Presentation is loading. Please wait.

Presentation is loading. Please wait.

Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©

Similar presentations


Presentation on theme: "Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©"— Presentation transcript:

1 Red-DragonRising.com©

2 Red-DragonRising.com©

3 Red-DragonRising.com©

4 Red-DragonRising.com© 中国人民共和国 信息戰 LTCOL (RET) William Hagestad II MSc Security Technologies MSc Management of Technology www.red-dragonrising.comhagestadwt@red-dragonrising.com 中華人民共和 國 網絡代碼衝 突... What Country Poses The Most Existential Cyber Threat to the World?

5 Red-DragonRising.com©

6 Red-DragonRising.com© “21 st Century Chinese Cyber Warfare” “ 二十一世紀中國網絡戰 ” ISBN: 9781849283342 取締中華人民共和國

7 Red-DragonRising.com© ISBN: 978-1482577105 取締中華人民共和國

8 Red-DragonRising.com© ISBN: 978-1493771974 取締中華人民共和國

9 Red-DragonRising.com© Is China Really the Enemy? Red-DragonRising.com©

10 Red-DragonRising.com© “Thanks to the increased attack traffic seen from Indonesia, ports 80 and 443 were the most commonly targeted ports, accounting for 41 percent of observed attacks combined.” Indonesia Overtakes China… http://www.techinasia.com/report-indonesia-overtakes-china-worlds-biggest-source-online-attacks/

11 Red-DragonRising.com© Cyber Adversary Taxonomy Cyber ThreatMotiveTargets of OpportunityMethodologiesCapabilities Nation States ~ Peace Time Economic, Military, National Secrets, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain short of kinetic Nation States ~ War Time Economic, Military, Political Commercial Enterprises, Intelligence, National Defense, Governments, National Infrastructure Military & Intel specific cyber doctrine, hacktivists Asymmetric use of the cyber domain including kinetic Cyber Terrorists & Insurgents Political Infrastructure, Extortion and Political Processes Combination of advanced persistent threats (APT) Developing – will be a concern in 2012 Cyber Criminals – Grey & Black Markets Financial Intellectual Property Theft, Fraud, Theft, Scams, Hijacked Network & Computer Resources, Cyber Crime for Hire Exploits, Malware Botnets, Worms & Trojans Cell-based structure as an APT Criminal Organizations – RBS Financial Use of above with distinct planning Highly professional, dangerous Rogue Organizations – Anonymous, LulzSec Financial Military, National Secrets, Political Intellectual Property Theft, Direct & Indirect pressure on OGA Resources Organic hacking capabilities unsurpassed Organized yet de- centralized

12 Red-DragonRising.com© LabelTimeframePurposeTarget Nation State Responsible Nation State Affected Stuxnet 2004 - 2007 Cyber / Physical Destruction Iranian Nuclear Facility @ Natanz US & Israel Islamic Republic of Iran Duqu 2007 – 2011 Cyber Counter Intelligence Industrial Control Systems US & Israel …Taiwan – Republic of China Multiple… Flame 2009 - 2012 Cyber reconnaissance/ cyber data exfiltration… Cyber espionage Middle Eastern computer systems US & Israel Iran, Lebanon, Syria, Sudan, Occupied Territories of Israel Gauss 2011 - 2012 Cyber surveillance / Banking Trojan Middle Eastern Banks Unknown Lebanon, CitiBank & PayPal Batch Wiper 2012 Cyber Destruction Iranian Oil Infrastructure US & Israel Islamic Republic of Iran Weaponized Malware Cyber Weapons Impacting Civilian Infrastructure

13 Red-DragonRising.com© http://arstechnica.com/security/2012/08/nation-sponsored-malware-has- mystery-warhead/ Cyber Weapons Geo-Infections

14 Red-DragonRising.com© 謝謝您 謝謝您的時間今天 有沒有問題?

15 Red-DragonRising.com© 跟隨紅龍 Red-DragonRising #RedDragon1949 http://www.linkedin.com/in/billhagestad Red-dragonrising.com


Download ppt "Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©"

Similar presentations


Ads by Google