SlideShare a Scribd company logo
1 of 9
Module 8 Textbook Reading
The textbook reading assignment for Module 8 is pages 193-
216.
Understand the Limits of the State in Cyberspace: Why Can't
the Government
Handle it?
Governments cannot control the movement of data the way that
governments can control the
movement of people and things. Surprisingly, the authors don't
point out the two main reasons
this is true:
• A country may try to control all physical connections to the
internet, but wireless is almost
impossible to control.
• Even if a government were able to monitor all internet traffic,
the meaning of data is often
unclear to anybody other than the sender and the recipient of
that data. The most obvious
example of this is when data is encrypted, but even unencrypted
data is often meaningless
without context.
On top of that, data can be instantly moved across borders to
anywhere in the world. One day it
might be stored in Seattle, the next day in Finland and the next
day in South Africa.
One of the ramifications of these facts is that governments
cannot control internet content as
much as they would like. The other ramification, which is more
immediately of interest to us, is
that governments also cannot simply monitor internet traffic for
attacks and block the attacks.
There's no way to monitor the internet for cyberattacks in the
way that radar can be used to
monitor for attacks by aircraft.
The authors discuss other related topics in this section as well,
including the government's
reliance upon the private sector. For instance, at the top of page
196:
“98 percent of US. government communications, including
classified communications,
travel over civilian owned-and-operated networks”
This statistic makes it easy to grasp just how dependent the
government, including the military, is
dependent upon private sector infrastructure. (by the way, they
are not saying that classified
communications travel over private networks in plaintext, they
would be encrypted to preserve
confidentiality while on those networks)
Rethink Government's Role: How Can We Better Organize for
Cybersecurity?
This section and the next have a lot of good information in
them, but I have to admit that the
organization of these sections is not obvious to me – it almost
feels like stream of consciousness
writing. For instance, in this first section, I made a list of 21
separate topics that the authors cover
in just seven pages. Perhaps the authors wrote these sections to
make clear one of their main
points – that the government is also not organized when it
comes to cybersecurity!
IT 238 Introduction to Cyberterrorism Central Washington
University – ITAM
Module 8 Textbook Reading 2
You should probably view both this section and the next more
as examples of what the
government is doing, is not doing, and could be doing to
improve cybersecurity. I will just point
out some specific topics you should not miss.
By the way, very little has changed in any of these topics since
the book was written.
On pages 199-200 there's an important discussion of the conflict
in the dual roles of the
government, and the NSA in particular, as they want both to
improve cybersecurity of some
devices but to be able to infiltrate other devices. We'll look
more at this in the outside readings.
One of the most helpful things that the government has done is
to provide guidance for cyber
defenses. It is not obvious from the name, but the National
Institute of Standards and Technology
(NIST) is the government entity that does the most to provide
cybersecurity expertise both for
the rest of the government and for the private sector. Unlike the
NSA, NIST does not have any
other competing mission. You can browse NIST's website here:
http://csrc.nist.gov/
After the mention of NIST, there's a discussion of critical
infrastructure and the electric power
grid in particular. It shouldn't make you feel any more confident
in the security of critical
infrastructure, and again, little has changed since the book was
written.
Then they talk about the government's ability to use market
forces to improve cybersecurity. The
government is a large customer of IT products, and could
presumably use that leverage to require
companies to create more secure products. The textbook
mentions one difficulty of that strategy,
which is that the government really is only about 0.1% of the
market today. The textbook doesn't
mention the other difficulty, which is that if procurement rules
are going to require higher levels
of security, there has to be some way of measuring the security
of competing products, and of
determining what premium should be paid for the difference in
security. This is not just a
difficulty for the government, but for any organization (or
person) who wants to use security as
criteria for making purchasing decisions.
Finally, don't miss the comment about the relationship between
a $100 microchip and a $100
million helicopter. This is a perfect example of the supply chain
problem from Module 4.
Approach It as a Public-Private Problem: How Do We Better
Coordinate
Defense?
