130 likes | 280 Vues
Cybersecurity. Write your response papers!| Paper Drafts Due Tuesday! . Cyber security . Warfare v. espionage? State AND non-state actors Russian-Georgia War (2008) Estonia removing the statue
E N D
Cybersecurity Write your response papers!| Paper Drafts Due Tuesday!
Cyber security • Warfare v. espionage? • State AND non-state actors • Russian-Georgia War (2008) • Estonia removing the statue • 2002- radical Islamic clerics in Britain “in a matter of time you will see attacks on the stock market”
Responses • Why are cyber attacks so difficult to deal with? • What interests are at play? • What actors are involved? • Is cyber security a “new” threat?
Nothing new under the sun • Sources of power; economic wealth, military forces, ideas, and information • Speed of communication • WWII Allies broke German and Japanese codes • 2003 Invasion of Iraq • Text messages • Quantity of information • Accessibility becomes important
Difficulties • Often unreported • Don’t want to frighten stockholders • unaware • Actors are hard to track • Expensive • Offensive advantage
Types of cyber attacks • Botnet • Denial of service attack (DDOS) • Botmaster/botherder • Spam (please send me $$$ so I can repay you) • “packet sniffers” • Data blocks = packages • Tracking those data for specific things (ex. passowords) • Argentinian guy breaking into DOD Naval Research Lab • “IP Spoofing” • Not really at the IP address you think you are • Worms/viruses • Trojan Horse
cybercrime • 2000 “ILOVEYOU” • Undergrad thesis project in Philippines • 45 million CPUs, $10B • Never charged with a crime • 2007- TJ Maxx lost $130 M • Attacks from US, Ukraine, Belarus, Estonia, China • 2010 US, UK, Ukraine • Zeus- getting bank account passwords ~$70M • Almost all cyber crime are transnational
Cyber-espionage • NATO HQ attacked ~100X per day • Moonlight Maze (US v. Russia 1999), Titan Rain (US v. China ~10 terabytes of data 2003) • These computers weren’t connected to the internet • “air gap” for US military = SIPRNET • Thumb drives/physical help to jump gap • PRC as perpetrator
Michael Anti (zhaojing) • http://www.ted.com/talks/michael_anti_behind_the_great_firewall_of_china.html (18 min. ) • China’s internet policy is both international and domestic • What are the outcomes of these policies? • What kind of power is displayed in his story?
Cyber-terrorism • How is the internet useful for terrorists? • Communication • Gathering information • Money raising • Attacking networks • Is the internet a “good” place for a terrorist attack? Importance of spectacle?
Cyber War • 1981, Soviet KGB “Farewell” started working for the French • US fed him bad technology intel • Soviets were building a huge pipeline for natural gas • CIA tampered with it • Boom • Does attribution matter when we talk about war?
What to do? • How do you attack this security threat? • Domestic efforts • International efforts • Dual use technologies • Easy to hide • Privacy rights/ intellectual property rights