SlideShare uma empresa Scribd logo
1 de 100
Baixar para ler offline
Practical CyberPractical Cyber DefenceDefence
--TOP 10 Cyber ThreatsTOP 10 Cyber Threats--
1
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
--TOP 10 Cyber ThreatsTOP 10 Cyber Threats--
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
Практическая кибер ЗащитаПрактическая кибер Защита
--Топ 10Топ 10 кибер Угрозкибер Угроз--
2
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
--Топ 10Топ 10 кибер Угрозкибер Угроз--
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dr David E. ProbertDr David E. Probert
VAZAVAZA InternationalInternational
Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
“C“Cybersecurityybersecurity Trends”:Trends”: Dual ThemesDual Themes
Theme (1)Theme (1) –– ..........Practical Cyber DefencePractical Cyber Defence against TOP 10 Cyber Threats.....against TOP 10 Cyber Threats.....
--
“Networked”“Networked” :: “Real“Real--Time Cyber Security & Surveillance”Time Cyber Security & Surveillance” 09:4509:45 66thth June 2017June 2017
We review PracticalWe review Practical CyberDefenceCyberDefence against Threats, Hacks & Attacksagainst Threats, Hacks & Attacks
fromfrom RansomwareRansomware, BotNets(DDoS), Key Logging, Insider Threats,, BotNets(DDoS), Key Logging, Insider Threats,
Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),
Advanced Persistent Attacks (APT), Virus/Trojan & Web/Cookie Hacks.Advanced Persistent Attacks (APT), Virus/Trojan & Web/Cookie Hacks.
3
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ThemeTheme (2)(2) –– ..........Cyber Tools & Trends:Cyber Tools & Trends: The Next 7 years: 2018The Next 7 years: 2018 –– 2025.....2025.....
--
“Neural”“Neural” :: “New Generation Networked Neural Security"“New Generation Networked Neural Security" 14:1514:15 66thth June 2017June 2017
Download SlideDownload Slides:s: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/
We present Cyber Trends & Scenarios for 2018 (We present Cyber Trends & Scenarios for 2018 (Cyber TransitionCyber Transition),),
2020 (2020 (Intelligent SecurityIntelligent Security) and 2025 () and 2025 (Neural Security).Neural Security). We discussWe discuss
the Evolution of Advanced AI based Cyber Tools with Applicationsthe Evolution of Advanced AI based Cyber Tools with Applications
to Smart Devices (IoT), Smart Transportation & Smart Cities.to Smart Devices (IoT), Smart Transportation & Smart Cities.
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
4
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
5
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
“Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses
6
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
…From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity
-- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” --
7
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018!
-- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! --
• 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts)
• 1948 – “Cybernetics” – Norbert Wiener
• 1969 – ARPANet Launched – 4 Packet Switching Net Nodes -
• 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn
• 1982 – Elk Cloner - 1st “Apple Computer Virus
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
8
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
• 1986 – “Brain” – 1st Microsoft MS-DOS Virus
• 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp)
• 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee
• 1993 – Mosaic Browser – NCSA – Illinois, USA
• 2018 –Transition to AI/ML Apps for 21stC CyberSecurity!
-- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
11 ––““Cyber Crime, Cyber Terror & Cyber War”Cyber Crime, Cyber Terror & Cyber War” 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
9
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack!”“Cyber Attack!”
7 – In-Depth: 21stC Technical Cyber Defence 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Defence Campaign Plan!
““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar””
1)1) Media:Media: Global News Reports of Cyber Attacks!
2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats,
& Mechanisms exploited by “Bad Guys”!
3)3) Cyber Reality:Cyber Reality: Understand the Criminal &
Political Reality behind Cyber Attacks!
10
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Political Reality behind Cyber Attacks!
4)4) Practical Defence:Practical Defence: Discuss Practical Cyber
Defence to these Threats for YOUR Business!
.....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some
combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
11
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
12
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime
-- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) --
Red Alert!Red Alert!
13
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Red Alert!Red Alert!
–– InIn--Coming Cyber Attack!Coming Cyber Attack! --
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
14
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
15
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Chemnitz StationChemnitz Station -- GermanyGermany
Global RansomWareGlobal RansomWare CyberAttackCyberAttack
“WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017
16
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond!
...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017
Recommended!Recommended!
17
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf
Recommended!Recommended!
EU Agency for Info Security:EU Agency for Info Security: ENISAENISA
ENISAENISA Strategic Security FrameworkStrategic Security Framework
Provides effectiveProvides effective “Cyber”“Cyber” model formodel for
NationalNational GovernmentsGovernments & Ministries& Ministries
18
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
-- ALL EU CountriesALL EU Countries now have approvednow have approved National Cybersecurity StrategiesNational Cybersecurity Strategies --
www.enisa.europa.eu/topics/nationalwww.enisa.europa.eu/topics/national--cybercyber--securitysecurity--strategies/ncssstrategies/ncss--mapmap
UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex
Only 73 Nations (38%)Only 73 Nations (38%)
19
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Only 73 Nations (38%)Only 73 Nations (38%)
Publish Public DomainPublish Public Domain
CyberSecurity StrategiesCyberSecurity Strategies
Available on UN/ITUAvailable on UN/ITU
Website:Website: ww.itu.intww.itu.int
UN/ITU GCAUN/ITU GCA -- GlobalGlobal
Cybersecurity Agenda:Cybersecurity Agenda:
----------------------------------------
11 –– Legal MeasuresLegal Measures
22 –– Technical MeasuresTechnical Measures
33 –– Organisational MeasuresOrganisational Measures
44 –– Capacity BuildingCapacity Building
UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda
20
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
44 –– Capacity BuildingCapacity Building
55 –– International CooperationInternational Cooperation
----------------------------------------
...The...The ITUITU constitutes aconstitutes a uniqueunique
global forumglobal forum for partnership andfor partnership and
the discussion ofthe discussion of cybersecurity.cybersecurity.
--------------------------------------
www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies
21
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides
22
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
-- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda --
Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus))
23
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
LinkLink: www.itu.int/en/publications/
“CyberSecurity USA”“CyberSecurity USA”:: Critical InfrastructureCritical Infrastructure
•• 1111thth May 2017May 2017: Presidential Executive Order
on “Strengthening the Cybersecurity of“Strengthening the Cybersecurity of
Federal Networks and Critical Infrastructure”Federal Networks and Critical Infrastructure”
24
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• NIST Mandated:NIST Mandated: “Framework for Improving
Critical Infrastructure Cybersecurity”– 20172017
1 – Cyber Crime, Cyber Terror & Cyber War! 22 –– CountdownCountdown to TOP 10 Cyber Threats!to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
25
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Defence Campaign Plan!
“Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!”
•• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by
Role during Criminal/Political Cyber Campaign:
ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack
•• Cyber AttacksCyber Attacks may be planned by Criminals,
26
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Cyber AttacksCyber Attacks may be planned by Criminals,
Terrorists & Hacktivists for weeks & months!
•• Research & Intelligence:Research & Intelligence: Major Attacks will be
based on In-Depth Research, “Insider
Intelligence”, and Cyber “Hackers” Toolkit!...
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 33 –– 21stC21stC Cyber Hack & Attack CampaignsCyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
27
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
“21stC“21stC CyberCyber Hack & AttackHack & Attack CampaignsCampaigns””
•• CyberCrime & TerrorismCyberCrime & Terrorism are now organised on
an “Industrial Scale” with Toolkits & BotNets for
“Hire by the Hour” on the “DarkWeb”...
•• Major Cyber AttacksMajor Cyber Attacks demand the Professional
Skills of a well managed Criminal Enterprise...
28
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Skills of a well managed Criminal Enterprise...
•• The Cyber EnterpriseThe Cyber Enterprise may be a small CyberCell
of 3 or 4 “Staff” and scale up to teams of
hundreds in some Cyber Banking “Heists”...
.....Next we explore some Cyber Criminal Skills........Next we explore some Cyber Criminal Skills...
Hierarchy ofHierarchy of Cyber Hacking Skills!Cyber Hacking Skills!
29
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!...
• Skills required by the “Bad Guys”“Bad Guys” to launch
and manage major Cyber Crime Campaigns:
•• ICT:ICT: Cyber Technical Specialist (Hacking Tools)
•• Finance:Finance: Money Laundering & Campaign Budget
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
30
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent!
•• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt
•• Project Management:Project Management: Co-ordinate Campaign!
•• Security:Security: Detect “BackDoors” both in the Physical
