u.s. national cybersecurity

52
U.S. National Cybersecurity September 30th, 2004 U.S. National U.S. National Cybersecurity Cybersecurity William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Fall 2004 Stanford University

Upload: braith

Post on 14-Jan-2016

34 views

Category:

Documents


0 download

DESCRIPTION

U.S. National Cybersecurity. William J. Perry Martin Casado • Keith Coleman • Dan Wendlandt MS&E 91SI Fall 2004 Stanford University. Why are we talking about cybersecurity?. Case 1: Internet Under Siege. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

U.S. National U.S. National CybersecurityCybersecurity

William J. PerryMartin Casado • Keith Coleman • Dan Wendlandt

MS&E 91SIFall 2004

Stanford University

Page 2: U.S. National Cybersecurity

Why are we talking about cybersecurity?

Page 3: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Case 1: Internet Under Siege

• February 7 - 9, 2000Yahoo!, Amazon, Buy.com, CNN.com, eBay, E*Trade, ZDNet websites hit with massive DOS

• Attacks received the attention of president Clinton and Attorney General Janet Reno.

• “A 15-year-old kid could launch these attacks, it

doesn’t take a great deal of sophistication to do” – Ron Dick, Director NIPC, February 9

• U.S. Federal Bureau of Investigation (FBI) officials have estimated the attacks caused $1.7 billion in damage

* The Yankee Group, 2000

Page 4: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Case 2: Slammer Worm

• January 2003Infects 90% of vulnerable computers within 10 minutes

• Effect of the Worm- Interference with elections- Cancelled airline flights- 911 emergency systems affected in Seattle- 13,000 Bank of America ATMs failed

• No malicious payload!• Estimated ~$1 Billion in productivity loss

Page 5: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Case 3: WorldCom

• July 2002WorldCom declares bankruptcy

• ProblemWorldCom carries 13% - 50% of global internet traffic. About 40% of Internet traffic uses WorldCom’s network at some point

• October 2002Outage affecting only 20% of WorldCom users snarls traffic around the globe

• Congressional HearingsCongress considers, but rejects, extension of FCC regulatory powers to prevent WorldCom shutdown

Vulnerabilities are not just technical

Page 6: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Case 4: September 11

• Wireless Tower on Top of Trade Center Destroyed

• AT&T has record call volumes

• “Flash” usage severely limits availability

• Rescue efforts hampered

Physical Vulnerability!

Legitimate Usage!

Page 7: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Case 5: It’s a Jungle Out There

• The Internet is highly, globally connected

• Viruses/worms are legion on the Internet and continue to scan for vulnerable hosts

• Hackers scan looking for easy targets to attack With Live Demo!

Page 8: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What’s really going on here

Page 9: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Increasing Dependence

We are increasingly dependent on the Internet:

Directly– Communication (Email, IM, VoIP)– Commerce (business, banking, e-commerce, etc)– Control systems (public utilities, etc)– Information and entertainment– Sensitive data stored on the Internet

Indirectly– Biz, Edu, Gov have permanently replaced

physical/manual processes with Internet-based processes

* Based on slides by David Alderson, CalTech

Page 10: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Security Not A Priority

Other design priorities often trump security:

Cost

Speed

Convenience

Open Architecture

Backwards Compatibility

Page 11: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Cybersecurity Roadblocks

• No metrics to measure (in)security

• Internet is inherently international

• Private sector owns most of the infrastructure

• “Cybersecurity Gap”: a cost/incentive disconnect?– Businesses will pay to meet business imperatives– Who’s going to pay to meet national security imperatives?

Page 12: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

An Achilles Heel?

This level of dependence makes the Internet a target for asymmetric attack

Cyberwarfare

Cyberterrorism

Cyberhooliganism*

and a weak spot for accidents and failures

* Coined by Bruce Schneier, Counterpane

Page 13: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

The Challenge

A solution to this problem will require both the right technology and the right public policy.

This is the cybersecurity challenge.

Page 14: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What is “cybersecurity?”

Page 15: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

According to the U.S. Dept of Commerce:

n. cybersecurity:

Some Definitions

n. information security: The protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional.