Brian Krebs is the star of the first story in this section. He
started as a Washington Post reporter
and really took the time to learn about cybersecurity. He left the
Post and is a freelance blogger
and author. He has been the original source of many cybercrime
news stories during the past few
years. Though his focus is cybercrime (for profit, not political
goals) and therefore isn't directly
relevant to this class, I still highly recommend his blog:
http://krebsonsecurity.com/
The discussion that follows, about trying to make it difficult for
cybercriminals to turn their
IT 238 Introduction to Cyberterrorism Central Washington
University – ITAM
http://csrc.nist.gov/
http://krebsonsecurity.com/
Module 8 Textbook Reading 3
stolen data into cash, is an important topic in cybercrime, but
not nearly as relevant to our course.
But starting at the top of page 208 we get to some very key
topics for this course.
First up, the authors discuss how ISPs could be more involved
in cybersecurity. ISPs are uniquely
positioned to identify and block certain types of attacks, though
they are reluctant to do so. The
book doesn't mention it, but ISPs will get involved in some big
cases, for instance, DDOS attacks
against large customers, but they do little for other customers.
Next is a short discussion of the fact that most organizations
aren't all that interested in working
with law enforcement to catch attackers after a breach. The
textbook mentions two reasons,
which are worth elaborating on.
• The first reason is that law enforcement wants to preserve
evidence, and preserving
evidence takes time that the organization would rather spend
restoring their systems.
• The second reason is the potential for bad publicity. If an
organization doesn't report a
cyberattack to law enforcement it is much less likely that the
attack will become public
knowledge.
This not unique to cybercrime. Organizations often don't report
non-cyber crime either, because
they don't want the disruption and bad publicity.
In Module 9 we will talk about situations where organizations
are required by law to report
breaches.
Exercise Is Good for You: How Can We Better Prepare for
Cyber Incidents?
This is a great discussion, but it may be easy to miss the fact
that they are talking about four
distinct types of exercises:
• Red team/blue team exercises. Using a simulated network, the
red team attempts to attack
the network while the blue team defends it. The red team plays
the role of an attacker with
no boundaries on what they are willing to do, while the blue
team is usually prohibited
from hacking back against the red team.
• Exercises that test the technical defenses of an organization,
including their ability to
detect attacks. This is usually known as penetration testing. In
penetration testing there is
a red team attacking the organization's network, but since it is a
real, operating network,
there are always strict limits on how far the red team can go, for
instance, destruction is
not allowed. The defenders are usually unaware or just vaguely
aware that a penetration
test is underway, making the test more realistic.
• Exercises that test the resilience of an organization when a
security breach occurs. This
type of exercise typically addresses the technical tasks to
detect, contain, maintain and
recover, but also public relations, interaction with law
enforcement, and so on. These
exercises are simulations, because you can't practice with a real
attack without creating
real consequences.
• Military exercises that simulate cyberwar. These don't
necessarily have the artificial
IT 238 Introduction to Cyberterrorism Central Washington
University – ITAM
Module 8 Textbook Reading 4
limitations of the other types of exercises, but just like other
types of military exercises,
they require the participants to make assumptions about the
motivations, tactics and
capabilities of the enemy.
There are several academic competitions that involve red
team/blue team exercises, at the college
and even high school levels. Probably the best known, at least
in this region, is the Collegiate
Cyber Defense Competition (CCDC).
http://www.nationalccdc.org/
This section has a nice example of a lack of resiliency. Near the
bottom of page 213, there's an
example of a security team that relied entirely upon email and
instant messaging for
communication, tools that could be lost during an attack, when
they need them the most.
For resiliency they need to have backup communications
methods that will function during a
cyber attack. For instance, cell phones using a cellular network
instead of their own (possibly
compromised) WiFi network. And of course, for this to be
successful, they also have to ensure
that everyone knows all of the relevant phone numbers, even
though they will only be using them
in an emergency. One thing to be very aware of is that it is easy
to set up a backup system like that
but fail to maintain it, for instance, by not updating contact
information as personnel changes.
IT 238 Introduction to Cyberterrorism Central Washington
University – ITAM
http://www.nationalccdc.org/

