12
“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.” -Rik Farlow, USENIX ;login :, August 2004

“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Embed Size (px)

DESCRIPTION

Who Am I ? Tom Bettge Associate Director Scientific Computing Division National Center for Atmospheric Research Boulder, Colorado Background: Applications Software Engineer – Climate Modeling my mother’s maiden name is Hacker

Citation preview

Page 1: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.”

-Rik Farlow, USENIX ;login:, August 2004

Page 2: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Welcome !

Page 3: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Who Am I ?Tom BettgeAssociate Director Scientific Computing DivisionNational Center for Atmospheric ResearchBoulder, ColoradoBackground: Applications Software Engineer – Climate Modeling

my mother’s maiden name is Hacker

Page 4: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

“………………………….The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.”

-Rik Farlow, USENIX ;login:, August 2004

Page 5: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Program Committee• Tom Bettge National Center for Atmospheric Research• RuthAnne Bevier California Institute of Technology• Ginger Caldwell National Center for Atmospheric Research• Walter Dykas Oak Ridge National Laboratory• Victor Hazlewood San Diego Supercomputer Center• Chris Hempel Texas Advanced Computer Center• Jim Marsteller Pittsburgh Supercomputer Center• Marla Meehl National Center for Atmospheric Research• George Strawn National Science Foundation• Howard Walter National Energy Research Scientific Computing Center• John Towns National Center for Supercomputing

Applications

Page 6: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Who Are You ?• Registered Participants: 128

• By Organizational/Agency:– University/NSF 79– DOE 25– Military 8– NASA 8– NOAA 3– Other 5

• By Duty/Position:– system/security administration 50– management 40– end user 10

Page 7: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Breakout Sessions1. User Policies/Education2. System Administration Policies/Education3. Network Based Intrusion Detection4. Host Based Intrusion Detection5. Grid Computing Challenges

Page 8: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Tom

NCAR/Scientific Computing Division

Bettge

Cybersecurity Summit 2004

1

Breakout Session Assignment

Page 9: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Monday Evening: Meeting Rooms • Dewey I / II• Charleston I / II• Farragut• wireless will be available Contact Staff

Page 10: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Thanks to NCAR Staff

• Susan Cross• Lynda Lester• Janie Young

Page 11: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,
Page 12: “The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers,

Cybersecurity Summit ?• Concept of Summit – Spring 2004

Share information, discuss impact upon users, systems, etc.Best PracticesProcedures for future incidents (communication, etc.)

• To include peer agencies• Endorsed/Sponsored by National Science

Foundation• Expanded to broad community• Expanded to include peer agencies• Invitation Only !