1 / 15

Internet Security and Implications on Transportation Systems

Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for Internet & Security Technology (LIST) http://list.cs.northwestern.edu. Internet Security and Implications on Transportation Systems. Outline. Internet Threat Landscape Security regulations

jstrange
Télécharger la présentation

Internet Security and Implications on Transportation Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for Internet & Security Technology (LIST) http://list.cs.northwestern.edu Internet Security and Implications on Transportation Systems

  2. Outline • Internet Threat Landscape • Security regulations • System Diagnosis

  3. Cable Modem Premises- based AccessNetworks LAN Transit Net LAN LAN Private Peering Premises- based Core Networks Transit Net WLAN WLAN NAP Analog WLAN Transit Net Public Peering DSLAM Operator- based RAS Regional Wireline Regional Cell H.323 Data Cell Data H.323 Cell PSTN Voice Voice The Current Internet: Connectivity and Processing

  4. The Spread of the Sapphire/Slammer SQL Worm

  5. Evolution of Botnets • Motivation change in computer hacking • Vandalism  Financial gains • Loss of $67.2 billion (2006 figure)

  6. Botnet Architecture Botmaster Bot Bot Bot Recruiting Recruiting Recruiting

  7. Attack Behaviors • Stealing personal information • Keylogger and Network sniffer used on compromised systems to spy on users and compile personal information • Phishing and spam proxy • Aggregated computing power and proxy capability allow spammers to impact larger groups without being traced. • Distributed Denial of Service (DDoS) • Impair or eliminate availability of a network to extort or disrupt business

  8. Raw Materials Goods (Re)Application Goal Market S S S Buy, Sell, & Trade eCrime Market Operation

  9. Sensitive Data and Market Significance Credit Card #s SSNs Bank Account #s Percentage of Labeled Data Sensitive Data Type

  10. Cyber spies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system. • Transportation systems (air, truck, bus) the next? • Next generation 9/11 without suicide bombers!

  11. Security Regulations • Business and security compliance is top-of-mind for executives • Protecting sensitive business & customer data is the key focus of regulatory compliance requirement

  12. Business Impact of Lack of Compliance • Direct financial ramifications • FTC fines • Compensation payout to customers • Cost of external security audits • Lost customer confidence • Research shows substantial indirect costs associated with brand damage

  13. Do We Have Any Security Regulations for Transportation Systems? • E.g., any FAA rules?

  14. Transportation Control System Management & Diagnosis • Many applications & services • Traffic monitoring, authentication, command & control, etc. • Critical for running business • Large enterprise networks • 1,000s network applications • 1,000s staffs in IT support • $$ millions of dollars spent every year

More Related