Cyber Storm Exercise
The Cyber Storm exercise is a biennial
Cyber Storm I
The first Cyber Storm exercise took place February 6 through February 10, 2006 with the purpose of testing the nation's defenses against
Simulation
The exercise simulated a large scale attack on critical digital infrastructure such as
- Washington, D.C. Metrotrains mysteriously shutting down.
- Bloggersrevealing locations of railcars containing hazardous materials.
- The airport control towers of Philadelphiaand Chicago mysteriously shutting down.
- A mysterious liquid appearing on a London subway.
- Significant numbers of people on "no fly" lists suddenly appearing at airports all over the nation.
- Planes flying too close to the White House.
- Water utilities in Los Angeles getting compromised.
Internal difficulties
During the exercise the computers running the simulation came under attack by the players themselves. Heavily censored files released to the
Performance of participants
The Cyber Storm exercise highlighted the gaps and shortcomings of the nation's cyber defenses. The cyber storm exercise report found that institutions under attack had a hard time getting the bigger picture and instead focused on single incidents treating them as "individual and discrete".[5] In light of the test the Department of Homeland Security raised concern that the relatively modest resources assigned to cyber-defense would be "overwhelmed in a real attack".[6]
Cyber Storm II
Cyber Storm II was an international cyber security exercise sponsored by the United States Department of Homeland Security in 2008. The week-long exercise was centered in
Cyber Storm III
Cyber Storm III was an international cyber security exercise sponsored by the United States Department of Homeland Security in 2010. The week-long exercise was centered in Washington, DC and concluded on October 1.[8]
See also
References
- ^ Department of Homeland Security). Accessed February 1, 2008.
- ^ Cyber Storm Exercise Report Archived February 12, 2012, at the Wayback Machine (Department of Homeland Security)
- ^ Kapica, Jack. A blogger’s paranoia Archived April 6, 2008, at the Wayback Machine, The Globe and Mail, Accessed February 1, 2008.
- ^ "Cyber 'War' Games Highlight Vital Security Flaws". www.cybertalkblog.co.uk. Archived from the original on April 16, 2021. Retrieved March 13, 2017.
- ^ Wait, Patience. Cyber Storm exercise challenged coordination, communications Archived February 11, 2008, at the Wayback Machine (Government computer news). Accessed February 1, 2008.
- ^ DHS releases report on Cyber Storm exercise. Accessed February 18, 2008.
- Computerweekly.com. Accessed March 21, 2008.
- ^ Ian Grant. "Cyber Storm III"