0
What is it? And what is its importance?
Cyber-Warfare:

       ▪ is the use of computers and the Internet in
         conducting warfare in cyberspace.




     ...
The ACTUAL tools used in Information Security
Rand Report 1970



    MULTICS



    Computer Viruses, Worms, and Trojan Horses



    Anti-virus Software



    En...
How much does Google really know about you?
What you are searching for
1.
     What web pages you visit
2.
     What blogs you read – Google Reader
3.
     Your finan...
6. Who and what you’re emailing –
  Gmail
7. What’s on your PC – Google Desktop
8. Your research paper, bills, etc. –
  up...
11. When you’re going to get the flu – Google
  flu tracker
12. Where you and your friends are – Google
  Latitude / Googl...
16. Your problems – searching Google
 for answers
17. Your medical issues – Google Health
18. Your home address – Google
 ...
21. What you, your friends and family look
  like and do – Picasa
22. Everything you do online – Google Secure
  Access en...
Against Video Privacy Act?

 Every video on You Tube, the judge required
  Google to turn over to Viacom the login name ...
Identity Theft / Stalker / Target Ads

     Full name
     Hometown
     School
     Class schedule
     Email
    ...
150 million users

    Businesses can look at your Facebook

    Check privacy settings

    http://news.bbc.co.uk/2/hi...
Doomsday April 1st?

    Conficker is a computer worm that exploits

    the weaknesses in Microsoft’s Windows
    12 mi...
“Perhaps the most obvious frightening aspect of
  Conficker is its clear potential to do harm.
  Perhaps in the best case,...
Cyber Terrorism
Cyber Warfare:

     The term cyber-warfare has many manifestations, ranging
      between website vandalism, iWar (info...
Cyber-war highlights:

      ▪ Jordan's’ Techno power:
             Those involved in cyber warfare have a vast amount o...
As the Internet becomes more pervasive in all areas of

    human endeavor, individuals or groups can use the
    anonymi...
The targets usually consisted of normal individual

    internet users 10 – 15 years ago. Now targets can be
    countrie...
On May 17, 2007 Estonia came under cyber attack. The

    Estonian parliament, ministries, banks, and media were
    targ...
Cyber-warfare is still developing. Small attacks have been made

    and attempted, but there hasn’t been a “large-scale”...
http://delicious.com/acallon



    http://delicious.com/JulesRoa



    http://delicious.com/gfisk

Clt3328fisk
Upcoming SlideShare
Loading in...5
×

Clt3328fisk

599

Published on

Cyber war and Information Security

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
599
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
32
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Clt3328fisk"

