Student Projects:Cyber Insecurity

From CSEP590TU
Revision as of 06:07, 8 November 2004 by J2chiu (talk | contribs)

Jump to: navigation, search

Homeland Cyber-(In)Security

Group Members:

 Becky Chen
 Jonathan Weinberg
 Jeremy Chiu
 Tim Pevzner

Possible Topics:

 Survey of cyber threats
 Real threat or just hype?
 Response & containment after a successful attack
 Survey of methods for countering cyber terrorism
 Web use by terrorist networks
 Cyber terrorism, the responibility of government or private sector
 Cyber terrorism and outsourcing



Outsourcing (Jon): In order to compete in today’s high-tech markets, private sector as well as government institutions are increasingly turning to outsourcing as a means by which to reduce operating cost and sharpen focus on core competencies. Inherent in this practice is a vulnerability to cyber terrorist threats in the form of deliberate software or hardware sabotage, backdoor exploits, ill-controlled intellectual property leaks, and the inadvertent introduction of security vulnerabilities stemming from deteriorated quality assurance practices. In this brief we will survey and categorize the threats to national cyber-infrastructure introduced by IT outsourcing (particularly offshore), current practices and contracting policies employed by government agencies dealing with sensitive security information, the benefits, shortcomings, omissions, and effectiveness of those policies, and the degree to which such practices can or should be extended to private sector organizations dealing in critical national infrastructure.


Is cyber terrorism real threat or just hype? (Tim)

Cyber terrorism is a real threat.
For example, law enforcement officials reported that the 9/11 attackers used technology to communicate and coordinate the attacks. They used email encryption and the internet to fulfill their highly coordinated attack.
Barry Colin of the Institute for Security and Intelligence defines cyber terrorism as "the union of cyberspace and terrorism in politically or socially motivated efforts to cause grave harm including but not limited to loss of life or serious economic damage."
Cyber terrorism was on the mind of President Bill Clinton, when in 1997, he created the President’s Commission on Critical Infrastructure Protection. This commission found: 1. As the computers become more and more powerful and prevalent, the country is relying more and more on “electrical energy, communications, and computer”.
2. Regarding cyber threats, the commission found that as the prevalence of computer knowledge increases, the likelihood of a cyber attack also increases, especially given the standardization of the protocols. A cyber attack will require a lot less knowledge and expertise to perpetrate than an equally damaging physical attack, if the attack is directed towards the critical infrastructure of the country. An attacker can use a computer located anywhere in the world to disrupt America’s communications or energy infrastructure at little to no cost at all.
3. As the country expands it’s energy and communications requirements, an attack is ever more likely to create a cascading failure effect, since a potential overload on the unaffected systems might produce these systems’ failures.
The commission concluded that a cyber attack is a lot more likely to happen if perpetrated by an enemy nation than a physical attack.
Commission recommended a number steps to better protect the US from potential cyber attacks, including isolating critical systems from the rest of the world, better access control, and better accountability through logging usage and access.
Another recommendation was to better share information among the various agencies regarding cyber threats.
The Department of Homeland Security was established just for this purpose. The department was established to protect the nation from physical threats of terrorist attacks, among other things; however, very little notice is given to the vulnerability of the country’s cyber infrastructure.
Part of this paper will discuss potential improvement to the cyber security, and further identify the various threats that are still not addressed from the 1997 presidential commission.


How terrorists use the internet & what to do about it.

 Increasingly terrorists are becoming internet savvy.  Groups ranging from those like Hamas and Al Qaida to white supremacist groups have found that the internet provides a multitude of advantages over traditional terrorist methods.  Their activities range from simple propaganda to information sharing or gathering to planning to direct attacks.  Compounding the problem is that a cyber operative tends to last longer than traditional operatives.  In the old world, terrorists would be trained, would go out on a mission, and with some probability they would not return.  Cyber operatives have a much higher chance of return and reuse.  This means that training and resources spent on a cyber operative yield a much higher return to the terrorist group.  As a part of this paper we will survey the benefits terrorists gain from the internet, how they exploit them, and how their usage of the internet in turn can make them vulnerable.  We know that they communicate via the internet.  Can we trace their communications or even read them?  We know they post propaganda online.  Can we use the hosts of such sites as leads to finding the criminals themselves?  If they share software and information can we not plant faulty or bugged tools in places where such software is shared and exchanged?  These are some of the things we will discuss in this chapter of the paper.