cyberguerre informatique une r ealit e
play

Cyberguerre informatique une r ealit e Pascal Lafourcade Octobre - PowerPoint PPT Presentation

Cyberguerre informatique une r ealit e Pascal Lafourcade Octobre 2017 1 / 19 Computers are everywhere! 2 / 19 5 Famillies of Cyber Criminality Phishing Espionnage Ransomwares Sabotage Destabilisation 3 / 19


  1. Cyberguerre informatique une r´ ealit´ e Pascal Lafourcade Octobre 2017 1 / 19

  2. Computers are everywhere! 2 / 19

  3. 5 Famillies of Cyber Criminality ◮ Phishing ◮ Espionnage ◮ Ransomwares ◮ Sabotage ◮ Destabilisation 3 / 19

  4. Phishing 4 / 19

  5. Espionnage ◮ Little Brother (Individual) ◮ Medium Brother (Corporation) ◮ Big Brother (Government) Edward Joseph Snowden, 6th june 2013 5 / 19

  6. Ransomwares: Wannacry et al. 12 may 2017 http://stopransomware.fr/ 6 / 19

  7. Sabotage Stuxnet, 2010 Saudi Aramco 35 000 PC deleted in 2012. 7 / 19

  8. Destabilisation: Defacing 8 / 19

  9. Destabilisation: Trojan, Botnets and Zombies 9 / 19

  10. http://cybermap.kaspersky.com/ 10 / 19

  11. http://cybermap.kaspersky.com/ 14 September 2017 USA stops to use Kaspersky 10 / 19 29 September 2017 France is doing the same

  12. Why are there more and more attacks? 11 / 19

  13. Why are there more and more attacks? 11 / 19

  14. Why are there more and more attacks? 11 / 19

  15. Why are there more and more attacks? Fast, large scale, semi-automatic... 11 / 19

  16. Why are there more and more attacks? Fast, large scale, semi-automatic... but you wrongly feel anonymous! 11 / 19

  17. Why are there more and more attacks? Fast, large scale, semi-automatic... but you wrongly feel anonymous! Internet was not designed to be secure but just to work! 11 / 19

  18. Cyber Attack against Estonia April 2007 12 / 19

  19. DDos Attack against Dyn DNS 21 October 2016 13 / 19

  20. Advanced Persistent Threat: Govermment attacks ◮ Titan Rain discovered in 2003: Massive USA data collected during 3 years ◮ Operation Aurora discovered in 2010: Chinese attack against USA ◮ November 2014, ◮ 2011 Bercy, 150 PC infected 14 / 19

  21. Computer Science Security Agencies ◮ 1919 ◮ 1952, ◮ 1995, ◮ 2002, ◮ 7 July 2009, 15 / 19

  22. Livre blanc sur la d´ efense et la s´ ecurit´ e nationale 2013 5 milieux (p84): ◮ terre ◮ air ◮ mer ◮ espace extra-atmosphrique ◮ cyberespace “le dispositif de cyberd´ efense, qui est appel ` a s’amplifier dans les ann´ ees qui viennent.” ANSSI et OIV 16 / 19

  23. Backdoors ◮ NSA’s backdoor into Dual_EC_DRBG Dual Elliptic Curve Deterministic Random Bit Generator. ◮ Backdoor identified by academic researchers (Crypto 2007) and revealed by Snowden 2013. 17 / 19

  24. Conclusion: Cyberwar is a reality $7 billion for USA cyber operations in 2017 over $35 billion over the next 5 years. 18 / 19

  25. Conclusion: Cyberwar is a reality $7 billion for USA cyber operations in 2017 over $35 billion over the next 5 years. ◮ Communications are crucial: Egypt, Tunisia revolutions 18 / 19

  26. Conclusion: Cyberwar is a reality $7 billion for USA cyber operations in 2017 over $35 billion over the next 5 years. ◮ Communications are crucial: Egypt, Tunisia revolutions ◮ Tracking authors is not always easy 18 / 19

  27. Conclusion: Cyberwar is a reality $7 billion for USA cyber operations in 2017 over $35 billion over the next 5 years. ◮ Communications are crucial: Egypt, Tunisia revolutions ◮ Tracking authors is not always easy ◮ Defense and attack strategies are different 18 / 19

  28. Conclusion: Cyberwar is a reality $7 billion for USA cyber operations in 2017 over $35 billion over the next 5 years. ◮ Communications are crucial: Egypt, Tunisia revolutions ◮ Tracking authors is not always easy ◮ Defense and attack strategies are different ◮ Cyberattacks can have physical consequences 18 / 19

  29. Thanks for your attention. War games, 1983 Could be a reality? Questions? 19 / 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend