Risk
3/8/2012
04:14 PM
Connect Directly
RSS
E-Mail
50%
50%

Feds Simulate Crippling Cybersecurity Attack On NYC Electricity

Senators and agencies participate in exercise, which simulated how the government might respond in the event of a cyberattack on New York's electricity supply during a summer heat wave.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. senators Wednesday participated in a multi-agency exercise to simulate how the government might respond in the event of a cyber attack that cripples New York City’s electric supply during a summer heat wave.

The demonstration was part of an effort by lawmakers to encourage bi-partisan cooperation on cybersecurity to underscore how important it is for the feds to align on the issue.

In addition to members of the Senate, top cybersecurity officials from various departments and agencies--including the White House, the Department of Homeland Security (DHS), FBI, and National Security Agency--also participated in the event, which illustrated the consequences of a massive cyber attack at a critical time in a major U.S. city. Officials were keeping exact details of what happened at the exercise confidential.

The senior administration officials involved--including DHS secretary Janet Napolitano, White House cybersecurity coordinator Howard Schmidt, and FBI director Robert Mueller--used the exercise to stress the need for legislation to more effectively prevent and respond to potential cyber attacks in the United States, said DHS press secretary Matt Chandler. Laws that officials want Congress to pass include risk-based performance standards for critical infrastructure systems so they meet at least a baseline level of security.

[ Federal cybersecurity incidents are growing. See Federal Cybersecurity Incidents Rocket 650% In 5 Years. ]

The Obama administration submitted a cybersecurity proposal to Congress last May to outline its priorities for cybersecurity and to press lawmakers to pass comprehensive legislation to protect critical U.S. infrastructure that powers the Internet, utilities, and other control systems that are vulnerable to attack. Cybersecurity coordinator Schmidt also pressured Congress in January to pass cybersecurity legislation; however, it has yet to do so, though it is considering a number of bills.

Since then other officials also have been sounding the alarm to get Congress to take action. Thursday National Security Council spokeswoman Caitlyn Hayden urged it to provide legislation to support federal cybersecurity efforts already underway.

"Only Congress can modernize our underlying laws and give us the full range of tools our cybersecurity professionals need to more effectively deal with this growing and increasingly sophisticated threat," she said.

Earlier this week commission co-chairs Tom Kean and Lee Hamilton, former 9/11 commission co-chairs, also took up the cause in a letter sent to Majority Leader Harry Reid and Minority Leader Mitch McConnell. Senate co-sponsors of bi-partisan cybersecurity legislations--Sens. Joe Lieberman, I-Conn., Susan Collins, R-Maine, Jay Rockefeller, D-W.Va., and Dianne Feinstein, D-Calif.--released the letter.

"Comprehensive legislation is needed to flesh out a range of pressing cyber security policy questions, including how the federal government should defend against and respond to cyber attacks and what measures private sector owners of critical infrastructure should take to prevent the damage or disruption of their often interconnected and interdependent networks," the senators said in the letter, which Rockefeller’s office sent to InformationWeek. "Nothing less than the security of our electricity, communications, financial, and water systems is at stake."

How 10 federal agencies are tapping the power of cloud computing--without compromising security. Also in the new, all-digital InformationWeek Government supplement: To judge the success of the OMB's IT reform efforts, we need concrete numbers on cost savings and returns. Download our Cloud In Action issue of InformationWeek Government now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ANON1241624276539
50%
50%
ANON1241624276539,
User Rank: Apprentice
3/9/2012 | 6:24:56 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
BPrince, Is that a serious question? (Just being cynical, not insulting.) OF COURSE I don't!
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/9/2012 | 5:15:59 PM
re: Feds Simulate Crippling Cybersecurity Attack On NYC Electricity
@ readers: how confident are you in the goverment's ability to respond effectively to this type of cyber attack?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.