SlideShare uma empresa Scribd logo
1 de 50
Baixar para ler offline
Gohsuke Takama /          , Meta Associates, 2011   9



           http://www.slideshare.net/gohsuket
about…

✴ Gohsuke Takama
  ✴ Meta Associates (http://www.meta-associates.com/)
     ✴founder & president, connector, analyst, planner
     ✴ local organizer of security conferences: BlackHat Japan, PacSec
     ✴ liaison of security businesses: Patch Advisor, SecWest
     ✴ organizer of tech entrepreneur / startup support events
     ✴ independent tech journalist for over 10 years
     ✴ for security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/
  ✴ Privacy International (London, UK http://www.privacyinternational.org/)
     ✴advisory board member
  ✴ Computer Professionals for Social Responsibility (http://cpsr.org/)
     ✴Japan chapter founding supporter
"what happened in the last 2 years"

•   OperationAurora, ShadyRAT,     ...

•   Stuxnet

•                    (MENA) *new

•   Wikileaks *new

•   Sony PSN

•   Anonymous *new

•   Indira Gandhi
"what happened in the last 2 years"

•   OperationAurora, ShadyRAT,             ...
    =                    = APT (Advanced Persistent Threat)

•   Stuxnet = SCADA

•                        *new=

•   Wikileaks *new =                  :

•   Sony PSN:        3       = DDoS,          ,

•   Anonymous *new =                      +

•   Indira Gandhi        =
"what happened in the last 2 years"
       infra attack: SCADA
      Supervisory Control And Data Acquisition
"whom targeted, why"

•                ,

•   Sony PSN, Sony

•           ,

•
•           :
"whom targeted, why"




http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/
"spoofing, phishing & targeted attack"
/                    1
"cybercrime, cyber espionage,
 primary target = individual"
"know your enemy: techniques"

•   phishing            •   website spoofing
•   targeted phishing   •   content altering
•   trojan              •   XSRF
•   spyware             •   XSS
•   keylogger           •   code injection
•   rootkit             •   IP hijacking
•   botnet DDoS         •   rogue WiFi AP
                        •   sniffer
"know your enemy: techniques"




   http://www.ipa.go.jp/security/vuln/newattack.html
"know your enemy: not just techniques"

•
•   who are they?
•   disseminate characters

•   disseminate motives
"disseminate characters"

•
•
•
•
•
•
•
•
•
"disseminate characters"
"disseminate characters"




https://us.mcafee.com/en-us/local/html/identity_theft/NAVirtualCriminologyReport07.pdf
"disseminate characters"
how cyber criminals lure talents?
"disseminate characters"




 http://www.youtube.com/watch?v=2Tm7UKo4IBc
http://www.youtube.com/watch?v=kZNDV4hGUGw
"disseminate characters"

•   =
•           =

•               =
•                       =

•       :                        →CEO        26%
•                           = Lulzsec, TeaMp0isoN
•           = Th3J35t3r, On3iroi

•                             = Anonymous
•                      vs
"disseminate motives"

•                 ,

•
•   hacktivism,

•
"disseminate motives"
Law, Market, Norm, Architecture
"disseminate motives"
Law, Market, Norm, Architecture
"disseminate motives"
Law, Market, Norm, Architecture
"disseminate motives"
Law, Market, Norm, Architecture
                   -
                   - J-SOX
                   -
                     -           (   )
                     -
                     -
                     -
                   -         :
                   -
"disseminate motives"

•                  ,             =         Power

•                      = Money

•    hacktivism,                 =
    Ideology
•
    =                            Control
"disseminate motives"
     Power, Money, Ideology, Control
                  Power




$Money                                 Ideology



                             -
                             -
                             -
                             -


                 Control
"disseminate motives"
  Autocracy, Crime, Extremism, Hacker
                      Power

                      Autocratic
                     Government




         Organized                     Extremist
$Money    Crime                        Hacktivist   Ideology


                                            :
                                   -
                      Hacker       -
                      Cracker      -
                                   -


                     Control
"disseminate motives"
  Autocracy, Crime, Extremism, Hacker
                         Power

