1 / 13

Cybersecurity

Cybersecurity. Write your response papers!| Paper Drafts Due Tuesday! . Cyber security . Warfare v. espionage? State AND non-state actors Russian-Georgia War (2008) Estonia removing the statue

kipp
Télécharger la présentation

Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Write your response papers!| Paper Drafts Due Tuesday!

  2. Cyber security • Warfare v. espionage? • State AND non-state actors • Russian-Georgia War (2008) • Estonia removing the statue • 2002- radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”

  3. Responses • Why are cyber attacks so difficult to deal with? • What interests are at play? • What actors are involved? • Is cyber security a “new” threat?

  4. Nothing new under the sun • Sources of power; economic wealth, military forces, ideas, and information • Speed of communication • WWII Allies broke German and Japanese codes • 2003 Invasion of Iraq • Text messages • Quantity of information • Accessibility becomes important

  5. Difficulties • Often unreported • Don’t want to frighten stockholders • unaware • Actors are hard to track • Expensive • Offensive advantage

  6. Types of cyber attacks • Botnet • Denial of service attack (DDOS) • Botmaster/botherder • Spam (please send me $$$ so I can repay you) • “packet sniffers” • Data blocks = packages • Tracking those data for specific things (ex. passowords) • Argentinian guy breaking into DOD Naval Research Lab • “IP Spoofing” • Not really at the IP address you think you are • Worms/viruses • Trojan Horse

  7. cybercrime • 2000 “ILOVEYOU” • Undergrad thesis project in Philippines • 45 million CPUs, $10B • Never charged with a crime • 2007- TJ Maxx lost $130 M • Attacks from US, Ukraine, Belarus, Estonia, China • 2010 US, UK, Ukraine • Zeus- getting bank account passwords ~$70M • Almost all cyber crime are transnational

  8. Cyber-espionage • NATO HQ attacked ~100X per day • Moonlight Maze (US v. Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003) • These computers weren’t connected to the internet • “air gap” for US military = SIPRNET • Thumb drives/physical help to jump gap • PRC as perpetrator

  9. Article discussion

  10. Michael Anti (zhaojing) • http://www.ted.com/talks/michael_anti_behind_the_great_firewall_of_china.html (18 min. ) • China’s internet policy is both international and domestic • What are the outcomes of these policies? • What kind of power is displayed in his story?

  11. Cyber-terrorism • How is the internet useful for terrorists? • Communication • Gathering information • Money raising • Attacking networks • Is the internet a “good” place for a terrorist attack? Importance of spectacle?

  12. Cyber War • 1981, Soviet KGB “Farewell” started working for the French • US fed him bad technology intel • Soviets were building a huge pipeline for natural gas • CIA tampered with it • Boom • Does attribution matter when we talk about war?

  13. What to do? • How do you attack this security threat? • Domestic efforts • International efforts • Dual use technologies • Easy to hide • Privacy rights/ intellectual property rights

More Related