SlideShare uma empresa Scribd logo
1 de 21
Global Cyber Threats 
Professor John Walker CFIP MFSoc CRISC CISM ITPC CITP SIRM FBCS FRSA 
© Red-Spike
Introduction to the Global Threat 
1) Thousands of IT systems are compromised every day, some attacks are based on political 
motives, but most commonly to steal money or commercial secrets. 
2) The magnitude and tempo of the attacks pose a real threat to Britain's economic security. 
3) National Critical Assets are targeted and exposed. 
4) Global economic stability is exposed. 
5) Internet root-servers under daily attack. 
6) High dependencies on computing, infrastructures and a live-by-wire lifestyle. 
7) CyberWar, CyberConflict is here!
Examples of Compromise 
Attendance to an incident requires the First Responder to keep an Open Mind: 
2) The magnitude and tempo of the attacks pose a real threat to Globalised economic security. 
3) National Critical Assets are targeted and exposed. 
4) Inter-nation economic stability is impacted. 
5) Internet root-servers under daily attack. 
6) High dependencies on computing, infrastructures and a live-by-wire lifestyle. 
7) CyberWar, CyberConflict is here! 
8) Dependency on Technology increases the potentials of attack or compromise
Threat Scale & Position 
HIGH RISK 
MEDIUM RISK 
Hi-Tech, Media, Retail, Industrial Manufacturing etc. 
LOW RISK 
Non-Profit, Local & SME’s 
Governments, Defence, 
Banking, Oil & Gas, SCADA, 
& Critical Infrastructure.
Hackers
Non-Disclosure – 911 - Impact 
Event on 9/9/2011 [911] 
saw 5 Million people impacted by 
traffic chaos, flight cancellations 
and two Nuclear Reactors being 
Closed down – all caused by 
one single employee!
Hacktivists Threat 
5th November, 2012 = DDoS 
Pose a High Threat, and are very Motivated
Serious-Organised-Crime 
Serious-and-Organised Crime Ganges are highly organised, and very successful – consider 
Some of the top targets: 
 The Public 
 Home [WiFi in particular] 
 Companies 
 Governments 
 Banks 
 Oil-&-Gas
The ‘Chinese’ Threat 
"Whether it be the intrusions of 
hackers, a major explosion at the 
World Trade Centre, or a 
bombing attack by bin Laden, all 
of these greatly exceed the 
frequency bandwidths 
understood by the American 
military...“ 
Qiao Liang and Wang Xiangsui 
Titan Rain - 2008
The Internet 
Cyber-Jihad use the Internet to a very effective extent to support their missions.
The Statistics 
High availability of 
information on the 
Internet, and the GhostNet 
– and its on the rise
The ‘Cyber-Terror’ Threat - 1 
Cyber-Jihad 
vs. 
Cyber-Terrorism
The ‘Cyber-Terror’ Tools 
Cyber-Jihadist Tools and Capabilities:
The ‘Cyber-Terror’ Tools - 3 
DDoS a speciality: 
Copyright SBLTD 2012
The ‘AET’ 
The AET was once considered Hype – but they have been seen in the wild, and with some 
success:: 
McAfee Firewall 
Paloalto 
Sourefire 
Checkpoint 
Juniper
The ‘Cyber-Terror’ Tools - 5 
Security is accommodated – in some cases to a higher level than most organisations:
The ‘Impact’ of Tools - 6 
By leveraging free Attack Tools supplied with Linux Speciality Distributions, targeting a LAN based 
Windows 8 System, a number of attacks were performed against a Firewalled System – the impact 
was a fully compromised systems, broken, and very infected with Malicious Payload – and this from a 
GUI environment, with a free, publically available set of tools.
The Infamous Teams
The Impact 
Cyber-Jihadist impact and payload can arrive in many forms: 
Attacks on Critical Infrastructure 
Promised – and have occurred! - example
The ‘Myth’
The Response to the Threat 
About 80% of known attacks would be defeated by embedding basic information security 
Practices and learning from the First Responder Engagements. 
Let us consider the opportunities, options, and what you have in place: 
? 
How many of the aforementioned areas are you covered against?

