Cyber-Warfare: The Future is Now!

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
Computer Crimes and Security Professor Matt Thatcher.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
Information Warfare Theory of Information Warfare
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
E-Commerce Security and Fraud Issues and Protections
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Computer Crime and CyberCrime Why we need Computer Forensics.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Hurdles in implementation of cyber security in India.
Information Warfare Playgrounds to Battlegrounds.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
Safe’n’Sec IT security solutions for enterprises of any size.
Security Mindset Lesson Introduction Why is cyber security important?
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
October 28, 2015 Cyber Security Awareness Update.
Cyber crime and security issues
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
International Conflict & Cyber Security
CYBER SECURITY...
FYE Cybersecurity Dr. X.
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Dissecting the Cyber Security Threat Landscape
CSI Survey 2007 Tiffany Gorman
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Chapter 1: The Need for Cybersecurity
Protecting Your Company’s Most Valuable Asset
Forensic and Investigative Accounting
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
LO1 - Know about aspects of cyber security
Texas Assisted Living Association 2019 Conference
Presentation transcript:

Cyber-Warfare: The Future is Now!

Agenda BLUF - Bottom Line Up Front Cyber-Warfare - 5Ws Cyber-Threats and Targets Economic Impact and Cyber-Law Questions

BLUF (Bottom Line Up Front) Significantly increased over the last decade Frequency, scale, sophistication, and severity of impact Thousands of attacks daily ~240 New forms of Malware released each day Requires minimal cost and effort Malicious Tools easily found on the “DarkNet” at minimal cost Can impose a tremendous amount damage and confusion on a global scale. Reliant on technology, even minor attacks can be catastrophic and debilitating

What is Cyber-Warfare 5th Dimension of War Probing or penetration attack On an individual computer or a computer network system through the Internet Exploit weakness, steal information, or conduct sabotage.

Who is the Enemy Individual Hackers Hacktivist Groups Criminal Organizations Corrupt Businesses Terrorists Foreign Military or Government

Types of Threat External: Most Likely Insider Threats: (Difficult to Identify) Malicious / Intentional / Unintentional / Consequential

Types of Attack Point of Sale Attacks: 28.5% Crimeware: 18.8% Computer Espionage: 18.0% Privilege Misuse: 10.6% Web Applications: 9.4% Miscellaneous: 14.7% Malicious Code Denial of Service Theft / Fraud Espionage Sabotage / Destruction SOURCE: Verizon Data Breach Investigations Report (DBIR) 2015

Cyber-Targets Medical / Healthcare - 129 / 100 Mil 2015 # Breaches / # Records Medical / Healthcare - 129 / 100 Mil Government / Military - 27 / 47 Mil Education / Research - 31 / 724K Banking / Financial - 39 / 408K Small, Medium, Large Business - 154 / 121K Energy / Utilities - 79 /

Previous Attacks 2007: Russia / Estonia - DDOS - Sabotage 2010: U.S. / Iran - Stuxnet Worm- Sabotage 2013: Iran / U.S - Natanz - Retaliation - Theft / Fraud

Recent Attacks 2014: Anthem / Unknown 2015: China / U.S - OPM - Theft Theft 80 mil medical records 2015: China / U.S - OPM - Theft Outsourced Domain Administration Support to Foreigners: System Administrators from: China and Argentina Both had ROOT Privileges. NO HACKING REQUIRED! Encryption Would NOT have helped!

Economic Impact Cost of Cyber-Crime Lost profits Minimal public spending due to lost trust Destruction of the Financial System

Cyber-Law Domestic Law International Law Laws of War Rules of Engagement - Kinetic / Electronic

Take Away Increase cyber education and training Increase budgets and funding Increase vigilance Malicious Code Denial of Service Theft / Fraud Espionage Sabotage / Destruction

Questions