More Related Content

Similar to Module 8 Textbook ReadingThe textbook reading assignment f.docx

Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxscuttsginette
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webatlanticcouncil
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxarnoldmeredith47041
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112 Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112 OllieShoresna
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 

Similar to Module 8 Textbook ReadingThe textbook reading assignment f.docx (18)

Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docx
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Ac breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_webAc breaking cyber-sharinglogjam_web
Ac breaking cyber-sharinglogjam_web
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
The global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docxThe global digital divide portrays the global disparities basicall.docx
The global digital divide portrays the global disparities basicall.docx
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112 Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
Case study 11
Case study 11Case study 11
Case study 11
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 

More from gilpinleeanna

Name 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docxName 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docxgilpinleeanna
 
Name _____________________Date ________________________ESL.docx
Name  _____________________Date  ________________________ESL.docxName  _____________________Date  ________________________ESL.docx
Name _____________________Date ________________________ESL.docxgilpinleeanna
 
Name Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docxName Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docxgilpinleeanna
 
Name _______________________________ (Ex2 rework) CHM 33.docx
Name  _______________________________ (Ex2 rework) CHM 33.docxName  _______________________________ (Ex2 rework) CHM 33.docx
Name _______________________________ (Ex2 rework) CHM 33.docxgilpinleeanna
 
Name 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docxName 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docxgilpinleeanna
 
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
Name   Don’t ForgetDate       UNIT 3 TEST(The direct.docxName   Don’t ForgetDate       UNIT 3 TEST(The direct.docx
Name Don’t ForgetDate UNIT 3 TEST(The direct.docxgilpinleeanna
 
Name Add name hereConcept Matching From Disease to Treatmen.docx
Name  Add name hereConcept Matching From Disease to Treatmen.docxName  Add name hereConcept Matching From Disease to Treatmen.docx
Name Add name hereConcept Matching From Disease to Treatmen.docxgilpinleeanna
 
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docxName Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docxgilpinleeanna
 
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docxName  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docxgilpinleeanna
 
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name    Sophocles, AntigoneMain Characters Antigone, Cre.docxName    Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name Sophocles, AntigoneMain Characters Antigone, Cre.docxgilpinleeanna
 
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docxN4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docxgilpinleeanna
 
Name Habitable Zones – Student GuideExercisesPlease r.docx
Name  Habitable Zones – Student GuideExercisesPlease r.docxName  Habitable Zones – Student GuideExercisesPlease r.docx
Name Habitable Zones – Student GuideExercisesPlease r.docxgilpinleeanna
 
Name Class Date SKILL ACTIVITY Giving an Eff.docx
Name    Class    Date   SKILL ACTIVITY Giving an Eff.docxName    Class    Date   SKILL ACTIVITY Giving an Eff.docx
Name Class Date SKILL ACTIVITY Giving an Eff.docxgilpinleeanna
 
Name Speech Title I. Intro A) Atten.docx
Name  Speech Title    I. Intro  A) Atten.docxName  Speech Title    I. Intro  A) Atten.docx
Name Speech Title I. Intro A) Atten.docxgilpinleeanna
 
n engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docxn engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docxgilpinleeanna
 
Name Class Date HUMR 211 Spr.docx
Name     Class     Date    HUMR 211 Spr.docxName     Class     Date    HUMR 211 Spr.docx
Name Class Date HUMR 211 Spr.docxgilpinleeanna
 
NAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docxNAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docxgilpinleeanna
 
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docxNAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docxgilpinleeanna
 
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name  Understanding by Design (UbD) TemplateStage 1—Desir.docxName  Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name Understanding by Design (UbD) TemplateStage 1—Desir.docxgilpinleeanna
 
