3 introduction

Information about 3 introduction

Published on March 27, 2008

Author: Reva

Source: authorstream.com

Content

Cyber Security: Are we Ready?:  Cyber Security: Are we Ready? Spring 2005 Sanjay Goel University at Albany, School of Business / NY State Center for Information Forensics and Assurance Introduction:  Introduction Slide3:  Every 18 seconds an incident is reported Every third day a new virus is released Reported incidents 2001 - 52,000 2002 - 82,094 2003 - 137,529 Identity Theft 2002 - 8.75 billion 2003 - 24 billion Sources: CSI/FBI Report, 03; ISCA Report, 12/03; CERT Report, 2003; Aberdeen Report, 2003 Computer Security Hacking 2003 Estimated Number of Electronic Crimes or Network, System or Data Intrusions Experienced by Organizations Average Number of E-crimes or Intrusions: 136 Slide4:  Number of reported incidents far lower than actual incidents Unreported Incidents 2001 - 4.1 million, 2002 - 7.9 million, 2003 - 15.9 million Computer Security Hacking Average Number of E-crimes or Intrusions: 136 Slide5:  April 8, 2004 CNET News.com NetSky attacks target file−sharing networks. The main website of file-sharing network eDonkey was knocked offline this week following an attack from NetSky. Earlier this week, the Kazaa and eDonkey sites, as well as three other file-sharing sites, were bracing for a distributed denial−of−service (DDoS) attack expected to be launched by variants of the NetSky worm. NetSky.Q, which first appeared March 29, is designed to attack certain websites that distribute file−sharing clients, as well as sites that distribute hacking and cracking tools. The attack is scheduled to last at least six days. Source: http://news.com.com/2100−1009_3−5187211.html?tag=nefd.top Computer Security Security Incidents Slide6:  May 3, 2004, CNET News.com Sasser variants pose greater danger. After a slow start, new version of the Sasser worm spread to more than 500,000 computers. The original version of the Sasser worm spread slowly, but Saturday, SasserB infected computer much faster. When two new variants appeared on Monday, the worm spread to hundreds of thousands of systems. The University of Massachusetts at Amherst experienced an outbreak of 1,100 computers compromised with Sasser. Delta Air Lines also encountered problems in Atlanta with its computers for more than six hours, resulting in delays. Computer Security Security Incidents Slide7:  March 2004, Washington Times Computer viruses, worms set costly Internet record. According to security experts mi2g, virus activity caused as much as $83 billion in economic damage in February. Numerous variants of MyDoom/Doomjuice and NetSky caused havoc over the wires. Source: Washington Times, March 1, 2004 Computer Security Security Incidents Slide8:  April 09, Mobile Pipeline Second Cisco WLAN security threat exposed. Cisco faced its second serious WLAN security threat last week when a network and security analyst released a tool that attacks the company's proprietary Lightweight Extensible Authentication Protocol (LEAP) wireless authentication system. Wright strongly urged LEAP users to take alternative measures. "Customers using LEAP should be aware that the usernames and password of their user account are exposed, and should plan for the deployment of alternate authentication mechanisms such as PEAP or TTLS," http://www.mobilepipeline.com/news/18900815;jsessionid=3TNL4 Computer Security Security Incidents Slide9:  September 22, 2004 Times Union Worm burrows way into state computers Education Department’s network crippled by powerful software virus. The state Education Department’s vast computer network was hit with what programmers described as a powerful cyber virus on Monday afternoon, temporarily shutting down hundreds of computers, idling scores of workers and putting a scare into the rest of state government. Thanks to the virus, the Education Department’s network “slowed to a crawl,” and a number of computers were completely shut down, says Platt, “People were just unable to get into their computers” Source: http://www.timesunion.com Computer Security Security Incidents Slide10:  Tuesday July 27, 2004, Associated Press     Reports of hacking from South Korea into computers in other countries increased from 6,531 in 2002 to 14,063 in 2003, and then to 10,634 in the first half of 2004, the Korea Information Security Agency said in a report. Those statistics were mainly based on reports from other countries.     