See “information security”

Page 16: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Some Definitions

According to H.R. 4246 “Cyber Security Information Act”:

cybersecurity: “The vulnerability of any computing system, software program, or critical infrastructure to, or their ability to resist, intentional interference, compromise, or incapacitation through the misuse of, or by unauthorized means of, the Internet, public or private telecommunications systems or other similar conduct that violates Federal, State, or international law, that harms interstate commerce of the United States, or that threatens public health or safety.”

Page 17: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Some Definitions

According to S. 1901 “Cybersecurity Research and Education Act of 2002”:

cybersecurity: “information assurance, including scientific, technical, management, or any other relevant disciplines required to ensure computer and network security, including, but not limited to, a discipline related to the following functions:

(A) Secure System and network administration and operations.

(B) Systems security engineering.

(C) Information assurance systems and product acquisition.

(D) Cryptography.

(E) Threat and vulnerability assessment, including risk management.

(F) Web security.

(G) Operations of computer emergency response teams.

(H) Cybersecurity training, education, and management.

(I) Computer forensics.

(J) Defensive information operations.

Page 18: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Some Definitions

According to S. 1900 “Cyberterrorism Preparedness Act of 2002 ”:

cybersecurity: “information assurance, including information security, information technology disaster recovery, and information privacy.”

Page 19: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of cyberspace

Page 20: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of cyberspace

information systems and networks

Page 21: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks

Page 22: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks

+ with the goal of protecting operations and assets

Page 23: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks with the goal of protecting operations and assets

Page 24: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks with the goal of protecting operations and assets

security in the face of attacks, accidents and failures

Page 25: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks in the face of attacks, accidents and failures with the goal of protecting operations and assets

Page 26: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = security of information systems and networks in the face of attacks, accidents and failures with the goal of protecting operations and assets

availability, integrity and secrecy

Page 27: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

One way to think about it

cybersecurity = availability, integrity and secrecy of information systems and networks in the face of attacks, accidents and failures with the goal of protecting operations and assets

(Still a work in progress.)

Page 28: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

In Context

corporate cybersecurity = availability, integrity and secrecy of information systems and networks in the face of attacks, accidents and failures with the goal of protecting a corporation’s operations and assets

national cybersecurity = availability, integrity and secrecy of the information systems and networks in the face of attacks, accidents and failures with the goal of protecting a nation’s operations and assets

Page 29: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Cybersecurity as a Discipline

How to achieve cybersecurity “success”?

How to overcome the cybersecurity problem?

Must understand four factors that play into the cybersecurity equation:

– Technology– Economics (of stakeholders and incentives)– Social Influences (e.g. Big Brother fears) – Public Policy

Page 30: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What This Class is All About

Page 31: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Goal of the Class

- Build a foundation of knowledge

- Explore salient advanced topics

- Prepare students to critically analyze interdisciplinary questions relating to the cybersecurity challenge  

Page 32: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Cybersecurity Questions

• How vulnerable is the United States to a cyberattack? Are we heading for an “electronic pearl harbor”?

• What areas of vulnerability require the greatest attention in order to improve our national cybersecurity?

• With what parties must the government work in order to make significant cybersecurity improvements?

• Are market forces sufficient to provide for US national cybersecurity? Should the government get involved to change these forces, and if so, how?

Page 33: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Cybersecurity Questions

• Is the Internet an appropriate platform upon which to operate infrastructure systems critical to US economic or government operation? 

• What characteristics would we want in an “Ideal Internet”?

• Can the current Internet evolve into a network with significantly improved security guarantees or will another system need to created?

• Does greater Internet security necessarily entail decreased online privacy?

Page 34: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

How We Will Get There

Use intro lectures provide a technical and policy foundation.

Develop a framework within which to think about and discussion cybersecurity.

Learn from expert guest lecturers and weekly readings that provide in-depth perspectives on advanced topics.

Challenge classmates, student leaders, and expert guests during in-class discussions and activities.

Page 35: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Our Evaluation

The Cybersecurity Legislative Debate

1) Write a well-reasoned analysis a piece of cybersecurity legislation and provide a voting recommendation.

2) In groups, create an in-class presentation backing a single position on one of the bills. You will debate an opposing group and your will defend your stance against questioning from the rival group and the class at large.

3) Both the class and a panel of celebrity judges will vote on the winner of each debate.

