SlideShare a Scribd company logo
1 of 37
Computer Network Attack / Exploitation: Regional Threats China & North Korea Karl Wolfgang, CISSP
CNO in NE Asia ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Jiang Zemin: 90s – Early 21 st  Century Warfare at the Speed of Electrons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NETOPS  vs. The Science of Campaigns cognitive errors Multi-dimentional Threat Phased Operations
Civilian Assets & IW Reserves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Civilian Assets & IW Reserves ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
China:  Plausible Denial ,[object Object],[object Object],[object Object]
Stratagems of Information Warfare ,[object Object],[object Object],[object Object],[object Object],47 China’s Electronic Strategies http://www.au.af.mil/au/awc/awcgate/milreview/thomas.htm
Sun Tzu – Wang Mind Meld ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thirty-Six Stratagems: The Secret Art of War http://www.chinastrategies.com/List.htm http://leav-www.army.mil/fmso/documents/china_electric/china_electric.htm
Thirty-Six Stratagems: The Secret Art of War ,[object Object]
Technical / Social Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object]
The innocent e-mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Harvest then Exploit http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf
Expired Accounts,  Spear Phishing: Compromise ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thirty-Six Stratagems: The Secret Art of War ,[object Object],Supreme excellence consists in breaking the enemy's resistance without fighting. Sun Tzu
Supply Chain Fakes Threaten Miltary Readiness ,[object Object],[object Object],[object Object],[object Object]
Thirty-Six Stratagems: The Secret Art of War ,[object Object]
Thirty-Six Stratagems: The Secret Art of War ,[object Object],Slammer's most novel feature: propagation speed.  In 3 minutes; scanning rate > 55 million / second; after which the growth rate slowed because significant portions of the network had insufficient bandwidth to accommodate more growth.
AutoRun Worms: Leverage Strengths, Dynamics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://kr.youtube.com/watch?v=xgVecDefOMg
AutoRun: Fish in the sea Mal/Generic-A [Sophos] 42  W32.SillyFDC [Symantec] 41  Packed.Generic.181 [Symantec] 5  W32.Dotex.CA [Symantec] 5  Mal/TinyDL-T [Sophos] 4  Mal/Basine-A,, Mal/Basine-C Mal/Behav-160, Mal/Emogen-E,  Mal/Behav-009, Mal/Basine-C Worm.Hamweg.Gen Worm.Win32.AutoRun.eic ,[object Object],[object Object],[object Object],The varieties:  The statistics:  Worm.Win32.AutoRun.eae [Kaspersky Lab] VirTool:Win32/Vtub.WL [Microsoft]  Trojan Horse [Symantec]  HackTool.Win32.IISCrack.d [Ikarus]  Worm.Win32.AutoRun.lkx Worm.Hamweg.Gen [PC Tools] 3  Worm.Win32.AutoRun.eic [Kaspersky Lab] 3  Worm.Win32.AutoRun.ejf [Kaspersky Lab] 3  Backdoor.Graybird!sd6 [PC Tools] 2  Mal/Dropper-MAP [Sophos] 2  TROJ_AGENT.ANFQ [Trend Micro] 4  Trojan.Win32.Agent.vkw [Kaspersky Lab] 4  VirTool.Win32.DelfInject [Ikarus] 4  W32.SillyP2P [Symantec] 4  Worm.Win32.Agent [Ikarus] 4  Worm.Win32.Agent.lz [Kaspersky Lab] 4  Worm.Win32.AutoRun.rol [Kaspersky Lab]  Worm:Win32/Autorun.GR [Microsoft] 4  Worm:Win32/Hamweq.gen!C [Microsoft] 4  WORM_AUTORUN.AJX [Trend Micro
Thirty-Six Stratagems: The Secret Art of War ,[object Object],[object Object]
Thirty-Six Stratagems: The Secret Art of War ,[object Object],[object Object],Loot a burning house
Growing Web-based Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unpatched IE Malicious page exploits browser vulnerability, Downloads code without user approval Installs back door beacon User clicks on HTML link in Email,  User expects & receives download of article on tax benefits for Americans living overseas…
Legitimate Sites Can Point to “Drive-by Download” Source:  Korea Information  Security Agency
Computer Network Exploitation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
North Korean CNA Capabilities:  Low ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
nK CNA Threat is Low ,[object Object],[object Object],[object Object],“ In the next war we will crush the American boors/Philistines first”
Great Leader’s IW Vision ,[object Object],[object Object],[object Object],[object Object],[object Object]
Plato’s Cave:  NK IW / CNA Constraints
Minimal Internet: No Sea for Fish to Swim ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Infrastructure Does Not Support Formidable Threat ,[object Object],[object Object],[object Object],[object Object]
Possess Skills for Cyber Hacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CNA / CNE within nK Government Kim Jong-il National Defense Commission MPAF General Staff Department Reconnissance Bureau Unit 121 Chairman of the National Defence Commission   Korean Workers Party General Secretary   ? GlobalSecurity.org +  Federation of American Scientists   39 38 Office 35
CNA & CNE Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Ulrich Janßen
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)TBSS Group
 
Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Ulrich Janßen
 
Career Ministries Seminar Ppt 97 03version
Career Ministries Seminar Ppt 97 03versionCareer Ministries Seminar Ppt 97 03version
Career Ministries Seminar Ppt 97 03versionJoe Jones
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins ResumePaul Mullins
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)Valeriu Margescu
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıGovernment
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Jorge Sebastiao
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsMikko Jakonen
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Jorge Sebastiao
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 

Viewers also liked (20)

Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013Rebranding IO (Information Operations) June 2013
Rebranding IO (Information Operations) June 2013
 
Ew asia cw and ew joint space for comments (14 sep2016)
Ew asia cw and ew joint space   for comments (14 sep2016)Ew asia cw and ew joint space   for comments (14 sep2016)
Ew asia cw and ew joint space for comments (14 sep2016)
 
Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)Social Media in countering x- border threats (Dec15)
Social Media in countering x- border threats (Dec15)
 
Career Ministries Seminar Ppt 97 03version
Career Ministries Seminar Ppt 97 03versionCareer Ministries Seminar Ppt 97 03version
Career Ministries Seminar Ppt 97 03version
 
Paul Mullins Resume
Paul Mullins ResumePaul Mullins Resume
Paul Mullins Resume
 
The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)The russian military and ukraine (v.m.)
The russian military and ukraine (v.m.)
 
Cyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_YayımlandıCyber Operation Planning and Operational Design_Yayımlandı
Cyber Operation Planning and Operational Design_Yayımlandı
 
Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21Tracking and implications of stuxnet v21
Tracking and implications of stuxnet v21
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
HA10 – Task 1
HA10 – Task 1HA10 – Task 1
HA10 – Task 1
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
The Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare OperationsThe Elements of Offensive Cyber Warfare Operations
The Elements of Offensive Cyber Warfare Operations
 
Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13Infowarcon 2014 ME Cyber wars v13
Infowarcon 2014 ME Cyber wars v13
 
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 

Similar to Computer Attack Stratagems

The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014Bill Hagestad II
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber WarfareBill Hagestad II
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategiesEyesOpen Association
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Port security
Port securityPort security
Port securityborepatch
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber WarRadware
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceJarno Limnéll
 

Similar to Computer Attack Stratagems (20)

The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
 
China Cyber
China CyberChina Cyber
China Cyber
 
Exp r35
Exp r35Exp r35
Exp r35
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014Red Dragon Rising    Understanding the Chinese Cyber Scenarios 02 march 2014
Red Dragon Rising Understanding the Chinese Cyber Scenarios 02 march 2014
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Network Centric Warfare
Network Centric WarfareNetwork Centric Warfare
Network Centric Warfare
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Port security
Port securityPort security
Port security
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Computer Attack Stratagems

  • 1. Computer Network Attack / Exploitation: Regional Threats China & North Korea Karl Wolfgang, CISSP
  • 2.
  • 3.
  • 4. NETOPS vs. The Science of Campaigns cognitive errors Multi-dimentional Threat Phased Operations
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Thirty-Six Stratagems: The Secret Art of War http://www.chinastrategies.com/List.htm http://leav-www.army.mil/fmso/documents/china_electric/china_electric.htm
  • 11.
  • 12.
  • 13.
  • 14. Harvest then Exploit http://www.indiana.edu/~phishing/social-network-experiment/phishing-preprint.pdf
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Unpatched IE Malicious page exploits browser vulnerability, Downloads code without user approval Installs back door beacon User clicks on HTML link in Email, User expects & receives download of article on tax benefits for Americans living overseas…
  • 26. Legitimate Sites Can Point to “Drive-by Download” Source: Korea Information Security Agency
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Plato’s Cave: NK IW / CNA Constraints
  • 32.
  • 33.
  • 34.
  • 35. CNA / CNE within nK Government Kim Jong-il National Defense Commission MPAF General Staff Department Reconnissance Bureau Unit 121 Chairman of the National Defence Commission Korean Workers Party General Secretary ? GlobalSecurity.org + Federation of American Scientists 39 38 Office 35
  • 36.
  • 37.