William J. Perry - PowerPoint PPT Presentation

About This Presentation
Title:

William J. Perry

Description:

U.S. National Cybersecurity William J. Perry Martin Casado Keith Coleman Dan Wendlandt MS&E 91SI Fall 2004 Stanford University Why are we talking about ... – PowerPoint PPT presentation

Number of Views:132
Avg rating:3.0/5.0
Slides: 53
Provided by: KeithC48
Learn more at: http://web.stanford.edu
Category:
Tags: city | perry | tomorrow | william

less

Transcript and Presenter's Notes

Title: William J. Perry


1
U.S. National Cybersecurity
  • William J. Perry
  • Martin Casado Keith Coleman Dan Wendlandt
  • MSE 91SI
  • Fall 2004
  • Stanford University

2
Why are we talking about cybersecurity?
3
Case 1 Internet Under Siege
  • February 7 - 9, 2000Yahoo!, Amazon, Buy.com,
    CNN.com, eBay, ETrade, ZDNet websites hit with
    massive DOS
  • Attacks received the attention of president
    Clinton and Attorney General Janet Reno.
  • A 15-year-old kid could launch these attacks, it
    doesnt take a great deal of sophistication to
    do Ron Dick, Director NIPC, February 9
  • U.S. Federal Bureau of Investigation (FBI)
    officials have estimated the attacks caused 1.7
    billion in damage

The Yankee Group, 2000
4
Case 2 Slammer Worm
  • January 2003Infects 90 of vulnerable computers
    within 10 minutes
  • Effect of the Worm- Interference with
    elections- Cancelled airline flights- 911
    emergency systems affected in Seattle- 13,000
    Bank of America ATMs failed
  • No malicious payload!
  • Estimated 1 Billion in productivity loss

5
Case 3 WorldCom
  • July 2002WorldCom declares bankruptcy
  • ProblemWorldCom carries 13 - 50 of global
    internet traffic. About 40 of Internet traffic
    uses WorldComs network at some point
  • October 2002Outage affecting only 20 of
    WorldCom users snarls traffic around the globe
  • Congressional HearingsCongress considers, but
    rejects, extension of FCC regulatory powers to
    prevent WorldCom shutdown
  • Vulnerabilities are not just technical

6
Case 4 September 11
  • Wireless Tower on Top of Trade Center Destroyed
  • ATT has record call volumes
  • Flash usage severely limits availability
  • Rescue efforts hampered

Physical Vulnerability!
Legitimate Usage!
7
Case 5 Its a Jungle Out There
  • The Internet is highly, globally connected
  • Viruses/worms are legion on the Internet and
    continue to scan for vulnerable hosts
  • Hackers scan looking for easy targets to attack

With Live Demo!
8
Whats really going on here
9
Increasing Dependence
  • We are increasingly dependent on the Internet
  • Directly
  • Communication (Email, IM, VoIP)
  • Commerce (business, banking, e-commerce, etc)
  • Control systems (public utilities, etc)
  • Information and entertainment
  • Sensitive data stored on the Internet
  • Indirectly
  • Biz, Edu, Gov have permanently replaced
    physical/manual processes with Internet-based
    processes

Based on slides by David Alderson, CalTech
10
Security Not A Priority
  • Other design priorities often trump security
  • Cost
  • Speed
  • Convenience
  • Open Architecture
  • Backwards Compatibility

11
Cybersecurity Roadblocks
  • No metrics to measure (in)security
  • Internet is inherently international
  • Private sector owns most of the infrastructure
  • Cybersecurity Gap a cost/incentive disconnect?
  • Businesses will pay to meet business imperatives
  • Whos going to pay to meet national security
    imperatives?

12
An Achilles Heel?
  • This level of dependence makes the Internet a
    target for asymmetric attack
  • Cyberwarfare
  • Cyberterrorism
  • Cyberhooliganism
  • and a weak spot for accidents and failures

Coined by Bruce Schneier, Counterpane
13
The Challenge
  • A solution to this problem will require both the
    right technology and the right public policy.
  • This is the cybersecurity challenge.

14
What is cybersecurity?
15
Some Definitions
See information security
  • According to the U.S. Dept of Commerce
  • n. cybersecurity

n. information security The protection of
information against unauthorized disclosure,
transfer, modification, or destruction, whether
accidental or intentional.
16
Some Definitions
  • According to H.R. 4246 Cyber Security
    Information Act
  • cybersecurity The vulnerability of any
    computing system, software program, or critical
    infrastructure to, or their ability to resist,
    intentional interference, compromise, or
    incapacitation through the misuse of, or by
    unauthorized means of, the Internet, public or
    private telecommunications systems or other
    similar conduct that violates Federal, State, or
    international law, that harms interstate commerce
    of the United States, or that threatens public
    health or safety.

