In our meeting on Cyber Privacy, Ron pointed out that Cyber Espionage was a much more serious problem. Certainly it is a serious problem, as well as Cyber Crime, Hacktivism and War. We can argue if any of these are more important than Privacy.
This presentation by Richard Clark about his book Cyber War, covers the four-headed Cyber monster a called CHEW. We will show Richard Clark's presentation at our meeting and use it to set up our discussions.
Here are seven short YouTube videos which provides some background on the topics covered by Clark. We will show these videos only if time permits.
- Obama issue executive orders to improve Cyber Security
- Action against China
- Cyber Attacks by Iran
- Stuxnet
- Military Cyber Command
- Internet of Things
- Anonymous
Update 1/15/14
Here is a link to the Economist article on Cyberwar.
After watching the morning videos and the informative discussions that followed I got a lot out of the Economist article on Cyberwar. I tried to do some research on "zero-day" vulnerabilities and the term seems to relate not to a particular type of vulnerability but to the start of a time span after a vulnerability is discovered up through when it is patched. To my surprise there is a market wherein a buyer, e.g. company/government, would procure a vulnerability with the intent to exploit it before the originator of the software finds and patches it. There are also "White-hat Hackers, good guys, unless they are really double or triple agents. Fascinating.
ReplyDeleteThe Zero Day market was mentioned in the STUXNET video in the list above. Unfortunately, it was not shown at the meeting. It was very informative and I probably should have shown it.
DeleteA zero-day vulnerability can command a premium price on the black market because it is "fresh". As soon as a zero-day vulnerability is used, the vulnerability has a limited number of days it can be used until it is closed.
When a hacker finds a zero-day vulnerability, he can sell it on the black market or claim a reward from the vulnerable company.
http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/
Here is the Aurora video that Richard Clark mentioned. It shows how a Cyber Attack can blow up a power generator.
ReplyDeletehttp://www.youtube.com/watch?v=rTkXgqK1l9A