Cyber Security & Infrastructure Protection. FBI Philadelphia Division Special Agent John B. Chesson. Cyber Terrorism. Potential Cyber Attacks. Unauthorized Intrusions Website Defacements Domain Name Server Attacks Distributed Denial of Service (DDoS) Attacks Computer Worms
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
FBI Philadelphia Division
Special Agent John B. Chesson
Cyberspace: the Infrastructure behind Critical Infrastructure…
9. Manufacturing 10. Food & Agriculture 11. Chemicals and Hazardous Materials
12. Defense Industry 13. Public Health
The New Threat: Anyone with a Computer
National Security Threats
Intruder Technical Knowledge
“stealth” / advanced scanning techniques
network mgmt. diagnostics
exploiting known vulnerabilities
as a jpg image
VBS Worm Generator from Internet
Corrupt log files
erase log files
create root users
Customer account/credit info
Through hack/intrusion, subject obtains customer account credit info
Using IRC chat rooms, the subject recruits college students to assist in scam.
Orders for Merchandise Placed using Stolen Acct Info..
Merchandise Shipped to Co-conspirators..
These steps do NOT occur quickly!
To promote protection of critical information systems
Provides formal and informal channels for the exchange of information about infrastructure threats and vulnerabilities
What is InfraGard?
Representatives from private industry, government agencies, academic institutions, state & local law enforcement
Membership requirements (No Cost)
Sign Membership agreement
FBI criminal records check
Cyber Incident Detection
& Data Analysis Center
Cyber Threat Picture
Current Obstacles to Timely & Accurate Reporting
Current Cyber Incident Reporting
National Infrastructure Protection
Who has the big picture?
Vulnerable to Attack
Participant’s Perimeter Network
Offers normal looking company services, but no legitimate network traffic. Use of this system will assist in an Early Detection of a Cyber Attack
Mail, Web, FTP
Company’s Mission Critical
CIDDAC 24/7 Operations
Real-time Cyber Attack Detection Sensor (RCADS)
John B. Chesson
Special Agent FBI