Download presentation
Presentation is loading. Please wait.
Published byConstance Imogen Robinson Modified over 9 years ago
1
Cyber Threats Scenarios and Defense Model Principles ASSOCHAM Cyber Security Conference April 2011 Presented by Dr. Nimrod Kozlovski, Chairman, Nimrod@altalsec.com, +972 544 336056 ©All Right Reserved to Altal Security Ltd., 2011.
2
Estonia dDoSEstonia Brazil Critical InfrastructureBrazil Georgia dDoSGeorgia Iran StuxnetIran China GhostnetChina China DNS RedirectionChina Greece InterceptionGreece ©All Right Reserved to Altal Security Ltd., 2011. 2005200720082009 2010 2011 NSDQInterceptionNSDQInterception COMODO Certification Theft COMODO AustraliaHackingAustraliaHacking Korea GPS manipulation Korea RSA Algorithm Theaft RSA
3
©All Right Reserved to Altal Security Ltd., 2011. Hardware Hiding Code Embed/ Manipulation Destruction Monitoring Mapping and analysis Traffic redirection Re-transmission on existing infrastructure Communication Re-transmission via RF Voice Interception Future control Focused Blockings Data Interception Purpose Threat Computer and Storage Theft Personal computer intrusion Remote network intrusion Data Mining Data Mining Network Social Engineering Copy by Internals External impersonation Unintentional Data Leakage Action Not necessarily immediate effect Impersonation of legit activity in all layers Not necessarily Identifiable destruction
4
Closed-Garden Networks (Military, Gov) Critical Infrastructure (Power, Nuclear) ©All Right Reserved to Altal Security Ltd., 2011. Industrial Open Infrastructure (Water, Transportation, Telecom) InterconnectivityInterconnectivity ComplexityComplexity OpennessOpenness
5
©All Right Reserved to Altal Security Ltd., 2011.
6
Requires National Involvement National Level Threat Analysis SynchronizationSynchronization Technology Development Efficient Enforcement
7
Traditional passive protection (Enterprise-Based) ©All Right Reserved to Altal Security Ltd., 2011. Security Structure does not dramatically change (but upgraded) Network security Structure and security standards are known Does not consider up-to-date attack scenarios Technologies are not tailored to be compatible with new threat model PerimeterPerimeter Trusted User Protected Asset Known (standard) Infrastructure National Interest not in focus IT oriented security technologies
8
IntegrativePro-ActiveShared Inter-sector information sharing (Private-Public sharing model) Distributed sensors system (connecting the ‘dots’) Shared monitoring and analytics of incidents Traps/ Honey-pots Initiate attacks to identify reaction Research vulnerabilities of Target systems Hiding capabilities in target systems Integrated cross- sectors analysis Integrated incentive structure for defense One coordinating entity for all sectors Central incident response ”brain” Monitor patterns/Profiles ©All Right Reserved to Altal Security Ltd., 2011.
9
IntegrativePro-ActiveShared ©All Right Reserved to Altal Security Ltd., 2011. Development Telecom Security Compliance Management Telco Firmware Integrity Electronic Seamless Segregation Massive Traffic Anomaly detection
10
Altal Israel ____________________________________________________ Dr. Nimrod Kozlovski Chairman nimrod@altalsec.com +972 544336056 Netanel (Nati) Davidi, CEO nati@altalsec.com +972 525406775 Altal India ____________________________________________________ Dr. D.K. Ghosh, Board Member dkg@altalsec.com +981 1264849 Avi Gutgold, Country Manager avi@altalsec.com +919 953780090
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.