part of this paper we will survey the benefits terrorists gain from the internet, how they exploit them, and how their usage of the internet in turn can make them vulnerable.  We know that they communicate via the internet.  Can we trace their communications or even read them?  We know they post propaganda online.  Can we use the hosts of such sites as leads to finding the criminals themselves?  If they share software and information can we not plant faulty or bugged tools in places where such software is shared and exchanged?  These are some of the things we will discuss in this chapter of the paper.