What practical methods should citizens be using to protect themselves against, and reduce the impact of an attack against critical national infrastructure
A lot of recent news about critical network infrastructure under DDoS attacks, for example GoDaddy. Furthermore with the discovery of APTs like Stuxnet and flame the danger of cyber war is beginning. The U.S. Defense Secretary said that if we don't secure our computer systems and networks they will be on the way to destruction. So I'm wondering, what practical methods should citizens be using to protect themselves against, and reduce the impact of a Cyber Pearl Harbor?
According to my threat model I divided computer systems into tiers. Each higher tier should follow everything lowers tiers do and more. The lowest is regular computer users - primarily they need to protect against becoming infected as part of a zombie botnet, but also becoming infected so that any removable media could not infect their workplaces (a higher tier priority).
Regular people:
- Strong (high entropy and salted) Passwords Changed Monthly
- Full Disk Encryption and External Hard Drive (reduce the attack surface to modify your computer data to one of: physical access, remote code execution..) compartmentalizing threat models. with regular backups.
- Firewall and no unnecessary services:
- Disable vulnerable software java and flash
- HTTPS everywhere (block interception and man in the middle attacks.. make sure all devices check certificates correctly)
- Tor over VPN (anonymity + privacy).
- ensure wireless router is not usable for DDOS by reflection attacks
- Cryptographically Signed Daily Software Upgrade (protection against all patched exploits: only have to worry about 0-days).
- System installer disks: If you get a virus or suspect a rootkit just wipe the computer and start again
- Offline computers: A "backup" computer not connected to the internet at all
Businesses:
- Regular business security practices and certifications plus:
- Encrypted Cloud Services: check that cloud computer services you use encrypt so that they cannot leak information to cyber attackers
- Large scale Cooperation with LE via Counter surveillance of alien packets.
- PGP encrypted emails.
- 2 factor Authentication to protect against phishing and social engineering.
- Censorship of propaganda against for recruitment: UN report urges internet strategy against terrorism
CAs: It is unknown how Certificate Authority should operate in a time of cyber war. Due to the danger of another DigiNotar it should perhaps be supported by the web of trust, also using "offline" methods such as IPoAC to issue certificate revocations.
Drones: hackers may attempt reprogram surveillance drones to operate offensively.
This is the highest priority so they will have the strictest security measures of all include the Obama "red button" to completely disable network operation of the country. Also in dire circumstances maybe assemble a "hack back" counter attack team to produce a worm which is capable of shutting down the entire worlds internet parallel to the cold war standoff?