cyber space incidents 1 is tv4 attack tv5monde went black
play

Cyber(space) Incidents 1 IS TV4 attack TV5Monde went black - PowerPoint PPT Presentation

Cyber(space) Incidents 1 IS TV4 attack TV5Monde went black (2015) Heartbleed: Wikileaks Revelations worst vulnerability ever secret hacking tools: IoT (2014; in open SSL) (democratic control?, 2017)


  1. • • •

  2. Cyber(space) Incidents 1 IS TV4 attack ‘TV5Monde went black’ (2015) Heartbleed: Wikileaks Revelations ‘worst vulnerability ever’ ‘ secret hacking tools: IoT ’ (2014; in open SSL) (democratic control?, 2017) Great Bank Robbery (Carbanak) ‘ biggest ever cybercrime’ (1 billion dollars, 2015, global)

  3. Cyber(space) Incidents 2 Wanna Cry (2017) : within a day 230.000 Microsoft computers were infected in 150 countries (ransom to be paid in bitcoin crypto currency ; exploit was discovered by NSA and used for cyber weapons; Microsoft also discovered it; released a patch: was often not implemented  wide spread of the worm) Petya (2016/17) container terminal of APM (Maersk) in port of Rotterdam stopped to function, among others (worldwide impact!!!!) WannyCry: Initially affected countries

  4. • • •

  5. • –  –  13

  6. Vision: Cyberspace = 5th domain • Cyberspace is a complex , manmade system at global scale, deeply embedded in the four physical domains of land, water, air and space • Characteristics: high speed global connectivity (  individual organizations) – – huge distributed data processing power (including millions of intelligent systems taking autonomously decisions  passive information) huge data storage capabilities: we now talk about big & open data – – with almost 3 billion human actors in different roles worldwide – with > 14 billion (intelligent) devices and systems connected • Key assets: cyber activities = IT-enabled 6 activities (!)

  7. Cyber activities of all kind… Basic cyber activities (= IT-enabled activities ) • Communication: sms, email, chat, whatsapp, skype, voip, twittering , … • Information retrieval: news, wheather forcast , public transportation, crises, … • Watching: movies, sporting events, television, youtube , … • Listening: radio, music, spotify , … More advanced cyber activities ‘ Searching ’: google searching, wikipedia , route planning, translating, … • • (Automatic) transacting: e-shopping, e-trading, e-payments, e-procurement, holiday planning, tax returns, e-marketplaces, e-voting, crowd sourcing/funding , … • Social gathering: Facebook, LinkedIn, e-dating, 2 nd love, sexting, gambling , … 15 15 Rating & Ranking: top web-sites, universities , hotels, services, … •

  8. Cyber activities of all kind, cont’d . More advanced cyber activities, cont. • Educating: MOOCs, e-learning, e- coaching … • Monitoring and surveillance activities : sensoring, detecting, using drones, … • Controling critical infrastructures: energy & water supply, transport, chemical processing, flood defence , … • Cyber protesting: activism including fundraising, community building, lobbying, organizing Less favourable cyber activities • Cyber crime (dark markets) : financial fraud, theft, hacking, child pornography, e- espionage, cyber bullying, sale of drugs/guns /…, illegal downloads, … • Cyber warfare: intelligence, defense, attack ~ Cyber Operations: NSA, drones, hacking, attacking, cracking, information warfare … Note : cyber activities provide semantics to data processing (!!!) 16 16

  9. Decomposing cyberspace in layers Technical layer: IT services ~ information security ~ • CIA(A) Socio-tech layer: • cyber activities ~ cyber security ~ personal/business/societal goals Governance layer: • governance & management ~ rules & regulations (for other layers) ~ cyber risk appetite, ethics & compliance - Cyber sub-domains: examples in figure! 17 17

  10. Cyber security struggling As end-user •  How to protect my PC? How to educate (my) children?  As (board) member of a company •  Which specialists, how to organize them? Should we start a SOC?  • As decision maker about critical infrastructures  How far can we develop the smart grid?  What about the cyber security of automated car control?  Is distant-control for gas supply/flood defense acceptable?

  11. Cyber security struggling, cont’d • As crisis manager What to do? Who should I contact?  Which information to make public?  • As police officer What happens in the dark web?  Which tools to use for catching the unknown  attacker/criminal? • As politician  Which rules & regulations to put in place?  Which institutions, which responsibilities?

  12. Risk mgt: 1. Risk assessment of cyber activity breaches 2. Reduction of cyber risks to ‘ acceptable levels’ “bowtie diagram” 21 21

  13. 3. Taking a set of adequate security measures Balancing preventive and repressive measures in different layers Technical layer: …  Socio-tech layer:   Governance layer: aligned over all cyber sub-domains • … … • together securing cyberspace = securing the cyber activities of all actors 22 22

  14. Conditio-sine-qua-non for adequate risk management  Creating Cyber Situational Awareness in  socio-technical layer (cyber activities by people & intelligent systems)  technical layer (in terms of IT-processes and -communication)  Includes  attackers  cyber crime (dark web)  in short: cyber attacks Creates   privacy-security dilemma

  15. Conclusions  Cyberspace = space of cyber activities = IT-enabled activities  Cyber security (= Securing Cyberspace ) is a societal problem having technical/legal/economical/institutional/international relations/ethical , … perspectives  Goal of cyber security: reducing cyber risks to acceptable levels  It starts with identification of all relevant cyber risks  Level of cyber risks determines what measures are appropriate  Everyone can and has to contribute 24 24

  16. • • •

  17. • • • •

  18. • • • •

  19. • •

  20. • • • • • • •

  21. • • • • • • •

  22. • •

  23. • • •

  24. • • • – – • •

  25. • • – –

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend