Cyber Conflict Research Rain Ottis 5.05.2015 UNCLASSIFIED.

Slides:



Advertisements
Similar presentations
Jacky Altal. T O C  Hackers Terminology  Cyber attacks in 2012 (so far…)  Nations Conflict  Cyber Motives  Characteristics of CyberCrime  DEMO –
Advertisements

© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Cyberterrorism. Critical Infrastructure Vulnerability.
Assessing Actions Along the Spectrum of Cyberspace Operations
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
Cyber X-Force-SMS alert system for threats.
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
Threats and Attacks Principles of Information Security, 2nd Edition
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
A First Course in Information Security
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Design of a cyber security awareness campaign for Internet Cafés users in rural areas WA Labuschagne, MM Eloff, N Veerasamy, L Leenen, M Mujinga CSIR /
Second Grade Laptop Information Please sit at the table labeled with your child’s teacher’s name
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
Information Warfare Playgrounds to Battlegrounds.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Cyber Warfare Case Study: Estonia
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Information Warfare Playgrounds to Battlegrounds.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Understand Malware LESSON Security Fundamentals.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Professor Peeter Lorents, CCD COE Chief of the R&D Branch
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Information Security tools for records managers Frank Rankin.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
How to download the latest version of AVAST Antivirus for free?
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
International Conflict & Cyber Security
Issues and Protections
Cybersecurity Awareness
HOW TO DOWNLOAD THE LATEST VERSION OF AVAST ANTIVIRUS FOR FREE?
Cyberwarfare and Its Implications for Civilian Industry
The University of Adelaide, School of Computer Science
Faculty of Science IT Department By Raz Dara MA.
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

Cyber Conflict Research Rain Ottis UNCLASSIFIED

Disclaimer The opinions expressed are those of the presenter and should not be considered as official policy of the CCD COE or NATO UNCLASSIFIED

Outline My background – why cyber defence? What is a cyber conflict? Volunteers in cyber conflicts Farmers with laptops National security implications Spam Q&A UNCLASSIFIED

About me – USMA, BSc (Computer Science) – EDF Signal Battallion, instructor – National Defence College, TDC CIS, cyber defence section chief – CCD COE, scientist – TUT, MSc (Informatics) PhD studies in TUT since 2007 UNCLASSIFIED

Cyber Conflict Definition, please? Cyberspace, cyber society, cyber attack, cyber stuff etc. UNCLASSIFIED

Cyber Conflict An information system is a system* that is designed to operate with information. * a fixed set of elements and their properties or relations UNCLASSIFIED

Cyber Conflict A weapon is a system that is designed to damage the structure or operations of some other system(s). An information technology weapon, or shorter – IT weapon, is an information technology based system that is designed to damage the structure or operations of some other system(s). UNCLASSIFIED

Cyber Conflict A cyber weapon is an information technology based system that is designed to damage the structure or operations of some other information technology based system(s). Cyber weapons are a subset of IT weapons UNCLASSIFIED

Cyber Conflict Cyber incidents are events that cause or may cause unacceptable deviation(s) in the structure or operation of an information system (or its components, including information, hardware, software etc.). UNCLASSIFIED

Cyber Conflict Cyber attack is the intentional use of a cyber weapon or a system that can be used as a cyber weapon against an information system in order to create a cyber incident. UNCLASSIFIED

Cyber Conflict Cyber espionage is the use of cyber attacks to cause a loss of confidentiality of the target system. Cyber conflict is the use of cyber attacks (which must include attacks against integrity or availability of the target systems) to achieve political aims. Cyber war is a cyber conflict between state actors. UNCLASSIFIED

Volunteers in Cyber Conflict UNCLASSIFIED

Volunteers in Cyber Conflict UNCLASSIFIED

Volunteers in Cyber Conflict (Using) politically supportive civilian assets Create, Hijack or Manipulate? Or hope for the best? Plausible deniability Low attribution level May be protected from legal actions Geographically spread out Diverse arsenal LOW resource need UNCLASSIFIED

Volunteers in Cyber Conflict Difficult to plan, control, restrain Indirect control mechanism Effectiveness not guaranteed Rise of cyber crime UNCLASSIFIED

L33T H4X0R resources Access to a PC Internet connection Web browser Time to browse forums and websites Potentially administrator rights on the PC Potentially PC is a laptop with wireless UNCLASSIFIED

L33T H4X0R skills Using the web browser Using a search engine Downloading files from a web site Opening data files (.doc,.xls etc.) Opening (running) executable files Copy-paste commands to command line and execute UNCLASSIFIED

L33T H4X0R 1.0 – support actions Propaganda & Recruitment Supply Training Reconnaissance & Targeting Observation Fog of War UNCLASSIFIED Сегодня, проводится грандиозная DoS-атака на сайт их правительства ооуществить это легко - заходим в Пуск - Стандартные - командная строка, в открывшемся окне пишем : ping -n l на это вы потратите 5 мегабайт исходящего трафика.

L33T H4X0R 1.0 – support actions UNCLASSIFIED

L33T H4X0R attacks Denial of Service (DoS) Distributed Denial of Service (DDoS) Web defacement Infecting systems with malware UNCLASSIFIED

Rocket science? UNCLASSIFIED

National security implications Attribution Deterrence Cyber Power Critical Information Infrastructure Protection Educating the end user... UNCLASSIFIED

I want in! CCD COE Annual Conference –Conference on Cyber Conflict, June 2010 –Will happen again in 2011 ECIW 2011 – co-hosted by CCD COE and TUT Cybernetics Institute, July 7-8, IEEE Special Edition on Cyber Conflict –Abstracts due 15 June 2010 –To appear in fall 2011 UNCLASSIFIED

References Lorents, P. and Ottis, R. (2010) ”Knowledge Based Framework for Cyber Weapons and Conflict.” In Czosseck, C. and Podins, K. (Eds.) Conference on Cyber Conflict. Proceedings Tallinn: CCD COE Publications, p Ottis, R. (2009) ”Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability.” In Proceedings of the 8th European Conference on Information Warfare and Security, Lisbon. Reading: Academic Publishing Limited, p Ottis, R. (2010) ”From Pitch Forks to Laptops: Volunteers in Cyber Conflicts.” In Czosseck, C. and Podins, K. (Eds.) Conference on Cyber Conflict. Proceedings Tallinn: CCD COE Publications, p Ottis, R. (2010) ”Proactive Defence Tactics Against On-Line Cyber Militia.” 8th European Conference on Information Warfare and Security, Thessaloniki, Greece. [to appear] UNCLASSIFIED

Questions Thank you! UNCLASSIFIED