Lifeboat Foundation InternetShield

Overview

Types of Attacks

1. Distributed Attack

2. Phishing Attacks

3. Attack Against Physical Infrastructure

4. Specialized One-On-One Attack

5. One-To-Many Attack

6. Attack Against Software Components of the Infrastructure

Social Solutions

Create a CERT body to deal with reports of malicious activity. This body should be mostly composed of independent professional representatives, especially of the major ISPs, to assure neutrality, competence and efficiency in dealing with these issues.



Reporting of incidents to the responsible CERT should become legally binding. A less bureaucratic solution would be that IT-related insurance companies demand reporting of all incidents in their contracts to mitigate the overall impact and frequency of cyberattacks. (And CERT would require that you have IT insurance.) Create a separate law-enforcement branch that will follow up on repeated criminal Internet activity by actors within their physical borders (regardless of provable monetary losses).



This branch will need to differentiate between individual financial losses (traditional fraud against companies, persons, copyright) and the more serious: attacking the Internet infrastructure (DDoS, mass phishing, mass intrusions, worms, viruses, attacks against ISPs and real-world infrastructure such as CCTV, hospitals, and power grids). Require cooperation and information sharing between these bodies inside the country and also with other countries’ CERT/LE bodies. Give these bodies the authority and power to require ISPs/registrars within their borders to remove malicious sites and hostnames upon a report by the CERT or face monetary penalties for not doing so.

Technical Solutions

1. Secure Operating Systems

2. Secure Hardware

3. Variety of Operating Systems

4. Honeypots

5. Secure Email

6. Untrusted Executables

7. Clean Slate

Conclusion

Notes and References