On Cyber-Peace Towards an International Strategy of Cyber-Security - - PowerPoint PPT Presentation

on cyber peace
SMART_READER_LITE
LIVE PREVIEW

On Cyber-Peace Towards an International Strategy of Cyber-Security - - PowerPoint PPT Presentation

On Cyber-Peace Towards an International Strategy of Cyber-Security Stefan Schumacher Magdeburger Institut f ur Sicherheitsforschung DeepSec In Depth Security Conference Stefan Schumacher (MIS) On Cyber-Peace DeepSec 1 / 19 Uber Mich


slide-1
SLIDE 1

On Cyber-Peace

Towards an International Strategy of Cyber-Security Stefan Schumacher

Magdeburger Institut f¨ ur Sicherheitsforschung

DeepSec In Depth Security Conference

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 1 / 19

slide-2
SLIDE 2

¨ Uber Mich

NetBSD-Developer, Hacker for almost 20 years consultant for IT-Security with focus on Social Engineering, Security Awareness and Counter Intelligence (www.Kaishakunin.com) Co-Founder and Managing Director of Magdeburger Institut f¨ ur Sicherheitsforschung www.sicherheitsforschung-magdeburg.de Co-Editor of Magdeburger Journal zur Sicherheitsforschung studied educational science and psychology

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 2 / 19

slide-3
SLIDE 3

Danger

I am not going to present a plan or algorithm to make ≫the internet≪ secure, but just some thoughts on IT security from a more global point of view. strategic level, according to Carl von Clausewitz

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 3 / 19

slide-4
SLIDE 4

On Cyber War

DeepSec 2010: Cyberwar on the Horizon? Cybercrime/-war hype in the media on cyber (in-)security and cyber war good: awareness on security is on a high level (at least for some) bad: not anyone involved in the discussion knows what he’s talking about ugly: some journalists, politicians, lobbyist groups (DRM etc.)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 4 / 19

slide-5
SLIDE 5

Current Development in IT-Security

IT is emerging to many new fields IT security is also emerging to new fields but many are not aware of IT security problems Electrical and Mechanical Engineers have a complete different concept of security static rules published by the organization for standardization (DIN)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 5 / 19

slide-6
SLIDE 6

Current Development in IT-Security

IT is emerging to many new fields IT security is also emerging to new fields but many are not aware of IT security problems Electrical and Mechanical Engineers have a complete different concept of security static rules published by the organization for standardization (DIN)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 5 / 19

slide-7
SLIDE 7

the pestilence of modern days ...

Networking/Internet is emerging to new fields IPv6 enables each coffee maker and fridge to be online smart living roles out more and more IT use your smart phone to control your heating at home and instruct your fridge to order more beer online ...

  • nce again: it security is expensive and not that sexy, so it is

(mostly) ignored Cassandra is calling ...

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 6 / 19

slide-8
SLIDE 8

the pestilence of modern days ...

Networking/Internet is emerging to new fields IPv6 enables each coffee maker and fridge to be online smart living roles out more and more IT use your smart phone to control your heating at home and instruct your fridge to order more beer online ...

  • nce again: it security is expensive and not that sexy, so it is

(mostly) ignored Cassandra is calling ...

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 6 / 19

slide-9
SLIDE 9

Stuxnet

attacked Programmable Logic Controllers (PLC) on Industrial Control Systems included the first (created|known) PLC rootkit Industrial Control Systems are mainly developed/operated by Electrical Engineers different concept of ≫security≪ further malicious software might attack other PLCs/ICSs a car has been hacked by a manipulated MP3 CD

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 7 / 19

slide-10
SLIDE 10

Attacks - the complete picture

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 8 / 19

slide-11
SLIDE 11

Zombies, Botnets and dDoS

botnets containing of thousands or even millions of zombies used by eg. cyber crime groups to extort companies like banks botnets are usually created by automated scanning of large nets and automated exploiting of detected vulnerabilities most exploits are already known and patches are available - but not installed many average users are still not aware of it security if they are aware, they are lacking skills to secure/harden their systems according to Microsoft, ca. 40% of exploits use vulnerabilities, where security patches have been available for more than 12 month

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 9 / 19

slide-12
SLIDE 12

Zombies, Botnets and dDoS

botnets containing of thousands or even millions of zombies used by eg. cyber crime groups to extort companies like banks botnets are usually created by automated scanning of large nets and automated exploiting of detected vulnerabilities most exploits are already known and patches are available - but not installed many average users are still not aware of it security if they are aware, they are lacking skills to secure/harden their systems according to Microsoft, ca. 40% of exploits use vulnerabilities, where security patches have been available for more than 12 month

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 9 / 19

slide-13
SLIDE 13

The Future of Social Engineering

a technique to circumvent security mechanisms by misusing human behavior

≫Hacking People≪

misuse of fundamental human psychology Why should I crack /etc/master.passwd, if I can talk a user into revealing his password?