Name MUS108 Music Cultures of the World .docx
Name              MUS108 Music Cultures of the World              .docxName              MUS108 Music Cultures of the World              .docx
Name MUS108 Music Cultures of the World .docxgilpinleeanna
 

More from gilpinleeanna (20)

Name 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docxName 1. The table shows the number of days per week, x, that 100.docx
Name 1. The table shows the number of days per week, x, that 100.docx
 
Name _____________________Date ________________________ESL.docx
Name  _____________________Date  ________________________ESL.docxName  _____________________Date  ________________________ESL.docx
Name _____________________Date ________________________ESL.docx
 
Name Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docxName Bijapur Fort Year 1599 Location Bijapur city.docx
Name Bijapur Fort Year 1599 Location Bijapur city.docx
 
Name _______________________________ (Ex2 rework) CHM 33.docx
Name  _______________________________ (Ex2 rework) CHM 33.docxName  _______________________________ (Ex2 rework) CHM 33.docx
Name _______________________________ (Ex2 rework) CHM 33.docx
 
Name 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docxName 1 Should Transportation Security Officers Be A.docx
Name 1 Should Transportation Security Officers Be A.docx
 
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
Name   Don’t ForgetDate       UNIT 3 TEST(The direct.docxName   Don’t ForgetDate       UNIT 3 TEST(The direct.docx
Name Don’t ForgetDate UNIT 3 TEST(The direct.docx
 
Name Add name hereConcept Matching From Disease to Treatmen.docx
Name  Add name hereConcept Matching From Disease to Treatmen.docxName  Add name hereConcept Matching From Disease to Treatmen.docx
Name Add name hereConcept Matching From Disease to Treatmen.docx
 
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docxName Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
Name Abdulla AlsuwaidiITA 160Uncle VanyaMan has been en.docx
 
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docxName  Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
Name Add name hereHIM 2214 Module 6 Medical Record Abstractin.docx
 
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name    Sophocles, AntigoneMain Characters Antigone, Cre.docxName    Sophocles, AntigoneMain Characters Antigone, Cre.docx
Name Sophocles, AntigoneMain Characters Antigone, Cre.docx
 
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docxN4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
N4455 Nursing Leadership and ManagementWeek 3 Assignment 1.docx
 
Name Habitable Zones – Student GuideExercisesPlease r.docx
Name  Habitable Zones – Student GuideExercisesPlease r.docxName  Habitable Zones – Student GuideExercisesPlease r.docx
Name Habitable Zones – Student GuideExercisesPlease r.docx
 
Name Class Date SKILL ACTIVITY Giving an Eff.docx
Name    Class    Date   SKILL ACTIVITY Giving an Eff.docxName    Class    Date   SKILL ACTIVITY Giving an Eff.docx
Name Class Date SKILL ACTIVITY Giving an Eff.docx
 
Name Speech Title I. Intro A) Atten.docx
Name  Speech Title    I. Intro  A) Atten.docxName  Speech Title    I. Intro  A) Atten.docx
Name Speech Title I. Intro A) Atten.docx
 
n engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docxn engl j med 352;16www.nejm.org april 21, .docx
n engl j med 352;16www.nejm.org april 21, .docx
 
Name Class Date HUMR 211 Spr.docx
Name     Class     Date    HUMR 211 Spr.docxName     Class     Date    HUMR 211 Spr.docx
Name Class Date HUMR 211 Spr.docx
 
NAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docxNAME ----------------------------------- CLASS -------------- .docx
NAME ----------------------------------- CLASS -------------- .docx
 
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docxNAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
NAHQ Code of Ethics and Standards of Practice ©Copyright 2011 .docx
 
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name  Understanding by Design (UbD) TemplateStage 1—Desir.docxName  Understanding by Design (UbD) TemplateStage 1—Desir.docx
Name Understanding by Design (UbD) TemplateStage 1—Desir.docx
 
