InfoGram
May 31, 2001
NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.
Denial of Service Attacks
An international study estimated that nearly 13,000 denial of service (DOS) attacks occurred worldwide during a three-week period in February. The study concluded that the online DOS threat is far greater than previously thought. "We know with certainty that DOS attacks are now more powerful and prevalent," said Stefan Savage, one of the study's authors. A DOS attack is an incident in which the primary goal of the attack is to deny access to a particular resource or service through resource starvation or overload. Usually there will be a loss involving a particular network service such as electronic mail. In some instances, a popular website will be forced to temporarily cease operations. However, in worst cases, DOS attacks can destroy programs and files in a computer system. "Although typically intentional and malicious, DOS attacks can be accidental," according to Mr. Savage. He added that DOS attacks are a type of security breach to a computer system that does not normally result in the theft of information. Nevertheless, he said, "DOS attacks cost victims a great deal of time and money."
Managed Security Services
To strengthen cyber security, computer experts advise that organizations consider choosing a managed security provider after researching what providers are available and how they differ. The managed security market includes services for virus scanning, firewalls, intrusion detection, and virtual private networks. According to a recent study just released by the Yankee Group, a technology consultancy, "the managed security market is hot and definitely getting hotter." Matthew Kovar, author of the study, said organizations are outsourcing their cyber security needs in order to acquire a "holistic" approach to security. He elaborated that a "holistic" approach means "a complete system, not a treatment of parts-a firewall might prevent some outside attacks, but an intrusion detection system is necessary to fully address internal and external threats." A primary driver in the growth of the managed security services market is the lack of skilled workers, the study said. Information technology (IT) directors have general knowledge of security issues, but often do not have the specific skills needed to implement a quality security plan. In addition, Mr. Kovar said that IT directors usually are too busy with other tasks to keep current on the latest threats and appropriate countermeasures.
9-1-1 Service
Pacific Bell suffered a power outage on 25 May that spread through most of California. The blackout adversely affected 9-1-1 service and Internet connections. The company confirmed that troubles in its frame relay network, one of several common technologies for transmitting data over telecommunications lines, was the source of the outage. A Pacific Bell spokeswoman said that 9-1-1 services that distinguish the name and number of people calling had been down most of the day, but calls were still getting through.
Computer Disaster Drills
In a recent USA TODAY article, Michelle Kessler wrote: "Computer disaster drills as well as recovery plans and practices should be happening at all organizations'it just makes sense!" Computer disaster drills are growing in popularity given the increase in computer downtime caused by hackers, power outages, hurricanes, tornadoes, fires, etc. With much more data on computer networks accessed by many more people, the bitter reality is that cyber systems are far more vulnerable to people and nature attacks on their systems. It is "finally dawning on people" that computer disaster drills are important, said Steve Hunt, a systems analyst with a research firm. "You don't want the firefighters to show up at the fire without ever having seen one before." "The drills help identify missing data, holes in procedures, and changes in the environment that may not have been accounted for," said Greg Petersen, a disaster recovery planning manager. The drills are important, advocates say, because they also help diagnose problems, keep data recovery skills current, and identify security flaws.
Electrical Power
A couple of weeks ago, police and fire departments of a Massachusetts city were deluged with calls during an electrical power outage. Police dispatched several cruisers to major key intersections because traffic signals were not operational. The cruisers went on-station with their lights on, but the officers did not go onto the streets because it was too dangerous. Simultaneously, firefighters responded to numerous false box alarms triggered by the outage. The State of New York hopes to avoid much of this scenario. A new emergency regulation was unveiled there that will allow backup diesel generators in some buildings and locations to begin operating before there is an actual loss of service. With the demand for electricity growing at faster rates than the supply, New York officials expressed concerns that high summer temperatures will lead to blackouts throughout New York's major metropolitan areas. The state already has installed ten temporary generators throughout New York City to create more power. Allowing large businesses, colleges, factories, and office towers to turn on their emergency generators when outages are deemed imminent will help reduce demand on the state's power grid, according to the new regulation that takes effect immediately.
USFACIPC Weekly Lexicon: Computer Fraud
(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)
The intended misrepresentation, alteration, or disclosure of data in order to perform an operation that may illicitly gain the user an item of perceived value.