Reports of hacking from other countries into South Korean computers grew from 468 in 2002 to 2,301 in 2003 and then showed a huge increase to 17,055 in the first half of this year, the agency said. Source: LexisNexis Computer Security Security Incidents Slide11:  July 16, 2004, Friday The Korea Herald     In its initial investigation, the National Intelligence Service said that an anonymous hacking group based in China broke into 211 computers at 10 government organizations, including the National Assembly, the Maritime Police Agency, the Agency for Defense Development and the Korea Atomic Energy Research Institute. Also hit were 67 computers at private companies, universities and media firms.     In this regard, the Ministry of Information and Communications, among other authorities, can learn a lesson from other countries which have moved far ahead in gearing up for cyber war. Following 9/11, for instance, U.S. President George W. Bush ordered a $1.5 billion increase in spending on computer network security and training an army of workers to thwart any cyber attack that terrorists might launch. Source: LexisNexis Computer Security Security Incidents Slide12:  October 5, 2004, Tuesday International Herald Tribune     North Korea's military has trained more than 500 cyberwarriors, whose mission is to hack into South Korean, Japanese and U.S. networks to gather intelligence or to attack computer systems, the South Korean Ministry of National Defense said Monday. The intelligence came in a report presented to the National Assembly's Defense Committee. The military hackers are apparently recruited from among those who have received specialized computer training at universities. The ministry said it believed that the North's capability was on a level with that of technologically advanced countries. Source: LexisNexis Computer Security Security Incidents Slide13:  August 31, 2004, Tuesday Asia Pulse     The number of South Korean Web sites reported to have been attacked in August by overseas-based hackers rose for the third straight month, sounding alarm bells for the country's cyber security, the government said Tuesday.    In August, overseas hackers attacked 287 Web sites in South Korea, up from 262 in July and 172 in June, the Ministry of Information and Communication said in a statement.     On Aug. 11, about 70 domestic Web sites were attacked by a group of Brazilian hackers. The same group also attacked 120 computers on Aug. 15 and 40 others on Aug. 16, the ministry said.     Seven computer servers were crippled by an Indonesian hacker group called "neotector," it added.     South Korea boasts one of the world's highest broadband Internet penetration rates with more than 11 million people connected to the always-on, high-speed Internet.     Although South Korea has the most advanced Internet network, the country has lagged behind the United States and other industrial nations in cyber security, analysts said Source: LexisNexis Computer Security Security Incidents Slide14:  March 2004, Washington Times Computer viruses, worms set costly Internet record. According to security experts mi2g, virus activity caused as much as $83 billion in economic damage in February. Numerous variants of MyDoom/Doomjuice and NetSky caused havoc over the wires. Source: Washington Times, March 1, 2004 Computer Security Security Incidents Slide15:  July 19, 2001 – July 20, 2001 340,000+ devices infected in less than 14 hours Computer Security Code Red Slide16:  Rate of Spread of viruses continues to grow January 25, 2003 90%+ of vulnerable