Cyber Warfare

30
Cyber Warfare and Big Data

Transcript of Cyber Warfare

Page 1: Cyber Warfare

Cyber Warfare and Big Data

Page 2: Cyber Warfare

George Pauwels

• CISSP

• CEH

• CHFI

• Security+

• A+

• Linux+

• Network+

• CCNP – S

• CISCO – SCYBER

• CCNA – S

• CCNA – RS

Page 3: Cyber Warfare

What is Hacking?

Page 4: Cyber Warfare

“The Tao that can be spoken is not the eternal TaoThe name that can be named is not the eternal name

The nameless is the origin of Heaven and EarthThe named is the mother of myriad things”

Lau Tsu - Tao Te Ching

Page 5: Cyber Warfare

CEHCertified Ethical Hacker != Hacking

Page 6: Cyber Warfare

Hacker Process• Reconnaissance

• Scanning

• Gaining Access

• Maintaining Access

• Achieving our Goal

• Covering tracks

Page 7: Cyber Warfare
Page 8: Cyber Warfare
Page 9: Cyber Warfare
Page 10: Cyber Warfare

CyberWarfare

Page 11: Cyber Warfare

Who Are the Players?

• China

• Germany

• India

• Iran

• South Korea

• Netherlands

• Russia

• United States

• Syria

• North Korea

Page 12: Cyber Warfare

China• AKA: Unit 61398, Comment Crew, Putter Panda, Axiom

• Targets in the United States attributed to Chinese sponsored hacking organizations include:

• The aerospace engineering program• Space shuttle design• High performance computers• Nuclear weapon design• Cruise missile data• Semiconductors• Details of US arms sales to Taiwan

• Despite the evidence China still maintains that they are not a threat but more the victim of cyber terrorism

Page 13: Cyber Warfare

Germany

• National Cyber Defense Centre

• The original number of member of the team was 60

• Shortly after Snowden release the details of the NSA’s cyber surveillance the decided more money and staff would be an excellent idea.

Page 14: Cyber Warfare

Russia• AKA: APT28

• One of the worlds leaders in cyber warfare

• Attacks usually target sites in eastern Europe and the United States

• Attacks include NATO and the White House

Page 15: Cyber Warfare

Iran• Ajax Security Team/Flying Kitten/Tarh Andishan

• Responsible for Operation Saffron Rose – a phishing and spoofing attack on OWA and VPN pagers targeting the US defense industry.

Page 16: Cyber Warfare

North Korea• Bureau 121/Pyongyang

• Reportedly the North Korea cyber warfare division hosts 6000 troops

• Was at least partly to mostly responsible for the Sony attack.

• Was seriously outgunned by Anonymous

Page 17: Cyber Warfare

United States• Tailored Access Operations/NSA

• Stuxnet

• Collects telephone data on its citizens

• Over 54,000 Global Network Exploitations carried out since 2013

Page 18: Cyber Warfare

Germany

• National Cyber Defense Centre

• The original number of member of the team was 60

• Shortly after Snowden release the details of the NSA’s cyber surveillance the decided more money and staff would be an excellent idea.

Page 19: Cyber Warfare

United States• Tailored Access Operations/NSA

• Stuxnet

• Collects telephone data on its citizens

• Over 54,000 Global Network Exploitations carried out since 2013

Page 20: Cyber Warfare

The IoT

Page 21: Cyber Warfare

Electronic article surveillance

Page 22: Cyber Warfare

Automobiles

Page 23: Cyber Warfare

Pacemaker/Heart Monitors/Insulin Pumps

Page 24: Cyber Warfare

ATM

Page 25: Cyber Warfare

Smart Meters

Page 26: Cyber Warfare

If it runs on software it is hackable

Page 27: Cyber Warfare
Page 28: Cyber Warfare

Countermeasures

Page 29: Cyber Warfare

Risk Mitigation

• Risk Mitigation

• Risk Transfer

• Risk Acceptance

• Risk Avoidance

Page 30: Cyber Warfare

Risk Avoidance?