                         Autocratic
                        Government

                                  Infra
                      APT      Disruption

         Organized                        Extremist
$Money    Crime                           Hacktivist   Ideology
                     Theft      Hacktivism
                     Fraud
                              Lulz
                                               :
                                      -
                         Hacker       -
                         Cracker      -
                                      -


                       Control
"social change on Internet"
        2000
•
•
    •
    •
    •
    •
"social change on Internet"
        2001
•                         •
•                         •
•                         •
•                         •
    •                     •
    •                     •
    •                     •             (Wiki   )

    •        /            •
    •                     •   3D

                          •
"real world vs. social data world"
"real world vs. social data world"




                        :
"emerging attack techniques"

•   malware:                                       ,


•   VM                               , bios
•                          : VNC, Spycam,

•   spyware                         : keylogger, GPS logger
•   sabotage ware                             : Stuxnet

•                USB
                                =


•    DDoS:
    JavaScript         (LOIC)
                                                   ($8/h~),
"layer approach"




     •examle: OSI model
"a security layer model "

                     7 Psychological       ,
Human Factor         6 Custom (Habit)      ,
                     5 Operation
                     4 Content
 Intangibles
                     3 OS/Application
                     2 Hardware
  Tangibles
                     1 Physical
"attacks vs. counter measures "

                APT, espionage, phishing,
Psychological
                   social engineering                   ?
                   spoofing, pharming,    accustomed best practice,
   Custom       phishing spam, XSS, XSRF,   awareness, CIRT, PKI,
                 spyware, ID spoof/theft digital ID, SSL certificate
                DoS, spam, ransom-ware,     routing, filtering, policy,
  Operation
                     sabotage-ware                  audit, CIRT

                sniffing, spyware, spam,      encryption, filtering,
   Content
                       alteration             content-scan, host IDS

     OS/        DoS, vuln exploit, 0day,    Firewall, network IDS, IPS,
 Application         rootkit, botnet         anti-virus, OS/app patch

                direct access, tampering,     perimeter guard, anti-
  Hardware
                       alteration              tampering, hard seal

                  lock pick, break in,       surveillance, perimeter
  Physical
                        vandalism               alarm, armed guard
"state of security methodology"

✴
 •(                            +           )
✴
 •=             (                      )
✴ PKI               = DigiNotar
✴                          =

 •(                                )
✴                      =
"perspective for counter strategy"
       set basic security measures:


✴                         prevention, detection, response
✴
✴
✴                     :           100%
✴                         :
✴                                        (APT               )
✴    PET (Privacy Enhancing Technology               )

✴    PIA (Privacy Impact Assessment              )
"perspective for counter strategy"
              be creative:

✴
✴ soft power
 •
 •                  PR    deflective PR
✴ social intelligence
          (                              )
✴ counter social engineering
 •
 •
"perspective for counter strategy"
    be creative: Learn Attack Technique

•
    •
•                      = CTF (Capture The Flag)
    •

    •    DEFCON CTF
                             CTF


    •
"perspective for counter strategy"
         be creative: Soft Power

•      Soft Power = 1990        Joseph Nye


•             Hard Power
•
•   http://en.wikipedia.org/wiki/Soft_power
•                                  /

•
•
"perspective for counter strategy"
     be creative: Soft Power
"perspective for counter strategy"
      be creative: Social Intelligence

•
•
    •          hacktivism


    •

    •   Twitter, Facebook, IRC, Weibo, RenRen
"perspective for counter strategy"
be creative: Counter Social Engineering

•
•
•
    •
    •
•
    •   (
            )
"perspective for counter strategy"
    be prepared: Simulation Exercise

✴
• TableTop Exercise =
 •
• Functional Exercise =
 •
 •
• FullScale Exercise =
 •
 •
references

•   CEOs - the new corporate fraudstersds http://www.iol.co.za/
    sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649

•   PwC Survey Says: Telecoms Are Overconfident About Security http://
    www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php

