UNR Cybersecurity Center Seminar Series Talk: Cyber Terrorism
Cyberterrorism is a new cyberattack tactic that is carried out by cyber actors who have specific political motives. Creating terrorism in cyberspace can achieve strategic political goals and objectives for nation-state sponsored organizations. The cyberterrorist tools, tactics, and procedures (TTP) can be similar with other cyber actors. However, their ultimate strategic goals and objectives are political, military, and economical gains for these cyberterrorists. They search for cyber vulnerabilities at the target networks and exploit these vulnerabilities in a large scale which result in a pandemic consequence due to loss of power grids, water systems, transportation, and public health systems.
Cyber vulnerability includes many security weaknesses that can lead to cyberattacks. We will discuss many of the cyber vulnerabilities that can contribute to an attack. Cyber vulnerability defines the Internet based data communication and its associated vulnerabilities. Cyberattacks exploit these vulnerabilities to compromise the target. There are many tools used in Cyberattacks. Some of these tools are freely available on the Internet as downloadable software. These tools can cause costly damages if exploited on a specific target. The impacts could be devastating to a nation’s infrastructure if attacked on the national critical infrastructure. Some of the Cyber-attacking techniques include:
Distributed Denial of Attack (DDoS) where distributed systems can participate in attacking a specific target. When successful, the target can be denied for its intended services. This is a form of DoS attack with an intent to stop the target’s operation, except the DDoS is initiated by many participating attackers synchronously or asynchronously.
Malware includes virus, worms, trojans, spyware, and other form of malicious software designed to target critical infrastructure systems that can create pandemic damage to national security, economy, health, and other financial impacts. Virus replicates itself by infecting and modifying other computer software. Worms replicate themselves without depending on any agents or applications. The objective of Worm attacks is to saturate the target’s resources by replicating themselves throughout the network and attacking network resources. Worms replicate themselves to other networks without any dependency on other agents or applications. Trojan Horses are hidden to exploit the target. Trojan horses appear normal because they are hidden behind normal software; however, their intent, when executed, is malicious. Backdooor is left hidden to exploit the target behind the front-end software. Its intention is only known to the perpetrator who will take advantage of the backend channel for a later attack.
About the speaker: Dr. Charles Pak, CISSP, CRISC, CISM, SSCP, MCSE, MCT, CCNA, ITIL, Security+
Over 35 years of hands-on business and technical experience, Dr. Pak is a New Business Solution Architect in Information Security in both the private and public sectors, most recently provided cyber security solutions to large government agencies with technical management and consulting for large, diversified global clients in the healthcare, financial services, and communication sectors. Dr. Pak provides vision and leadership in transforming, conducting internal IT programs globally. Dr. Pak has responsibility for aligning IT and business strategies, driving innovation and ensuring transparency and effective communication with all relevant stakeholders. His special focus areas include leading cloud solutions, harnessing business intelligence for improved decision-making, implementing growth-enhancing emerging technologies and managing the rollout of innovative financial and enterprise systems and processes.
Further, Dr. Pak is a seasoned Sr. Cyber Security Solution Architect, Cyber Security Director, Technical Program Manager, and a Scholar with over 32 years of hands-on technical background from a low-level microprocessor design to a high-level Web application programming and cloud computing. He is a world recognized IA research scholar and published several novel conference and journal papers. He is an invited speaker in IA education. He is a hands-on practitioner who holds industry certifications such as CISSP, CISM, CRISC, SSCP, ITIL, MCSE, MCT and CCNA with more than 20 years of leadership in engineering, supporting, and servicing complex centralized and distributed Information Technology environments; Windows 2012/2008/2003/2000/NT LAN/WAN/MAN and, IBM Blade Center, EMC Virtual Center, Cloud Computing, SAN, PKI, CISCO Network design, development, testing, installation, configuration, operation, and support; working with a wide range of network protocols and topologies; systems reengineering; user training; and mini/micro-computer multi-tier Help Desk support environments. Dr. Pak is also experienced in program management including the performance of staffing, workload forecasting, budgeting, scheduling, customer relations, proposal-writing and performance evaluation.
Meeting ID: 870 3643 8994
Friday, October 29 at 12:00 pm to 1:00 pmVirtual Event