Shanee Gamliel
ISSC362: IT Security: Attack & Defense
Adam Meyer
26 April 2015
I. INTRODUCTION
a. Thesis
i. Cyber-attacks have changed the future of cyber security.
b. Cyber Security
i. Reasons networks need cyber security more than ever
1. Types of attacks
2. Vulnerability of a company’s network
3. How cyber security protects a company’s network
c. Introduction of cyber-attacks that will be discussed.
i. The Melissa Virus (1999) ii. I LOVE YOU Virus (2000) iii. Stuxnet (2010) iv. Attack on Sony (2011 & 2014)
II. TECHNOLOGY USED FOR CYBER ATTACKS
a. Techniques used for cyber attacks
i. Port scanning
1. What is Port Scanning
2. How does an attacker use open ports to attack a network
3. Software ii. Phishing
1. What is Phishing
2. How does it target users iii. Worms and Viruses
1. How they differ from on another
2. Why are Worms dangerous to a network iv. DDOS Attacks
1. What is a DDOS attack
2. Ways to create a DDOS attack
III. HOW THESE ADVANCED ATTACKS CHANGED SECURITY NEEDS
a. The Melissa Virus (1999)
i. Introduced dangers of the macro virus ii. Email security iii. Utilization of virus scanners
b. The I LOVE YOU Virus (2000)
i. Introduced dangers of Worms and DDoS attacks ii. Email security and targeting iii. Updating of anti-virus and anti-malware software
c. Stuxnet Worm (2010)
i. Introduced possibilities of cyber warfare
1. Cyber-attacks now being used as a weapon ii. Foreign government and political affairs
1. Need for new cyber policies
2. What is and what isn’t ethical
d. Attack on Sony (2011 & 2014)
i. Introduces vulnerabilities to large corporations
1. Port scanning ii. Created a visual that even now cyber security needs to be taken seriously iii. Effects of leaking sensitive information
IV. GLOBAL IMPLICATIONS AND FUTURE TRENDS
a. Global Implications
1. Cyber security as a nationwide issue
a. President Obama addressed the importance of Cyber security after the Sony attack
References: Chen, T., & Abu-Nimeh, S. (2011). Lessons from Stuxnet. Computer, 44(4), 91-93. Retrieved April 30, 2015, from http://ieeexplore.ieee.org.ezproxy1.apus.edu/stamp/stamp.jsp?tp=&arnumber=5742014& isnumber=5741994 Greenwald, J. (2015). SONY ATTACK RECASTS CYBER SECURITY DEBATE. Business Insurance, 49(2), 1-n/a. Retrieved from http://search.proquest.com/docview/1647431191?accountid=8289 iRiS Software Protects Users From the Melissa Virus; iRiS Customers Were Protected Before Media Reports Emerged. PR Newswire, Retrieved from www.lexisnexis.com/hottopics/lnacademic MacSweeney, G. (2000). When "I love you" isn 't so sweet. Insurance & Technology, 25(7), 7. Retrieved from http://search.proquest.com/docview/229285360?accountid=8289 Obama, B. (Director) (2015, February 13). Remarks by the President. Cybersecurity and Consumer Protection Summit. Lecture conducted from The White House, Stanford, California. https://www.whitehouse.gov/the-press-office/2015/02/13/remarks-president- cybersecurity-and-consumer-protection-summit Sicard, S. (2015). North korean cyber attack on sony poses tough security questions. National Defense, 99(736), 24-25. Retrieved from http://search.proquest.com/docview/1664028918?accountid=8289 Stateman, A. (2000). Love at first byte: "I love you" virus bugs PR pros. Public Relations Tactics, 7(7), 1-1,4. Retrieved from http://search.proquest.com/docview/205085506?accountid=8289 Thibodeau, P. (1999). The melissa virus lesson: Quicker reactioneeded. Computerworld, 33(17), 25. Retrieved from http://search.proquest.com/docview/216056378?accountid=8289 Tweedie, S. (2015, March 20). White House hires Facebook engineering director as its new director of information technology. Retrieved April 30, 2015, from http://www.businessinsider.com/facebook-engineering-director-hired-by-white-house- 2015-3 Zetter, K. (2013, 05). Stuxnet. Wired, 21, 139. Retrieved from http://search.proquest.com/docview/1411852095?accountid=8289