UGN Security Forums
My ProfileMember DirectoryLogin
Search our ForumsView our FAQView our Site Rules
View our CalendarView our Active TopicsGo to our Main Page

UGN Security Store
 

Network Sites UGN Security, The GoNix Initiative, Elite Web Gamers, Back of the Web, EveryDay Helper, VNC Web Design & Development
August
Su M Tu W Th F Sa
1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31
Sponsored Links
Latest Postings
Latest Reviews
Topic Options
Rate This Topic
#15771 - 04/25/03 08:49 AM Cyber War (Vulnerabilities)
smarts Offline
Junior Member

Registered: 04/25/03
Posts: 4
Loc: California
How vulnerable are we?

A letter from concerned scientists:

Following the Sept. 11 attacks, a group of concerned scientists sent President Bush this letter, in which they warn, "The critical infrastructure of the United States, including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is highly vulnerable to cyber attack. Fast and resolute mitigating action is needed to avoid national disaster." The scientists advocate that the president respond to the cyber threat by setting up a Cyber Warfare Defense Project modeled on the Manhattan Project.


How real is the threat?

Many authorities on national defense and the Internet are warning that the critical infrastructure of the U.S. -- including electrical power, finance, telecommunications, health care, transportation, water, defense, and the Internet -- is highly vulnerable to cyber attack. How imminent is such a threat? And how prepared are we? Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; Amit Yoran of Symantec; O. Sami Saydjari of Cyber Defense Agency; former FBI security expert Ron Dick; James Lewis of the Center for Strategic and International Studies; John Arquilla of the Naval Postgraduate School; former Deputy Secretary of Defense John Hamre; and Scott Charney of Microsoft.


What's needed to secure cyberspace?

Does the U.S. need a regulatory mechanism to get people to pay attention to cyber security? Would liability laws help? More encryption technology? Or a more robust government/private-sector partnership? Here are views on the measures needed and the challenges involved in improving cybersecurity, drawn from FRONTLINE's interviews with Amit Yoran of Symantec; James Lewis of the Center for Strategic and International Studies; John Arquilla of the Naval Postgraduate School; John Hamre, former deputy secretary of defense; Michael Skroch of Sandia National Laboratories; O. Sami Saydjari of Cyber Defense Agency; Scott Charney, chief security strategist at Microsoft; and Richard Clarke, former White House adviser on cyberspace security.


What are Al Qaeda's capabilities?

Over the past year, investigators have accumulated intelligence about Al Qaeda's interests and skills in using cyberspace to launch an attack. Many experts believe terrorists could likely combine such a cyber-based disruption with a real-world physical attack to amplify the impact. Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; John Arquilla of the Naval Postgraduate School; James Lewis of the Center for Strategic and International Studies; John Hamre, former deputy secretary of defense; Michael Skroch of Sandia National Laboratories; Ron Dick, former FBI security expert; and a hacker who spoke on condition of anonymity.


Vulnerabilities: The power grid?

In a potential cyber attack on the U.S., there are experts who believe one of the targets could be the country's electric power grid. By exploiting vulnerabilities in the control systems utility companies use to remotely monitor and manage their operations, U.S. cities could be blacked out for extended periods of time. Here are excerpts from interviews with Richard Clarke, former White House adviser on cyberspace security; O. Sami Saydjari of Cyber Defense Agency; Ron Dick, former FBI security expert; James Lewis of the Center for Strategic and International Studies; Michael Skroch of Sandia National Laboratories; John Arquilla of the Naval Postgraduate School; and John Hamre, former deputy secretary of defense.


Vulnerabilities: SCATA systems?

Digital control systems, such as SCADA systems, supervise and control real-world structures like gas pipelines, oil refineries, and power grids -- and they can be manipulated remotely. That, says experts, makes them a potential prime target for terrorist groups who could get inside these systems and inflict physical damage on the nation's infrastructure. Is the clock ticking on this kind of cyber-based threat? Here are excerpts from interviews with Tom Longstaff of the CERT Research Center; James Lewis of the Center for Strategic and International Studies; Joe Weiss of KEMA Consulting; Amit Yoran of Symantec; Michael Skroch of Sandia National Laboratories; and a hacker.


Vulnerabilities: Software?

Some of the most recent worms that have affected computers worldwide took advantage of software vulnerabilities that were previously known to manufacturers. There's also the problem of known vulnerabilities in the software used in SCADA systems. Although many companies maintain that they are doing their best to prevent and self-correct for inadvertent vulnerabilities, critics say the manufacturers should be held more accountable for software security. Here are excerpts from interviews with Amit Yoran of Symantec; John Hamre, former deputy secretary of defense; Richard Clarke, former White House adviser on cyberspace security; Joe Weiss, a security consultant for KEMA Consulting; O. Sami Saydjari of Cyber Defense Agency; Scott Charney, chief security strategist at Microsoft; and a hacker.

