Your SlideShare is downloading. ×
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Surviving Cyber War
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Surviving Cyber War

3,051

Published on

Cyber crime is not the least of your worries. Nation states are actively engaged in cyber espionage, probing, and targeted attacks.

Cyber crime is not the least of your worries. Nation states are actively engaged in cyber espionage, probing, and targeted attacks.

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,051
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
222
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Surviving Cyber War
      • Richard Stiennon
      • Chief Research Analyst
      • IT-Harvest
      • Blog: ThreatChaos.com
      • twitter.com/stiennon
    • 2. Prelude: February 24, 2008
    • 3. No more YouTube
    • 4. No more Pakistan
    • 5. Threat hierarchy is a time line!
      • Information Warfare
      • CyberCrime
      • Hactivism
      • Vandalism
      • Experimentation
    • 6. Rumblings April 1, 2001 Navy EP-3 Chinese F-8
    • 7. The Five Levels of Cyber Defense Conditions
      • Cyber DefCon 1. Travel warnings. Governments issue warnings about protecting data when traveling to foreign nations.
      • Cyber DefCon 2. Nation states probe each other’s network’s for vulnerabilities.
      • Cyber Defcon 3. Wide spread information theft with intent to mine industrial as well as military and geo-political secret information.
      • Cyber DefCon 4. Targeted attacks against a nation’s military and government installations. Loss of critical data, collateral damage.
      • Cyber DefCon 5. Nation to nation attacks are malicious with intent to destroy communication infrastructure and disable business processes including financial markets.
    • 8. Custom Trojans, tools of the trade Michael Haephrati shows us how. While China…
    • 9. China takes it to the next level
      • In the UK, the Home Office has warned about a spate of attacks in recent months involving e-mail Trojans. "We have never seen anything like this in terms of the industrial scale of this series of attacks," said Roger Cumming, director of NISCC
    • 10. Titan Rain
      • Custom Trojans
      • Sandia drops its shorts, 2005
      • Shawn Carpenter, First US Cyber Warrior
      • Summer 2007 Pentagon is attacked and shut down. Source of attack Chinese Red Army
    • 11. Multiple fronts in this info war
      • German Chancellery, Summer 2007
      • Whitehall, UK
      • France
      • India
      • Australia
    • 12. Cyber war breaks out
      • Estonia, March 2007
      • Ukrain November 2007
      • Lithuania, June 2008
      • Georgia, August 2008
      Nashi summer camp ‘07
    • 13. 300 Lithuanian websites defaced
      • "All the hackers of the country have decided to unite, to counter the impudent actions of Western superpowers. We are fed up with NATO's encroachment on our motherland, we have had enough of Ukrainian politicians who have forgotten their nation and only think about their own interests. And we are fed up with Estonian government institutions that blatantly re-write history and support fascism," the message stated.
      • -The Baltic Course http://www.baltic-course.com
    • 14. Surviving Cyber War
      • Same rules apply, only more so.
      • Appoint a cyber security commander
      • Defense in depth against multiple adversaries
      • Fighting the low and slow war. Your information is their weapon. Worry about infiltration.
      • DDoS. Yes, it takes investment.
      • Surviving a meltdown. Remember modems?
    • 15. Blog: www.threatchaos.com email: [email_address] Twitter: twitter.com/stiennon
    • 16.
      • DEFCON 4

    ×