24
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

SECR 5140-FLCritical Infrastructure Protection

Dr. Barry S. HessSpring 2 Semester

Week 3: 1 April 2006

Page 2: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

2

Class Website

Class Info http://home.covad.net/~bshess/

Contact info [email protected] 571.237.3418

Page 3: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

3

Agenda

Make-up Presentations Student Presentations National Strategy to Secure

Cyberspace Discussion

Page 4: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

Presentations

Page 5: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

National Strategy to Secure Cyberspace

White House Office of Homeland SecurityFebruary 2003

Page 6: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

6

Strategic Objectives

Prevent cyber attacks against America’s critical infrastructures;

Reduce national vulnerability to cyber attacks; and

Minimize damage and recovery time from cyber attacks that do occur.

Page 7: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

7

Critical Priorities for CyberspaceSecurity

I. A National Cyberspace Security Response System;

II. A National Cyberspace Security Threat and Vulnerability Reduction Program;

III. A National Cyberspace Security Awareness and Training Program;

IV. Securing Governments’ Cyberspace; and

V. National Security and International Cyberspace Security Cooperation.

Page 8: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

8

Cyber Security Research and Development Act (Public Law 107-305)

Signed by President Bush on 27 November 2002

Authorized over $900M over five years to the National Science Foundation (NSF) and the National Institute of Standards and Technology (NIST)

Funding will: Improve basic research in computer security Encourage partnerships between industry

and academia Generate a new cybersecurity workforce

Page 9: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

9

Information Sharing and Analysis Centers (ISACs) Sharing Information to Protect the

Economy Develop ways of better protect our critical

infrastructures and to help minimize vulnerabilities, DHS established ISACs to allow critical sectors to share information and work together to help better protect the economy

http://www.dhs.gov/dhspublic/display?theme=73&content=1375

Page 10: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

10

Computer Emergency ResponseTeam/Coordination Center (CERT/CC)

Identified computer security—increased significantly from 2000 to 2002, going from 1,090 to 4,129

Page 11: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

11

Cyberspace Vulnerabilities

Source: CERT/CC

Page 12: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

12

Guiding Principles A National Effort

Coordination and cooperation between federal, state, and local governments and the private sector is key to success

Protect Privacy and Civil Liberties Enhanced cyber security is not an anathema to personal privacy

rights Regulation and Market Forces

Balance between government edicts and what commercial markets can do

Accountability and Responsibility: National Strategy to Secure Cyberspace

Assigns single agency to lead cyber security initiative Ensure Flexibility

As threat evolves so must our planning and capabilities Multi-Year Planning

On-going process that must be updated and refreshed as new technologies arrive on market

Page 13: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

13

Priority I: A National CyberspaceSecurity Response System Major Actions and Initiatives

1. Establish a public-private architecture for responding to national-level cyber incidents;

2. Provide for the development of tactical and strategic analysis of cyber attacks and vulnerability assessments;

3. Encourage the development of a private sector capability to share a synoptic view of the health of cyberspace;

4. Expand the Cyber Warning and Information Network to support the role of DHS in coordinating crisis management for cyberspace security;

5. Improve national incident management;6. Coordinate processes for voluntary participation in the

development of national public-private continuity and contingency plans;

7. Exercise cybersecurity continuity plans for federal systems; and

8. Improve and enhance public-private information sharing involving cyber attacks, threats, and vulnerabilities.

Page 14: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

14

Priority II: A National CyberspaceSecurity Threat and VulnerabilityReduction Program

Major Actions and Initiatives1. Enhance law enforcement’s capabilities for preventing and

prosecuting cyberspace attacks;2. Create a process for national vulnerability assessments to

better understand the potential consequences of threats and vulnerabilities;

3. Secure the mechanisms of the Internet by improving protocols and routing;

4. Foster the use of trusted digital control systems/supervisory control and data acquisition systems;

5. Reduce and remediate software vulnerabilities;6. Understand infrastructure interdependencies and improve

the physical security of cyber systems and telecommunications;

7. Prioritize federal cybersecurity research and development agendas; and

8. Assess and secure emerging systems

Page 15: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

15

Priority III: A National Cyberspace Security Awareness and Training Program

Major Actions and Initiatives1. Promote a comprehensive national awareness

program to empower all Americans—businesses, the general workforce, and the general population—to secure their own parts of cyberspace;

2. Foster adequate training and education programs to support the Nation’s cybersecurity needs;

3. Increase the efficiency of existing federal cybersecurity training programs; and

4. Promote private-sector support for well-coordinated, widely recognized professional cybersecurity certifications.

Page 16: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

16

Priority IV: Securing Governments’ Cyberspace Major Actions and Initiatives

1. Continuously assess threats and vulnerabilities to federal cyber systems;

2. Authenticate and maintain authorized users of federal cyber systems;

3. Secure federal wireless local area networks;4. Improve security in government outsourcing and

procurement; and5. Encourage state and local governments to consider

establishing information technology security programs and participate in information sharing and analysis centers with similar governments.

Page 17: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

17

Priority V: National Security andInternational Cyberspace SecurityCooperation

Major Actions and Initiatives1. Strengthen cyber-related counterintelligence efforts;2. Improve capabilities for attack attribution and response;3. Improve coordination for responding to cyber attacks

within the U.S. national security community;4. Work with industry and through international organizations

to facilitate dialogue and partnerships among international public and private sectors focused on protecting information infrastructures and promoting a global “culture of security;”

5. Foster the establishment of national and international watch-and-warning networks to detect and prevent cyber attacks as they emerge; and

6. Encourage other nations to accede to the Council of Europe Convention on Cybercrime, or to ensure that their laws and procedures are at least as comprehensive.

Page 18: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

Discussion

Page 19: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

19

Discussion Questions

Is the federal government doing enough to protect the critical infrastructure?

What is the role of state and local governments in protecting the critical infrastructure?

Page 20: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

20

Discussion Questions

Does the war on terrorism have a cyber component?

Are we currently engaged in cyber war?

Page 21: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

Assignment for Week 4

Page 22: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

22

Briefing Assignment

Prepare and present a fifteen minute discussion on what your chosen topic question Cite sources

Page 23: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

23

Topic Questions1. What is the National Science Foundation doing for critical

infrastructure protection?2. What is the Defense Advanced Research Projects Agency doing

for critical infrastructure protection?3. What is the Institute for Information Infrastructure Protection

(I3P)?4. What is Public Key Infrastructure (PKI)?5. What is Intrusion Detection and how does it work?6. How does the Domain Name System (DNS) work?7. How does a Virtual Private Network (VPN) work?8. What is IP spoofing and why do we care?9. How does Secure Sockets Layer (SSL) work?10. What is the Honey Net Project?11. Who is Kevin Mitnick and why do we care?12. What is a White Hat Hacker?13. What is the difference between a hacker and a cracker?14. What is the Electronic Frontier Foundation (EFF)?

Page 24: SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006

24

Additional Readings for Week 4

The Cyber-Intifada: Activism, Hactivism, and Cyber-Terrorism in the Context of the “New Terrorism” Georgetown University

The Cyber-Posture of the National Information Infrastructure RAND Corporation