hosts were infected within 10 minutes Computer Security SQL Slammer Slide17:  Computer Security Mean Time to Exploit Decreasing Chart Courtesy: P. Elias Slide18:  Computer Security Economy Connected to Internet Disruption to electronic trade will have a crippling effect on the global economy Slide19:  Computer Security Financial Losses In 2003, there was $141,496,560 in losses #1 Viruses losses: $55,053,900 #2 Denial of Service losses: $26,064,050 Slide20:  Technology has made many of our essential services (utilities, banking, transportation, etc.) enormously more productive and reliable. Virtually every critical service (such as electrical power grids, phone systems, air traffic control, water and sewer service, and medical services) is dependent on computers. U.S. analysts believe that by disabling or taking command of the floodgates in a dam, or for example, of substations handling 300,000 volts of electric power, an intruder could use virtual tools to destroy real-world lives & property. Computer Security Critical Infrastructure Source: Washington Post, June 27, 2002 Slide21:  April 12, 2004 Associated Press LAX Airport hit by brief blackout. A brief power line failure knocked out electricity to the Los Angeles International Airport (LAX) control tower and disrupted air traffic Monday morning, April 12. Eighty to 100 flights had to hold in the air, circle or stay on the ground at other airports, Federal Aviation Administration spokesperson Donn Walker said. All radar, radios and telephones −− essentially everything that controllers use to communicate with aircraft and other control facilities −− were hit by the outage, Walker said. Source: http://www.usatoday.com/travel/news/2004−04−12−lax−blackout_ x.htm May 5, 2004 Independent.co.uk News Worm crashes Coastguard computers. The Sasser worm, disrupted work at the Marine and Coastguard Agency, forcing staff to use pencil and paper to find ships and locate distress calls on maps. Computer Security Security Incidents (Infrastructure) Slide22:  June 16, 2001 Insight on the News - Investigative Report Hackers attack Sandia computers. Hackers recently penetrated national-security computer systems at Sandia National Nuclear Laboratory in Albuquerque gaining access to classified information relating to nuclear-weapons design. February 4, 2003 ComputerWeekly.com Briton pleads guilty to US nuclear lab hacking attack. London hacker Joseph James McElroy, 18, hacked into 17 computer systems at the Fermi National Accelerator Laboratory near Chicago over a two-week period in June 2002 to store and exchange hundreds of gigabytes worth of computer files with his friends. September 24, 2003 IDG News Service U.S. Immigration system hit by virus. The U.S. Department of State struggled Tuesday to quell an outbreak of the W32.Welchia Internet worm on the department's computer systems. Source: http://www.infoworld.com/article/03/09/24/HNimmigration_1.html Computer Security Security Incidents (Infrastructure) Slide23:  An employees sends about 22.9 messages each day, receives 81 messages per day and gets 19.5 spam messages per day. The number of instant messaging users will grow to 180 million in 2004 (Gartner Report) The world has become globally connected Today each country has connectivity to the Internet Computer Security Life styles depend on Computers 1991 1997 Slide24:  Computer Security Who out of these is a hacker? Slide25:  In past hackers were geniuses with a deep interest in technology. Today hackers can operate with little knowledge network or computers Download code from the Internet Follow recipes Number of potential hackers grows from a few to several million Hackers of tomorrow will be terrorists with deep evil intent. Computer Security Changing profile of the hacker Slide26:  Security issues are escalating out of control Severe financial consequences to these threats Infrastructure vulnerable to cyber threats The social behavior that has adapted to the Internet is under threat Computer Security Conclusions