and Cyber Defences of the Target Business/Govt
...In summary, the “Bad Guys”“Bad Guys” will often organise
themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
31
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference31
44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 –In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
“Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools
*** EXPLORATION ****** EXPLORATION ***
• Cyber Crime Campaigns will be launched with
In-depth Cyber & Insider Target ExplorationExploration:
•• Threat 1: APTThreat 1: APT = Advanced Persistent Attack
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
32
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams
•• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing
........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor
detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in
preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
May 2016May 2016 :: $81m Bank Cyber$81m Bank Cyber--HeistHeist
33
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
International Business TimesInternational Business Times
-- 1313thth May 2016May 2016 --
Process Flow ofProcess Flow of CyberCriminalCyberCriminal Attack onAttack on
Major UKMajor UK Financial InstitutionFinancial Institution: 2010: 2010
34
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Source: White Paper by M86 Security: Aug 2010
Such Cyber Attacks, with variations, take place regularly inSuch Cyber Attacks, with variations, take place regularly in Banking & Financial ServicesBanking & Financial Services
. During. During Summer 2014Summer 2014 more thanmore than 83Million Accounts83Million Accounts were “hacked” @were “hacked” @ JP Morgan ChaseJP Morgan Chase--
-- It is estimated that more thanIt is estimated that more than $450Bllion/Year$450Bllion/Year is lost throughis lost through CyberCrimeCyberCrime --
CyberEspionageCyberEspionage:: Middle East and AfricaMiddle East and Africa
35
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyber Threat:Cyber Threat: “Banking Theft”“Banking Theft”–– CarbanakCarbanak
36
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
EstimatedEstimated ~$1Billion~$1Billion stolenstolen
fromfrom ~100+~100+ Banks & FinancialBanks & Financial
Institutions duringInstitutions during 2013/20142013/2014
Researched by “Researched by “KasperskyKaspersky Labs”Labs”
Cyber Threats:Cyber Threats: Phishing and Identity TheftPhishing and Identity Theft
37
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Phishing Attack: TypicalPhishing Attack: Typical “Cyber Hacking”“Cyber Hacking” ProcessProcess
38
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Malaysian Government:Malaysian Government: CyberSecurityCyberSecurity
39
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyber Threats:Cyber Threats: “Fake” Profiles & Toxic“Fake” Profiles & Toxic eMaileMail
40
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyber Threats:Cyber Threats: Spyware & Password HacksSpyware & Password Hacks
41
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Cyber Threats:Cyber Threats: KeyloggersKeyloggers -- Hardware & SoftwareHardware & Software
• Easily inserted by CyberCriminal “Insiders”!
• Wi-Fi Scanners & Loggers also Easily Acquired
• Alternative Software Keyloggers can be illegally
downloaded into compromised servers & PCs
42
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
downloaded into compromised servers & PCs
• Logged files can be uploaded to CyberCriminals
through eMail or by FTP through Open Ports
• Examples have also been found inside credit card terminals, pre-
installed by criminals in production plants with SIM Cards and Phone.
4
2
Australian Government:Australian Government: Cybersecurity AwarenessCybersecurity Awareness
43
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Attacker SophisticationAttacker Sophistication vsvs Intruder KnowledgeIntruder Knowledge
44
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference 4
4
“Dark Web”“Dark Web” CriminalCriminal CyberCyber EconomyEconomy
--“Bad Guys”“Bad Guys” Rent/BuyRent/Buy Tools & ResourcesTools & Resources!! --
45
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference 4
5
...Already...Already Criminalised & CommercialisedCriminalised & Commercialised more than 10 Years ago!more than 10 Years ago!
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
46
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference46
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
55 –– Cyber Entry and Exit Routes and ToolsCyber Entry and Exit Routes and Tools
““Penetration”Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 - In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
“Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools”
*** PENETRATION ****** PENETRATION ***
• The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or
Agency for both “Entry” & “Exit” Routes for “Data/Bots”:
•• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration
with SQL DB Injection & Web Cross-Site Scripting (XSS)
47
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
with SQL DB Injection & Web Cross-Site Scripting (XSS)
•• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans
•• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches
•• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style”
...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT
WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
Typical C2Typical C2
MalwareMalware
SignaturesSignatures
48
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
SignaturesSignatures
Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
“Cyber Threat”:“Cyber Threat”: SQL Injection VulnerabilitySQL Injection Vulnerability
“Website”
“Website”
49
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Website”
SolutionSolution: Ensure allEnsure all SQLSQL Inputs areInputs are “Non“Non--EXECUTABLE”EXECUTABLE” ParameterisedParameterised Statements!...Statements!...
Cyber Threats:Cyber Threats: “Twitter”“Twitter” CrossCross--Site Scripting VulnerabilitySite Scripting Vulnerability
50
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference 5
0
Impact ofImpact of XSSXSS CrossCross--Site ScriptingSite Scripting “Cyber Threat”“Cyber Threat”
Solution:Solution:
51
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference 5
1
Solution:Solution: Always check rigorouslyAlways check rigorously
for data fields that allow userfor data fields that allow user--input.input.
Ensure that there is no possibility forEnsure that there is no possibility for
User ScriptUser Script input to be executed ininput to be executed in
website codedwebsite coded ““phpphp”” oror “asp”“asp” pagespages
CrossCross--Site ScriptingSite Scripting Threat by Proxy :Threat by Proxy : XSSXSS
52
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DesignerDesigner ““StuxNetStuxNet”” WormWorm -- Industrial “SCADA” SystemsIndustrial “SCADA” Systems
StuxnetStuxnet WormWorm : Discovered: Discovered June 2010June 2010
53
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
SCADASCADA = S= Supervisoryupervisory CControl &ontrol & DDataata AAcquisitioncquisition
-- Mainly for Power Stations & Industrial PlantsMainly for Power Stations & Industrial Plants
Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix
54
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
55
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
66 –– RealReal--Time Cyber Alert: Hack & AttackTime Cyber Alert: Hack & Attack
“Cyber Attack”“Cyber Attack”
7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
“Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack””
*** CYBER ATTACK ****** CYBER ATTACK ***
• Following In-Depth Cyber Research & Target
Mapping the “Bad Guys”“Bad Guys” will Launch Attack
Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! :
•• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route
Users to “Fake” or “Toxic” Web & DB Resources
56
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Users to “Fake” or “Toxic” Web & DB Resources
•• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service
executed through “Hired” Networked “BotNets”
•• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on
Device that Encrypts ALL Networked Files with
Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack!
57
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Successive “RealSuccessive “Real--Time”Time”DarkNetDarkNet CyberAttacksCyberAttacks
58
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack
59
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
TypicalTypical DDOSDDOS ““BotNetBotNet” Attack” Attack
60
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
61
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CompareCompare “Classic War”“Classic War” toto ““CyberWarCyberWar”!”!
Naval Campaign:Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805
62
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!...
...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
“CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works!
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
RecommendedRecommended
“Bedtime“Bedtime
Reading”Reading”
forfor
63
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
forfor
CybersecurityCybersecurity
Specialists!Specialists!
Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815
64
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
““ClauzewitzClauzewitz”” is relevant tois relevant to Cyber Campaigns!Cyber Campaigns!
Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812
65
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
“Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns!
21stC21stC Cyber WarCyber War && Peace!Peace!
2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism”
DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds
INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER
Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY
“Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools
& Resources to extensively& Resources to extensively
ResearchResearch && LaunchLaunch MajorMajor
Physical Terror Attacks!Physical Terror Attacks!
66
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Physical Terror Attacks!Physical Terror Attacks!
(1)(1) DarkWebDarkWeb forfor Weapons!Weapons!
(2)(2) ResearchResearch Urban TargetsUrban Targets
(3)(3) Social MediaSocial Media forfor CommsComms
(4)(4) RecruitmentRecruitment & Training& Training
(5)(5) RansomwareRansomware for CAfor CA$$H..H..
