cyber terrorism shawn carpenter computer security analyst sandia national laboratories

13
Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories Supported by the International Borders and Maritime Security Program, Charles Massey, Manager [email protected]

Upload: olwen

Post on 22-Feb-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories. Supported by the International Borders and Maritime Security Program, Charles Massey, Manager [email protected]. What is Cyber Terrorism?. Premeditated, politically motivated attack - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Cyber Terrorism

Shawn CarpenterComputer Security Analyst

Sandia National Laboratories

Supported by the International Borders and Maritime Security Program, Charles Massey, Manager [email protected]

Page 2: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

What is Cyber Terrorism?

• Premeditated, politically motivated attack

• Targets information systems• Results in violence against

noncombatant targets or substantial economic harm

Page 3: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Is the Threat Real?

• Port of Houston – 2001• Queensland, Australia sewage

treatment system – 2000• Arizona’s Roosevelt Dam – 1998

Page 4: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Computer Security IncidentsFrom (US CERT) Computer Emergency Response Team statistics

0

20000

40000

60000

80000

100000

120000

140000

1998 1999 2000 2001 2002 2003

Page 5: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Anatomy of an Attack• Vulnerabilities in software / unprotected network

access points • No vulnerability assessment• Poor awareness of security issues

Queensland, Australia case• Unsecured wireless access points• Accessed using ordinary Commercial Off The Shelf

(COTS) software and hardware

• Poor access control and monitoring• Result:

• Unauthorized control of wastewater/freshwater pumping stations

• Environmental and economic damage

Page 6: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Large Ports Are Attractive Targets

• Potentially high economic impactSignificant impact on ship/port/facilityPossible world trade disruptionPort of Houston impact

• High visibility• Low cost• Low risk• Numerous attack options

Page 7: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Marine Industry

Could this affect your organization?

• Supervisory Control And Data Acquisition (SCADA)• Port logistical software applications• Internet / Communications

Email Antivirus software (Trojans, viruses, worms)Ohio’s Davis-Besse Nuclear Power Plant – 2003

• Wireless communications (war driving)• Modems (war dialing)• Insiders / disgruntled employees

Page 8: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Sampling of 120 Unprotected Wireless Access PointsDiscovered in a Ten Minute Taxi Ride

Page 9: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Consequences

• Electronic intelligence lossAid physical attacksForge credentialsEmergency response plans

• Loss of data integrityChange manifestsRedirect shipments / shipsAffect shipyard logisticsCause delaysImpact inspections status

Page 10: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Port Cactus Scenario• Target - Port Cactus, New Mexico• Reconnaissance

research target – Internetprobe network for vulnerabilities

• Deliver Trojan via email• Compromise other systems via trojaned

system(s), stealthily install backdoors• Capture logon credentials for port logistics

application• Change manifests, inspection records, etc.

as necessary

Page 11: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

1

2

3

4

5

6

1998 1999 2000 2001 2002 2003 2004

% o

f Bud

get

Cyber Security Spending

The Reactionary Approach

NetworkcompromiseNetwork

compromise

Networkcompromise

Page 12: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

The Proactive Approach• There is no silver bullet

Constant vigilance – dedicated personnelNetwork Intrusion DetectionEffective process to quickly patch vulnerabilities Configuration management / firewalls / antivirusIntegrated cyber incident response

• Backup systems / data recovery – no single point of failure

• Regular cyber security policy audits• Formal network vulnerability assessments and

corrective actions – Red Teaming • Robust cyber security program with high-level

support • Employee education / awareness

Page 13: Cyber Terrorism Shawn Carpenter Computer Security Analyst Sandia National Laboratories

Questions?

Shawn CarpenterComputer Security Analyst

Sandia National LaboratoriesAlbuquerque, NM 1-505-228-37621-505-845-7413

[email protected]