Return-Path: <sentto-279987-5242-1030201984-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sat, 24 Aug 2002 08:14:07 -0700 (PDT) Received: (qmail 17513 invoked by uid 510); 24 Aug 2002 15:11:20 -0000 Received: from n25.grp.scd.yahoo.com (66.218.66.81) by all.net with SMTP; 24 Aug 2002 15:11:20 -0000 X-eGroups-Return: sentto-279987-5242-1030201984-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.192] by n25.grp.scd.yahoo.com with NNFMP; 24 Aug 2002 15:13:04 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_1_0_1); 24 Aug 2002 15:13:03 -0000 Received: (qmail 39188 invoked from network); 24 Aug 2002 15:13:03 -0000 Received: from unknown (66.218.66.217) by m10.grp.scd.yahoo.com with QMQP; 24 Aug 2002 15:13:03 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 24 Aug 2002 15:13:03 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7OFDJY08531 for iwar@onelist.com; Sat, 24 Aug 2002 08:13:19 -0700 Message-Id: <200208241513.g7OFDJY08531@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sat, 24 Aug 2002 08:13:19 -0700 (PDT) Subject: [iwar] [fc:Cyberterrorism.Scenarios.Scrutinized] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Cyberterrorism Scenarios Scrutinized Date: Friday, 23 August 2002 <a href="http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8816">http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8816> Source: PC World Communications Story: WASHINGTON--At the inaugural SECTOR5 conference that opened in Washington, D.C., Wednesday, the talk of cyberterrorism is talk of an IT doomsday. In it, weapons of mass disruption replace weapons of mass destruction, and instead of a "dirty bomb" filled with radioactive material hitting a city, terrorists pack "logic bombs" in their bag of nasty tricks. Conference officials kicked off the event with a dark scenario involving the New York Stock Exchange and a group of terrorists who gain access to the trading floor data center by taking temporary jobs there as IT employees. In the scenario described, the terrorists plug into open ports in the data center and use accounts issued to them as employees. Doomsday Scenario Their dirty work begins with the release of a fast-spreading worm that takes over all servers associated with the trading floor. This worm penetrates Windows, Linux, and other operating systems in a variety of ways, burrowing into security holes in Web servers, browsers, e-mail, and network applications. To avoid detection it changes its appearance and behavior as it spreads. Anti-virus software is no help, according to the scenario, because the worm travels so quickly and because it exploits previously unknown vulnerabilities--known as zero-day exploits--in various servers. The worm's spread consumes most of the bandwidth on the trading floor network for several minutes, making it appear that a mere temporary surge in bandwidth usage has occurred. Things return to normal when the worm falls dormant on the servers, and systems administrators breathe a sigh of relief. Then the logic bomb is dropped. It initially dupes systems administrators into thinking everything is okay, by allowing them to check the integrity of the data and showing it to be valid. But it destroys the data when they want to use it to restore their systems by overwriting it seven times with alternating ones and zeroes. These events are just the opening act of the simulation, which goes on to employ a variety of techniques including denial of service attacks to bring down servers on the trading floor and elsewhere. The end result is the compromising of millions upon millions of computers worldwide and the effective disabling of the Internet. Jolted to Attention Farfetched? Not in the post-September 11 world, where vendors and government officials participating in SECTOR5 believe terrorists will do anything to make their point. "It sounded like the simulation really got people thinking," said Peggy Weigle, chief executive officer of Sanctum, a software security vendor. "From our experience doing audits or hacking demonstrations, it still amazes people how easy it is to breach systems at the application level or at the system level." Sanctum broke into 98 percent of the 350 large corporate sites it has audited, compromising the security in an average of two hours, Weigle says. Often Sanctum accessed the directory structure containing things like the master file for passwords. In the case of an unnamed airline reservation site, Sanctum accessed back-up files of source code for Web application interfaces. "We did this sitting at a Web browser. People don't believe it until they see it," Weigle said. Charles Sander, vice president and managing principal of Unisys' airports practice, referred to his work on a new security infrastructure for airlines after the PanAm 103 explosion over Lockerbie, Scotland. One of the best tools was that the U.K. government agreed to impose a standard that essentially legislated how airlines handle security, he said. Practical Paranoia Qinetiq is one of several co-sponsors of the SECTOR5 conference, which derives its name from the title Summit Exploring Cyber Terrorism. The company espouses the intrusion management model, which suggests viewing cyberterrorism as inevitable. Consequently, the industry can reallocate its efforts to be more effective and more precise in determining how it might happen, said Michael Corby, president of Qinetiq. But industry wants the government to guide minimum security standards for all companies, Corby said. The U.S. government alone is expected to spend billions of dollars on IT once the new Department of Homeland Security is in place. But Corby said it will be at least six months after that before vendors know what standards they will be expected to follow in their products. Many in the SECTOR5 audience of about 300 government and private sector IT professionals, as well as vendors, appeared to support a government plan for security certification. It would be similar to a recent Congressional act requiring chief executive officers and chief financial officers to certify under legal penalty that financial results are accurate. The audience broke into applause at the certification suggestion. Some attendees also saw significance in the participation by representatives of the three U.S. government agencies slated to be part of the new Department of Homeland Security. They are the National Infrastructure Protection Center, the Critical Infrastructure Assurance Office, and the Secret Service. "You are going to see a lot more coordinated effort among the CIAO, NIPC, and the Secret Service," said John M. Frazzini, special agent in the secret service. The result will be "a lot more synergy and a more coordinated government approach," he added. Vendors have requested a single contact to deal with the government on critical infrastructure projects, Frazzini said. ------------------------ Yahoo! Groups Sponsor ---------------------~--> 4 DVDs Free +s&p Join Now http://us.click.yahoo.com/pt6YBB/NXiEAA/mG3HAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT