9. The Vulnerability Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Notas del editor
1 – On line Webster's dictionary 2 – FBI
According to the book Cyber terrorism: the use of the internet for terrorist purposes – compiled by the council of Europe The continued growing use and access of the internet is leading to this being a breeding ground for the new terrorist, the cyber terrorist The intent of these cyber terrorist is largely a three pronged: ECONOMIC CONFUSION – MEANING TO SHOW THE VULNERABILITY OF STATE AND ORGANIZATION DISCRIMINATION OF OPPONENT – SIMILAR TO THE ABOVE BUT SHOWING THEIR SUPERIORITY TECHNICALLY MONETARY INCOME – SELF EXPLANATORY BUT WILL PROVIDE FUNDS NEEDED FOR FUTURE TERRORIST ENDEAVORS
According to Time magazine article A Brief History of Cybercrime By Randy James Monday, Jun. 01, 2009 Telephone networks were first targets Corporate and academic networks DOS This attack method floods web servers, and networks with requests from many different computers at once. When these servers are flooded with so many requests, they can't process them all and freeze-up, or shut down. This can be a major problem to websites or networks vital to the national security infrastructure Read more: http://www.time.com/time/nation/article/0,8599,1902073,00.html#ixzz1I2klXctq
The Internet encyclopedia, Volume 1 By Hossein Bidgoli In the 1980s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term "cyber terrorism" to refer to the convergence of cyberspace and terrorism Listed modern cyber terrorism - remotely changing pressure in gas lines – explosions fires - computerized bombs remotely detonated using unique numeric patterns if one doesn’t detonate the others detonate simultaneously - Future air traffic attacks – mid air collisions etc
Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy Dorothy E. Denning Georgetown University Collins - potential threats Food manufacturing – increasing chemicals or additives to make food not safe Air Traffic – disrupting navigation systems Remote bombing – placement of bombs to explode simultaneously Utilities disruption – knocking out service FBI Manufacturing – workers would notice increase in ingredients Air traffic – controllers and radar Utilities – alarmed services
5 http://www.directionsmag.com/articles/cyber-terrorism/123840 Probability of occurrence of cyber terrorism - graph The cost Direct Cost Implications Loss of sales during the disruption Staff time, network delays, intermittent access for business users Increased insurance costs due to litigation Loss of intellectual property - research, pricing, etc. Costs of forensics for recovery and litigation Loss of critical communications in time of emergency Indirect Cost Implications Loss of confidence and credibility in our financial systems Tarnished relationships& public image globally Strained business partner relationships - domestic and internationally Loss of future customer revenues for an individual or group of companies Loss of trust in the government and computer
Dan Verton Vice President & Executive Editor www.itsecuritymagazine.com This slide represents the vulnerability of the united states to cyber terrorism and the areas of where attacks could take place. Utilities Banking Government Telco Transportation
1 – On line websters dictionary 2 – FBI
1 – On line websters dictionary 2 – FBI
1 – On line websters dictionary 2 – FBI
1 – On line websters dictionary 2 – FBI
1 – On line websters dictionary 2 – FBI
III. Cyber Security Cyber threats to our national security are broad in nature, from acts of terrorism supported by the use of the Internet, to economic espionage by foreign countries, to sophisticated state- sponsored hackers. Such threats could compromise our national critical infrastructure, from energy, water, telecommunications and transportation systems to financial services. Cyber Threats With regard to the terrorist use of the Internet, terrorists have not used the Internet to launch a full-scale cyber attack. But terrorist sympathizers have used the Internet to hide their communications, attempted denial-of-service attacks, and defaced numerous websites. And while the damage may have been limited, such groups may attack for publicity or impact, and they are becoming more adept at both. The FBI, with our partners in the intelligence community, believes that the threat from the terrorist use of the Internet is a growing terrorist threat area. We speculate they will either train their own recruits or hire outsiders, with an eye toward leveraging physical attacks with use of the internet. The cyber threat is equally significant with regard to counterintelligence intrusions and economic espionage. Today, our adversaries sit within our networks, often unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target both government and corporate networks. They seek our technology and our trade secrets, our intelligence and our intellectual property, even our military weapons and strategies. The FBI is actively pursuing each of these threats. We have cyber squads in each of our 56 field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners, including the Secret Service, which also has strong capabilities in this area. And they teach their counterparts - both at home and abroad - how best to investigate cyber threats. But the FBI cannot do it alone. The National Cyber Investigative Joint Task Force includes 20 law enforcement and intelligence agencies, working side by side to share intelligence and to identify key players and schemes. The goal is to predict and prevent what is on the horizon, and to pursue the enterprises behind these attacks. Last year`s takedown of the Mariposa botnet is but one example of that collaboration. As you may know, Mariposa was an information- stealing botnet - one that infected millions of computers, including major banks and other Fortune 1000 companies. And this case, like so many others, emphasized the need for global cooperation. We look forward to working with Congress as it considers whether it should enact legislation requiring companies to report significant breaches of their network security to the FBI and other law enforcement agencies in real time. Such a requirement would promote coordination between appropriate agencies to investigate intrusions, identify the bad actors, and take actions to prevent further damage.