Download presentation
Presentation is loading. Please wait.
1
The Cyber Threats Landscape
Global, Regional and National Perspective The cyber domain is currently evolving at a rapid pace and scale with an increasing level of interconnectedness between physical and virtual systems, people and processes. ENG. BADAR ALI ALSALEHI DG OF OMAN NATIONAL CERT Information Technology Authority Muscat – November
2
Global Cyber Threats Landscape
3
Global Cyber Threats Landscape
4
Global Cyber Threats Landscape
5
Global Cyber Threats Landscape
6
Global Cyber Threats Landscape
Digital Attack Map : Top daily DDoS attacks worldwide
7
Global Cyber Threats Landscape
8
Global Cyber Threats Landscape
9
Global Cyber Threats Landscape
FBI: Ransomware Estimated Financial impact is 1B USD
10
Global Cyber Threats Landscape
11
Global Cyber Threats Landscape
12
Cyber Attacks Motivation
13
445B $ Annual impact of Cyber Crime on global Economy
IMPACTS of Cyber Crime 18 victims 445B $ Annual impact of Cyber Crime on global Economy Estimated to become a 6 Trillion $ by 2021 150 M $ loss on personal data e.g. Credit cards 556 Millions Annual victims of cyber crime 1.5 million victims a day 18 victims of Cyber Crime every second
14
UN estimates that 80% of cyber crime comes from Organized
Source of Cyber Crime UN estimates that 80% of cyber crime comes from Organized Criminal gangs
15
WHERE CRIMINLA SPEND THEIR TIME!?
Dark Web 4 % 96% % CAN BUY EVERY TYPE OF ATTACKS, YOU CAN SEE GOLD , SLIVER AND VRONZE LEVEL OF SERVICES. CAN CHECKS REFERENCES, BUY MONEY BACK GURANTEE ATTACKS
16
What is in the dark web ? Malware distribution Hitman Pornography
Cyber terrorism Human trafficking Drugs Zero day vulnerabilities Weapons/ guns etc
17
Dark web tools
18
Dark web SERVICE EVALUATION
SELLING MALWARE SERVICE EVALUATION
19
TERMS OF SERVICE !!
20
Underground Market
21
Regional Cyber Threat landscape : Arab region
22
Regional Cyber Threat landscape : Arab region
Ref : Kaspersky Security Network (KSN) statistics for the first quarter of 2017
23
Regional Cyber Threat landscape : Arab region
- Algeria (38.1% ) Tunisia (32.4%) Morocco (26.1%) Egypt (23.5%) Ref: Kaspersky Security Network (KSN) statistics for the first quarter of 2017
24
Regional Cyber Threat landscape : Arab region
Qatar (29.7%), Saudi Arabia (24.2%) UAE (23.6%) Ref: Kaspersky Security Network (KSN) statistics for the first quarter of 2017
25
Regional Cyber Threat landscape : Arab region
Regional Cyber Security Readiness : Arab region vs Other Regions Ref: ITU GCI Report 2017
26
National Cyber Threat landscape : Oman
27
National Cyber Threat landscape : Oman
28
Cyber Threats Statistics 2017
National Cyber Threat landscape : Oman Cyber Threats Statistics 2017 17749 Cyber attacks attempts targeting Oman’s Cyber Space 70 Million attacks attempts on Government Networks 6 Million web attack attempts
29
National Cyber Threat landscape : Oman
Top Targeted Services Network & Web Attacks
30
(1839) Reported Cyber Security Incidents
National Cyber Threat landscape : Oman (1839) Reported Cyber Security Incidents
31
>> Reported Cyber Security incidents
National Cyber Threat landscape : Oman >> Reported Cyber Security incidents
32
National Cyber Threat landscape : Oman
549 Malware attacks
33
Cyber Crimes Statistics 2017
National Cyber Threat landscape : Oman Cyber Crimes Statistics 2017 129 Cases 632 Digital Evidences
34
486 Cyber Threat & Alert Notifications
National Cyber Threat landscape : Oman 486 Cyber Threat & Alert Notifications
35
Cyber Threats Landscape: Future l Vision
36
Cyber Threats Landscape: Future l Vision
Attacks will become more opportunistic and difficult to detect or predict. Built-in threats will become part of the landscape and will be impossible to detect using current methodologies. Threats will become more potent because systems are more interconnected and people, business and government will have a greater reliance on ICT to function. Isolating systems as a protection mechanism will become impractical due to the need for interconnectedness. Effects or outcomes of attacks will not be as obvious and may go undetected for long periods of time and have longer term flow-on effects. There will be a move from code exploitation to manipulation of data, attacks on business processes and the introduction of systemic effects.
37
>> Cyber Threats Landscape: Future l Vision
SMART CITIES
38
>> Cyber Threats Landscape: Future l Vision
39
>> Cyber Threats Landscape: Future l Vision
40
>> Cyber Threats Landscape: Future l Vision
MEDICAL HEALTH CARE REMORE ELECTRIACL SHOCK IF HEART NEED IT , WHAT HAPPEN IF IT IS GIVEN AND NOT NEEDED
41
>> Cyber Threats Landscape: Future l Vision
BIOLOGY DNA IS ANOTHER OPERATING SYSTEM TO BE HACKED
42
>> Cyber Threats Landscape: Future l Vision
EBOLA SARS BIOLOGY BIO WEAPONS: CREATE NEW VERSION OF VIRUS ZIKA BIRD FLUE
43
>> Cyber Threats Landscape: Future l Vision
Artificial Intelligence
44
>> Cyber Threats Landscape: Future l Vision
AUTONOMOUS MICRO DRONES - CONTROLLED BY ARTIFICIAL INTELLIGENCE
45
>> Cyber Threats Landscape: Future l Vision
Aviation
46
>> Cyber Threats Landscape: Future l Vision
Power
47
>> Cyber Threats Landscape: Future l Vision
Water
48
>> Cyber Threats Landscape: Future l Vision
49
Regional & International cooperation
CONCLUSION Regional & International cooperation
50
INTERNATIONAL COOPERATION
>> CONCLUSION INTERNATIONAL COOPERATION ORGANIZATIONAL Information sharing Regional Cyber security platforms Cyber Security Governance National Focal Point Cyber Security Compliance and Assurance Cyber Security policy Cyber security strategy CYBER SECURITY TECHNICAL LEGAL CAPACITY BUIDLING Cyber early Warning Proactive Cyber Security Monitoring Development of Cyber Security Solutions Forensics and security labs Secure Infrastructure Cyber crime and Privacy Laws Cyber security Regulations Cyber security Standards Operational polices Awareness raising Skill development Specialized Education Cyber Drills
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.