•   Cyber attack led to IGI shutdown http://www.indianexpress.com/news/
    cyber-attack-led-to-igi-shutdown/851365/

•   Anonymous announces global plans http://www.digitaltrends.com/
    computing/video-anonymous-announces-global-plans/

•   ANONYMOUS - OPERATION PAYBACK - Sony Press Release http://
    www.youtube.com/watch?v=2Tm7UKo4IBc

•   Operation Payback - Anonymous Message About ACTA Laws, Internet
    Censorship and Copyright http://www.youtube.com/watch?
    v=kZNDV4hGUGw

•   Anonymous: Message to Scientology http://www.youtube.com/watch?
    v=JCbKv9yiLiQ

•                     Anonymous                 http://www.atmarkit.co.jp/
    fsecurity/special/161dknight/dknight01.html
references

•   28 Nation States With Cyber Warfare Capabilities http://
    jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html

•                                                                      Far East
    Research    http://scan.netsecurity.ne.jp/archives/52017036.html

•   CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability
    http://www.youtube.com/watch?v=DP_rRf468_Y

•   MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/
    204792193/MYBIOS_Is_BIOS_infection_a_reality

•   McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/
    html/identity_theft/NAVirtualCriminologyReport07.pdf

•               Google Zeitgeist                          http://blog.f-secure.jp/
    archives/50630539.html

•    "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V
    http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959
references

•                                                          -- DEFCON CTF
            http://scan.netsecurity.ne.jp/archives/52002536.html

•   PET
                           http://www.soumu.go.jp/denshijiti/pdf/
    jyumin_p_s3.pdf

•   PIA
    http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf

•                                                                   http://
    jp.reuters.com/article/topNews/idJPJAPAN-21406320110527

•                                      GIE
    http://d.hatena.ne.jp/ukky3/20110829/1314685819

•      Diginotar      Black.Spook
    http://blog.f-secure.jp/archives/50626009.html
references

•    Computer virus hits US Predator and Reaper drone fleet http://
    arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits-
    drone-fleet.ars

•   F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case
    R2D2") http://www.f-secure.com/weblog/archives/00002249.html

•    State-sponsored spies collaborate with crimeware gang | The Unholy APT-
    botnet union http://www.theregister.co.uk/2011/09/13/
    apt_botnet_symbiosis/

•    NISC                              10 7    http://www.nisc.go.jp/
    conference/seisaku/index.html#seisaku27
A perspective for counter strategy against cybercrime and cyber espionage

Mais conteúdo relacionado

Destaque

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢2013
パーソナルデータ保護の課題と国際情勢2013パーソナルデータ保護の課題と国際情勢2013
パーソナルデータ保護の課題と国際情勢2013Gohsuke Takama
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本Gohsuke Takama
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...Gohsuke Takama
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナーGohsuke Takama
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本Gohsuke Takama
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Gohsuke Takama
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Gohsuke Takama
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30Gohsuke Takama
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーGohsuke Takama
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?Winston & Strawn LLP
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 

Destaque (17)

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
 
パーソナルデータ保護の課題と国際情勢2013
パーソナルデータ保護の課題と国際情勢2013パーソナルデータ保護の課題と国際情勢2013
パーソナルデータ保護の課題と国際情勢2013
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 

Semelhante a A perspective for counter strategy against cybercrime and cyber espionage

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาMuay31
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksDefending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksEC-Council
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle BH
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016 arohan6
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generationTony Lauro
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 

Semelhante a A perspective for counter strategy against cybercrime and cyber espionage (20)

โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
 
Hacking
HackingHacking
Hacking
 
hacking
hackinghacking
hacking
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Defending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael BanksDefending Against 1,000,000 Cyber Attacks by Michael Banks
Defending Against 1,000,000 Cyber Attacks by Michael Banks
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Information security in the starbucks generation
Information security in the starbucks generationInformation security in the starbucks generation
Information security in the starbucks generation
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Último

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 

Último (20)

