cyber security: are we ready?

26
University at Albany, School of Business Center for Information Forensics and Assurance 1 Cyber Security: Cyber Security: Are we Ready? Are we Ready? Sanjay Goel Sanjay Goel University at Albany, School of Business / NYS University at Albany, School of Business / NYS Center for Information Forensics and Assurance Center for Information Forensics and Assurance

Upload: jalene

Post on 15-Jan-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Cyber Security: Are we Ready?. Sanjay Goel University at Albany, School of Business / NYS Center for Information Forensics and Assurance. Introduction. Computer Security Hacking. Every 18 seconds an incident is reported Every third day a new virus is released Reported incidents - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

1

Cyber Security: Cyber Security: Are we Ready?Are we Ready?

Sanjay GoelSanjay Goel

University at Albany, School of Business / NYS University at Albany, School of Business / NYS Center for Information Forensics and AssuranceCenter for Information Forensics and Assurance

Page 2: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

2

Introduction

Page 3: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

3

• Every 18 seconds an incident is reported• Every third day a new virus is released• Reported incidents

2001 - 52,0002002 - 82,0942003 - 137,529

• Identity Theft 2002 - 8.75 billion2003 - 24 billion

Sources: CSI/FBI Report, 03; ISCA Report, 12/03; CERT Report, 2003; Aberdeen Report, 2003

Computer SecurityHacking

2003 Estimated Number of Electronic Crimes or Network, System or Data Intrusions Experienced by Organizations

Average Number of E-crimes or

Intrusions: 136

Page 4: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

4

• Number of reported incidents far lower than actual incidents

• Unreported Incidents

2001 - 4.1 million, 2002 - 7.9 million, 2003 - 15.9 million

Computer SecurityHacking

Average Number of E-crimes or

Intrusions: 136

Page 5: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

5

April 8, 2004 CNET News.com NetSky attacks target file−sharing networks. The main website of file-sharing network eDonkey was knocked offline this week following an attack from NetSky. Earlier this week, the Kazaa and eDonkey sites, as well as three other file-sharing sites, were bracing for a distributed denial−of−service (DDoS) attack expected to be launched by variants of the NetSky worm. NetSky.Q, which first appeared March 29, is designed to attack certain websites that distribute file−sharing clients, as well as sites that distribute hacking and cracking tools. The attack is scheduled to last at least six days. Source: http://news.com.com/2100−1009_3−5187211.html?tag=nefd.top

Computer SecuritySecurity Incidents

Page 6: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

6

May 3, 2004, CNET News.com

Sasser variants pose greater danger. After a slow start, new version of the Sasser worm spread to more than 500,000 computers. The original version of the Sasser worm spread slowly, but Saturday, SasserB infected computer much faster. When two new variants appeared on Monday, the worm spread to hundreds of thousands of systems. The University of Massachusetts at Amherst experienced an outbreak of 1,100 computers compromised with Sasser.

Delta Air Lines also encountered problems in Atlanta with its computers for more than six hours, resulting in delays.

Computer SecuritySecurity Incidents

Page 7: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

7

March 2004, Washington TimesComputer viruses, worms set costly Internet record. According to security experts mi2g, virus activity caused as much as $83 billion in economic damage in February. Numerous variants of MyDoom/Doomjuice and NetSky caused havoc over the wires.Source: Washington Times, March 1, 2004

Computer SecuritySecurity Incidents

Page 8: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

8

April 09, Mobile Pipeline Second Cisco WLAN security threat exposed.

Cisco faced its second serious WLAN security threat last week when a network and security analyst released a tool that attacks the company's proprietary Lightweight Extensible Authentication Protocol (LEAP) wireless authentication system. Wright strongly urged LEAP users to take alternative measures. "Customers using LEAP should be aware that the usernames and password of their user account are exposed, and should plan for the deployment of alternate authentication mechanisms such as PEAP or TTLS," http://www.mobilepipeline.com/news/18900815;jsessionid=3TNL4