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
67
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
77 –– InIn--Depth:Depth: 2121stst Technical Cyber DefenceTechnical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
“In“In--Depth 21stC TechnicalDepth 21stC Technical Cyber DefenceCyber Defence””
• Effective Cyber Defence to TOP 10 Threats
requires BOTH Technical & Operational Plans:
• Technical Actions, Plans & Policies include:
–– DataBaseDataBase:: Secure Physical & Cloud DataBase Scripts
–– BackBack--Ups:Ups: Continuous Real-Time DB/Web Back-Ups
–– BYOD:BYOD: Strict Policy for “Bring Your Own Device”
68
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
–– BYOD:BYOD: Strict Policy for “Bring Your Own Device”
–– eMaileMail:: Script Locks on eMail Attachments & Web Links
–– DDoS:DDoS: Switch DNS/IP Settings in case of DDoS Attack
–– CERT:CERT: Set-Up Computer Emergency Response Team
............CERTsCERTs work togetherwork together GloballyGlobally to provideto provide
Cyber Alerts & IntelligenceCyber Alerts & Intelligence to Govt & Businessto Govt & Business
Cyber Secure SystemsCyber Secure Systems LANLAN
Infrastructure withInfrastructure with DMZDMZ forfor
Government or EnterpriseGovernment or Enterprise
TOP Security for Critical Sectors:TOP Security for Critical Sectors: Govt, Banks, Energy, Transport..Govt, Banks, Energy, Transport..
69
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference 6
9
DDoSDDoS Mitigation :Mitigation : “Packet Filter”“Packet Filter”
70
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
MitigateMitigate DDoSDDoS Attack:Attack: “Black“Black--Holing”Holing”
71
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
72
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 – In-Depth: 21stC Technical Cyber Defence 88 –– YOURYOUR Operational Cyber DefenceOperational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
““YOURYOUR OperationalOperational Cyber DefenceCyber Defence””
•• CC$$O:O: Board Level Role – Chief $ecurity Officer - with
Security Investment Plan and $$$ Budget!..
•• Cyber Standards:Cyber Standards: Migrate to International Security
Standards such as ISO2700x Series
•• Compliance:Compliance: Implement regular IT Asset & Process
Audits to ensure Full Compliance
•• Training:Training: Ensure Key Staff are Professionally Certified
73
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
•• Training:Training: Ensure Key Staff are Professionally Certified
(CISSP) with Bi-Annual Updates.
•• Culture:Culture: Launch Business/Agency Security Policy so ALLALL
Staff understand their Responsibilities!
....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR
BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
74
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST
Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017
NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology
75
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
76
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
NISTNIST CybersecurityCybersecurity FrameworkFramework
National Institute of Standards & TechnologyNational Institute of Standards & Technology
77
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
Cybersecurity for Critical SectorCybersecurity for Critical Sector “Sensor Networks”“Sensor Networks” (IoT)(IoT)
Sensor Networks
78
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ENISA:ENISA: European Computer Emergency Response NetworkEuropean Computer Emergency Response Network
79
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
FlowFlow--Chart:Chart: ISO27001 CyberSecurity CertificationISO27001 CyberSecurity Certification
80
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
BET365:BET365: Gambling Sector adoptsGambling Sector adopts
ISO/IEC 27001ISO/IEC 27001 Security StandardsSecurity Standards
• London 5 April 2017- BET365’SBET365’S commitment to
standards recognised with ISO/IEC 27001:2013ISO/IEC 27001:2013
Certification for Info Security Management (ISMS).
• UTECH Jamaica PhD - CyberSecurity & GamblingCyberSecurity & Gambling:
““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An
81
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An
Implementation Framework for Developing Countries -
A Case Study for the Jamaica Jurisdiction: George Brown...
.....Research Programme initiated following.....Research Programme initiated following UN/ITUUN/ITU
CyberSecurity TrainingCyberSecurity Training @@ UTECHUTECH –– September 2010....September 2010....
UN/ITU: 5UN/ITU: 5--dayday Cybersecurity WorkshopCybersecurity Workshop -- Jamaica 2010Jamaica 2010
82
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns
4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack!
“Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats!
83
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
4 – Cyber Intelligence Gathering Tools
“Exploration”“Exploration”
5 – Cyber Entry & Exit Routes & Tools
“Penetration”“Penetration”
6 – Real-Time Cyber Alert: Hack & Attack!
“Cyber Attack”“Cyber Attack”
7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!
““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan””
• Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a
Campaign Action Plan for Active Cyber Defence!
• Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires:
––C$O:C$O: Board Level Security Plan and $ Investment
84
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
––C$O:C$O: Board Level Security Plan and $ Investment
––Technical:Technical: Professional Team, Tools & Training
––Operational:Operational: Security, Standards & Compliance
........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up
withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
“Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders”
A.I. & Machine LearningA.I. & Machine Learning
CyberSecurity Tools willCyberSecurity Tools will
85
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
CyberSecurity Tools willCyberSecurity Tools will
ProvideProvide “Speed of Light”“Speed of Light”
RealReal--Time Defence againstTime Defence against
TOP 10TOP 10 Threats & Attacks!Threats & Attacks!
“Steam Powered Birds arrive over our Cities! - 1981
Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov
86
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
“Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
“Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
87
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
“Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
“Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats
International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa
ThankThank--You!You!ThankThank--You!You!
88
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
ThankThank--You!You!ThankThank--You!You!
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
EastEast--West Security ConferenceWest Security Conference –– Genoa 2017Genoa 2017
--“21stC CyberSecurity Trends”“21stC CyberSecurity Trends”--
89
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download Link:Download Link: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/
Theme (1)Theme (1) ––“TOP 10 Cyber Threats”“TOP 10 Cyber Threats” Theme (2)Theme (2) ––““CyberTrendsCyberTrends: 2018: 2018--2025”2025”
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
Download Presentation Slides:Download Presentation Slides:
www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
90
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
AdditionalAdditional CybersecurityCybersecurity ResourcesResources
91
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert
Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with
telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing
Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the
“knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business
European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included
support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments.
Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998)
Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web-
Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record.
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
92
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11
networking products with technology partners from both UK and Taiwan.
Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall
responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products.
Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT
security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries.
UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas
Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree
(Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) ,
and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
“Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012
-- Smart Security, Economy & GovernanceSmart Security, Economy & Governance --
93
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Download:Download: www.valentina.net/DigiTec2012/
“Practical Defence:“Practical Defence: TOP 10TOP 10 Cyber Threats!”Cyber Threats!”
3535thth International EastInternational East--West Security Conference: Genoa, ItalyWest Security Conference: Genoa, Italy
94
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
*** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing ***
SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres
95
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet...
15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes dieddied in Avalanchein Avalanche »»
Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents
96
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DDOSDDOS Mitigation:Mitigation: “Reactive Trace Back”“Reactive Trace Back”
97
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DDOSDDOS Mitigation:Mitigation: “Traffic Rate Limiting”“Traffic Rate Limiting”
98
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DDOSDDOS Mitigation:Mitigation: “Cryptographic Puzzles”“Cryptographic Puzzles”
99
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference
DDOSDDOS Mitigation:Mitigation: “Virtual Overlay Network”“Virtual Overlay Network”
100
-- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats --
“Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training”
*** Genoa, Italy – 5th & 6th June 2017 ***
© Dr David E. Probert : www.VAZA.com ©
35th International East/West Security Conference