Name MUS108 Music Cultures of the World .docx
Name              MUS108 Music Cultures of the World              .docxName              MUS108 Music Cultures of the World              .docx
Name MUS108 Music Cultures of the World .docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

Module 8 Textbook ReadingThe textbook reading assignment f.docx

  • 1. Module 8 Textbook Reading The textbook reading assignment for Module 8 is pages 193- 216. Understand the Limits of the State in Cyberspace: Why Can't the Government Handle it? Governments cannot control the movement of data the way that governments can control the movement of people and things. Surprisingly, the authors don't point out the two main reasons this is true: • A country may try to control all physical connections to the internet, but wireless is almost impossible to control. • Even if a government were able to monitor all internet traffic, the meaning of data is often unclear to anybody other than the sender and the recipient of that data. The most obvious example of this is when data is encrypted, but even unencrypted data is often meaningless without context. On top of that, data can be instantly moved across borders to anywhere in the world. One day it might be stored in Seattle, the next day in Finland and the next day in South Africa.
  • 2. One of the ramifications of these facts is that governments cannot control internet content as much as they would like. The other ramification, which is more immediately of interest to us, is that governments also cannot simply monitor internet traffic for attacks and block the attacks. There's no way to monitor the internet for cyberattacks in the way that radar can be used to monitor for attacks by aircraft. The authors discuss other related topics in this section as well, including the government's reliance upon the private sector. For instance, at the top of page 196: “98 percent of US. government communications, including classified communications, travel over civilian owned-and-operated networks” This statistic makes it easy to grasp just how dependent the government, including the military, is dependent upon private sector infrastructure. (by the way, they are not saying that classified communications travel over private networks in plaintext, they would be encrypted to preserve confidentiality while on those networks) Rethink Government's Role: How Can We Better Organize for Cybersecurity? This section and the next have a lot of good information in them, but I have to admit that the organization of these sections is not obvious to me – it almost feels like stream of consciousness writing. For instance, in this first section, I made a list of 21 separate topics that the authors cover
  • 3. in just seven pages. Perhaps the authors wrote these sections to make clear one of their main points – that the government is also not organized when it comes to cybersecurity! IT 238 Introduction to Cyberterrorism Central Washington University – ITAM Module 8 Textbook Reading 2 You should probably view both this section and the next more as examples of what the government is doing, is not doing, and could be doing to improve cybersecurity. I will just point out some specific topics you should not miss. By the way, very little has changed in any of these topics since the book was written. On pages 199-200 there's an important discussion of the conflict in the dual roles of the government, and the NSA in particular, as they want both to improve cybersecurity of some devices but to be able to infiltrate other devices. We'll look more at this in the outside readings. One of the most helpful things that the government has done is to provide guidance for cyber defenses. It is not obvious from the name, but the National Institute of Standards and Technology (NIST) is the government entity that does the most to provide cybersecurity expertise both for the rest of the government and for the private sector. Unlike the NSA, NIST does not have any
  • 4. other competing mission. You can browse NIST's website here: http://csrc.nist.gov/ After the mention of NIST, there's a discussion of critical infrastructure and the electric power grid in particular. It shouldn't make you feel any more confident in the security of critical infrastructure, and again, little has changed since the book was written. Then they talk about the government's ability to use market forces to improve cybersecurity. The government is a large customer of IT products, and could presumably use that leverage to require companies to create more secure products. The textbook mentions one difficulty of that strategy, which is that the government really is only about 0.1% of the market today. The textbook doesn't mention the other difficulty, which is that if procurement rules are going to require higher levels of security, there has to be some way of measuring the security of competing products, and of determining what premium should be paid for the difference in security. This is not just a difficulty for the government, but for any organization (or person) who wants to use security as criteria for making purchasing decisions. Finally, don't miss the comment about the relationship between a $100 microchip and a $100 million helicopter. This is a perfect example of the supply chain problem from Module 4. Approach It as a Public-Private Problem: How Do We Better Coordinate
