By. Andrew Largent COSC-480. Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Breaking Trust On The Internet
Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce Security and Fraud Issues and Protections
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Norman SecureSurf Protect your users when surfing the Internet.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
Combating cyber-crime: the context Justice Canada March 2005.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
The impact of -borne threats Why companies should recognise and embrace the need for change.
Protection of Relations Within Large Datasets1 Protection of Relations Within Large Datasets Mgr. Boleslav Bobčík, T-Systems Czech Republic, a.s.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Salsa Bits: A few things that the analysts aren't talking about... December 2006.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
Network security Product Group 2 McAfee Network Security Platform.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Hurdles in implementation of cyber security in India.
Security in Cloud Computing Zac Douglass Chris Kahn.
Cyberdefense and security policy – concepts and considerations for government policy 1 Cyberdefense and security policy Concepts and considerations for.
Information Warfare Playgrounds to Battlegrounds.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Internet Dangers Technology Communication Tools E-Literate.
FFIEC Cyber Security Assessment Tool
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Computer crimes.
Cybersecurity Test Review Introduction to Digital Technology.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part I.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
ICT for Masses New Environment Opportunities and Threats
Cyber Security: State of the Nation
Introduction to a Security Intelligence Maturity Model
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Chapter 9 E-Commerce Security and Fraud Protection
Cybersecurity Threats and Opportunities in Latin America
The Global Challenges of Cybersecurity and Digital Terrorism
Cybersecurity ATD Scenario conclusion
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Information Protection
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Information Protection
Cybersecurity and its Relevance to CIT
Presentation transcript:

By. Andrew Largent COSC-480

Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence of a threat.

Roadmap UI Threats, Risks Layered Security Threat Agents Cyber Offense Conclusion

UI Intelligence derived from massive data sets from ISP an other carriers. UI is a source of information passed enterprise perimeters into the carrier networks. “no man’s land”. UI helps identify active threat agents on the Internet. UI powerful security tool, seen in the Cyber security Act of 2009 and the Nation Broadband Plan from the Federal Communication Commission in 2010.

UI UI consists of proactive and accurate identification of compromised devices and networks on large scales in real time!!! Significant asset recovery was the reason UI was developed and deployed.

Threats, Risks Evolving threats and threat agents driving up risks and the need for new security capabilities. Most successful crime on the Internet: identity theft, credit card and banking fraud, spamming, phishing and DOS attacks. UI identifies threat agents and targeted assets, rather than malware.

Threats, Risks 1990’s to early 2000’s malware developers wreaked havoc. Now money is to be made through malware exploitation, code is shared less and the best code is not shared at all.

Layered Security UI represents a new layer of security for all organizations. Fundamental concept “defense in depth.” Security Architecture.

Layered Security UI provides two enhancements to the defense-in- depth design.

Cyber Offense UI is not about counter-attacks. UI should not be identified with offensive activates against cyber-threats. UI was developed for defensive and self-preservation as opposed to offensive.

Conclusion Developing further into real-time systems for info/intel sharing to identify threats and threatened assets. Discussion!!

References Cybersecurity Act Federal Communications Commission, National Broadband Pla: Connecting America, Bell Canada Q Macaulay, Tyson IAnewsletter- Vol 13 No 3- Summer