Mais conteúdo relacionado

Mais procurados

Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsDr David Probert
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceDr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity PredictionsNyotron
 

Mais procurados (20)

Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
CyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in CyberspaceCyberTerrorism - Security in Cyberspace
CyberTerrorism - Security in Cyberspace
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 

Semelhante a YOUR Defence for the TOP 10 Cyber Threats!

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureDr David Probert
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Mamoon Ismail Khalid
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Dr David Probert
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, EverywhereLINE Corporation
 
Bridging the gap between mobile and computer forensics
Bridging the gap between mobile and computer forensicsBridging the gap between mobile and computer forensics
Bridging the gap between mobile and computer forensicsNina Ananiasvili
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersEoin Keary
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaDr David Probert
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 

Semelhante a YOUR Defence for the TOP 10 Cyber Threats! (14)

Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth Case study cybersecurity industry birth and growth
Case study cybersecurity industry birth and growth
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
Smart Sustainable Security - Master Class - Yerevan, Armenia - 2012
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Drawing the Line Correctly: Enough Security, Everywhere
Drawing the Line Correctly:   Enough Security, EverywhereDrawing the Line Correctly:   Enough Security, Everywhere
Drawing the Line Correctly: Enough Security, Everywhere
 
Bridging the gap between mobile and computer forensics
Bridging the gap between mobile and computer forensicsBridging the gap between mobile and computer forensics
Bridging the gap between mobile and computer forensics
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for GeorgiaCyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
Cyber Vardzia - Integrated Physical and Cyber Security Systems for Georgia
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 

Mais de Dr David Probert

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsDr David Probert
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentDr David Probert
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseDr David Probert
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic BusinessDr David Probert
 

Mais de Dr David Probert (8)

AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
AI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPoliticsAI & Cybersecurity meet 21stC GeoPolitics
AI & Cybersecurity meet 21stC GeoPolitics
 
From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
Project KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the EnvironmentProject KolaNet - Rethinking IT Support for the Environment
Project KolaNet - Rethinking IT Support for the Environment
 
Embedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the EnterpriseEmbedding Artificial Intelligence in the Enterprise
Embedding Artificial Intelligence in the Enterprise
 
Business BluePrint for Electronic Business
Business BluePrint for Electronic BusinessBusiness BluePrint for Electronic Business
Business BluePrint for Electronic Business
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

YOUR Defence for the TOP 10 Cyber Threats!

