View
213
Download
0
Tags:
Embed Size (px)
Citation preview
SECR 5140-FLCritical Infrastructure Protection
Dr. Barry S. HessSpring 2 Semester
Week 3: 1 April 2006
2
Class Website
Class Info http://home.covad.net/~bshess/
Contact info [email protected] 571.237.3418
3
Agenda
Make-up Presentations Student Presentations National Strategy to Secure
Cyberspace Discussion
Presentations
National Strategy to Secure Cyberspace
White House Office of Homeland SecurityFebruary 2003
6
Strategic Objectives
Prevent cyber attacks against America’s critical infrastructures;
Reduce national vulnerability to cyber attacks; and
Minimize damage and recovery time from cyber attacks that do occur.
7
Critical Priorities for CyberspaceSecurity
I. A National Cyberspace Security Response System;
II. A National Cyberspace Security Threat and Vulnerability Reduction Program;
III. A National Cyberspace Security Awareness and Training Program;
IV. Securing Governments’ Cyberspace; and
V. National Security and International Cyberspace Security Cooperation.
8
Cyber Security Research and Development Act (Public Law 107-305)
Signed by President Bush on 27 November 2002
Authorized over $900M over five years to the National Science Foundation (NSF) and the National Institute of Standards and Technology (NIST)
Funding will: Improve basic research in computer security Encourage partnerships between industry
and academia Generate a new cybersecurity workforce
9
Information Sharing and Analysis Centers (ISACs) Sharing Information to Protect the
Economy Develop ways of better protect our critical
infrastructures and to help minimize vulnerabilities, DHS established ISACs to allow critical sectors to share information and work together to help better protect the economy
http://www.dhs.gov/dhspublic/display?theme=73&content=1375
10
Computer Emergency ResponseTeam/Coordination Center (CERT/CC)
Identified computer security—increased significantly from 2000 to 2002, going from 1,090 to 4,129
11
Cyberspace Vulnerabilities
Source: CERT/CC
12
Guiding Principles A National Effort
Coordination and cooperation between federal, state, and local governments and the private sector is key to success
Protect Privacy and Civil Liberties Enhanced cyber security is not an anathema to personal privacy
rights Regulation and Market Forces
Balance between government edicts and what commercial markets can do
Accountability and Responsibility: National Strategy to Secure Cyberspace
Assigns single agency to lead cyber security initiative Ensure Flexibility
As threat evolves so must our planning and capabilities Multi-Year Planning
On-going process that must be updated and refreshed as new technologies arrive on market
13
Priority I: A National CyberspaceSecurity Response System Major Actions and Initiatives
1. Establish a public-private architecture for responding to national-level cyber incidents;
2. Provide for the development of tactical and strategic analysis of cyber attacks and vulnerability assessments;
3. Encourage the development of a private sector capability to share a synoptic view of the health of cyberspace;
4. Expand the Cyber Warning and Information Network to support the role of DHS in coordinating crisis management for cyberspace security;
5. Improve national incident management;6. Coordinate processes for voluntary participation in the
development of national public-private continuity and contingency plans;
7. Exercise cybersecurity continuity plans for federal systems; and
8. Improve and enhance public-private information sharing involving cyber attacks, threats, and vulnerabilities.
14
Priority II: A National CyberspaceSecurity Threat and VulnerabilityReduction Program
Major Actions and Initiatives1. Enhance law enforcement’s capabilities for preventing and
prosecuting cyberspace attacks;2. Create a process for national vulnerability assessments to
better understand the potential consequences of threats and vulnerabilities;
3. Secure the mechanisms of the Internet by improving protocols and routing;
4. Foster the use of trusted digital control systems/supervisory control and data acquisition systems;
5. Reduce and remediate software vulnerabilities;6. Understand infrastructure interdependencies and improve
the physical security of cyber systems and telecommunications;
7. Prioritize federal cybersecurity research and development agendas; and
8. Assess and secure emerging systems
15
Priority III: A National Cyberspace Security Awareness and Training Program
Major Actions and Initiatives1. Promote a comprehensive national awareness
program to empower all Americans—businesses, the general workforce, and the general population—to secure their own parts of cyberspace;
2. Foster adequate training and education programs to support the Nation’s cybersecurity needs;
3. Increase the efficiency of existing federal cybersecurity training programs; and
4. Promote private-sector support for well-coordinated, widely recognized professional cybersecurity certifications.
16
Priority IV: Securing Governments’ Cyberspace Major Actions and Initiatives
1. Continuously assess threats and vulnerabilities to federal cyber systems;
2. Authenticate and maintain authorized users of federal cyber systems;
3. Secure federal wireless local area networks;4. Improve security in government outsourcing and
procurement; and5. Encourage state and local governments to consider
establishing information technology security programs and participate in information sharing and analysis centers with similar governments.
17
Priority V: National Security andInternational Cyberspace SecurityCooperation
Major Actions and Initiatives1. Strengthen cyber-related counterintelligence efforts;2. Improve capabilities for attack attribution and response;3. Improve coordination for responding to cyber attacks
within the U.S. national security community;4. Work with industry and through international organizations
to facilitate dialogue and partnerships among international public and private sectors focused on protecting information infrastructures and promoting a global “culture of security;”
5. Foster the establishment of national and international watch-and-warning networks to detect and prevent cyber attacks as they emerge; and
6. Encourage other nations to accede to the Council of Europe Convention on Cybercrime, or to ensure that their laws and procedures are at least as comprehensive.
Discussion
19
Discussion Questions
Is the federal government doing enough to protect the critical infrastructure?
What is the role of state and local governments in protecting the critical infrastructure?
20
Discussion Questions
Does the war on terrorism have a cyber component?
Are we currently engaged in cyber war?
Assignment for Week 4
22
Briefing Assignment
Prepare and present a fifteen minute discussion on what your chosen topic question Cite sources
23
Topic Questions1. What is the National Science Foundation doing for critical
infrastructure protection?2. What is the Defense Advanced Research Projects Agency doing
for critical infrastructure protection?3. What is the Institute for Information Infrastructure Protection
(I3P)?4. What is Public Key Infrastructure (PKI)?5. What is Intrusion Detection and how does it work?6. How does the Domain Name System (DNS) work?7. How does a Virtual Private Network (VPN) work?8. What is IP spoofing and why do we care?9. How does Secure Sockets Layer (SSL) work?10. What is the Honey Net Project?11. Who is Kevin Mitnick and why do we care?12. What is a White Hat Hacker?13. What is the difference between a hacker and a cracker?14. What is the Electronic Frontier Foundation (EFF)?
24
Additional Readings for Week 4
The Cyber-Intifada: Activism, Hactivism, and Cyber-Terrorism in the Context of the “New Terrorism” Georgetown University
The Cyber-Posture of the National Information Infrastructure RAND Corporation