Attack and Defense : Improving Cybersecurity by 2014

نویسنده

  • Edward D. Lazowska
چکیده

tight and could turn on the tiniest misstep. Rep. Hill has a secret: She has been diagnosed with the early signs of Alzheimer's disease the past summer. Based on her doctor's diagnosis of slow progression that can be treated with experimental drugs, Rep. Hill has decided to stay in the race. Joe Cracker has an agenda: he does not want Rep. Hill elected to the Senate. He is strongly opposed to most issues Rep. Hill has promoted, especially increased control over rogue elements on the internet. Joe Cracker knows a little about software security and vulnerabilities, and has had plenty of time on his hands. Months earlier Joe had decided to find embarrassing information about Rep. Hill and publicize it in order to derail her campaign. The previous week, on a visit to his doctor, Joe pocketed a small computer memory device that someone had left on the counter. Joe did not expect it to be of much use other than as more portable memory, but upon examining it at home he soon realized that it contained access code to the Central Medical Record Service (CMERECS). CMERECS was created 8 years earlier to allow authorized individuals access to the records of any patient under their care. Joe knew that although his doctor's office used the latest and greatest patient management application, the application vendor had not updated the encryption mechanism for nearly 10 years. The encryption algorithm was still on the list of approved algorithms for storing CMERECS access codes, but Joe knew it could be 2 cracked. Joe set his two brand new high end computers to work cracking the encryption by doing nothing cleverer than just attempting every possible combination. Four days later Joe had the access codes. These access codes allowed him to connect to CMERECS and request the medical records for anyone in the nation with the requests appearing to have originated from his doctor's office. Under normal conditions the patient's approval would be required before the records could be released to a doctor, but the system had a loophole: For emergency services no approval was required. Joe requested the records for Rep. Hill using this emergency request procedure. With the medical records in hand, Joe embarks on a plan he spent the last several months preparing; he will distribute Rep. Hill's medical records using a worm that attacks cell phones. Joe has a built a …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Fault Analysis and Filter Generation for Adaptive Cybersecurity

We are developing the FUZZBUSTER system to automatically identify software vulnerabilities and create adaptations that shield or repair those vulnerabilities before attackers can exploit them. Adaptive cybersecurity involves efficiently improving software security to minimize the window of attack, and also preserving software functionality as much as possible. This paper presents new tools that...

متن کامل

Cybersecurity Games and Investments: A Decision Support Approach

In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly interested in examining cases where the organization suffers from an underinvestment problem or inefficient spending on cybersecurity. To this end, we first model the cybersecurity environment of an organization. We then model non-cooperative cybersecurity control-games between the defender which...

متن کامل

Cybersecurity Issues and Challenges: In Brief

The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns...

متن کامل

An Argument for Game Balance: Improving Student Engagement by Matching Difficulty Level with Learner Readiness

The exponential growth of students participating in cybersecurity competition and challenge programs has been used as support for claims that the numbers of students interested in pursuing cybersecurity careers are also increasing. However, one recent study documented a decline in novice participants over the course of three cybersecurity competitions. This paper presents an argument for suppor...

متن کامل

A Characterization of Cybersecurity Posture from Network Telescope Data

Data-driven understanding of cybersecurity posture is an important problem that has not been adequately explored. In this paper, we analyze some real data collected by CAIDA’s network telescope during the month of March 2013. We propose to formalize the concept of cybersecurity posture from the perspectives of three kinds of time series: the number of victims (i.e., telescope IP addresses that ...

متن کامل

Shell We Play A Game? CTF-as-a-service for Security Education

Although we are facing a shortage of cybersecurity professionals, the shortage can be reduced by using technology to empower all security educators to efficiently and effectively educate the professionals of tomorrow. One powerful tool in some educators’ toolboxes are Capture the Flag (CTF) competitions. Although participants in all the different types of CTF competitions learn and grow their s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004