210 likes | 320 Vues
This report discusses the current landscape of information technology security in Michigan, highlighting recent statistics such as 30,000 virus attacks thwarted daily and 100,000 monthly hacking attempts. It covers the Critical IT Infrastructure Protection Program, funded by Homeland Security, which includes various projects tailored to enhance the protection, detection, and response capabilities of Michigan's cybersecurity framework. Key initiatives like intrusion detection systems, secure network portals, and proactive measures against cyber threats are outlined, along with notable accolades for cybersecurity efforts.
E N D
The 2005 Case for Information Technology Security October 14, 2004
From an executive perspective …What are the latest Information Security Issues?
Is there really an active threat to Michigan government? • 30,000 virus attacks stopped daily • 100,000 hacking attempts stopped monthly • 800 worker hours of productivity lost due to attacks in an average month • 600 DIT staff hours used to restore service due to attacks in an average month
Homeland Security Grant Projects Critical IT Infrastructure Protection Program
Program Overview • Program encompasses 12 separate but related projects that focus on prevention, detection, and response to cyber threats and incidents against critical State of Michigan IT infrastructure • All projects meet the goals and objectives required by Statewide Homeland Security Strategy • Funded by grant dollars from Department of Homeland Security
Critical Infrastructure IT Protection Projects • What: Fixed Generators for State’s Data Centers • What: Security events correlation collected by isolated systems (IDS, firewalls, SMTP anti-virus scanner, etc) • What: Firewall technologies for the internal State network placed at each of the hosting centers to provide protection for internal zones • What: Intrusion detection devices and systems for internal protected zones and the extranet made visible to the IDS systems • What: Network portal system that provides encryption to user data without the need for client side applications. Commonly referred to as SSL VPN • What: Permanent, dedicated and secure, remote-controlled network monitor/analyzer shared between the connections to the Public Internet and server farm infrastructure at the Tier III hosting centers
Critical Infrastructure IT Protection Projects • What: Decoy Server using honeypot technology provides early detection of internal, external, and unknown attacks • What: Network penetration tests to identify vulnerabilities • What: GIS information system for DIT Emergency Coordination Center • What: Software to reduce spam email entering the State’s email systems • What: Software preventing access to web sites that are deemed risks to the State's network and systems; spyware filter • What: Implement documented formal methods for the application of forensic risk analysis and risk management of information systems
Michigan Cyber Security Success Stories--- 2003 NASCIO Award for The Secure Michigan Initiative (Enterprise Risk Assessment) --- 2004 NASCIO Award for Michigan Critical Incident Management System --- Cyber Terrorism Exercise in July 2004
Contact Information:Dan Lohrmann Michigan CISOe-mail: Lohrmannd@mi.govphone: (517) 241-4090