Top
Sponsored Links
      
#15772 - 04/25/03 08:28 PM Re: Cyber War (Vulnerabilities)
Rapture Offline
Member

Registered: 04/23/02
Posts: 212
Loc: Redwood
really needed 3 threads for this?

Top
#15773 - 04/25/03 08:44 PM Re: Cyber War (Vulnerabilities)
Infinite Offline



Registered: 03/09/02
Posts: 1041
Loc: Canada eh
/me nods in agreement at rapture

Top
#15774 - 04/26/03 07:48 AM Re: Cyber War (Vulnerabilities)
smarts Offline
Junior Member

Registered: 04/25/03
Posts: 4
Loc: California
Nice and ORGANISED that way.
Sheesh.

Top
#15775 - 04/26/03 02:09 PM Re: Cyber War (Vulnerabilities)
SilentRage Offline
DollarDNS Owner

Registered: 03/04/02
Posts: 1273
Loc: OH, USA
ja, you don't hear me complaining. I read all 3 long posts, nice postings. Perhaps better fits in the news forum though. That's my only thought.

Where'd you get it? Naming sources is always a good idea.
_________________________
Domain Registration, Hosting, Management
http://www.dollardns.net

Top
#15776 - 04/26/03 08:26 PM Re: Cyber War (Vulnerabilities)
pergesu Offline
UGN Elite Poster

Registered: 03/14/02
Posts: 1136
Loc: Pimpin the Colorizzle
No complaints here. Rapture and Infinite, shut your traps

Top
#15777 - 04/26/03 11:20 PM Re: Cyber War (Vulnerabilities)
dashocker Offline
Member

Registered: 03/05/02
Posts: 524
Loc: Cornfields everywhere...
Hmmm, SR, you read this? Then you would notice it is a FRONTLINE report. Which I believe airs on PBS. Some interesting stuff here, but it's just another scare tactic being used against the American people. I'm really, really scared of Al-Qaeda "owning" my box. Not, I doubt the government is either. Taking out some power vs. blowing up an embassy? Bombs win everytime. Most of the vulnerable systems outlined are not as weak as this report makes them seem. These infrastructure related computers no doubt require very specialized and *expensive* software. It's not as if I can boot up telnet and go about taking down an oil pipeline. Surely
a private individual going in and attempting to purchase some of the same stuff used by AT&T, for example, will get noticed. I'm not saying our nation's valuable computer systems aren't at risk; I just don't like being terrorized by my own countrymen.

Top
#15778 - 04/27/03 12:37 AM Re: Cyber War (Vulnerabilities)
SilentRage Offline
DollarDNS Owner

Registered: 03/04/02
Posts: 1273
Loc: OH, USA
yes, I read it and I don't watch PBS, and I never see FRONTLINE reports. Capish?
_________________________
Domain Registration, Hosting, Management
http://www.dollardns.net

Top
#15779 - 04/28/03 11:03 PM Re: Cyber War (Vulnerabilities)
dashocker Offline
Member

Registered: 03/05/02
Posts: 524
Loc: Cornfields everywhere...
I think you spelled "Capish" wrong...

Top
#15780 - 04/28/03 11:14 PM Re: Cyber War (Vulnerabilities)
pergesu Offline
UGN Elite Poster

Registered: 03/14/02
Posts: 1136
Loc: Pimpin the Colorizzle
Rage spells phonetically. The word he's going for is "capisce," but it's never said right in movies anyway. No more discussion of this crap in this thread, or it gets closed.

>> Rage Insert
"capisce" is the foreign word "coppish" ( http://www.word-detective.com/012000.html#coppish ) comes from. In fact, I searched for the word before I typed it, and the "capish" spelling is commonly used. But I agree with perg, spell checking bullshit should be kept to yourself. Not in reply to an otherwise intelligent discussion. And if anything more is said about spelling, then that post should be deleted - not the whole topic closed. I want to delete dashocker's post, but perg already replied.
<<

Top

Featured Member
Registered: 08/21/13
Posts: 1
Forum Stats
2146 Members
46 Forums
33872 Topics
69039 Posts

Max Online: 1567 @ 04/25/10 10:20 AM
Top Posters
UGN Security 27035
Gremelin 7192
§intå× 3255
SilentRage 1273
Ice 1146
pergesu 1136
Infinite 1041
jonconley 955
Girlie 908
unreal 860
Newest Members
Devo60, ali, lavos, Zanvin Green, Daktologist
2145 Registered Users
Who's Online
0 registered (), 336 Guests and 336 Spiders online.
Key: Admin, Global Mod, Mod
Latest News


Donate
  Get Firefox!
Get FireFox!