ROLE OF CERT-GOV-MD and cooperation at national level Na Natalia - - PowerPoint PPT Presentation

role of cert gov md and cooperation at national level
SMART_READER_LITE
LIVE PREVIEW

ROLE OF CERT-GOV-MD and cooperation at national level Na Natalia - - PowerPoint PPT Presentation

ROLE OF CERT-GOV-MD and cooperation at national level Na Natalia SPINU NU, Ch Chief, C , CERT-GO GOV-MD MD, S , S.E .E. C . CTS AGENDA 1. Introduction 2. CERT-GOV- MD: organization and operational capacities 3. CYBERSECURI TY


slide-1
SLIDE 1

ROLE OF CERT-GOV-MD and cooperation at national level

Na Natalia SPINU NU, Ch Chief, C , CERT-GO GOV-MD MD, S , S.E .E. C . CTS

slide-2
SLIDE 2
  • 1. Introduction
  • 2. CERT-GOV-

MD:

  • rganization and
  • perational

capacities

  • 3. CYBERSECURI

TY INCIDENTS: CHALLENGES, CURRENT SITUATION AND PAST ATTACKS

  • 4. Future:

Cybersecurity in moldova

  • 5. CONCLUSION

S

AGENDA

slide-3
SLIDE 3

There are only two types

  • f companies: Those

that have been hacked, and those that will be.

Robert Mueller, FBI Director, 2012

slide-4
SLIDE 4

Introduction

slide-5
SLIDE 5

CYBER THREATS ARE INTERCONNECTED

CYBER THREATS 2017

PE PETYA / NONPE PETYA / GO GOLDENEYE (JUNE 2017) WA WANNACRY (MAY 2017) SH SHADOW W BROKERS S LE LEAK (APRIL 2017)

slide-6
SLIDE 6

SHADOW BROKERS LEAK

August 2016

§ Shadow brokers group claimed to

  • btain NSA spy tools.

April 2017

§ The most significant leak of spy exploits done by the group.

April’s leak led to the most serious consequences.

slide-7
SLIDE 7

WANNACRY

§ On Ma May 12 a strain of ransomware called WannaCry spread around the world. § The ransomware used leaked by Shadows Brokers exploit to attack the targets.

slide-8
SLIDE 8

PETYA / NONPETYA / GOLDENEYE

§ A month or so after WannaCry, another wave of ransomware infections that partially leveraged Shadow Brokers Windows exploits hit targets worldwide

slide-9
SLIDE 9

§ Gr Growing space with rapid expansion – Across all sectors: individuals, commerce, governments – Growing pervasiveness in everything we do § Ma Many threats § Cy Cyber Security is an unclear con

  • ncept

– Considerable uncertainty, broad scope, and ever-changing dimensions – Cyber security definitions vary widely and lack true conformity

WHY THIS MATTERS TO YOU

§ Cy Cyber is a chaot

  • tic and ungo

governed en environmen ent – Increasing tension between governments, individuals, private enterprises, commence. – What is cyber defense? § Ea Early stages of cyber expansion – Technological advancement – Fast and intense competition – An uncertain future of the cyber domain, the internet and more

slide-10
SLIDE 10

Wh When…

  • In the Cyber world, security was an afterthought
  • The Cyber world lacks a single central cyber architect
  • The Cyber world is a system of insecure systems
  • The Cyber world is not static but constantly evolving
  • Innovation is constant, and highly unpredictable

THE CYBER SECURITY CHALLENGE…

slide-11
SLIDE 11

CERT-GOV-MD

ORGANISATION AND OPERATIONAL CAPACITIES

slide-12
SLIDE 12

WHO WE ARE?

SUBORDINATION HIERARCHY FACTS 2010 Established by Government decision № nr. 746 of 18.08.2010 2013 Implemented ISO 27001 2014 CERT-GOV-MD became accredited by Trusted Introducer 2016 FIRST membership Security department Government Clients State Chancellery S.E. Center of Special Telecommunications Cyber Security Center CERT-GOV-MD Public Authorities Private sector

slide-13
SLIDE 13

§ Serve as a trusted point of contact § Develop an infrastructure for coordinating response § Develop a capability to support incident reporting § Conduct incident, vulnerability & artifact analysis § Participate in cyber watch functions § Help organizations to develop their own incident management capabilities § Provide language translation services § Make security best practices & guidance available § Provide awareness, education & trainings

Benefits of CERT-GOV-MD

slide-14
SLIDE 14

THREATS

CYBERSECURITY

slide-15
SLIDE 15

THREATS

Threats in Cyberspace

INFORMATION & ABUSE

  • Targeted government

control and influence of citizens

  • Propaganda
  • Consciously communicating

false information

  • State espionage
  • Data breach
  • Identity theft
  • Hackers
  • Internet crimes,

encouraging sedition

  • Terrorism
slide-16
SLIDE 16

THREATS

Threats are Becoming More Complex

Cloud storage Mobile data storage Supply chain isn’t transparent Tablet computer New types of viruses every day Increasingly more complex software programs Several updates daily