  1. 1. What is it? And what is its importance?
  2. 2. Cyber-Warfare:  ▪ is the use of computers and the Internet in conducting warfare in cyberspace. V.S. Information Security:  ▪ protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
  3. 3. The ACTUAL tools used in Information Security
  4. 4. Rand Report 1970  MULTICS  Computer Viruses, Worms, and Trojan Horses  Anti-virus Software  Encryption/Decryption 
  5. 5. How much does Google really know about you?
  6. 6. What you are searching for 1. What web pages you visit 2. What blogs you read – Google Reader 3. Your financial information – AdSense / 4. Google Checkout Strength / Popularity of your website – 5. Google Analytics / Google Page Creator
  7. 7. 6. Who and what you’re emailing – Gmail 7. What’s on your PC – Google Desktop 8. Your research paper, bills, etc. – uploading documents to Google 9. Your schedule – Google Calendar 10. Your social network and interests – Google indexes (Orkut, Facebook, Digg)
  8. 8. 11. When you’re going to get the flu – Google flu tracker 12. Where you and your friends are – Google Latitude / Google Maps 13. What you’re watching on You Tube – Google owns You Tube 14. What and where you study – Google Books, Scholar, and University 15. Everything you’re looking at online – Google Chrome
  9. 9. 16. Your problems – searching Google for answers 17. Your medical issues – Google Health 18. Your home address – Google Maps, AdSense, or Checkout 19. Mobile number – SM, Google Mobile, and Gmail 20. How your voice sounds – Google Talk
  10. 10. 21. What you, your friends and family look like and do – Picasa 22. Everything you do online – Google Secure Access encrypts your data 23. What you want to buy and have bought – product search and catalog 24. What you business is about – Adwords share information with Google 25. What’s important to you – Google Alerts
  11. 11. Against Video Privacy Act?   Every video on You Tube, the judge required Google to turn over to Viacom the login name of every user who had watched it and the address of their computer (IP)  Viacom claims information will be safeguarded and will be used only to press charges against Google ($1 billion copyright suit)  Public afraid of information being used against them
  12. 12. Identity Theft / Stalker / Target Ads   Full name  Hometown  School  Class schedule  Email  Phone Number  Picture  Religion  Activities / Interests
  13. 13. 150 million users  Businesses can look at your Facebook  Check privacy settings  http://news.bbc.co.uk/2/hi/technology/737  6738.stm
  14. 14. Doomsday April 1st?  Conficker is a computer worm that exploits  the weaknesses in Microsoft’s Windows 12 million machines infected with software  code that will connect the infected machine it controls to a powerful computer known as botnet Microsoft announces a $250,000 reward for  information leading to the capture of the Conficker author
  15. 15. “Perhaps the most obvious frightening aspect of Conficker is its clear potential to do harm. Perhaps in the best case, Conficker may be used as sustained and profitable platform for massive Internet fraud and theft. In the worst case, Conficker could be turned into a powerful offensive weapon for performing concerted information warfare attacks that could disrupt not just countries, but the Internet itself.” Phillip Porras - Research Director at SRI International
  16. 16. Cyber Terrorism
  17. 17. Cyber Warfare:   The term cyber-warfare has many manifestations, ranging between website vandalism, iWar (information warfare), to destroying a country's critical infrastructure! Government Vulnerability:   Large dependency on information platforms linked to the internet. Such as power grids, water, fuel, communications, and public transportation. They are all vulnerable to a cyber attack.  An example that highlights this is the Russian-Georgian war in 2008. Cyber Warfare still a relatively new type of war. Most  of the research is based on “potential-harm”.
  18. 18. Cyber-war highlights:  ▪ Jordan's’ Techno power:  Those involved in cyber warfare have a vast amount of techno power. As these “hackers” can destroy a country from inside out in a short time, and with complete anonymity. The true manifestation of “power”. Or they can manipulate any corporation, steal money, the limits are endless. They can access anythign connected to cyber space. ▪ Marvin’s Experts:  The experts that can engage in cyber warfare are put above all others in the realm of the internet. Why?  ▪ Because they can. ▪ Power ▪ Contracted. ▪ Can sell skills to terrorist groups or governments for money.
  19. 19. As the Internet becomes more pervasive in all areas of  human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Leveraging of a target's computers and  information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
  20. 20. The targets usually consisted of normal individual  internet users 10 – 15 years ago. Now targets can be countries, large corporations, etc; as society became more “digital”. Are only developed countries open to attack?  ▪ Yes, the more developed countries are susceptible to cyber warfare. As most of the foundations of the country and population lie within the realms of communication based in cyberspace. ▪ Lesser developed countries can be effected just as much. Although it won’t hit the general population as hard. Future wars and terrorism will look to manipulate and  target foundations with no losses.
  21. 21. On May 17, 2007 Estonia came under cyber attack. The  Estonian parliament, ministries, banks, and media were targeted. On first week of September 2007, The Pentagon and  various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement Georgian and Azerbaijani sites were attacked by hackers  during the 2008 South Ossetia War. The United States had come under attack from computers  and computer networks situated in China and Russia.
  22. 22. Cyber-warfare is still developing. Small attacks have been made  and attempted, but there hasn’t been a “large-scale” cyber war. Still a war-type of the near future. The following examples are just potential threats: Can cripple a country  ▪ Inhibit or stop all communication that uses any technological medium ▪ Could take control of power, water, and other necessities ▪ Confidential documents/plans stolen ▪ Total Control over most technological platforms (including nuclear codes and access)… Cyber warfare in media: (Somewhat possible damages if it were to  occur on a large scale) ▪ Eagle Eye ▪ Die Hard 4
  23. 23. http://delicious.com/acallon  http://delicious.com/JulesRoa  http://delicious.com/gfisk 
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×