compsec — network security and disaster survival

1
The keynote agenda for Compsec 2002 reflects the newly transformed security landscape with the compounding dam- age from 11 September and the menac- ing threat of cyberwar. Cyberwar Brian Jenkins, senior advisor to the presi- dent of the RAND Corporation and advi- sor to the International Chamber of Commerce, is one of the top five terrorist analysts in the world. Jenkins delivers a chilling keynote on the current threat of international terrorism. To start Brian Jenkins tackles the big question — can we expect calculated and catastrophic cyber- terrorism? We have heard speculation about cyber-attacks and witnessed violent variations in network traffic but nothing that can be classified as cyberwar. Jenkins says that what worries him the most is a combined attack involving a physical strike with a coordinated cyber-attack. He indicated the three-way multi-dimension- al attack that ran simultaneously with 11 September. Corporations and govern- ment departments were facing Anthrax scares, Code Red and the back- lash from 11 September all at once. Jenkins told Network Security that “We now know that the anthrax scare and the Code Red virus were unrelated to 11 September but this leaves us with the worry that such a combination of different attack strategies could pose a significant threat”. Jenkins believes that “Al-Quaeda were not fully aware of the cascading eco- nomic effects that the 11 September attacks would have”. He asserts that “their intentions were to bring down tall buildings, strike the symbol of the US military — the Pentagon and kill as many civilians as possible”. He is wor- ried that after terrorists have observed the economic standstill that 11 September caused with catastrophic financial loss they may rethink and aim to launch economic warfare in the future. Jenkins also asserts that it is not advisable to defend based on vulnerabil- ity intelligence alone as “vulnerabilities are infinite in modern society. We are greatly concerned, some vulnerabilities exist but not as many as people think. The notion of a hacker on a laptop in Pakistan bringing down a power grid in the midwestern US or Northern England is pretty far fetched. The sys- tems are a lot more robust than that.” Disaster survival Alan Brill from Kroll Consulting explains first hand who coped through the twin towers disaster and who didn't in his keynote. One business type that emerged with particular difficulties was law firms as many of their transactions are paper-based. He recounts scenes that haunt his memory such as trees outside the building covered in paper transac- tions. Every company located in the twin towers discovered whether their disaster recovery plan worked or didn't. Simple basic practical trivialities emerged as critical in the disaster. Typical examples witnessed by Brill include: Companies designed excellent action plans but these were so confiden- tial that they did not leave the office. So when the building went down, the most vital document to help the business sur- vive became dust in the attack. Brill advises the conversion of the document to an encrypted PDF file and transfer to a credit-card sized CD-ROM for accessi- bility and mobility. All key employees could have the copy on their person; any CD-reader then becomes all the redun- dancy equipment you need. Another example occurred when companies relied on contractual back-ups. The con- tracts dictated that in order to activate back-up plans, an emergency phone call was required that instigated upfront charges. Many employees outside the Twin Tower buildings were gazing at their burning offices but couldn’t make the call to the disaster recovery contrac- tors because they didn’t have the author- ity to initiate such charges. Policing across borders Willy Bruggeman, Deputy Director of Europol, the intelligence agency of the EU member states, believes there are “ pending needs for enhanced technical cooperation across Europe” and he indi- cates that there are planned initiatives to ensure maximum synergy in suppressing organized crime. One new such proposi- tion is the integration of all national law enforcement technical systems, e.g. national crime squad, from each member state under one umbrella. Bruggeman says that Europol is faced with critical problems such as using the Internet for sending sensitive informa- tion. He calls for common technical stan- dards and common protective systems for all member states at a European level. The future Marcus Ranum, a true visionary predicts the future of network security in his keynote. According to Ranum “building reliable systems translates to building simpler solutions.” In the next 10 year we will see the death of general computing,” said Ranum. There will be a driving move to appliances. Users will buy N point ter- minals and rent software when they need it. The X Box initiative by Microsoft to offset the Sony playstation is a key indica- tion of this move. According to Ranum, “Palladium is an unfortunate mistake”, it is a movement in the right direction but will not be the answer to security. Currently examples of Ranum’s theory can be seen in the online environment. For example, users pay for AOL’s services on a Windows machine. http://www.compsec2002.com compsec 2002 6 Compsec — Network Security and Disaster Survival

Post on 05-Jul-2016

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Compsec — Network Security and Disaster Survival

The keynote agenda for Compsec 2002reflects the newly transformed securitylandscape with the compounding dam-age from 11 September and the menac-ing threat of cyberwar.