  • 5. Defense? Brian Krebs is the star of the first story in this section. He started as a Washington Post reporter and really took the time to learn about cybersecurity. He left the Post and is a freelance blogger and author. He has been the original source of many cybercrime news stories during the past few years. Though his focus is cybercrime (for profit, not political goals) and therefore isn't directly relevant to this class, I still highly recommend his blog: http://krebsonsecurity.com/ The discussion that follows, about trying to make it difficult for cybercriminals to turn their IT 238 Introduction to Cyberterrorism Central Washington University – ITAM http://csrc.nist.gov/ http://krebsonsecurity.com/ Module 8 Textbook Reading 3 stolen data into cash, is an important topic in cybercrime, but not nearly as relevant to our course. But starting at the top of page 208 we get to some very key topics for this course. First up, the authors discuss how ISPs could be more involved in cybersecurity. ISPs are uniquely positioned to identify and block certain types of attacks, though they are reluctant to do so. The
  • 6. book doesn't mention it, but ISPs will get involved in some big cases, for instance, DDOS attacks against large customers, but they do little for other customers. Next is a short discussion of the fact that most organizations aren't all that interested in working with law enforcement to catch attackers after a breach. The textbook mentions two reasons, which are worth elaborating on. • The first reason is that law enforcement wants to preserve evidence, and preserving evidence takes time that the organization would rather spend restoring their systems. • The second reason is the potential for bad publicity. If an organization doesn't report a cyberattack to law enforcement it is much less likely that the attack will become public knowledge. This not unique to cybercrime. Organizations often don't report non-cyber crime either, because they don't want the disruption and bad publicity. In Module 9 we will talk about situations where organizations are required by law to report breaches. Exercise Is Good for You: How Can We Better Prepare for Cyber Incidents? This is a great discussion, but it may be easy to miss the fact that they are talking about four distinct types of exercises:
  • 7. • Red team/blue team exercises. Using a simulated network, the red team attempts to attack the network while the blue team defends it. The red team plays the role of an attacker with no boundaries on what they are willing to do, while the blue team is usually prohibited from hacking back against the red team. • Exercises that test the technical defenses of an organization, including their ability to detect attacks. This is usually known as penetration testing. In penetration testing there is a red team attacking the organization's network, but since it is a real, operating network, there are always strict limits on how far the red team can go, for instance, destruction is not allowed. The defenders are usually unaware or just vaguely aware that a penetration test is underway, making the test more realistic. • Exercises that test the resilience of an organization when a security breach occurs. This type of exercise typically addresses the technical tasks to detect, contain, maintain and recover, but also public relations, interaction with law enforcement, and so on. These exercises are simulations, because you can't practice with a real attack without creating real consequences. • Military exercises that simulate cyberwar. These don't necessarily have the artificial IT 238 Introduction to Cyberterrorism Central Washington University – ITAM
  • 8. Module 8 Textbook Reading 4 limitations of the other types of exercises, but just like other types of military exercises, they require the participants to make assumptions about the motivations, tactics and capabilities of the enemy. There are several academic competitions that involve red team/blue team exercises, at the college and even high school levels. Probably the best known, at least in this region, is the Collegiate Cyber Defense Competition (CCDC). http://www.nationalccdc.org/ This section has a nice example of a lack of resiliency. Near the bottom of page 213, there's an example of a security team that relied entirely upon email and instant messaging for communication, tools that could be lost during an attack, when they need them the most. For resiliency they need to have backup communications methods that will function during a cyber attack. For instance, cell phones using a cellular network instead of their own (possibly compromised) WiFi network. And of course, for this to be successful, they also have to ensure that everyone knows all of the relevant phone numbers, even though they will only be using them in an emergency. One thing to be very aware of is that it is easy to set up a backup system like that but fail to maintain it, for instance, by not updating contact
  • 9. information as personnel changes. IT 238 Introduction to Cyberterrorism Central Washington University – ITAM http://www.nationalccdc.org/