2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 

A perspective for counter strategy against cybercrime and cyber espionage

  • 1. Gohsuke Takama / , Meta Associates, 2011 9 http://www.slideshare.net/gohsuket
  • 2. about… ✴ Gohsuke Takama ✴ Meta Associates (http://www.meta-associates.com/) ✴founder & president, connector, analyst, planner ✴ local organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of security businesses: Patch Advisor, SecWest ✴ organizer of tech entrepreneur / startup support events ✴ independent tech journalist for over 10 years ✴ for security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/ ✴ Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member ✴ Computer Professionals for Social Responsibility (http://cpsr.org/) ✴Japan chapter founding supporter
  • 3. "what happened in the last 2 years" • OperationAurora, ShadyRAT, ... • Stuxnet • (MENA) *new • Wikileaks *new • Sony PSN • Anonymous *new • Indira Gandhi
  • 4. "what happened in the last 2 years" • OperationAurora, ShadyRAT, ... = = APT (Advanced Persistent Threat) • Stuxnet = SCADA • *new= • Wikileaks *new = : • Sony PSN: 3 = DDoS, , • Anonymous *new = + • Indira Gandhi =
  • 5. "what happened in the last 2 years" infra attack: SCADA Supervisory Control And Data Acquisition
  • 6. "whom targeted, why" • , • Sony PSN, Sony • , • • :
  • 8. "spoofing, phishing & targeted attack" / 1
  • 9. "cybercrime, cyber espionage, primary target = individual"
  • 10. "know your enemy: techniques" • phishing • website spoofing • targeted phishing • content altering • trojan • XSRF • spyware • XSS • keylogger • code injection • rootkit • IP hijacking • botnet DDoS • rogue WiFi AP • sniffer
  • 11. "know your enemy: techniques" http://www.ipa.go.jp/security/vuln/newattack.html
  • 12. "know your enemy: not just techniques" • • who are they? • disseminate characters • disseminate motives
  • 16. "disseminate characters" how cyber criminals lure talents?
  • 18. "disseminate characters" • = • = • = • = • : →CEO 26% • = Lulzsec, TeaMp0isoN • = Th3J35t3r, On3iroi • = Anonymous • vs
  • 19. "disseminate motives" • , • • hacktivism, •
  • 23. "disseminate motives" Law, Market, Norm, Architecture - - J-SOX - - ( ) - - - - : -
  • 24. "disseminate motives" • , = Power • = Money • hacktivism, = Ideology • = Control
  • 25. "disseminate motives" Power, Money, Ideology, Control Power $Money Ideology - - - - Control
  • 26. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Organized Extremist $Money Crime Hacktivist Ideology : - Hacker - Cracker - - Control
  • 27. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Infra APT Disruption Organized Extremist $Money Crime Hacktivist Ideology Theft Hacktivism Fraud Lulz : - Hacker - Cracker - - Control
  • 28.
  • 29. "social change on Internet" 2000 • • • • • •
  • 30. "social change on Internet" 2001 • • • • • • • • • • • • • • (Wiki ) • / • • • 3D •
  • 31. "real world vs. social data world"
  • 32. "real world vs. social data world" :
  • 33. "emerging attack techniques" • malware: , • VM , bios • : VNC, Spycam, • spyware : keylogger, GPS logger • sabotage ware : Stuxnet • USB = • DDoS: JavaScript (LOIC) ($8/h~),
  • 34. "layer approach" •examle: OSI model
  • 35. "a security layer model " 7 Psychological , Human Factor 6 Custom (Habit) , 5 Operation 4 Content Intangibles 3 OS/Application 2 Hardware Tangibles 1 Physical
  • 36. "attacks vs. counter measures " APT, espionage, phishing, Psychological social engineering ? spoofing, pharming, accustomed best practice, Custom phishing spam, XSS, XSRF, awareness, CIRT, PKI, spyware, ID spoof/theft digital ID, SSL certificate DoS, spam, ransom-ware, routing, filtering, policy, Operation sabotage-ware audit, CIRT sniffing, spyware, spam, encryption, filtering, Content alteration content-scan, host IDS OS/ DoS, vuln exploit, 0day, Firewall, network IDS, IPS, Application rootkit, botnet anti-virus, OS/app patch direct access, tampering, perimeter guard, anti- Hardware alteration tampering, hard seal lock pick, break in, surveillance, perimeter Physical vandalism alarm, armed guard
