SlideShare uma empresa Scribd logo
1 de 28
Cyber Threats are now front and center
to the largest events in the world
Set The Stage
• 9 Days
• Ranked at #1 Technically advanced in N.
America
• 75,000 fans into 1 stadium + operations,
vendors and media
• 1 Million + new Visitors into San Fran
• 100+ Million watching
• 150+ countries
• 70 cameras filming
• 360 instant freeze and Replay cameras
• 36 Red Zone Cameras with 360 degree
visibility and virtual playback
• Superimposed yard lines
• Apps offering fans an interactive experience
• 400 miles of data cable/fiber
• 12,000 network interfaces
• Distributed antenna system (DAS) to boost
the cellular signals
Mobile enabled
• 1,300 Wi-Fi Access Points
• 1,200 Bluetooth Beacons
• 40 Gb/s of available bandwidth
• 10 Terabyte of Data
• 1 AP for 100 Seats
• Cellular Enhanced
Now Social Media
• Brand engagements
• 50% of the ads had a special
hashtag
• Enhanced User Experience Apps
• For directions
• To order Food
• NFL emoji keyboard
• Fantasy Football
• Interactive games that let fans
catch virtual passes
Various Agencies involved
Preparation
• Understand the Network
Topology
• Set layered Inspection
and what sensors
• Understand role and
placement of sensors
• Base Line Traffic
• Understand chain of
command
Monitor Other Uses
Of the Stadium
• Local Events
• WrestleMania
• Concerts
• Foster Farms College
Bowl
Concerns
Before game day
• 14 Fiber Cuts through 2015
• New traffic showing up
• Outbound Traffic to
Ireland and other
countries
Concerns
• Horizontal Movement
between Servers
• JumboTron
• IP Harvesting
• POS
• Fake Tickets
• Fake Emails and part of
campaigns to confirm
orders
• APT’s
• Electric Power going dark
• Network Redundant
Systems in place
• and checked
What were the Fans Doing?
• 19.8% Video
• 19.6% Web-browsing
• 17.6% Social Media sharing
• 15.9% Cloud
• 2.3% Music
• 1.4% Messaging
• 1.4 % Email
• 1% Navigation
• 21% other
• Ie Twitter feeds on Cell Carriers
Met Life SB 48
• 1.1 TB of Wi-Fi Data
Univ of Phoenix SB 49
• 6.2 TB of Wi-Fi Data
• 25,936 unique Wi-Fi Users
• 17,322 Peak Concurrent
users
• 7 TB approx. data via
wireless carrier
Levi Stadium SF 50
• 10.1 TB of Wi-Fi Data +63%
• 1st to transfer 10 TB of Data over
Wi-Fi
• Sunday 6 am to 11 pm fans use
9.3TB and the media used 453 GB
• 27,315 Unique Wi-Fi users
• 20,300 Peak Concurrent users3.0
Gbps Continuous Wi-Fi bandwidth
for 4+ hrs. on Sunday
• 15.9 TB of data via wireless carrier
• 15.1 – 23Mbps download
throughout the game (3 x SB 49)
• Live Streaming consumed 315
Million Total min. @ 1.4 M users
Comparison
• Aver 49s Game generates 2.0 TB
• Wrestle Mania last March 4.5 TB
• 76,976 Fans
• 4.5 TB
• Peak 14,800 Concurrent Fans
• 1.61 Gbps Continuous data
• 2.474 Gbps
• Taylor Swift 7.1 TB ( with ½ of the
stadium closed off)
What did we Learn?
Game Stats
• 24 Million Cyber Events
• 19.6 Million events from Wired Network
• 3.8 Million from Wireless Wi-Fi Network
• Barrier1 AARE Engine 568,502 or 2.3%
Cyber never before seen in the world.
No Signatures. Definitions or Knowledge
• Game Day 6 am – 11Pm
• fans used 9.3 TB
• Media used 453 Gb
Severity of the Cyber Events
• 1 336,035 1.4%
• 2 801,122 3.3%
• 3 23,364,179 95.4%
What did we uncovered
Cnc P2P Bitorrent
TOR Vuze BtWeb Client
EDonkey Edonkey emule
Gnutella Kaza ThunderNetwork
RAT Client Heartbleed C2
Viruses
• User Agents
• Window Executable in Text file
• Anubis PushDo
• Netwire DNS Poison
• Trojan DNS
• Overtoobar.net backdoor
Most Bizarre
• Clear Text Password
• Inappropriate Websites
• Sexting
What Did we Learn
• Speeds will be faster
• Greater Emphasis on
Fan Experience
• More Apps
• Cyber Attacks will be
more complex
• There will be more
attack surfaces
• More Automation
Thank You
Thank You
Worries
• Phishing Attacks
• Ransomware
• Soft Targets – before and during the game
• Web Site compromise
• IP Harvesting
• Fake Tickets
• Fake Emails and part of campaigns to confirm orders
What were they doing?
• 19.8% Video
• 19.62% Web Browsing
• 15.9 % Cloud
• 2.29% Music
• 1.44% Messaging
• 1.3% email
• .97% Navigation
• 20.8% the rest
• Planned for 2/Gbps
• Ordered Food
• Watched Replays
• Communicating with their friends
that were not at the game
• Fantasy Football
• Stadium Apps that show direction
and locations of vendors & services
• Selfies
• 6,000 hrs. of HD Video
What Got Through
• Network Capture
• Wired 19,609,972 (normal business, Web, Mail, printing)
• Wireless 3,719,231
• AARE Engine 56,442
• Types of traffic
Continued
• Main Viruses
• User-Agent
• Flow Point 220
• Window Executable in Test File
• Anubis
• PushDo
• Netwire RD
• Overtoolbar.net backdoor
• DNS Poison
• Trojan DNS
Continued What were they doing?
• Live Streams consumed 315 Million total minutes of Game
• Average audience was 1.4 million
• Event driven traffic
• Distributed antenna system (DAS) to boost the cellular signals
• Thousands of monitors in every section of the stadium, so no one will miss a beat
• One large master control room to power those monitors with game action, graphics and replays
• Interactive games that let fans catch virtual passes
• 20,000 square feet of solar panels and a LEED Gold Certification for its environmental friendliness
• An app designed specifically to enhance the in-game experience

