Cyber security assocham

306 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
306
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber security assocham

  1. 1. Cyber Threats Scenarios and Defense Model Principles ASSOCHAM Cyber Security Conference April 2011Presented by Dr. Nimrod Kozlovski, Chairman, Nimrod@altalsec.com, +972 544 336056©All Right Reserved to Altal Security Ltd., 2011.
  2. 2. Brazil Iran COMODO Greece Georgia Australia Critical Stuxnet CertificationInterception dDoS Hacking Infrastructure Theft Korea GPS manipulation Estonia China China RSA NSDQ DNS Algorithm dDoS Ghostnet Redirection Interception Theaft ©All Right Reserved to Altal Security Ltd., 2011.
  3. 3. Impersonation of legit Not necessarily Not necessarily activity in all layers immediate effect Identifiable destruction Action Personal computer Remote network Purpose intrusion intrusion Monitoring Threat Computer Mapping and Destructionand Storage Data analysis Mining Theft Code Embed/ Voice Interception Manipulation Traffic redirection Network Data InterceptionUnintentional Social Re-transmission onData Leakage existing Engineering infrastructure Future control Communication Focused Blockings External Copy byimpersonation Internals Re-transmission via Hardware Hiding RF ©All Right Reserved to Altal Security Ltd., 2011.
  4. 4. Closed-Garden Networks Critical Infrastructure (Military, Gov) (Power, Nuclear) Industrial Open Infrastructure (Water, Transportation, Telecom) Interconnectivity Complexity Openness ©All Right Reserved to Altal Security Ltd., 2011.
  5. 5. ©All Right Reserved to Altal Security Ltd., 2011.
  6. 6. National Level Technology Efficient SynchronizationThreat Analysis Development Enforcement Requires National Involvement
  7. 7. Traditional passive protection (Enterprise-Based)Network security Structure and security Does not consider up-to-date attack standards are known scenariosNational Interest not in Trusted User focus IT oriented security Protected Asset technologies Known (standard) Perimeter InfrastructureSecurity Structure does not dramatically Technologies are not tailored to be change (but upgraded) compatible with new threat model ©All Right Reserved to Altal Security Ltd., 2011.
  8. 8. Shared Pro-Active IntegrativeInter-sector information Traps/ Honey-pots Integrated cross- sectorssharing (Private-Public analysis Initiate attacks to identifysharing model) reaction One coordinating entityDistributed sensors Research vulnerabilities of for all sectorssystem (connecting the Target systems Integrated incentive‘dots’) Hiding capabilities in structure for defense target systems Shared monitoring and Central incident analytics of incidents Monitor patterns/Profiles response ”brain” ©All Right Reserved to Altal Security Ltd., 2011.
  9. 9. Shared Pro-Active Integrative Development Telecom Security Electronic Seamless Massive Traffic Telco FirmwareCompliance Management Segregation Anomaly detection Integrity ©All Right Reserved to Altal Security Ltd., 2011.
  10. 10. Altal Israel____________________________________________________Dr. Nimrod Kozlovski Chairman nimrod@altalsec.com +972 544336056Netanel (Nati) Davidi, CEO nati@altalsec.com +972 525406775Altal India____________________________________________________Dr. D.K. Ghosh, Board Member dkg@altalsec.com +981 1264849Avi Gutgold, Country Manager avi@altalsec.com +919 953780090

×