17
Some Definitions
  • According to S. 1901 Cybersecurity Research and
    Education Act of 2002
  • cybersecurity information assurance, including
    scientific, technical, management, or any other
    relevant disciplines required to ensure computer
    and network security, including, but not limited
    to, a discipline related to the following
    functions
  • (A) Secure System and network administration and
    operations.
  • (B) Systems security engineering.
  • (C) Information assurance systems and product
    acquisition.
  • (D) Cryptography.
  • (E) Threat and vulnerability assessment,
    including risk management.
  • (F) Web security.
  • (G) Operations of computer emergency response
    teams.
  • (H) Cybersecurity training, education, and
    management.
  • (I) Computer forensics.
  • (J) Defensive information operations.

18
Some Definitions
  • According to S. 1900 Cyberterrorism Preparedness
    Act of 2002
  • cybersecurity information assurance, including
    information security, information technology
    disaster recovery, and information privacy.

19
One way to think about it
  • cybersecurity security of cyberspace

20
One way to think about it
  • cybersecurity security of cyberspace

information systems and networks
21
One way to think about it
  • cybersecurity security of information systems
    and networks

22
One way to think about it
  • cybersecurity security of information systems
    and networks

with the goal of protecting operations and
assets
23
One way to think about it
  • cybersecurity security of information systems
    and networks with the goal of protecting
    operations and assets

24
One way to think about it
  • cybersecurity security of information systems
    and networks with the goal of protecting
    operations and assets

security in the face of attacks, accidents and
failures
25
One way to think about it
  • cybersecurity security of information systems
    and networks in the face of attacks, accidents
    and failures with the goal of protecting
    operations and assets

26
One way to think about it
  • cybersecurity security of information systems
    and networks in the face of attacks, accidents
    and failures with the goal of protecting
    operations and assets

availability, integrity and secrecy
27
One way to think about it
  • cybersecurity availability, integrity and
    secrecy of information systems and networks in
    the face of attacks, accidents and failures with
    the goal of protecting operations and assets

(Still a work in progress.)
28
In Context
  • corporate cybersecurity availability, integrity
    and secrecy of information systems and networks
    in the face of attacks, accidents and failures
    with the goal of protecting a corporations
    operations and assets
  • national cybersecurity availability, integrity
    and secrecy of the information systems and
    networks in the face of attacks, accidents and
    failures with the goal of protecting a nations
    operations and assets

29
Cybersecurity as a Discipline
  • How to achieve cybersecurity success?
  • How to overcome the cybersecurity problem?
  • Must understand four factors that play into the
    cybersecurity equation
  • Technology
  • Economics (of stakeholders and incentives)
  • Social Influences (e.g. Big Brother fears)
  • Public Policy

30
What This Class is All About
31
Goal of the Class
  • Build a foundation of knowledge
  • Explore salient advanced topics
  • Prepare students to critically analyze
    interdisciplinary questions relating to the
    cybersecurity challenge  

32
Cybersecurity Questions
  • How vulnerable is the United States to a
    cyberattack? Are we heading for an electronic
    pearl harbor?
  • What areas of vulnerability require the greatest
    attention in order to improve our national
    cybersecurity?
  • With what parties must the government work in
    order to make significant cybersecurity
    improvements?
  • Are market forces sufficient to provide for US
    national cybersecurity? Should the government get
    involved to change these forces, and if so, how?

33
Cybersecurity Questions
  • Is the Internet an appropriate platform upon
    which to operate infrastructure systems critical
    to US economic or government operation? 
  • What characteristics would we want in an Ideal
    Internet?
  • Can the current Internet evolve into a network
    with significantly improved security guarantees
    or will another system need to created?
  • Does greater Internet security necessarily entail
    decreased online privacy?

34
How We Will Get There
  • Use intro lectures provide a technical and policy
    foundation.
  • Develop a framework within which to think about
    and discussion cybersecurity.
  • Learn from expert guest lecturers and weekly
    readings that provide in-depth perspectives on
    advanced topics.
  • Challenge classmates, student leaders, and expert
    guests during in-class discussions and activities.