Page 36: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Schedule & SyllabusSept. 30 Introduction: The Cybersecurity Challenge     Oct. 5 (Tues.) Tech Breakout I: Internet Basics    

Oct. 7 How To Think About Cybersecurity   

Oct. 12 (Tues.) Tech Breakout II: Viruses, Worms, Firewalls and CryptoGuest Speaker: Tal Garfinkel, Computer Science     

Oct. 14 An Industry PerspectiveGuest Speaker: TBA     

Oct. 21 Cybersecurity Policy    

Oct. 28 Cybersecurity and LawGuest Speaker: Jennifer Granick, Stanford Law School  

   Nov. 4 Security Metrics and Risk Management

Guest Speaker: Kevin Soo Hoo, Sygate    

Nov. 11 Assessing the Threat Guest Speaker: Peter Neumann, SRI     

Nov. 18 What Do We Want in a Future Information Infrastructure?Guest Speaker: David Alderson, CalTech     

Nov. 22 Liability, Negligence and Cyber-InsuranceGuest Speaker: Erin Kenneally, San Diego Supercomputing Center

    Dec. 2 Legislative Debate

Page 37: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What You Will Come Away With

• Working knowledge of how the Internet infrastructure operates and who the major cybersecurity policy actors are.

• Frameworks within which to understand and analyze cybersecurity issues.

• Knowledge about current salient and interdisciplinary topics in cybersecurity.

• Connections and resources to help you in continue to explore cybersecurity.

Page 38: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What This Class is Not

• This class is not…

– “How the Internet works” • Take CS244A Networks, or CS193i Internet

Systems– “How to hack”

• Take CS155 Computer Security– “Cryptography and privacy”

• Take CS255 Intro to Cryptography– “File sharing and music piracy”

Page 39: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What This Class Is

• This class is…– A look at the bigger picture– A chance to consider all the factors that play

into cybersecurity• Technology• Public Policy• Economics• Social Issues

Page 40: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Course Logistics

Page 41: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Basics

• Course website will have latest readings & updates:

http://msande91si.stanford.edu

• 2 units, S/NC

• No prerequisites

• Location: TBD

Page 42: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Course Format

Class Format:

• Pre-class readings and discussion questions posted to class forum.

• Lecture and Q&A with expert guest speaker

• Discussion or other in-class activity for more in depth exploration of the week’s topic.

Page 43: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Course Reading Materials

Two Main Texts:

Critical Information Infrastructure Protection and the Law

and

Cybersecurity: Today and Tomorrow

(both are available free online or can be ordered in paperback)

Other readings posted on course website

Page 44: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Grading & Expectations

Our expectations are simple:• Do all readings and pre-class discussion

questions.• Significant in-class participation• Completion of final legislative debate

project.

This should be fun!

Page 45: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Enrollment

• Limited to 20 students

• Student Info Questionnaire

• Looking to audit? Talk to us after class.

Page 46: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Further Cybersecurity Opportunities

Discussion Forum:Meets weekly during quarters when this class is not offered.

Library & Resources: http://cybersecurity.stanford.edu

Security in the News:http://news.ists.dartmouth.edu/

Page 47: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Contact

• Website & Email– Website: http://msande91si.stanford.edu – Instructors: [email protected]

• Office Hours– By request (send email)– Individual questions after class

Page 48: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Thank You

Page 49: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Unused Slides

Page 50: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

What is “infrastructure?”

Page 51: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

The Internet is Hard to Secure

• Extreme complexity, minimal understanding

• High global connectivity

• Weak attribution (who’s doing what?)

• Hard to tell malicious uses from legitimate ones

Page 52: U.S. National Cybersecurity

U.S. National Cybersecurity September 30th, 2004

Some Definitions

According to S.I. 1901 “Cybersecurity Research and Education Act of 2002”:

“The term cybersecurity infrastructure includes--(A) equipment that is integral to research and education capabilities in

cybersecurity, including, but not limited to--(i) encryption devices;(ii) network switches;(iii) routers;(iv) firewalls;(v) wireless networking gear;(vi) protocol analyzers;(vii) file servers;(viii) workstations;(ix) biometric tools; and(x) computers; and

(B) technology support staff (including graduate students) that is integral to research and education capabilities in cybersecurity.”