• Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
409
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
13
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The Shape of New Conflict
  • 2. Agenda Cyberspace Ecosystem Cases of Cyber Incidents
  • 3. Cyberspace EcosystemCyberspace: What is It? Physical Domain/Operating Environment  A domain characterized by the use of electronics and the electromagnetic spectrum to store,modify, and exchange data via networked systems and associated infrastructures -- DOD Definition Governed by physical laws and rules of code  Electromagnetism & light; protocols and operating systems  Man-made and highly mutable
  • 4. Cyberspace Ecosystem Threat Source Motivation Threat ActionHacker, Cracker Challenge Hacking Ego Social Engineering Rebellion System intrusion Unauthorized system accessComputer Criminal Destruction of information Malware Illegal information Spoofing disclosure Cyber stalking Monetary gain Information bribery Unauthorized data alterationTerrorist Blackmail Bomb/Terrorrism Destruction Info warfare Exploitaton Denial of servie Revenge System penetration System tampering
  • 5. Cyberspace Ecosystem Threat Source Motivation Threat ActionIndustrial Spies Competitive advantage Economic exploitation(companies, Economic espionage Information Theftgovernments) Access to classified, proprietary, and/or technology related informationInsiders Curiousity Assault on an employee(poorly trained, Ego Blackmaildisgruntled, Intelligence Computer Abusemalicious Monetary gain Fraud nd Theftemployees) Revenge Falsified and Corrupted data Sin of omissions and Unauthorized system access commisions
  • 6. Cyberspace Ecosystem Crimeware Business Environment
  • 7. Cyberspace Ecosystem General Attack Trend
  • 8. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 9. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 10. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 11. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 12. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 13. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 14. Cyber ConflictsDenying Access Cases • Palestinian- Israeli Cyber War (Sep 2000) • Estonia Web War I (May 2007)
  • 15. Cyber ConflictsExtorting Money The Archiveus Case, 2006
  • 16. Cyber ConflictsEspionage • Michael and Ruth Haephrati Case
  • 17. Cyber ConflictsStealing Information
  • 18. Cyber ConflictsStealing Information
  • 19. Cyber ConflictsBotnets Prevalence (2006) • China: 12 million • Netherlands: 1.5 million
  • 20. Cyber ConflictsBotnets • Specialist knowledge not required • Downloadable tools and source codes
  • 21. Cyber ConflictsBotnets Auctioned Botnets • USD 50 – 60 per 1,000 – 2,000 IP • USD 33 cents per IP
  • 22. Cyber Conflicts Market Players Impacts toISPs Affected profitability = cost –revenue Customer support and abuse management costeCommerce companies Costly services CIA of customer dataSoftware vendors Reputation effects Costly response measures Develoing/testing/applying patchesDNS Registrars Increase number of formal and informal abuse notifications Cost to proving the identity of registrantsEnd Users Erosion of trust and confidence in the CyberspaceIP based Networks Disruption/damage to services
  • 23. Cyber Conflicts
  • 24. Cyber Conflicts
  • 25. Way AheadRevisit strategy for National Cybersecurity :(a) reinforces current policy and operational measures to reduce vulnerability in the cyberspace under Philippine jurisdiction;(b) nurtures a culture of cyber security amongst users and critical sectors; and(c) strengthens self-reliance in terms of information security technologies and human resources.
  • 26. Cyberspace: The Shape of New Conflict