THREATS ARE BECOMING MORE COMPLEX

slide-17
SLIDE 17

THREATS

DATA IN SECURE BUSINESS SYSTEMS

§ Mainframe systems § Internetworking § Emergence of open systems

INTERNET ACCESS AND HIGHLY CONNECTED SYSTEMS

§ Online access to citizen data § Advances in internetworking § Citizen self service

ACCESS ANYWHERE & ANYTIME

§ Integrated online eligibility systems § Big data § Cloud § Mobile

DATA EVERYWHERE; USER EXPERIENCE DRIVEN

§ Wearable technology § Internet of things § Smart devices § Drones § Artificial intelligence § Mobile payment § Etc.

Low

BUSINESS IMPACT:

§ Citizen trust § Cost to protect § Legal/ regulatory § Critical infrastructure

Now 2000s 2010-2014 1990s

High

Cyber terrorism

Insecure codes Cyber crime Identity theft

Hackers

Data breach Network attacks Malware Critical infrastructure attacks Foreign state sponsored cyber espionage

Cyber warfare

slide-18
SLIDE 18

CYBERSECURITY INCIDENTS

CHALLENGES, CURRENT SITUATION AND PAST ATTACKS

slide-19
SLIDE 19

CYBER INCIDENTS IN GOVERMENTAL SECTOR

0% 10% 20% 30% 40% 50% 60% 70%

SPAM Network attacks Information gathering Botnets Intrusion attempts

INCIDENTS BY CATEGORY (2016)

2013 2014 2015 2016 60% 80% 100% 120%

NUMBER OF INCIDENTS 5 636 172 6 570 938 6 285 590 6 644 949

slide-20
SLIDE 20

THREATS

3 3 882 882 529 529 unsolici cited ed em emails block cked ed as of 2016 2016

SPAM

Seems legitimate and are sent to an email account Contains often dangerous links (to download) or invoices for alleged online orders Many email accounts have spam filtering Can also be sent on social networks or apps

slide-21
SLIDE 21

THREATS

57 57 575 575 malware e block cked ed as of 2016 2016

ATTACKER VICTIM TROJANS & WORMS

Various new forms of malware appear

  • n the internet every day.

Nest undetected in computer systems

  • r creep in during downloads

ARE SENT VIA INFECTED EMAILS

Can transfer sensitive data such as passwords, banking information, personal data

hacker

slide-22
SLIDE 22

ATTACKER BOTNETS CONTROLERS INFECTED TARGET

Can attacks all IT systems Can send infected and dangerous (spam) emails Networks consisting of several computers Can send infected and dangerous (spam) emails

INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED

hACK ER hACK ER

THREATS

3 3 678 678 Botnets infect ections detect ected ed

slide-23
SLIDE 23

BOTNETS CONTROLERS TARGET INFECTED

Block internet services

Are also used as a distraction while malicious software is being installed

ATTACKER

It purpose is to Interrupt web servers which then causes a mass of data packets to be sent to the server

Networks consisting of several computers

hACK ER hACK ER

INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED INFEC TED

THREATS

124 575 Distri ributed Denial-of

  • f-ser

service ce (D (DOS) ) at attacks stopped

slide-24
SLIDE 24

CAPACITY BUILDING

Cyber Security Trainings and Workshops

Joint educational activities

slide-25
SLIDE 25

INFORMATION SECURITY AWARENESS

CERT-GOV-MD’s awareness activities

slide-26
SLIDE 26

POWER OF PARTNERS

Working together to ensure high level of cybersecurity

slide-27
SLIDE 27

FUTURE

CYBERSECURITY IN MOLDOVA

slide-28
SLIDE 28

SECURITY

Continuous Steps of a Security Management Process

Technical measures Validation and improvement Risk analysis

Policies,

  • rganizational

measures

3 4 1 2

Security Manageme nt Process

slide-29
SLIDE 29

FUTURE

New Research Program of the Government with Four Focus Areas

New encryption capabilities and security measures Security measures and solutions for networked systems Protection of critical infrastructures and networked industrial plants More control over citizens’ personal data on the Internet

PRIVACY & DATA PROTECTI ON APPLICATI ONS SECURE INFORMAT ION & COMMUNI CATIONS TECHNOL OGY (ICT) SYSTEMS NEW HIGH- TECH INFORMAT ION TECHNOL OGIES FOR MORE SAFETY

slide-30
SLIDE 30

CONCLUSIONS

slide-31
SLIDE 31

CONCLUSION

Cyber security is a global problem that has to be addressed globally by all governments jointly; No government can fight cybercrime or secure its cyberspace in isolation; International cooperation is essential to securing cyberspace;

It is not a technology problem that can be ‘solved’; it is a risk to be managed by a combination of defensive technology.

slide-32
SLIDE 32

THANK YOU!

Na Natalia alia SP SPINU natalia.spinu@cts.md natalia.spinu@cert.gov.md