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 10 / 19

slide-14
SLIDE 14

The Future of Social Engineering

a technique to circumvent security mechanisms by misusing human behavior

≫Hacking People≪

misuse of fundamental human psychology Why should I crack /etc/master.passwd, if I can talk a user into revealing his password? automatic social engineering enhanced spear phishing to collect passwords or install malware (trojans etc.)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 10 / 19

slide-15
SLIDE 15

The Future of Social Engineering

a technique to circumvent security mechanisms by misusing human behavior

≫Hacking People≪

misuse of fundamental human psychology Why should I crack /etc/master.passwd, if I can talk a user into revealing his password? automatic social engineering enhanced spear phishing to collect passwords or install malware (trojans etc.)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 10 / 19

slide-16
SLIDE 16

IT security is multi factorial

IT security is not just a technological problem technological dimension – psychological dimension – social dimension – political dimension – legal dimension IT security has to extend its limitations to technology cooperation with psychology, social science, educational science, didactics, adult education, law, politics

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 11 / 19

slide-17
SLIDE 17

the human factors ...

human factors research - a branch of (industrial/engineering) psychology man machine interaction, cognitive load of cockpits, electronic assistants in cars security awareness and capacity building How do I motivate people to get interested in IT security? (huge problem) How do I train and educate people in IT security matters? (install patches etc.) Want to prevent Social Engineering? social problem social solution psychology So there is a lot to do, let’s get it on :-)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 12 / 19

slide-18
SLIDE 18

the human factors ...

human factors research - a branch of (industrial/engineering) psychology man machine interaction, cognitive load of cockpits, electronic assistants in cars security awareness and capacity building How do I motivate people to get interested in IT security? (huge problem) How do I train and educate people in IT security matters? (install patches etc.) Want to prevent Social Engineering? social problem social solution psychology So there is a lot to do, let’s get it on :-)

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 12 / 19

slide-19
SLIDE 19

Manufacturers of Software

have to deal with security problems develop and roll out patches etc. get in contact with security researchers, (white hat) hackers be aware of security matters

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 13 / 19

slide-20
SLIDE 20

Politics and Law

limited to Germany

product liability by the manufacturer user liability by the user users in Germany are normally not responsible/liable for the technical security of their Computers but they are responsible/liable for the security of eg. their car this should be changed the manufacturer of software should also be responsible and liable for their products

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 14 / 19

slide-21
SLIDE 21

Politics

security policy is an essence of every government (police, firefighters, hospitals, armed forces ...) the internet is being discussed by politicians (mostly in a very strange way) talk to them, educate them, don’t vote for them, found a political party ;-) if the manufacturers of software don’t care about security, the government could force them ...

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 15 / 19

slide-22
SLIDE 22

nations unite ...

governments and countries should cooperate in fighting cyber crime get aware of cyber crime exchange knowledge and technology shut down cyber crime gangs

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 16 / 19

slide-23
SLIDE 23

solving solvable problems

some ideas

according to Microsoft, ca. 40% of exploits use vulnerabilities, where security patches have been available for more than 12 month Microsoft evolved and implemented a cyber security strategy (good) the users did not evolve (bad) Psychology: Awareness, Training, Education Politics: make users liable for security problems Media: Awarenes, cover the topic (in a serious way!) Social Science: Knowledge Management in Organizations

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 17 / 19

slide-24
SLIDE 24

solving solvable problems

some ideas

according to Microsoft, ca. 40% of exploits use vulnerabilities, where security patches have been available for more than 12 month Microsoft evolved and implemented a cyber security strategy (good) the users did not evolve (bad) Psychology: Awareness, Training, Education Politics: make users liable for security problems Media: Awarenes, cover the topic (in a serious way!) Social Science: Knowledge Management in Organizations

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 17 / 19

slide-25
SLIDE 25

Sum it up

IT security has many dimensions IT security professionals/researchers have to connect to that dimension problems can often only be solved in some or all of these dimensions IT security is not static! Security Exports of the World: Unite!

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 18 / 19

slide-26
SLIDE 26

Sum it up

IT security has many dimensions IT security professionals/researchers have to connect to that dimension problems can often only be solved in some or all of these dimensions IT security is not static! Security Exports of the World: Unite!

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 18 / 19

slide-27
SLIDE 27

Questions? stefan.schumacher@ sicherheitsforschung-magdeburg.de

9475 1687 4218 026F 6ACF 89EE 8B63 6058 D015 B8EF

Stefan Schumacher (MIS) On Cyber-Peace DeepSec 19 / 19