  • 1. Practical CyberPractical Cyber DefenceDefence --TOP 10 Cyber ThreatsTOP 10 Cyber Threats-- 1 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference --TOP 10 Cyber ThreatsTOP 10 Cyber Threats-- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
  • 2. Практическая кибер ЗащитаПрактическая кибер Защита --Топ 10Топ 10 кибер Угрозкибер Угроз-- 2 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference --Топ 10Топ 10 кибер Угрозкибер Угроз-- Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dr David E. ProbertDr David E. Probert VAZAVAZA InternationalInternational Dedicated to GrandDedicated to Grand--Sons: Ethan, Matthew, Roscoe & HughSons: Ethan, Matthew, Roscoe & Hugh –– Securing YOUR Future!Securing YOUR Future!
  • 3. “C“Cybersecurityybersecurity Trends”:Trends”: Dual ThemesDual Themes Theme (1)Theme (1) –– ..........Practical Cyber DefencePractical Cyber Defence against TOP 10 Cyber Threats.....against TOP 10 Cyber Threats..... -- “Networked”“Networked” :: “Real“Real--Time Cyber Security & Surveillance”Time Cyber Security & Surveillance” 09:4509:45 66thth June 2017June 2017 We review PracticalWe review Practical CyberDefenceCyberDefence against Threats, Hacks & Attacksagainst Threats, Hacks & Attacks fromfrom RansomwareRansomware, BotNets(DDoS), Key Logging, Insider Threats,, BotNets(DDoS), Key Logging, Insider Threats, Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL),Legacy IoT Hacks, Social Media Phishing, Data Base Hacks(SQL), Advanced Persistent Attacks (APT), Virus/Trojan & Web/Cookie Hacks.Advanced Persistent Attacks (APT), Virus/Trojan & Web/Cookie Hacks. 3 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ThemeTheme (2)(2) –– ..........Cyber Tools & Trends:Cyber Tools & Trends: The Next 7 years: 2018The Next 7 years: 2018 –– 2025.....2025..... -- “Neural”“Neural” :: “New Generation Networked Neural Security"“New Generation Networked Neural Security" 14:1514:15 66thth June 2017June 2017 Download SlideDownload Slides:s: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/ We present Cyber Trends & Scenarios for 2018 (We present Cyber Trends & Scenarios for 2018 (Cyber TransitionCyber Transition),), 2020 (2020 (Intelligent SecurityIntelligent Security) and 2025 () and 2025 (Neural Security).Neural Security). We discussWe discuss the Evolution of Advanced AI based Cyber Tools with Applicationsthe Evolution of Advanced AI based Cyber Tools with Applications to Smart Devices (IoT), Smart Transportation & Smart Cities.to Smart Devices (IoT), Smart Transportation & Smart Cities.
  • 4. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 4 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
  • 5. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 5 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World
  • 6. “Visualisation of Cyberspace”:“Visualisation of Cyberspace”: Global IP “WHOIS” AddressesGlobal IP “WHOIS” Addresses 6 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference …From 19…From 19ththC Physical World To 21C Physical World To 21ststC Intelligent WorldC Intelligent World! ...! ...
  • 7. GeoVisionGeoVision 24/7 Internet Connectivity24/7 Internet Connectivity -- ““CarnaCarna BotnetBotnet Internet Census 2012”Internet Census 2012” -- 7 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 8. “Cybernetics & Security”:“Cybernetics & Security”: 19431943 -- 2018!2018! -- Back to the Future:Back to the Future: The Last 75 Years!The Last 75 Years! -- • 1943 – “Neural Networks” – Perceptrons (AI – McCulloch/Pitts) • 1948 – “Cybernetics” – Norbert Wiener • 1969 – ARPANet Launched – 4 Packet Switching Net Nodes - • 1974 – Internet Protocol Published – Vint Cerf/Bob Kahn • 1982 – Elk Cloner - 1st “Apple Computer Virus • 1986 – “Brain” – 1st Microsoft MS-DOS Virus 8 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference • 1986 – “Brain” – 1st Microsoft MS-DOS Virus • 1988 – 1st “Packet Filter” Firewall (DEC: Digital Equipment Corp) • 1990 – World Wide Web – CERN Labs - Sir Tim Berners Lee • 1993 – Mosaic Browser – NCSA – Illinois, USA • 2018 –Transition to AI/ML Apps for 21stC CyberSecurity! -- ExploringExploring “Cyber Visions”“Cyber Visions” requires us torequires us to Research the PastResearch the Past!!
  • 9. 11 ––““Cyber Crime, Cyber Terror & Cyber War”Cyber Crime, Cyber Terror & Cyber War” 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 9 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack!”“Cyber Attack!” 7 – In-Depth: 21stC Technical Cyber Defence 8– YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Defence Campaign Plan!
  • 10. ““CyberCyberCrimeCrime,, CyberCyberTerrorTerror && CyberCyberWarWar”” 1)1) Media:Media: Global News Reports of Cyber Attacks! 2)2) TOP Threats:TOP Threats: We explore the TOP 10 Threats, & Mechanisms exploited by “Bad Guys”! 3)3) Cyber Reality:Cyber Reality: Understand the Criminal & Political Reality behind Cyber Attacks! 10 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Political Reality behind Cyber Attacks! 4)4) Practical Defence:Practical Defence: Discuss Practical Cyber Defence to these Threats for YOUR Business! .....These same.....These same TOP 10 ThreatsTOP 10 Threats are used in someare used in some combination incombination in EVERYEVERY Cyber Hack & Attack!....Cyber Hack & Attack!....
  • 11. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 11 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 12. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- 12 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 13. World Economic Forum:World Economic Forum: Global CyberCrimeGlobal CyberCrime -- $445Billion$445Billion (Intel Research : June 2014)(Intel Research : June 2014) -- Red Alert!Red Alert! 13 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Red Alert!Red Alert! –– InIn--Coming Cyber Attack!Coming Cyber Attack! --
  • 14. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 14 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 15. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 15 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!! Chemnitz StationChemnitz Station -- GermanyGermany
  • 16. Global RansomWareGlobal RansomWare CyberAttackCyberAttack “WanaCrypt0r 2.0”“WanaCrypt0r 2.0” -- 1212thth May 2017May 2017 16 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Global Impact onGlobal Impact on Critical ServicesCritical Services:: UK, Russia, Spain, Italy, China, USA & Beyond!UK, Russia, Spain, Italy, China, USA & Beyond! ...More than...More than 200k200k Systems inSystems in 150+150+ CountriesCountries!!
  • 17. Guide toGuide to Cyber ScamsCyber Scams: March 2017: March 2017 Recommended!Recommended! 17 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference https://beta.met.police.uk/globalassets/downloads/fraud/thehttps://beta.met.police.uk/globalassets/downloads/fraud/the--littlelittle--bookbook--cybercyber--scams.pdfscams.pdf Recommended!Recommended!
  • 18. EU Agency for Info Security:EU Agency for Info Security: ENISAENISA ENISAENISA Strategic Security FrameworkStrategic Security Framework Provides effectiveProvides effective “Cyber”“Cyber” model formodel for NationalNational GovernmentsGovernments & Ministries& Ministries 18 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference -- ALL EU CountriesALL EU Countries now have approvednow have approved National Cybersecurity StrategiesNational Cybersecurity Strategies -- www.enisa.europa.eu/topics/nationalwww.enisa.europa.eu/topics/national--cybercyber--securitysecurity--strategies/ncssstrategies/ncss--mapmap
  • 19. UN/ITUUN/ITU –– GlobalGlobal CybersecurityCybersecurity IndexIndex Only 73 Nations (38%)Only 73 Nations (38%) 19 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Only 73 Nations (38%)Only 73 Nations (38%) Publish Public DomainPublish Public Domain CyberSecurity StrategiesCyberSecurity Strategies Available on UN/ITUAvailable on UN/ITU Website:Website: ww.itu.intww.itu.int
  • 20. UN/ITU GCAUN/ITU GCA -- GlobalGlobal Cybersecurity Agenda:Cybersecurity Agenda: ---------------------------------------- 11 –– Legal MeasuresLegal Measures 22 –– Technical MeasuresTechnical Measures 33 –– Organisational MeasuresOrganisational Measures 44 –– Capacity BuildingCapacity Building UN/ITU:UN/ITU: Global Cybersecurity AgendaGlobal Cybersecurity Agenda 20 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 44 –– Capacity BuildingCapacity Building 55 –– International CooperationInternational Cooperation ---------------------------------------- ...The...The ITUITU constitutes aconstitutes a uniqueunique global forumglobal forum for partnership andfor partnership and the discussion ofthe discussion of cybersecurity.cybersecurity. -------------------------------------- www.itu.int/ITUwww.itu.int/ITU--D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdfD/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf
  • 21. UN/ITU:UN/ITU: National Cybersecurity StrategiesNational Cybersecurity Strategies 21 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference www.itu.int/en/ITUwww.itu.int/en/ITU--D/Cybersecurity/Pages/NationalD/Cybersecurity/Pages/National--StrategiesStrategies--repository.aspxrepository.aspx
  • 22. United Nations/ITUUnited Nations/ITU CybersecurityCybersecurity GuidesGuides 22 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 23. -- UN/ITUUN/ITU CyberSecurityCyberSecurity AgendaAgenda -- Quest forQuest for CyberConfidenceCyberConfidence (Eng/(Eng/RusRus)) 23 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference LinkLink: www.itu.int/en/publications/
  • 24. “CyberSecurity USA”“CyberSecurity USA”:: Critical InfrastructureCritical Infrastructure •• 1111thth May 2017May 2017: Presidential Executive Order on “Strengthening the Cybersecurity of“Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure”Federal Networks and Critical Infrastructure” 24 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• NIST Mandated:NIST Mandated: “Framework for Improving Critical Infrastructure Cybersecurity”– 20172017