Computer SecuritySecurity Incidents

Page 9: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

9

September 22, 2004 Times UnionWorm burrows way into state computers Education Department’s network crippled by powerful software virus. The state Education Department’s vast computer network was hit with what programmers described as a powerful cyber virus on Monday afternoon, temporarily shutting down hundreds of computers, idling scores of workers and putting a scare into the rest of state government.Thanks to the virus, the Education Department’s network “slowed to a crawl,” and a number of computers were completely shut down, says Platt, “People were just unable to get into their computers”

Source: http://www.timesunion.com

Computer SecuritySecurity Incidents

Page 10: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

10

Tuesday July 27, 2004, Associated Press    Reports of hacking from South Korea into

computers in other countries increased from 6,531 in 2002 to 14,063 in 2003, and then to 10,634 in the first half of 2004, the Korea Information Security Agency said in a report. Those statistics were mainly based on reports from other countries.

    Reports of hacking from other countries into South Korean computers grew from 468 in 2002 to 2,301 in 2003 and then showed a huge increase to 17,055 in the first half of this year, the agency said.

Source: LexisNexis

Computer SecuritySecurity Incidents

Page 11: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

11

July 16, 2004, Friday The Korea Herald

    In its initial investigation, the National Intelligence Service said that an anonymous hacking group based in China broke into 211 computers at 10 government organizations, including the National Assembly, the Maritime Police Agency, the Agency for Defense Development and the Korea Atomic Energy Research Institute. Also hit were 67 computers at private companies, universities and media firms.

    In this regard, the Ministry of Information and Communications, among other authorities, can learn a lesson from other countries which have moved far ahead in gearing up for cyber war. Following 9/11, for instance, U.S. President George W. Bush ordered a $1.5 billion increase in spending on computer network security and training an army of workers to thwart any cyber attack that terrorists might launch.

Source: LexisNexis

Computer SecuritySecurity Incidents

Page 12: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

12

October 5, 2004, Tuesday International Herald Tribune

    North Korea's military has trained more than 500 cyberwarriors, whose mission is to hack into South Korean, Japanese and U.S. networks to gather intelligence or to attack computer systems, the South Korean Ministry of National Defense said Monday.

The intelligence came in a report presented to the National Assembly's Defense Committee. The military hackers are apparently recruited from among those who have received specialized computer training at universities. The ministry said it believed that the North's capability was on a level with that of technologically advanced countries.

Source: LexisNexis

Computer SecuritySecurity Incidents

Page 13: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

13

August 31, 2004, Tuesday Asia Pulse

    The number of South Korean Web sites reported to have been attacked in August by overseas-based hackers rose for the third straight month, sounding alarm bells for the country's cyber security, the government said Tuesday.

   In August, overseas hackers attacked 287 Web sites in South Korea, up from 262 in July and 172 in June, the Ministry of Information and Communication said in a statement.

    On Aug. 11, about 70 domestic Web sites were attacked by a group of Brazilian hackers. The same group also attacked 120 computers on Aug. 15 and 40 others on Aug. 16, the ministry said.

    Seven computer servers were crippled by an Indonesian hacker group called "neotector," it added.

    South Korea boasts one of the world's highest broadband Internet penetration rates with more than 11 million people connected to the always-on, high-speed Internet.

    Although South Korea has the most advanced Internet network, the country has lagged behind the United States and other industrial nations in cyber security, analysts said

Source: LexisNexis

Computer SecuritySecurity Incidents

Page 14: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

14

March 2004, Washington TimesComputer viruses, worms set costly Internet record. According to security experts mi2g, virus activity caused as much as $83 billion in economic damage in February. Numerous variants of MyDoom/Doomjuice and NetSky caused havoc over the wires.Source: Washington Times, March 1, 2004

Computer SecuritySecurity Incidents

Page 15: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

15

• July 19, 2001 – July 20, 2001– 340,000+ devices infected in less than 14 hours

Computer SecurityCode Red

Page 16: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

16

• Rate of Spread of viruses continues to grow– January 25, 2003– 90%+ of vulnerable hosts were infected within 10 minutes

Computer SecuritySQL Slammer

Page 17: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

17

Computer SecurityMean Time to Exploit Decreasing

Chart Courtesy: P. Elias

180 Days

120 Days

42 Days

21 Days

7 Days 2 Days

Slammer Nimda Slapper Blaster(RPC)

MS03-039(RPCSS)

MS03-0??

