210 likes | 221 Views
Learn about computer security incidents and the Unabomber case. Explore job opportunities in computer security and the importance of certifications and degrees. Discover the field of Computer Forensics.
E N D
Final Exam May 15 at 10:30 • Two hour exam • No electronic devices • Open Notes • Primarily Multiple choice with four short answer questions • Not cumulative, but might require knowledge from the beginning of the semester as ideas build on ideas after all.
A Cautionary Tale • Now Two stories not strictly keeping to the idea of computer security
A Cautionary Tale • On November 29, 1979 an Air New Zealand plane crashed into Mount Erebus on the Antarctic Continent • All aboard were killed, 257 persons • The crash was originally attributed to. “pilot error” • A second investigation exposed a more complex possibility
A Cautionary Tale • Aircraft in that period where amoung the first to be computer controlled during most of their flights. • A flight plan was loaded into the planes computer and would guide the plane if needed during cruise. • Pilots could override this flight plan
A Cautionary Tale • The flight was a tourist flight. It was meant to pass close to Mt.Erebus and then proceed to overfly McMurdo Base nearby. • The position of McMurdo base was entered incorrectly, it was over a hundred miles out. • The line of flight of the aircraft, in the flight plan, actually passed through the mountain.
A Cautionary Tale • Amazingly, the airline knew of the keying error in entering the flight plan • The first three flights disengaged the computer and flew around the mountain by hand. • The weather was clear on these three occasions
A Cautionary Tale • On the fourth flight • The crew was not briefed on the flight plan error in the computer • The visibility was poor • What is called in polar conditions, whiteout • The pilot did not disengage the computer • The plane tried to fly throught the mountain
A Cautionary Tale • This remains the only crash where the airlines are willing to admit a computer error, albeit a data entry error. • There are about six other suspect incidents
A Cautionary Tale • From a computer security point of view • The planes computer was not hacked • Aircraft computers are not networked • The error occurred on a company mainframe • Not networked then • Certainly networked now • Consider the result if a true cyberterrorist hacked into the computers currently used for flight planning • McKinnon case show high skill is not always needed
Opportunities • There are many similar opportunities • Computers used for industrial control • Power grids • Refinery control • Nuclear power plant, or even conventional power plants • To date, we have not seen a real cyberterrorist
What does a real terrorist look like? • Ted Kazinski – Unabomber • Was a genius, measured IQ – 162 • Received a PHD in Mathmatics • Became a professor • Dropped out and became a neo-Luddite recluse • Lived in a small cabin in Montana • Had an income of less than 1,000 a year
Unabomber • For over a decade, the Unabomber foiled the FBI and terrified the high tech community • He sent letter and package bombs to University professors and people in what he considered the high tech industry. • One of his trademarks was that his bombs provided no forensic evidence. He was brilliantly skilled in anticipating what might give him away. He even mixed his own explosives
Unabomber • He was finally captured when he insisted his manifesto be published to end the bombings • His brother recognized Ted's writing style and gave that information to the FBI • Again, defeated by ego • Without the publication he would be bombing today
What is a terrorist? • A truly dangerous terrorist (successful) • Has high intelligence (Kazinski, Atta, McVeigh) • Has great skill • Has an ideaology • Motivates him to endure hardship to complete plan • Allows him to objectify the victims
What is a terrorist? • So far, in the cyber world we have not encountered this. • Most hackers/crackers with serious skill are largely motivated by money • Those like McKinnon, with other motivations are of relatively low skill • This won't last forever
Jobs in Computer Security • There is a growing shortage of computer security people. • Jobs, with a BS average around 77 thousand • People at a high live, who create security policy, can make in the low six figures • Low level techs implementing security make in the high fifties
Jobs in Computer Security • Preparing for a career in computer security • A BS is less important that certifications • Certifications can be granted by • Professional organizations • CompTIA • Vendors • Microsoft • Cisco • Certifications granted by vendors are currently more important in the Job market.
Jobs in Computer Security • Preparing for a job in Computer Security • Graduate degrees do increase earning power • Mean salary for someone with a grad degree is 90 thousand
Computer Forensics • Computer Forensics is related to computer security • Kicks in after the crime • Deals with analyzing evidence • Looking for hidden data on hard drives • Breaking encryption • Creating “Honeypots” or traps • Analyzing traffic patterns • Defeating privacy software we have studied
Computer Forensics • Job usually requires • Computer training • Police training • How to maintain a chain of evidence • Illegal and legal search • State police lab is just across the street