  • 25. 1 – Cyber Crime, Cyber Terror & Cyber War! 22 –– CountdownCountdown to TOP 10 Cyber Threats!to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 25 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 –YOURYOUR Cyber Defence Campaign Plan!
  • 26. “Countdown to“Countdown to TOPTOP 1010 Cyber ThreatsCyber Threats!”!” •• TOP Cyber ThreatsTOP Cyber Threats may be roughly classified by Role during Criminal/Political Cyber Campaign: ExplorationExploration –– PenetrationPenetration –– Alert & AttackAlert & Attack •• Cyber AttacksCyber Attacks may be planned by Criminals, 26 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Cyber AttacksCyber Attacks may be planned by Criminals, Terrorists & Hacktivists for weeks & months! •• Research & Intelligence:Research & Intelligence: Major Attacks will be based on In-Depth Research, “Insider Intelligence”, and Cyber “Hackers” Toolkit!...
  • 27. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 33 –– 21stC21stC Cyber Hack & Attack CampaignsCyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 27 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 28. “21stC“21stC CyberCyber Hack & AttackHack & Attack CampaignsCampaigns”” •• CyberCrime & TerrorismCyberCrime & Terrorism are now organised on an “Industrial Scale” with Toolkits & BotNets for “Hire by the Hour” on the “DarkWeb”... •• Major Cyber AttacksMajor Cyber Attacks demand the Professional Skills of a well managed Criminal Enterprise... 28 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Skills of a well managed Criminal Enterprise... •• The Cyber EnterpriseThe Cyber Enterprise may be a small CyberCell of 3 or 4 “Staff” and scale up to teams of hundreds in some Cyber Banking “Heists”... .....Next we explore some Cyber Criminal Skills........Next we explore some Cyber Criminal Skills...
  • 29. Hierarchy ofHierarchy of Cyber Hacking Skills!Cyber Hacking Skills! 29 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 30. Cyber Criminal TeamCyber Criminal Team SkillsetSkillset!...!... • Skills required by the “Bad Guys”“Bad Guys” to launch and manage major Cyber Crime Campaigns: •• ICT:ICT: Cyber Technical Specialist (Hacking Tools) •• Finance:Finance: Money Laundering & Campaign Budget •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! 30 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• HRHR--Human Resources:Human Resources: Headhunting Cyber Talent! •• Intelligence:Intelligence: Recruit “Insiders” in Business/Govt •• Project Management:Project Management: Co-ordinate Campaign! •• Security:Security: Detect “BackDoors” both in the Physical and Cyber Defences of the Target Business/Govt ...In summary, the “Bad Guys”“Bad Guys” will often organise themselves as an Criminal Cell or Illegal BusinessCriminal Cell or Illegal Business!
  • 31. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 31 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference31 44 –– Cyber Intelligence Gathering ToolsCyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 –In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 32. “Cyber Intelligence Gathering Tools“Cyber Intelligence Gathering Tools *** EXPLORATION ****** EXPLORATION *** • Cyber Crime Campaigns will be launched with In-depth Cyber & Insider Target ExplorationExploration: •• Threat 1: APTThreat 1: APT = Advanced Persistent Attack •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams 32 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Threat 2: Stealth MonitoringThreat 2: Stealth Monitoring – Loggers & Cams •• Threat 3: ToxicThreat 3: Toxic eMaileMail & Social Media Phishing ........Cyber “Stealth” ToolsCyber “Stealth” Tools will be used bywill be used by “Bad Guys”“Bad Guys” forfor detaileddetailed “Mapping”“Mapping” of the Target Organisation, inof the Target Organisation, in preparation for Cyber Penetration & Attack!....preparation for Cyber Penetration & Attack!....
  • 33. May 2016May 2016 :: $81m Bank Cyber$81m Bank Cyber--HeistHeist 33 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference International Business TimesInternational Business Times -- 1313thth May 2016May 2016 --
  • 34. Process Flow ofProcess Flow of CyberCriminalCyberCriminal Attack onAttack on Major UKMajor UK Financial InstitutionFinancial Institution: 2010: 2010 34 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Source: White Paper by M86 Security: Aug 2010 Such Cyber Attacks, with variations, take place regularly inSuch Cyber Attacks, with variations, take place regularly in Banking & Financial ServicesBanking & Financial Services . During. During Summer 2014Summer 2014 more thanmore than 83Million Accounts83Million Accounts were “hacked” @were “hacked” @ JP Morgan ChaseJP Morgan Chase-- -- It is estimated that more thanIt is estimated that more than $450Bllion/Year$450Bllion/Year is lost throughis lost through CyberCrimeCyberCrime --
  • 35. CyberEspionageCyberEspionage:: Middle East and AfricaMiddle East and Africa 35 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 36. Cyber Threat:Cyber Threat: “Banking Theft”“Banking Theft”–– CarbanakCarbanak 36 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference EstimatedEstimated ~$1Billion~$1Billion stolenstolen fromfrom ~100+~100+ Banks & FinancialBanks & Financial Institutions duringInstitutions during 2013/20142013/2014 Researched by “Researched by “KasperskyKaspersky Labs”Labs”
  • 37. Cyber Threats:Cyber Threats: Phishing and Identity TheftPhishing and Identity Theft 37 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 38. Phishing Attack: TypicalPhishing Attack: Typical “Cyber Hacking”“Cyber Hacking” ProcessProcess 38 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 39. Malaysian Government:Malaysian Government: CyberSecurityCyberSecurity 39 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 40. Cyber Threats:Cyber Threats: “Fake” Profiles & Toxic“Fake” Profiles & Toxic eMaileMail 40 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 41. Cyber Threats:Cyber Threats: Spyware & Password HacksSpyware & Password Hacks 41 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 42. Cyber Threats:Cyber Threats: KeyloggersKeyloggers -- Hardware & SoftwareHardware & Software • Easily inserted by CyberCriminal “Insiders”! • Wi-Fi Scanners & Loggers also Easily Acquired • Alternative Software Keyloggers can be illegally downloaded into compromised servers & PCs 42 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference downloaded into compromised servers & PCs • Logged files can be uploaded to CyberCriminals through eMail or by FTP through Open Ports • Examples have also been found inside credit card terminals, pre- installed by criminals in production plants with SIM Cards and Phone. 4 2
  • 43. Australian Government:Australian Government: Cybersecurity AwarenessCybersecurity Awareness 43 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 44. Attacker SophisticationAttacker Sophistication vsvs Intruder KnowledgeIntruder Knowledge 44 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 4
  • 45. “Dark Web”“Dark Web” CriminalCriminal CyberCyber EconomyEconomy --“Bad Guys”“Bad Guys” Rent/BuyRent/Buy Tools & ResourcesTools & Resources!! -- 45 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 5 ...Already...Already Criminalised & CommercialisedCriminalised & Commercialised more than 10 Years ago!more than 10 Years ago!
  • 46. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 46 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference46 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 55 –– Cyber Entry and Exit Routes and ToolsCyber Entry and Exit Routes and Tools ““Penetration”Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 - In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 47. “Cyber Entry & Exit Routes & Tools”“Cyber Entry & Exit Routes & Tools” *** PENETRATION ****** PENETRATION *** • The “Bad Guys”“Bad Guys” will PenetratePenetrate the “Target” Business 0or Agency for both “Entry” & “Exit” Routes for “Data/Bots”: •• Threat 4:Threat 4: DataBaseDataBase/Web Hacks/Web Hacks – DB/Web Penetration with SQL DB Injection & Web Cross-Site Scripting (XSS) 47 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference with SQL DB Injection & Web Cross-Site Scripting (XSS) •• Threat 5: Classic MalwareThreat 5: Classic Malware – Viruses & Trojans •• Threat 6: Authentication HacksThreat 6: Authentication Hacks – Passwords/Patches •• Threat 7: Custom Design “Bots”Threat 7: Custom Design “Bots” – “StuxNet Style” ...... “Dark Web Tools & Bots”“Dark Web Tools & Bots” may check for Target ITmay check for Target IT WeaknessesWeaknesses–– 24/724/7 -- using Fast Network Assets!using Fast Network Assets!
  • 48. Typical C2Typical C2 MalwareMalware SignaturesSignatures 48 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference SignaturesSignatures Image:Image: www.fireeye.comwww.fireeye.com –– FireEyeFireEye Inc (c)Inc (c)
  • 49. “Cyber Threat”:“Cyber Threat”: SQL Injection VulnerabilitySQL Injection Vulnerability “Website” “Website” 49 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference “Website” SolutionSolution: Ensure allEnsure all SQLSQL Inputs areInputs are “Non“Non--EXECUTABLE”EXECUTABLE” ParameterisedParameterised Statements!...Statements!...
  • 50. Cyber Threats:Cyber Threats: “Twitter”“Twitter” CrossCross--Site Scripting VulnerabilitySite Scripting Vulnerability 50 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 5 0
  • 51. Impact ofImpact of XSSXSS CrossCross--Site ScriptingSite Scripting “Cyber Threat”“Cyber Threat” Solution:Solution: 51 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 5 1 Solution:Solution: Always check rigorouslyAlways check rigorously for data fields that allow userfor data fields that allow user--input.input. Ensure that there is no possibility forEnsure that there is no possibility for User ScriptUser Script input to be executed ininput to be executed in website codedwebsite coded ““phpphp”” oror “asp”“asp” pagespages