Related presentations


Other presentations created by Reva

GIS Forest
03. 01. 2008
0 views

GIS Forest

U1introduction
20. 02. 2008
0 views

U1introduction

JENESYS introduction India
09. 10. 2007
0 views

JENESYS introduction India

Ibragimova Nikol CIRET2006 Rome
11. 10. 2007
0 views

Ibragimova Nikol CIRET2006 Rome

sudarshan cargo
15. 10. 2007
0 views

sudarshan cargo

InzhechikBaksan07 1
16. 10. 2007
0 views

InzhechikBaksan07 1

Presentacion retos CAFTA
22. 10. 2007
0 views

Presentacion retos CAFTA

Harth pobreza1aversion
22. 10. 2007
0 views

Harth pobreza1aversion

Wave Erosion and Marine Geology
23. 10. 2007
0 views

Wave Erosion and Marine Geology

7 Meslin
23. 10. 2007
0 views

7 Meslin

polibristol
24. 10. 2007
0 views

polibristol

genetically modified wheat
04. 10. 2007
0 views

genetically modified wheat

NELIGdec2005
02. 11. 2007
0 views

NELIGdec2005

CapitalesCA
25. 10. 2007
0 views

CapitalesCA

lezione 5
15. 10. 2007
0 views

lezione 5

PH10
15. 10. 2007
0 views

PH10

6 oct
23. 10. 2007
0 views

6 oct

A C 10 US CHAPTER
25. 10. 2007
0 views

A C 10 US CHAPTER

1450west
29. 10. 2007
0 views

1450west

chasing responsibly
05. 10. 2007
0 views

chasing responsibly

POCKETConsultTrainin gPowerPoint
08. 10. 2007
0 views

POCKETConsultTrainin gPowerPoint

West Nile Virus Overview CY 03
21. 10. 2007
0 views

West Nile Virus Overview CY 03

THALASSA
22. 10. 2007
0 views

THALASSA

summer seminar
07. 10. 2007
0 views

summer seminar

MTCRbrief19May03 Isby
15. 10. 2007
0 views

MTCRbrief19May03 Isby

THE LINDEN SHOW
23. 11. 2007
0 views

THE LINDEN SHOW

60years EIUDF presentation
28. 12. 2007
0 views

60years EIUDF presentation

NORM What
04. 01. 2008
0 views

NORM What

servicechallenges
24. 10. 2007
0 views

servicechallenges

Booster Basics Presentation
07. 11. 2007
0 views

Booster Basics Presentation

trois conventions
24. 10. 2007
0 views

trois conventions

DNSA overview 11 2005
23. 12. 2007
0 views

DNSA overview 11 2005

Historia projektu EGEE
17. 10. 2007
0 views

Historia projektu EGEE

B822summary
24. 02. 2008
0 views

B822summary

cetraining1
16. 10. 2007
0 views

cetraining1

reference
28. 02. 2008
0 views

reference

potato nutrition presentation
07. 03. 2008
0 views

potato nutrition presentation

Isaac Talk UDC2007 Final
10. 12. 2007
0 views

Isaac Talk UDC2007 Final

IEEE 010417
26. 03. 2008
0 views

IEEE 010417

6b Bedritsky
27. 09. 2007
0 views

6b Bedritsky

korean db overview
30. 03. 2008
0 views

korean db overview

Clouqueur Grover
16. 04. 2008
0 views

Clouqueur Grover

naturalresourceds
17. 04. 2008
0 views

naturalresourceds

VortragJaneliunas
12. 10. 2007
0 views

VortragJaneliunas

ekaw2006 tutorial
21. 10. 2007
0 views

ekaw2006 tutorial

Five Act Play
18. 04. 2008
0 views

Five Act Play

ts erms
22. 04. 2008
0 views

ts erms

Invest in Belgium
16. 03. 2008
0 views

Invest in Belgium

LoagueAETC06
15. 11. 2007
0 views

LoagueAETC06

6Dilut Sec OptionsSu2006
24. 02. 2008
0 views

6Dilut Sec OptionsSu2006

Interconnection Talk for Nigeria
28. 04. 2008
0 views

Interconnection Talk for Nigeria

SC190 Final Project
07. 05. 2008
0 views

SC190 Final Project

Local rad inj HGy
30. 04. 2008
0 views

Local rad inj HGy

esug2006georgheeg
02. 05. 2008
0 views

esug2006georgheeg

Ramirez
02. 05. 2008
0 views

Ramirez

CSRCS
02. 05. 2008
0 views

CSRCS

PES lecture1 history
15. 10. 2007
0 views

PES lecture1 history

Marx slides
19. 02. 2008
0 views

Marx slides

smith slides1
19. 10. 2007
0 views

smith slides1

metzner1
19. 10. 2007
0 views

metzner1

ismd01
11. 10. 2007
0 views

ismd01

sj1
07. 10. 2007
0 views

sj1

DarienResource06
07. 11. 2007
0 views

DarienResource06

IRC Calendarioautunno 2007
12. 03. 2008
0 views

IRC Calendarioautunno 2007

Conferencia Sima06
23. 10. 2007
0 views

Conferencia Sima06

WorldWarI TheGreatWar 000
26. 02. 2008
0 views

WorldWarI TheGreatWar 000

gb aging all
10. 10. 2007
0 views

gb aging all

TurkeyConf pres 905
21. 11. 2007
0 views

TurkeyConf pres 905