CyberwarBrian Jenkins, senior advisor to the presi-dent of the RAND Corporation and advi-sor to the International Chamber ofCommerce, is one of the top five terroristanalysts in the world. Jenkins delivers achilling keynote on the current threat ofinternational terrorism. To start BrianJenkins tackles the big question — can weexpect calculated and catastrophic cyber-terrorism? We have heard speculationabout cyber-attacks and witnessed violentvariations in network traffic but nothingthat can be classified as cyberwar. Jenkinssays that what worries him the most is acombined attack involving a physicalstrike with a coordinated cyber-attack. Heindicated the three-way multi-dimension-al attack that ran simultaneously with 11September. Corporations and govern-ment departments were facing Anthrax scares, Code Red and the back-lash from 11 September all at once.Jenkins told Network Security that “We now know that the anthrax scare andthe Code Red virus were unrelated to 11 September but this leaves us with the worry that such a combination of different attack strategies could pose a significant threat”.

Jenkins believes that “Al-Quaeda werenot fully aware of the cascading eco-nomic effects that the 11 Septemberattacks would have”. He asserts that“their intentions were to bring downtall buildings, strike the symbol of theUS military — the Pentagon and kill asmany civilians as possible”. He is wor-ried that after terrorists have observed

the economic standstill that 11September caused with catastrophicfinancial loss they may rethink and aimto launch economic warfare in thefuture. Jenkins also asserts that it is notadvisable to defend based on vulnerabil-ity intelligence alone as “vulnerabilitiesare infinite in modern society. We aregreatly concerned, some vulnerabilitiesexist but not as many as people think.The notion of a hacker on a laptop inPakistan bringing down a power grid inthe midwestern US or NorthernEngland is pretty far fetched. The sys-tems are a lot more robust than that.”

Disaster survivalAlan Brill from Kroll Consultingexplains first hand who coped throughthe twin towers disaster and who didn'tin his keynote. One business type thatemerged with particular difficulties waslaw firms as many of their transactionsare paper-based. He recounts scenes thathaunt his memory such as trees outsidethe building covered in paper transac-tions. Every company located in thetwin towers discovered whether theirdisaster recovery plan worked or didn't.Simple basic practical trivialitiesemerged as critical in the disaster.Typical examples witnessed by Brillinclude: Companies designed excellentaction plans but these were so confiden-tial that they did not leave the office. Sowhen the building went down, the mostvital document to help the business sur-vive became dust in the attack. Brilladvises the conversion of the documentto an encrypted PDF file and transfer toa credit-card sized CD-ROM for accessi-bility and mobility. All key employeescould have the copy on their person; anyCD-reader then becomes all the redun-dancy equipment you need. Another

example occurred when companiesrelied on contractual back-ups. The con-tracts dictated that in order to activateback-up plans, an emergency phone callwas required that instigated upfrontcharges. Many employees outside theTwin Tower buildings were gazing attheir burning offices but couldn’t makethe call to the disaster recovery contrac-tors because they didn’t have the author-ity to initiate such charges.

Policing across bordersWilly Bruggeman, Deputy Director ofEuropol, the intelligence agency of theEU member states, believes there are “pending needs for enhanced technicalcooperation across Europe” and he indi-cates that there are planned initiatives toensure maximum synergy in suppressingorganized crime. One new such proposi-tion is the integration of all national lawenforcement technical systems, e.g.national crime squad, from each memberstate under one umbrella.

Bruggeman says that Europol is facedwith critical problems such as using theInternet for sending sensitive informa-tion. He calls for common technical stan-dards and common protective systems forall member states at a European level.

The futureMarcus Ranum, a true visionary predictsthe future of network security in hiskeynote. According to Ranum “buildingreliable systems translates to buildingsimpler solutions.” In the next 10 year wewill see the death of general computing,”said Ranum. There will be a driving moveto appliances. Users will buy N point ter-minals and rent software when they needit. The X Box initiative by Microsoft tooffset the Sony playstation is a key indica-tion of this move. According to Ranum,“Palladium is an unfortunate mistake”, itis a movement in the right direction butwill not be the answer to security.Currently examples of Ranum’s theorycan be seen in the online environment.For example, users pay for AOL’s serviceson a Windows machine.http://www.compsec2002.com

compsec 2002

6

Compsec — NetworkSecurity and DisasterSurvival

neseoctprint.qxd 23/10/2002 13:32 Page 6