  • 52. CrossCross--Site ScriptingSite Scripting Threat by Proxy :Threat by Proxy : XSSXSS 52 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 53. DesignerDesigner ““StuxNetStuxNet”” WormWorm -- Industrial “SCADA” SystemsIndustrial “SCADA” Systems StuxnetStuxnet WormWorm : Discovered: Discovered June 2010June 2010 53 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference SCADASCADA = S= Supervisoryupervisory CControl &ontrol & DDataata AAcquisitioncquisition -- Mainly for Power Stations & Industrial PlantsMainly for Power Stations & Industrial Plants
  • 54. Cyber ToolCyber Tool: Web: Web--Site SecuritySite Security -- AcunetixAcunetix 54 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 55. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 55 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 66 –– RealReal--Time Cyber Alert: Hack & AttackTime Cyber Alert: Hack & Attack “Cyber Attack”“Cyber Attack” 7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 56. “Real“Real--Time Cyber Alert:Time Cyber Alert: Hack & AttackHack & Attack”” *** CYBER ATTACK ****** CYBER ATTACK *** • Following In-Depth Cyber Research & Target Mapping the “Bad Guys”“Bad Guys” will Launch Attack Utilising Selection of TOP 10 Cyber ThreatsTOP 10 Cyber Threats! : •• Threat 8: Toxic Cookies/Proxy/DNSThreat 8: Toxic Cookies/Proxy/DNS – Re-Route Users to “Fake” or “Toxic” Web & DB Resources 56 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Users to “Fake” or “Toxic” Web & DB Resources •• Threat 9: DDoSThreat 9: DDoS – Distributed Denial of Service executed through “Hired” Networked “BotNets” •• Threat 10: RansomWareThreat 10: RansomWare – Toxic Script running on Device that Encrypts ALL Networked Files with Decryption after ““BitCoinBitCoin Ransom Payment”!Ransom Payment”!
  • 57. Typical GlobalTypical Global ““BotnetBotnet”” CyberAttack!CyberAttack! 57 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 58. Successive “RealSuccessive “Real--Time”Time”DarkNetDarkNet CyberAttacksCyberAttacks 58 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 59. RealReal--Time GlobalTime Global DDoS “DDoS “BotNetBotNet” Attack” Attack 59 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Link:Link: map.norsecorp.commap.norsecorp.com -- Norse CorporationNorse Corporation
  • 60. TypicalTypical DDOSDDOS ““BotNetBotNet” Attack” Attack 60 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 61. “Naval Campaign:“Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 61 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference CompareCompare “Classic War”“Classic War” toto ““CyberWarCyberWar”!”!
  • 62. Naval Campaign:Naval Campaign: Battle of TrafalgarBattle of Trafalgar--18051805 62 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ““Cyber Attack Strategies & CampaignsCyber Attack Strategies & Campaigns havehave SimilaritiesSimilarities withwith Classical WarfareClassical Warfare!...!... ...But they occur...But they occur 1Million X Faster1Million X Faster @@ “Speed of Light”“Speed of Light” rather thanrather than “Speed of Sound”!“Speed of Sound”!
  • 63. “CyberWar”“CyberWar” StrategiesStrategies & Models from& Models from Classic Works!Classic Works! RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor RecommendedRecommended “Bedtime“Bedtime Reading”Reading” forfor 63 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity!Classic WorksClassic Works onon “War”“War” are still relevant today forare still relevant today for 21stC Cybersecurity!21stC Cybersecurity! forfor CybersecurityCybersecurity Specialists!Specialists! forfor CybersecurityCybersecurity Specialists!Specialists! Cyber CriminalsCyber Criminals now plannow plan Cyber CampaignsCyber Campaigns && AttacksAttacks withwith InIn--Depth ResearchDepth Research && 2121stst WeaponsWeapons!!
  • 64. Classic CampaignsClassic Campaigns: Battle of Waterloo: Battle of Waterloo--18151815 64 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ““ClauzewitzClauzewitz”” is relevant tois relevant to Cyber Campaigns!Cyber Campaigns!
  • 65. Classical Warfare:Classical Warfare: Battle of BorodinoBattle of Borodino--18121812 65 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference “Classic Works”“Classic Works” are relevant toare relevant to Cyber War Campaigns!Cyber War Campaigns! 21stC21stC Cyber WarCyber War && Peace!Peace!
  • 66. 2121ststC Warfare:C Warfare: “Urban Terrorism”“Urban Terrorism” DefenceDefence againstagainst “Urban Terror”“Urban Terror” needsneeds INTEGRATIONINTEGRATION ofof PHYSICALPHYSICAL && CYBERCYBER Security Solutions =Security Solutions = SMART SECURITYSMART SECURITY “Bad Guys”“Bad Guys” useuse Cyber ToolsCyber Tools & Resources to extensively& Resources to extensively ResearchResearch && LaunchLaunch MajorMajor Physical Terror Attacks!Physical Terror Attacks! 66 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Physical Terror Attacks!Physical Terror Attacks! (1)(1) DarkWebDarkWeb forfor Weapons!Weapons! (2)(2) ResearchResearch Urban TargetsUrban Targets (3)(3) Social MediaSocial Media forfor CommsComms (4)(4) RecruitmentRecruitment & Training& Training (5)(5) RansomwareRansomware for CAfor CA$$H..H..
  • 67. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 67 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 77 –– InIn--Depth:Depth: 2121stst Technical Cyber DefenceTechnical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 68. “In“In--Depth 21stC TechnicalDepth 21stC Technical Cyber DefenceCyber Defence”” • Effective Cyber Defence to TOP 10 Threats requires BOTH Technical & Operational Plans: • Technical Actions, Plans & Policies include: –– DataBaseDataBase:: Secure Physical & Cloud DataBase Scripts –– BackBack--Ups:Ups: Continuous Real-Time DB/Web Back-Ups –– BYOD:BYOD: Strict Policy for “Bring Your Own Device” 68 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference –– BYOD:BYOD: Strict Policy for “Bring Your Own Device” –– eMaileMail:: Script Locks on eMail Attachments & Web Links –– DDoS:DDoS: Switch DNS/IP Settings in case of DDoS Attack –– CERT:CERT: Set-Up Computer Emergency Response Team ............CERTsCERTs work togetherwork together GloballyGlobally to provideto provide Cyber Alerts & IntelligenceCyber Alerts & Intelligence to Govt & Businessto Govt & Business
  • 69. Cyber Secure SystemsCyber Secure Systems LANLAN Infrastructure withInfrastructure with DMZDMZ forfor Government or EnterpriseGovernment or Enterprise TOP Security for Critical Sectors:TOP Security for Critical Sectors: Govt, Banks, Energy, Transport..Govt, Banks, Energy, Transport.. 69 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 6 9
  • 70. DDoSDDoS Mitigation :Mitigation : “Packet Filter”“Packet Filter” 70 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 71. MitigateMitigate DDoSDDoS Attack:Attack: “Black“Black--Holing”Holing” 71 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 72. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 72 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 – In-Depth: 21stC Technical Cyber Defence 88 –– YOURYOUR Operational Cyber DefenceOperational Cyber Defence 9 – YOURYOUR Cyber Defence Campaign Plan!
  • 73. ““YOURYOUR OperationalOperational Cyber DefenceCyber Defence”” •• CC$$O:O: Board Level Role – Chief $ecurity Officer - with Security Investment Plan and $$$ Budget!.. •• Cyber Standards:Cyber Standards: Migrate to International Security Standards such as ISO2700x Series •• Compliance:Compliance: Implement regular IT Asset & Process Audits to ensure Full Compliance •• Training:Training: Ensure Key Staff are Professionally Certified 73 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference •• Training:Training: Ensure Key Staff are Professionally Certified (CISSP) with Bi-Annual Updates. •• Culture:Culture: Launch Business/Agency Security Policy so ALLALL Staff understand their Responsibilities! ....A Major Targeted....A Major Targeted Cyber AttackCyber Attack can easily destroycan easily destroy YOURYOUR BusinessBusiness as effectively as Bankruptcy soas effectively as Bankruptcy so Plan & InvestPlan & Invest!!
  • 74. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017 NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology 74 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
  • 75. Guide toGuide to CyberSecurityCyberSecurity EventEvent Recovery:Recovery:NISTNIST Recommended Technical Handbook:Recommended Technical Handbook: January 2017January 2017 NISTNIST = National Institute of Standards & Technology= National Institute of Standards & Technology 75 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Free Download:Free Download: https://doi.org/10.6028/NIST.SP.800https://doi.org/10.6028/NIST.SP.800--184184
  • 76. NISTNIST CybersecurityCybersecurity FrameworkFramework National Institute of Standards & TechnologyNational Institute of Standards & Technology 76 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
  • 77. NISTNIST CybersecurityCybersecurity FrameworkFramework National Institute of Standards & TechnologyNational Institute of Standards & Technology 77 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Web:Web: www.nist.gov/cyberframework/www.nist.gov/cyberframework/
  • 78. Cybersecurity for Critical SectorCybersecurity for Critical Sector “Sensor Networks”“Sensor Networks” (IoT)(IoT) Sensor Networks 78 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 79. ENISA:ENISA: European Computer Emergency Response NetworkEuropean Computer Emergency Response Network 79 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 80. FlowFlow--Chart:Chart: ISO27001 CyberSecurity CertificationISO27001 CyberSecurity Certification 80 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 81. BET365:BET365: Gambling Sector adoptsGambling Sector adopts ISO/IEC 27001ISO/IEC 27001 Security StandardsSecurity Standards • London 5 April 2017- BET365’SBET365’S commitment to standards recognised with ISO/IEC 27001:2013ISO/IEC 27001:2013 Certification for Info Security Management (ISMS). • UTECH Jamaica PhD - CyberSecurity & GamblingCyberSecurity & Gambling: ““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An 81 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ““Cybercrime in Online Gaming & Gambling”:Cybercrime in Online Gaming & Gambling”: An Implementation Framework for Developing Countries - A Case Study for the Jamaica Jurisdiction: George Brown... .....Research Programme initiated following.....Research Programme initiated following UN/ITUUN/ITU CyberSecurity TrainingCyberSecurity Training @@ UTECHUTECH –– September 2010....September 2010....
