Risk
3/8/2012
04:14 PM
50%
50%

Feds Simulate Crippling Cybersecurity Attack On NYC Electricity

Senators and agencies participate in exercise, which simulated how the government might respond in the event of a cyberattack on New York's electricity supply during a summer heat wave.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New York City’s electric supply during a summer heat wave.

The demonstration was part of an effort by lawmakers to encourage bi-partisan cooperation on cybersecurity to underscore how important it is for the feds to align on the issue.

In addition to members of the Senate, top cybersecurity officials from various departments and agencies--including the White House, the Department of Homeland Security (DHS), FBI, and National Security Agency--also participated in the event, which illustrated the consequences of a massive cyber attack at a critical time in a major U.S. city. Officials were keeping exact details of what happened at the exercise confidential.

The senior administration officials involved--including DHS secretary Janet Napolitano, White House cybersecurity coordinator Howard Schmidt, and FBI director Robert Mueller--used the exercise to stress the need for legislation to more effectively prevent and respond to potential cyber attacks in the United States, said DHS press secretary Matt Chandler. Laws that officials want Congress to pass include risk-based performance standards for critical infrastructure systems so they meet at least a baseline level of security.

[ Federal cybersecurity incidents are growing. See Federal Cybersecurity Incidents Rocket 650% In 5 Years. ]

The Obama administration submitted a cybersecurity proposal to Congress last May to outline its priorities for cybersecurity and to press lawmakers to pass comprehensive legislation to protect critical U.S. infrastructure that powers the Internet, utilities, and other control systems that are vulnerable to attack. Cybersecurity coordinator Schmidt also pressured Congress in January to pass cybersecurity legislation; however, it has yet to do so, though it is considering a number of bills.

Since then other officials also have been sounding the alarm to get Congress to take action. Thursday National Security Council spokeswoman Caitlyn Hayden urged it to provide legislation to support federal cybersecurity efforts already underway.

"Only Congress can modernize our underlying laws and give us the full range of tools our cybersecurity professionals need to more effectively deal with this growing and increasingly sophisticated threat," she said.

Earlier this week commission co-chairs Tom Kean and Lee Hamilton, former 9/11 commission co-chairs, also took up the cause in a letter sent to Majority Leader Harry Reid and Minority Leader Mitch McConnell. Senate co-sponsors of bi-partisan cybersecurity legislations--Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, Jay Rockefeller, D-W.Va., and Dianne Feinstein, D-Calif.--released the letter.

"Comprehensive legislation is needed to flesh out a range of pressing cyber security policy questions, including how the federal government should defend against and respond to cyber attacks and what measures private sector owners of critical infrastructure should take to prevent the damage or disruption of their often interconnected and interdependent networks," the senators said in the letter, which Rockefeller’s office sent to InformationWeek. "Nothing less than the security of our electricity, communications, financial, and water systems is at stake."

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241624276539
50%
50%
ANON1241624276539,
User Rank: Apprentice
3/9/2012 | 6:24:56 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
BPrince, Is that a serious question? (Just being cynical, not insulting.) OF COURSE I don't!
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/9/2012 | 5:15:59 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
@ readers: how confident are you in the goverment's ability to respond effectively to this type of cyber attack?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7830
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse cap...

CVE-2014-7831
Published: 2014-11-24
lib/classes/grades_external.php in Moodle 2.7.x before 2.7.3 does not consider the moodle/grade:viewhidden capability before displaying hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role to access the get_grades web service.

CVE-2014-7832
Published: 2014-11-24
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by vi...

CVE-2014-7833
Published: 2014-11-24
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.

CVE-2014-7834
Published: 2014-11-24
mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?