SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
Cyber Security
(yes, really)
(because we have to...)

13/10/13
Classification: unclassified

13/10/13
Challenge...

13/10/13
Clinton Ingrams
–

cfi@dmu.ac.uk

Cyber Security Centre
De Montfort University

(that's in Leicester)
Teaching PHP & pentesting
Undergrad & Postgrad

13/10/13
Threats
Agencies
Solutions

13/10/13
Cyber Security is...
●

Protecting people
–

and their information
●

13/10/13

on line
And the big problem is...
In humans we trust ...

13/10/13
Threats

13/10/13
Cyber Attacks
●

Estonia
– Multiple

DDoS
– 3 weeks, starting 27th April 2007
– First state-level cyber attack
● Now on NATO agenda

13/10/13
Cyber Attacks
●

Georgia
– Multiple

DDoS
– 7th August 2008
– In conjunction with military invasion
TTNET

Caucasus Cable

Caucasus Net

Delta Net
Transtelecom

TISCALI
Seabone

13/10/13

RETN
COGENT
Cyber Attacks
●

Syria
Israeli malware was (allegedly) installed in
Syrian Integrated Air Defence System
(IADS)
– 6th September 2007
– Disrupted Syrian nuclear research
–

www.defensetech.org/2007/11/26/israels-cyber-shot-at-syria/

13/10/13
Lost IPR
●

●

“the average business takes 300 days to
identify a data breach”
Small SMEs can lose ~£1M over 5-10 years

13/10/13
Other attack vectors

13/10/13
SMART...
●

Systems

●

Buildings
–
–

●

house
manufacturing

Cities
“arcologies”
Society
–

●

13/10/13
SCADA
●

Supervisory Control and Data Acquisition
Often programmed in software logic
blocks
Typically 30 year turnover in hardware/software
–

●

–
–

●

IET

13/10/13

Windows 95 still very common
Some equipment is 60 years old!
Malware
●

Stuxnet

●

Duku

●

Flame
–
–

13/10/13

now in the wild
have changed the face of modern warfare
People
●

Anonymous

●

Lulzsec

●

Julian Assange
–

●

Bradley (Chelsea) Manning

Edward Snowden
–
–

13/10/13

game changer
(insider threat)
Who's doing what???

13/10/13
HMG
●

Cabinet office

●

GCHQ

●

Centre for Protection of National
Infrastructure
–

13/10/13

CPNI
Police
●

National Crime Agency
–

National Cybercrime Unit

replaces
●

Serious Organised Crime Agency
–

13/10/13

SOCA
Cabinet Office
●

●

Create partnerships between businesses,
academics, HMG & international
£860m
–

over 5 years

–

From the NSCP
●

13/10/13

National Cyber Security Programme
National Cyber Security Strategy
Our vision is for the UK in 2015 to derive huge economic and social value from a
vibrant, resilient and secure cyberspace, where our actions, guided by our core
values of liberty, fairness, transparency and the rule of law, enhance prosperity,
national security and a strong society.
To achieve this vision by 2015 we want:
Objective 1:

Objective 2:

Objective 3:

The UK to tackle cyber
crime and be one of the
most secure places in the
world to do business in
cyberspace

The UK to be more
resilient to cyber attacks
and better able to protect
our interests in
cyberspace

The UK to have helped
shape an open, stable
and vibrant cyberspace
which the UK public can
use safely and that
supports open societies

Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to
underpin all our cyber security objectives
13/10/13
CPNI
●

Awareness raising
–

Physical vulnerabilities
●

–

Software vulnerabilities
●

13/10/13

Lots of “fireworks” demonstrations
???
What's to be done???

13/10/13
Coding
“Why is there never time or money to implement
proper application security before the launch date,
but always time and money to retro-fit security after
the first hack”
Anon

13/10/13
Testing
●

MoD – 4 levels of Vulnerability Assessment
–

Scanning

–

Toolkits
●

–

Penetration test
●

–

13/10/13

automated assessments
qualified & experienced expert

Physical test
TSI
●

Trustworthy Software Initiative
–

–

13/10/13

“Making software more secure, dependable and
reliable”
Partly as a documentation standards repository
Measuring
●

Security Analytics
–

13/10/13

are you safer/more secure now than you were
before?
Reading
Eg
Trustwave Global Security Report
– Checkpoint Security Report
– The Global Cyber Game report
–

●

http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

DefenseTech
– The Register
– etc
–

13/10/13
Cyber Security Vouchers
●

HMG

●

Department for Business, Innovation and Skils

●

Up to £5000 as a voucher
–

●

to spend improving the security of a client

http://news.bis.gov.uk/Press-Releases/Support-for-smallbusinesses-to-tackle-record-levels-of-cyber-attacks-68b5a.aspx

13/10/13
Training
●

Certified Application Security Tester
–

●

Certified Information Systems Security
Professional
–

●

CAST

CISSP

CESG Certified Professional
–

13/10/13

CCP
DMU
●

Cyber Security Centre

●

MSc Cyber Security (Deloitte)

●

MSc SCADA (EADS)

●

Free magazine
–

CyberTalk

–

multidisciplinary
http://softbox.co.uk/cybertalk
●

13/10/13
Questions??

13/10/13
●

http://www.dmu.ac.uk/research/research-faculties-andinstitutes/technology/cyber-security-centre/cyber-security-centre.aspx

●

https://www.gov.uk/government/publications/cyber-security-strategy

●

http://www.cpni.gov.uk/

●

http://www.ssgkc.com/strategic-initiatives/smart-city/

●

https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt

●

http://www.soca.gov.uk/

●

http://www.uk-tsi.org/

●

●

●

http://news.bis.gov.uk/Press-Releases/Support-for-small-businessesto-tackle-record-levels-of-cyber-attacks-68b5a.aspx
http://www.independent.co.uk/news/uk/home-news/more-than-amillion-british-youngsters-being-bullied-online-every-day8852097.html
http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

13/10/13

Mais conteúdo relacionado

Destaque (6)

Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis PresentationGRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
 

Semelhante a Phpnw 2013 cyber-security

GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
Muhammad Zeeshan
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
segughana
 

Semelhante a Phpnw 2013 cyber-security (20)

Take Down
Take DownTake Down
Take Down
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamanan
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
Publication in the International Journal Sangeetha
Publication in the International Journal SangeethaPublication in the International Journal Sangeetha
Publication in the International Journal Sangeetha
 
The red book
The red book  The red book
The red book
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
625 -ESECURITY
625 -ESECURITY625 -ESECURITY
625 -ESECURITY
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Phpnw 2013 cyber-security