  • 37. "state of security methodology" ✴ •( + ) ✴ •= ( ) ✴ PKI = DigiNotar ✴ = •( ) ✴ =
  • 38. "perspective for counter strategy" set basic security measures: ✴ prevention, detection, response ✴ ✴ ✴ : 100% ✴ : ✴ (APT ) ✴ PET (Privacy Enhancing Technology ) ✴ PIA (Privacy Impact Assessment )
  • 39. "perspective for counter strategy" be creative: ✴ ✴ soft power • • PR deflective PR ✴ social intelligence ( ) ✴ counter social engineering • •
  • 40. "perspective for counter strategy" be creative: Learn Attack Technique • • • = CTF (Capture The Flag) • • DEFCON CTF CTF •
  • 41. "perspective for counter strategy" be creative: Soft Power • Soft Power = 1990 Joseph Nye • Hard Power • • http://en.wikipedia.org/wiki/Soft_power • / • •
  • 42. "perspective for counter strategy" be creative: Soft Power
  • 43. "perspective for counter strategy" be creative: Social Intelligence • • • hacktivism • • Twitter, Facebook, IRC, Weibo, RenRen
  • 44. "perspective for counter strategy" be creative: Counter Social Engineering • • • • • • • ( )
  • 45. "perspective for counter strategy" be prepared: Simulation Exercise ✴ • TableTop Exercise = • • Functional Exercise = • • • FullScale Exercise = • •
  • 46. references • CEOs - the new corporate fraudstersds http://www.iol.co.za/ sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649 • PwC Survey Says: Telecoms Are Overconfident About Security http:// www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php • Cyber attack led to IGI shutdown http://www.indianexpress.com/news/ cyber-attack-led-to-igi-shutdown/851365/ • Anonymous announces global plans http://www.digitaltrends.com/ computing/video-anonymous-announces-global-plans/ • ANONYMOUS - OPERATION PAYBACK - Sony Press Release http:// www.youtube.com/watch?v=2Tm7UKo4IBc • Operation Payback - Anonymous Message About ACTA Laws, Internet Censorship and Copyright http://www.youtube.com/watch? v=kZNDV4hGUGw • Anonymous: Message to Scientology http://www.youtube.com/watch? v=JCbKv9yiLiQ • Anonymous http://www.atmarkit.co.jp/ fsecurity/special/161dknight/dknight01.html
  • 47. references • 28 Nation States With Cyber Warfare Capabilities http:// jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html • Far East Research http://scan.netsecurity.ne.jp/archives/52017036.html • CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability http://www.youtube.com/watch?v=DP_rRf468_Y • MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/ 204792193/MYBIOS_Is_BIOS_infection_a_reality • McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/ html/identity_theft/NAVirtualCriminologyReport07.pdf • Google Zeitgeist http://blog.f-secure.jp/ archives/50630539.html • "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959
  • 48. references • -- DEFCON CTF http://scan.netsecurity.ne.jp/archives/52002536.html • PET http://www.soumu.go.jp/denshijiti/pdf/ jyumin_p_s3.pdf • PIA http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf • http:// jp.reuters.com/article/topNews/idJPJAPAN-21406320110527 • GIE http://d.hatena.ne.jp/ukky3/20110829/1314685819 • Diginotar Black.Spook http://blog.f-secure.jp/archives/50626009.html
  • 49. references • Computer virus hits US Predator and Reaper drone fleet http:// arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits- drone-fleet.ars • F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case R2D2") http://www.f-secure.com/weblog/archives/00002249.html • State-sponsored spies collaborate with crimeware gang | The Unholy APT- botnet union http://www.theregister.co.uk/2011/09/13/ apt_botnet_symbiosis/ • NISC 10 7 http://www.nisc.go.jp/ conference/seisaku/index.html#seisaku27