  • 82. UN/ITU: 5UN/ITU: 5--dayday Cybersecurity WorkshopCybersecurity Workshop -- Jamaica 2010Jamaica 2010 82 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 83. 1 – Cyber Crime, Cyber Terror & Cyber War 2 – Countdown to TOP 10 Cyber Threats! 3 – 21stC Cyber Hack & Attack Campaigns 4 – Cyber Intelligence Gathering Tools 5 – Cyber Entry & Exit Routes & Tools 6 – Real-Time Cyber Alert: Hack & Attack! “Practical Cyber Defence”:“Practical Cyber Defence”: TOP 10 Cyber Threats!TOP 10 Cyber Threats! 83 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference 4 – Cyber Intelligence Gathering Tools “Exploration”“Exploration” 5 – Cyber Entry & Exit Routes & Tools “Penetration”“Penetration” 6 – Real-Time Cyber Alert: Hack & Attack! “Cyber Attack”“Cyber Attack” 7 – In-Depth: 21stC Technical Cyber Defence 8 – YOURYOUR Operational Cyber Defence 99 –– YOURYOUR Cyber Campaign Action Plan!Cyber Campaign Action Plan!
  • 84. ““YOURYOUR Cyber CampaignCyber Campaign Action PlanAction Plan”” • Defeating the “Bad Guys”“Bad Guys” requires YOU to Launch a Campaign Action Plan for Active Cyber Defence! • Fighting the TOP 10 Cyber ThreatsTOP 10 Cyber Threats requires: ––C$O:C$O: Board Level Security Plan and $ Investment 84 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ––C$O:C$O: Board Level Security Plan and $ Investment ––Technical:Technical: Professional Team, Tools & Training ––Operational:Operational: Security, Standards & Compliance ........CyberSecurityCyberSecurity is Continuously Evolving so keep upis Continuously Evolving so keep up withwith Conferences & Professional MembershipsConferences & Professional Memberships!....!....
  • 85. “Cyber Defence”“Cyber Defence” againstagainst “Alien Invaders”“Alien Invaders” A.I. & Machine LearningA.I. & Machine Learning CyberSecurity Tools willCyberSecurity Tools will 85 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference CyberSecurity Tools willCyberSecurity Tools will ProvideProvide “Speed of Light”“Speed of Light” RealReal--Time Defence againstTime Defence against TOP 10TOP 10 Threats & Attacks!Threats & Attacks! “Steam Powered Birds arrive over our Cities! - 1981 Pen & Ink Drawing by Dr Alexander RimskiDr Alexander Rimski--KorsakovKorsakov
  • 86. The Surrealistic Paintings of Dr Alexander RimskyThe Surrealistic Paintings of Dr Alexander Rimsky--KorsakovKorsakov 86 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Web LinkWeb Link:: www.valentina.net/ARK3/ark2.htmlwww.valentina.net/ARK3/ark2.html
  • 87. “Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa “Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa 87 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
  • 88. “Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa “Practical Cyber Defence”:“Practical Cyber Defence”: Top 10 Cyber ThreatsTop 10 Cyber Threats International EastInternational East--West Security Conference: GenoaWest Security Conference: Genoa ThankThank--You!You!ThankThank--You!You! 88 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference ThankThank--You!You!ThankThank--You!You! Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/
  • 89. EastEast--West Security ConferenceWest Security Conference –– Genoa 2017Genoa 2017 --“21stC CyberSecurity Trends”“21stC CyberSecurity Trends”-- 89 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download Link:Download Link: www.valentina.net/Genoa2017/www.valentina.net/Genoa2017/ Theme (1)Theme (1) ––“TOP 10 Cyber Threats”“TOP 10 Cyber Threats” Theme (2)Theme (2) ––““CyberTrendsCyberTrends: 2018: 2018--2025”2025”
  • 90. Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ Download Presentation Slides:Download Presentation Slides: www.Valentina.net/Genoa2017/www.Valentina.net/Genoa2017/ 90 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Thank you for your time!Thank you for your time!Thank you for your time!Thank you for your time!
  • 91. AdditionalAdditional CybersecurityCybersecurity ResourcesResources 91 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference LinkLink:: www.valentina.net/vaza/CyberDocswww.valentina.net/vaza/CyberDocs
  • 92. Professional ProfileProfessional Profile -- Dr David E. ProbertDr David E. Probert Computer Integrated Telephony (CIT)Computer Integrated Telephony (CIT) – Established and led British Telecom’s £25M EIGER Project during the mid-1980s’ to integrate computers with telephone switches (PABX’s). This resulted in the successful development and launch of CIT software applications for telesales & telemarketing Blueprint for Business CommunitiesBlueprint for Business Communities – Visionary Programme for Digital Equipment Corporation during late-1980’s that included the creation of the “knowledge lens” and “community networks”. The Blueprint provided the strategic framework for Digital’s Value-Added Networks Business European Internet Business Group (EIBGEuropean Internet Business Group (EIBG)) – Established and led Digital Equipment Corporation’s European Internet Group for 5 years. Projects included support for the national Internet infrastructure for countries across EMEA as well as major enterprise, government & educational Intranet deployments. Dr David Probert was a sponsoring member of the European Board for Academic & Research Networking (EARN/TERENA) for 7 years (1991 1998) Supersonic Car (Supersonic Car (ThrustSSCThrustSSC)) – Worked with Richard Noble OBE, and the Mach One Club to set up and manage the 1st Multi-Media and e-Commerce Web- Site for the World’s 1st Supersonic Car – ThrustSSC – for the World Speed Record. Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 92 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Secure Wireless NetworkingSecure Wireless Networking – Business Director & VP for Madge Networks to establish a portfolio of innovative fully secure wireless Wi-Fi IEEE802.11 networking products with technology partners from both UK and Taiwan. Networked Enterprise SecurityNetworked Enterprise Security - Appointed as the New Products Director (CTO) to the Management Team of the Blick Group plc with overall responsibility for 55 professional engineers & a diverse portfolio of hi-tech security products. Republic of GeorgiaRepublic of Georgia – Senior Security Adviser – Appointed by the European Union to investigate and then to make recommendations on all aspects of IT security, physical security and BCP/DR relating to the Georgian Parliament, and then by UN/ITU to review Cybersecurity for the Government Ministries. UN/ITUUN/ITU – Senior Adviser – Development of Cybersecurity Infrastructure, Standards, Policies, & Organisations in countries within both Europe & Americas Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1Dr David E. Probert is a Fellow of the Royal Statistical Society, IEEE Life Member and 1stst Class Honours Maths DegreeClass Honours Maths Degree (Bristol University) & PhD from Cambridge University in Self(Bristol University) & PhD from Cambridge University in Self--Organising Systems (Evolution of Stochastic Automata) ,Organising Systems (Evolution of Stochastic Automata) , and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007and his full professional biography is featured in the Marquis Directory of Who’s Who in the World: 2007--2018 Editions2018 Editions.
  • 93. “Master Class”: Armenia“Master Class”: Armenia -- DigiTec2012DigiTec2012 -- Smart Security, Economy & GovernanceSmart Security, Economy & Governance -- 93 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Download:Download: www.valentina.net/DigiTec2012/
  • 94. “Practical Defence:“Practical Defence: TOP 10TOP 10 Cyber Threats!”Cyber Threats!” 3535thth International EastInternational East--West Security Conference: Genoa, ItalyWest Security Conference: Genoa, Italy 94 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 95. *** Security Equipment for Alpine Climbing ****** Security Equipment for Alpine Climbing *** SunriseSunrise on «on « Barre des ÉcrinsBarre des Écrins »» –– 4102metres4102metres 95 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference Security Equipment includes:Security Equipment includes: 50m Rope, Steel Crampons, Ice50m Rope, Steel Crampons, Ice--Axe & Screws, Karabiners, Helmet...Axe & Screws, Karabiners, Helmet... 15th Sept 2015: «15th Sept 2015: « 7 Alpinistes7 Alpinistes dieddied in Avalanchein Avalanche »»
  • 96. Security Equipment forSecurity Equipment for Alpine AscentsAlpine Ascents 96 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 97. DDOSDDOS Mitigation:Mitigation: “Reactive Trace Back”“Reactive Trace Back” 97 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 98. DDOSDDOS Mitigation:Mitigation: “Traffic Rate Limiting”“Traffic Rate Limiting” 98 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 99. DDOSDDOS Mitigation:Mitigation: “Cryptographic Puzzles”“Cryptographic Puzzles” 99 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference
  • 100. DDOSDDOS Mitigation:Mitigation: “Virtual Overlay Network”“Virtual Overlay Network” 100 -- Practical Defence: TOP 10 Cyber ThreatsPractical Defence: TOP 10 Cyber Threats -- “Real“Real--Time Tools, Operations & Training”Time Tools, Operations & Training” *** Genoa, Italy – 5th & 6th June 2017 *** © Dr David E. Probert : www.VAZA.com © 35th International East/West Security Conference