Mais conteúdo relacionado

Mais procurados

Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 

Mais procurados (20)

Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
A Look Into Cyber Security
A Look Into Cyber SecurityA Look Into Cyber Security
A Look Into Cyber Security
 

Semelhante a Cyber Threats

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
 

Semelhante a Cyber Threats (20)

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 

Mais de Prof John Walker FRSA Purveyor Dark Intelligence

Mais de Prof John Walker FRSA Purveyor Dark Intelligence (13)

Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
Wax Switch
Wax SwitchWax Switch
Wax Switch
 
APT Event - New York
APT Event - New YorkAPT Event - New York
APT Event - New York
 
Take Down
Take DownTake Down
Take Down
 
Lipstick on a pig
Lipstick on a pigLipstick on a pig
Lipstick on a pig
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Ctf110213 public
Ctf110213 publicCtf110213 public
Ctf110213 public
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Cyber Threats

  • 1. Global Cyber Threats Professor John Walker CFIP MFSoc CRISC CISM ITPC CITP SIRM FBCS FRSA © Red-Spike
  • 2. Introduction to the Global Threat 1) Thousands of IT systems are compromised every day, some attacks are based on political motives, but most commonly to steal money or commercial secrets. 2) The magnitude and tempo of the attacks pose a real threat to Britain's economic security. 3) National Critical Assets are targeted and exposed. 4) Global economic stability is exposed. 5) Internet root-servers under daily attack. 6) High dependencies on computing, infrastructures and a live-by-wire lifestyle. 7) CyberWar, CyberConflict is here!
  • 3. Examples of Compromise Attendance to an incident requires the First Responder to keep an Open Mind: 2) The magnitude and tempo of the attacks pose a real threat to Globalised economic security. 3) National Critical Assets are targeted and exposed. 4) Inter-nation economic stability is impacted. 5) Internet root-servers under daily attack. 6) High dependencies on computing, infrastructures and a live-by-wire lifestyle. 7) CyberWar, CyberConflict is here! 8) Dependency on Technology increases the potentials of attack or compromise
  • 4. Threat Scale & Position HIGH RISK MEDIUM RISK Hi-Tech, Media, Retail, Industrial Manufacturing etc. LOW RISK Non-Profit, Local & SME’s Governments, Defence, Banking, Oil & Gas, SCADA, & Critical Infrastructure.
  • 6. Non-Disclosure – 911 - Impact Event on 9/9/2011 [911] saw 5 Million people impacted by traffic chaos, flight cancellations and two Nuclear Reactors being Closed down – all caused by one single employee!
  • 7. Hacktivists Threat 5th November, 2012 = DDoS Pose a High Threat, and are very Motivated
  • 8. Serious-Organised-Crime Serious-and-Organised Crime Ganges are highly organised, and very successful – consider Some of the top targets:  The Public  Home [WiFi in particular]  Companies  Governments  Banks  Oil-&-Gas
  • 9. The ‘Chinese’ Threat "Whether it be the intrusions of hackers, a major explosion at the World Trade Centre, or a bombing attack by bin Laden, all of these greatly exceed the frequency bandwidths understood by the American military...“ Qiao Liang and Wang Xiangsui Titan Rain - 2008
  • 10. The Internet Cyber-Jihad use the Internet to a very effective extent to support their missions.
  • 11. The Statistics High availability of information on the Internet, and the GhostNet – and its on the rise
  • 12. The ‘Cyber-Terror’ Threat - 1 Cyber-Jihad vs. Cyber-Terrorism
  • 13. The ‘Cyber-Terror’ Tools Cyber-Jihadist Tools and Capabilities:
  • 14. The ‘Cyber-Terror’ Tools - 3 DDoS a speciality: Copyright SBLTD 2012
  • 15. The ‘AET’ The AET was once considered Hype – but they have been seen in the wild, and with some success:: McAfee Firewall Paloalto Sourefire Checkpoint Juniper
  • 16. The ‘Cyber-Terror’ Tools - 5 Security is accommodated – in some cases to a higher level than most organisations:
  • 17. The ‘Impact’ of Tools - 6 By leveraging free Attack Tools supplied with Linux Speciality Distributions, targeting a LAN based Windows 8 System, a number of attacks were performed against a Firewalled System – the impact was a fully compromised systems, broken, and very infected with Malicious Payload – and this from a GUI environment, with a free, publically available set of tools.
  • 19. The Impact Cyber-Jihadist impact and payload can arrive in many forms: Attacks on Critical Infrastructure Promised – and have occurred! - example
  • 21. The Response to the Threat About 80% of known attacks would be defeated by embedding basic information security Practices and learning from the First Responder Engagements. Let us consider the opportunities, options, and what you have in place: ? How many of the aforementioned areas are you covered against?