Cyber Security in the Three Times: Past, Present & Future
Total Page:16
File Type:pdf, Size:1020Kb
Carnegie Mellon CyLab 4720 FORBES AVENUE CIC BUILDING PITTSBURGH, PA 15213 PH: 412.268.1870 FX: 412.268.7675 www.cylab.cmu.edu Cyber Security in the Three Times: Past, Present & Future CERT 20th Anniversary Seminar Series Pittsburgh, Pennsylvania, 7/22/08 Cyber Security in the Three Times Agenda • Speaker’s Bio • CyLab’s Mission • Global Economy & Cyberspace • Glimpses Into the 21st Century Threat Matrix • Cyber Risks Timeline • Elements of A Holistic Program • Ruminations & Conclusions Richard Power, Carnegie Mellon CyLab 2008 2 Harnessing the Future to Secure the Present Richard Power • CyLab Distinguished Fellow • Director of Global Security Intelligence for Deloitte Touche Tohmatsu (2002-2005) • Editorial Director for Computer Security Institute (1994-2002) • Author of Five Books, Including – Secrets Stolen/Fortunes Lost: Preventing Intellectual Property Theft & Economic Espionage in the 21st Century, (w/ Christopher Burgess) – Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace • Author of War & Peace in Cyberspace, monthly column for Computer Fraud and Security Journal (w/ Dario Forte) Richard Power, Carnegie Mellon CyLab 2008 3 CyLab’s Mission CyLab is … • A bold and visionary effort, which establishes public-private partnerships to develop new technologies for measurable, available, secure, trustworthy, and sustainable computing and communications systems as well as to educate individuals at all levels. • A dynamic matrix, in which great works are accomplished, great minds come together, and great careers are launched. • A vital resource for government and business to draw on in addressing cyber risks that threaten national and economic security. • A world leader in both technological research and the education of information assurance professionals, CyLab harnesses the future to secure the present. Richard Power, Carnegie Mellon CyLab 2008 4 Harnessing the Future to Secure the Present One of the world’s premier centers for Unique comprehensive approach cyber security, dependability and privacy • Multi-disciplinary, university-wide • Largest U.S. university-based cyber – Faculty and researchers from six security research & education program colleges of Carnegie Mellon • Computer Emergency Response Team – 50+ faculty/researchers and (CERT) 130+ graduate students • National Science Foundation (NSF) • Funded by private and public funds CyberTrust Center – Budget of approximately $12M in • Key partner in NSF-funded Center fiscal year 2007 for Team Research in Ubiquitous Secure – Supported by 50 member private Technology companies and government research • National Security Administration (NSA) funds Center of Academic Excellence in • Global educational partnerships & initiatives: Information Assurance Education e.g., Taiwan, India, Portugal, Singapore, Greece, Japan, etc. Richard Power, Carnegie Mellon CyLab 2008 5 6 Benefits of CyLab Partners Program The Four R’s of CyLab Partner Program Benefits -- • Research – Leverage CyLab researchers and facilities for your R&D • Recruitment – Get inside track on hiring CyLab graduates to build your technology team • Reputation – Embellish your image by association with leading research center • Return on Investment – Cost-savings & boost in reputation translate into immediate ROI Richard Power, Carnegie Mellon CyLab 2008 7 The Web of Life “All things are connected like the blood that unites us all. Man did not weave the Web of Life, he is merely a strand in it. Whatever he does to the Web he does to himself.” Chief Seattle,1854 Richard Power, Carnegie Mellon CyLab 2008 8 Growth of the Global Economy Everyone & Everything Everywhere is Connected … 2001: 34 nations sign “Free Trade Americas” pact for massive free-trade zone of 800 million people from Alaska to Argentina. 1999: Euro, a common currency for 11 European nations. “Biggest economic event we’ll see in our lifetime.” 1998: Asian economic crisis impacts the world. 1995: General Agreement on Tariffs and Trade (GATT) signed. 1994: North American Free Trade Agreement (NAFTA) signed. 1992: Treaty on European Union (EU) signed. 1989-1991: Collapse of Soviet Union, German reunification. 