Mais conteúdo relacionado

Semelhante a Jim Libersky: Cyber Security - Super Bowl 50

Mobile devices 5
Mobile devices 5Mobile devices 5
Mobile devices 5lerichard
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...Felipe Prado
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyKetan Patil
 
Nokta techpresentation
Nokta techpresentationNokta techpresentation
Nokta techpresentationAnkaraCloud
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huangKen Huang
 
ThingSpeak: apps for social things
ThingSpeak: apps for social thingsThingSpeak: apps for social things
ThingSpeak: apps for social thingsHans Scharler
 
Ted Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileTed Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileMobile Monday Amsterdam
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring Site24x7
 
Web & Apps Design for Mobile Devices
Web & Apps Design for Mobile DevicesWeb & Apps Design for Mobile Devices
Web & Apps Design for Mobile Deviceslerichard
 
GC_SP_full report
GC_SP_full reportGC_SP_full report
GC_SP_full reportDan Seidman
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...Nebraska Library Commission
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Mmsys14 amphi - slideshare
Mmsys14 amphi - slideshareMmsys14 amphi - slideshare
Mmsys14 amphi - slideshareShannon Chen
 
PlayFab analytics gdc
PlayFab analytics gdcPlayFab analytics gdc
PlayFab analytics gdcCrystin Cox
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...Dave Amirault
 

Semelhante a Jim Libersky: Cyber Security - Super Bowl 50 (20)

Mobile devices 5
Mobile devices 5Mobile devices 5
Mobile devices 5
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Colorado leadership v4
Colorado leadership v4Colorado leadership v4
Colorado leadership v4
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case Study
 
Nokta techpresentation
Nokta techpresentationNokta techpresentation
Nokta techpresentation
 
ICT across curriculum 2
ICT across curriculum 2ICT across curriculum 2
ICT across curriculum 2
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
 
ThingSpeak: apps for social things
ThingSpeak: apps for social thingsThingSpeak: apps for social things
ThingSpeak: apps for social things
 
Ted Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileTed Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobile
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring
 
Web & Apps Design for Mobile Devices
Web & Apps Design for Mobile DevicesWeb & Apps Design for Mobile Devices
Web & Apps Design for Mobile Devices
 
GC_SP_full report
GC_SP_full reportGC_SP_full report
GC_SP_full report
 
Spotify: behind the scenes
Spotify: behind the scenesSpotify: behind the scenes
Spotify: behind the scenes
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Mmsys14 amphi - slideshare
Mmsys14 amphi - slideshareMmsys14 amphi - slideshare
Mmsys14 amphi - slideshare
 
Last.fm vs Xbox
Last.fm vs Xbox Last.fm vs Xbox
Last.fm vs Xbox
 
PlayFab analytics gdc
PlayFab analytics gdcPlayFab analytics gdc
PlayFab analytics gdc
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
 

Mais de centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 

Mais de centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Jim Libersky: Cyber Security - Super Bowl 50