35
Our Evaluation
  • The Cybersecurity Legislative Debate
  • Write a well-reasoned analysis a piece of
    cybersecurity legislation and provide a voting
    recommendation.
  • 2) In groups, create an in-class presentation
    backing a single position on one of the bills.
    You will debate an opposing group and your will
    defend your stance against questioning from the
    rival group and the class at large.
  • 3) Both the class and a panel of celebrity
    judges will vote on the winner of each debate.

36
Schedule Syllabus
  • Sept. 30 Introduction The Cybersecurity
    Challenge
  •    
  • Oct. 5 (Tues.) Tech Breakout I Internet Basics
       
  • Oct. 7 How To Think About Cybersecurity   
  • Oct. 12 (Tues.) Tech Breakout II Viruses, Worms,
    Firewalls and Crypto Guest Speaker Tal
    Garfinkel, Computer Science     
  • Oct. 14 An Industry Perspective Guest Speaker
    TBA     
  • Oct. 21 Cybersecurity Policy    
  • Oct. 28 Cybersecurity and Law Guest Speaker
    Jennifer Granick, Stanford Law School  
  •    
  • Nov. 4 Security Metrics and Risk
    Management Guest Speaker Kevin Soo Hoo,
    Sygate    
  • Nov. 11 Assessing the Threat Guest Speaker
    Peter Neumann, SRI     
  • Nov. 18 What Do We Want in a Future Information
    Infrastructure? Guest Speaker David Alderson,
    CalTech     

37
What You Will Come Away With
  • Working knowledge of how the Internet
    infrastructure operates and who the major
    cybersecurity policy actors are.
  • Frameworks within which to understand and analyze
    cybersecurity issues.
  • Knowledge about current salient and
    interdisciplinary topics in cybersecurity.
  • Connections and resources to help you in continue
    to explore cybersecurity.

38
What This Class is Not
  • This class is not
  • How the Internet works
  • Take CS244A Networks, or CS193i Internet Systems
  • How to hack
  • Take CS155 Computer Security
  • Cryptography and privacy
  • Take CS255 Intro to Cryptography
  • File sharing and music piracy

39
What This Class Is
  • This class is
  • A look at the bigger picture
  • A chance to consider all the factors that play
    into cybersecurity
  • Technology
  • Public Policy
  • Economics
  • Social Issues

40
Course Logistics
41
Basics
  • Course website will have latest readings
    updates
  • http//msande91si.stanford.edu
  • 2 units, S/NC
  • No prerequisites
  • Location TBD

42
Course Format
  • Class Format
  • Pre-class readings and discussion questions
    posted to class forum.
  • Lecture and QA with expert guest speaker
  • Discussion or other in-class activity for more in
    depth exploration of the weeks topic.

43
Course Reading Materials
  • Two Main Texts
  • Critical Information Infrastructure Protection
    and the Law
  • and
  • Cybersecurity Today and Tomorrow
  • (both are available free online or can be ordered
    in paperback)
  • Other readings posted on course website

44
Grading Expectations
  • Our expectations are simple
  • Do all readings and pre-class discussion
    questions.
  • Significant in-class participation
  • Completion of final legislative debate project.
  • This should be fun!

45
Enrollment
  • Limited to 20 students
  • Student Info Questionnaire
  • Looking to audit? Talk to us after class.

46
Further Cybersecurity Opportunities
  • Discussion Forum
  • Meets weekly during quarters when this class is
    not offered.
  • Library Resources
  • http//cybersecurity.stanford.edu
  • Security in the News
  • http//news.ists.dartmouth.edu/

47
Contact
  • Website Email
  • Website http//msande91si.stanford.edu
  • Instructors cybersecurity_at_stanford.edu
  • Office Hours
  • By request (send email)
  • Individual questions after class

48
Thank You
49
Unused Slides
50
What is infrastructure?
51
The Internet is Hard to Secure
  • Extreme complexity, minimal understanding
  • High global connectivity
  • Weak attribution (whos doing what?)
  • Hard to tell malicious uses from legitimate ones

52
Some Definitions
  • According to S.I. 1901 Cybersecurity Research
    and Education Act of 2002
  • The term cybersecurity infrastructure includes--
  • (A) equipment that is integral to research and
    education capabilities in cybersecurity,
    including, but not limited to--
  • (i) encryption devices
  • (ii) network switches
  • (iii) routers
  • (iv) firewalls
  • (v) wireless networking gear
  • (vi) protocol analyzers
  • (vii) file servers
  • (viii) workstations
  • (ix) biometric tools and
  • (x) computers and
  • (B) technology support staff (including graduate
    students) that is integral to research and
    education capabilities in cybersecurity.
Write a Comment
User Comments (0)
About PowerShow.com