Page 18: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

18

Computer SecurityEconomy Connected to Internet

Worldwide B2B e-Commerce Projections 1999-2005

0

2000

4000

6000

8000

10000

1999 2000 2001 2002 2003 2004 2005

Year

B2B

e-C

omm

erce

Pro

ject

ions

(in

billi

ons)

North America EuropeAsia Rest of WorldWorld Total

Disruption to electronic trade will have a crippling effect on the global economy

Page 19: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

19

Computer SecurityFinancial Losses

• In 2003, there was $141,496,560 in losses – #1 Viruses losses: $55,053,900 – #2 Denial of Service losses: $26,064,050

Page 20: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

20

• Technology has made many of our essential services (utilities, banking, transportation, etc.) enormously more productive and reliable.

• Virtually every critical service (such as electrical power grids, phone systems, air traffic control, water and sewer service, and medical services) is dependent on computers.

• U.S. analysts believe that by disabling or taking command of the floodgates in a dam, or for example, of substations handling 300,000 volts of electric power, an intruder could use virtual tools to destroy real-world lives & property.

Computer SecurityCritical Infrastructure

Source: Washington Post, June 27, 2002

Page 21: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

21

April 12, 2004 Associated PressLAX Airport hit by brief blackout. A brief power line failure knocked out electricity to the Los Angeles International Airport (LAX) control tower and disrupted air traffic Monday morning, April 12. Eighty to 100 flights had to hold in the air, circle or stay on the ground at other airports, Federal Aviation Administration spokesperson Donn Walker said.

All radar, radios and telephones −− essentially everything that controllers use to communicate with aircraft and other control facilities −− were hit by the outage, Walker said. Source: http://www.usatoday.com/travel/news/2004−04−12−lax−blackout_ x.htm

May 5, 2004 Independent.co.uk News Worm crashes Coastguard computers. The Sasser worm, disrupted work at the Marine and Coastguard Agency, forcing staff to use pencil and paper to find ships and locate distress calls on maps.

Computer SecuritySecurity Incidents (Infrastructure)

Page 22: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

22

June 16, 2001 Insight on the News - Investigative Report Hackers attack Sandia computers. Hackers recently penetrated national-security computer systems at Sandia National Nuclear Laboratory in Albuquerque gaining access to classified information relating to nuclear-weapons design.

February 4, 2003 ComputerWeekly.comBriton pleads guilty to US nuclear lab hacking attack. London hacker Joseph James McElroy, 18, hacked into 17 computer systems at the Fermi National Accelerator Laboratory near Chicago over a two-week period in June 2002 to store and exchange hundreds of gigabytes worth of computer files with his friends.

September 24, 2003 IDG News ServiceU.S. Immigration system hit by virus. The U.S. Department of State struggled Tuesday to quell an outbreak of the W32.Welchia Internet worm on the department's computer systems.Source: http://www.infoworld.com/article/03/09/24/HNimmigration_1.html

Computer SecuritySecurity Incidents (Infrastructure)

Page 23: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

23

• An employees sends about 22.9 messages each day, receives 81 messages per day and gets 19.5 spam messages per day.

• The number of instant messaging users will grow to 180 million in 2004 (Gartner Report)

• The world has become globally connected– Today each country has connectivity to the Internet

Computer SecurityLife styles depend on Computers

1991 1997

Page 24: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

24

Computer SecurityWho out of these is a hacker?

Page 25: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

25

• In past hackers were geniuses with a deep interest in technology.• Today hackers can operate with little knowledge network or computers

– Download code from the Internet

– Follow recipes• Number of potential

hackers grows from a few to several million

• Hackers of tomorrow will be terrorists with deep evil intent.

Computer SecurityChanging profile of the hacker

Page 26: Cyber Security:  Are we Ready?

University at Albany, School of BusinessCenter for Information Forensics and Assurance

26

• Security issues are escalating out of control

• Severe financial consequences to these threats

• Infrastructure vulnerable to cyber threats

• The social behavior that has adapted to the Internet is under threat

Computer SecurityConclusions