  • 1. Cyber Threats are now front and center to the largest events in the world
  • 2. Set The Stage • 9 Days • Ranked at #1 Technically advanced in N. America • 75,000 fans into 1 stadium + operations, vendors and media • 1 Million + new Visitors into San Fran • 100+ Million watching • 150+ countries • 70 cameras filming • 360 instant freeze and Replay cameras • 36 Red Zone Cameras with 360 degree visibility and virtual playback • Superimposed yard lines • Apps offering fans an interactive experience • 400 miles of data cable/fiber • 12,000 network interfaces • Distributed antenna system (DAS) to boost the cellular signals
  • 3. Mobile enabled • 1,300 Wi-Fi Access Points • 1,200 Bluetooth Beacons • 40 Gb/s of available bandwidth • 10 Terabyte of Data • 1 AP for 100 Seats • Cellular Enhanced
  • 4. Now Social Media • Brand engagements • 50% of the ads had a special hashtag • Enhanced User Experience Apps • For directions • To order Food • NFL emoji keyboard • Fantasy Football • Interactive games that let fans catch virtual passes
  • 6. Preparation • Understand the Network Topology • Set layered Inspection and what sensors • Understand role and placement of sensors • Base Line Traffic • Understand chain of command
  • 7. Monitor Other Uses Of the Stadium • Local Events • WrestleMania • Concerts • Foster Farms College Bowl
  • 8. Concerns Before game day • 14 Fiber Cuts through 2015 • New traffic showing up • Outbound Traffic to Ireland and other countries
  • 9.
  • 10. Concerns • Horizontal Movement between Servers • JumboTron • IP Harvesting • POS • Fake Tickets • Fake Emails and part of campaigns to confirm orders • APT’s • Electric Power going dark
  • 11. • Network Redundant Systems in place • and checked
  • 12.
  • 13.
  • 14. What were the Fans Doing? • 19.8% Video • 19.6% Web-browsing • 17.6% Social Media sharing • 15.9% Cloud • 2.3% Music • 1.4% Messaging • 1.4 % Email • 1% Navigation • 21% other • Ie Twitter feeds on Cell Carriers
  • 15. Met Life SB 48 • 1.1 TB of Wi-Fi Data Univ of Phoenix SB 49 • 6.2 TB of Wi-Fi Data • 25,936 unique Wi-Fi Users • 17,322 Peak Concurrent users • 7 TB approx. data via wireless carrier Levi Stadium SF 50 • 10.1 TB of Wi-Fi Data +63% • 1st to transfer 10 TB of Data over Wi-Fi • Sunday 6 am to 11 pm fans use 9.3TB and the media used 453 GB • 27,315 Unique Wi-Fi users • 20,300 Peak Concurrent users3.0 Gbps Continuous Wi-Fi bandwidth for 4+ hrs. on Sunday • 15.9 TB of data via wireless carrier • 15.1 – 23Mbps download throughout the game (3 x SB 49) • Live Streaming consumed 315 Million Total min. @ 1.4 M users
  • 16. Comparison • Aver 49s Game generates 2.0 TB • Wrestle Mania last March 4.5 TB • 76,976 Fans • 4.5 TB • Peak 14,800 Concurrent Fans • 1.61 Gbps Continuous data • 2.474 Gbps • Taylor Swift 7.1 TB ( with ½ of the stadium closed off)
  • 17. What did we Learn? Game Stats • 24 Million Cyber Events • 19.6 Million events from Wired Network • 3.8 Million from Wireless Wi-Fi Network • Barrier1 AARE Engine 568,502 or 2.3% Cyber never before seen in the world. No Signatures. Definitions or Knowledge • Game Day 6 am – 11Pm • fans used 9.3 TB • Media used 453 Gb Severity of the Cyber Events • 1 336,035 1.4% • 2 801,122 3.3% • 3 23,364,179 95.4%
  • 18. What did we uncovered Cnc P2P Bitorrent TOR Vuze BtWeb Client EDonkey Edonkey emule Gnutella Kaza ThunderNetwork RAT Client Heartbleed C2 Viruses • User Agents • Window Executable in Text file • Anubis PushDo • Netwire DNS Poison • Trojan DNS • Overtoobar.net backdoor Most Bizarre • Clear Text Password • Inappropriate Websites • Sexting
  • 19.
  • 20.
  • 21. What Did we Learn • Speeds will be faster • Greater Emphasis on Fan Experience • More Apps • Cyber Attacks will be more complex • There will be more attack surfaces • More Automation
  • 23. Worries • Phishing Attacks • Ransomware • Soft Targets – before and during the game • Web Site compromise • IP Harvesting • Fake Tickets • Fake Emails and part of campaigns to confirm orders
  • 24. What were they doing? • 19.8% Video • 19.62% Web Browsing • 15.9 % Cloud • 2.29% Music • 1.44% Messaging • 1.3% email • .97% Navigation • 20.8% the rest • Planned for 2/Gbps • Ordered Food • Watched Replays • Communicating with their friends that were not at the game • Fantasy Football • Stadium Apps that show direction and locations of vendors & services • Selfies • 6,000 hrs. of HD Video
  • 25. What Got Through • Network Capture • Wired 19,609,972 (normal business, Web, Mail, printing) • Wireless 3,719,231 • AARE Engine 56,442 • Types of traffic
  • 26. Continued • Main Viruses • User-Agent • Flow Point 220 • Window Executable in Test File • Anubis • PushDo • Netwire RD • Overtoolbar.net backdoor • DNS Poison • Trojan DNS
  • 27. Continued What were they doing? • Live Streams consumed 315 Million total minutes of Game • Average audience was 1.4 million • Event driven traffic
  • 28. • Distributed antenna system (DAS) to boost the cellular signals • Thousands of monitors in every section of the stadium, so no one will miss a beat • One large master control room to power those monitors with game action, graphics and replays • Interactive games that let fans catch virtual passes • 20,000 square feet of solar panels and a LEED Gold Certification for its environmental friendliness • An app designed specifically to enhance the in-game experience