9 Growth of Cyberspace Everyone & Everything Everywhere is Connected … • Radio -- 35 Years to Reach 50 Million People • TV -- 15 Years to Reach 50 Million People • WWW – 5 Years to Reach 50 Million People Richard Power, Carnegie Mellon CyLab 2008 10 As They Evolve, They Increasingly Interpenetrate 1980s Global Economy Cyberspace 1990s Global Economy Cyberspace 21st Century Global Economy Cyberspace Secrets Stolen/Fortunes Lost, Synergy Press, 2008 11 In 21st Century, They Occupy Same Space & Share Risk 1980s Global Economy Cyberspace -- Competitors -- Hackers -- Espionage 1990s -- Data Theft Global Economy Cyberspace 21st Century Global Economy Cyberspace --- Hackers -- Competitors Secrets Stolen/Fortunes Lost, -- Data Theft -- Espionage Synergy Press, 2008 12 Yoga of the Three Times In the 8th Century, this teaching was written down by Yeshe Tsogyal, Tibetan yogini and consort of the great sage, Padma Sambhava; it was then “hidden away amidst a cache of precious things” to be read by seekers of the future – • The yoga of the past not being practiced, memory of the past remains latent. • The Future, not being welcomed, isis completelycompletely severedsevered byby thethe mindmind fromfrom thethe present.present. • The Present not being fixable remains in the state of voidness (Tibetan Book of the Great Liberation, Ed. & Trans. by W.Y. Evans-Wentz, Oxford University, 1954) Richard Power, Carnegie Mellon CyLab 2008 13 Glimpses into the 21st Century Threat Matrix On the dark side of cyberspace -- a rapidly expanding spectrum of risks & threats, ever-evolving in sophistication … • Every technological advance for mobile workers offers new opportunities for cyber criminals and industrial spies • Rise of organized crime in Eastern Europe was predicted 14 years ago, and yet, it has grown powerful & pervasive • Not just petty crime, recent headlines highlight attacks on national security, financial markets & power grids • Meanwhile, perennial threats, like the disgruntled or dishonest insider, continue unabated Richard Power, Carnegie Mellon CyLab 2008 14 Glimpses into the 21st Century Threat Matrix A random sampling from 30 days of newspaper headlines underscores the scope of the challenge •Bank: Rogue trader hacked • Former New Jersey system administrator computers (CNN, 1-27-08) gets 30 months in prison for ‘logic bomb’ (SC Magazine 1-9-08) •Hackers darken cities, CIA says • Engineer: I stole IDs from hotel computers (Security Focus, 1-21-08) (Miami Herald, 1-9-08) • China has penetrated key U.S. • Mass hack infects tens of thousands of sites databases (SC Magazine, 1-18-08) (Computerworld, 1-7-08) • Wi-fi users, beware: Hot spots are weak • FAA: Boeing's New 787 May Be Vulnerable to Hacker Attack (Wired, 1-4-08) spots (Wall Street Journal, 1-16-08) • eBay goes far to fight fraud – all the way to • New mass hack strikes sites, confounds Romania (L.A. Times, 12-26-07) researchers (Computerworld, 1-14-08) • Pune woman $12mn cyber theft (DNA, 12-28-07) •Former Cox employee who shut downRichard Power,911 Carneggetsie jail Mellon time CyLab (SC 2008 Magazine, 1-11-08) 15 Glimpses into the 21st Century Threat Matrix Another random sampling from recent newspaper headlines underscores the scope of the challenge •Crimeware server exposes breadth • Rare SCADA vulnerability discovered (SC of data theft (GCN, 5-6-08) Magazine 5-9-08) •Hackers' posts on epilepsy forum • Technology, media firms overconfident, cause migraines, seizures (SMH, 5- unprepared for breaches: Deloitte survey (SC Magazine, 2-7-08) 8-08) • Hackers Focus on VoIP Accounts (WebPro •Hacktivists collect fingerprint of News, 5-12-08) fingerprint collector (Register, 3-30- • Hackers May Have Stolen Millions of Cards 08) (Newsday 5-15-08) •Hackers Hijack a Half-million Sites • Hackers catch ride on Grand Theft Auto IV In Latest Attack (Computerworld, 5-13- downloaders (Computer Weekly, 5-15-08) 08) • Russia’s state hackers target Radio Free Richard Power, Carnegie Mellon CyLab 2008 Europe in Prague (Sunday Herald, 5-10-08) •FBI Worried as DoD Sold 16 C t f it N t ki G (CSO Glimpses into the 21st Century Threat Matrix A random sampling from 30 days of newspaper headlines underscores the scope of the challenge •Spam Blockers Losing Ground on • Former Employee Allegedly Deleted Organ Sophisticated Attackers (6-08) Bank Data (6-26-8) • More Than 630,000 Laptops Lost at Airports •Software Engineer First to be Each Year (6-30-08) Sentenced Under Economic • S.F. officials locked out of computer network Espionage Act (6-18-08) (7-15-08) •Citibank Server Breach Likely • New trojan in the wild targeting multimedia Source of Compromised ATM Cards files (SC Magazine, 7-14-08) (6-18-08) • Hackers break 3G iPhone lock (7-13-08) •Stolen Computer Holds Outsourced • Hackers Steal Millions From 7-Eleven ATM Human Resources Data (6-23-08) (AP, 7-3-08) Richard Power, Carnegie Mellon CyLab 2008 •Marshall Islands hit by 'zombie' 17 attack (6 25 08) Glimpses into the 21st Century Threat Matrix Trends for 2008-2009 (it’s only going to get worse) -- • Increased professionalism and commercialization of malicious activities • Threats tailored for specific regions, Increasing numbers of multi-staged attacks • Attackers targeting victims by first exploiting trusted entities • Convergence of attack methods • Automated evasion process • Advanced Web threats – laundering origins through the Web • Diversification