SlideShare a Scribd company logo
1 of 34
Download to read offline
Mr. Esam Abulkhirat
Deputy General Director
NISSA
‫ا‬.‫ات‬‫ﺮ‬‫ـــــــــــــــــــــــــ‬ ‫اﳋ‬ ‫اﺑﻮ‬ ‫ﺪي‬ ‫اﳌﻬ‬ ‫ﻋﺼــــــــــــــﺎم‬
‫ﻋـــــــــــــــﺎم‬ ‫ﺮ‬‫ﻣﺪ‬ ‫ﺋﺐ‬
‫اﳌﻌﻠﻮﻣﺎت‬ ‫وﺳﻼﻣﺔ‬ ‫ﻷﻣﻦ‬ ‫اﻟﻮﻃﻨﯿﺔ‬ ‫اﻟﻬﯿﺌﻮ‬
•Introduction & Overview.
•Why Cybersecurity is Important.
•Kinetics Vs Cyber.
•Challenges & Combating Efforts
•Conclusion.
IntroductionIntroduction::
CybercrimeCybercrime is the fastest growing crime in the world with millions ofis the fastest growing crime in the world with millions of
people affected every day. The effects of one successful attack on apeople affected every day. The effects of one successful attack on a
corporation can have farcorporation can have far--reaching implications, including financialreaching implications, including financial
losses at the corporate level, to stock losses and money lost forlosses at the corporate level, to stock losses and money lost for
consumers or stock holders.consumers or stock holders. LawsLaws have been swiftly put into placehave been swiftly put into place
to halt these types of attacks, but criminals find haven in countriesto halt these types of attacks, but criminals find haven in countries
with lax cybercrime laws.with lax cybercrime laws.
Crime Space
Security Law
Cyber
The term
“cybercrime” is
usually referred to as
any criminal offense
committed against
or with the use of
a computer or
computer network
A set of activities and
other measures,
technical and non-
technical intended to
protect data,
information and
information systems
from unauthorized
access, use,
disclosure, disruption,
modification and
destruction.
Virtual world of
information
networks. The
global information
space. The digital
era.
is a term used to
describe the legal
issues related to use
of ICTs, particularly
cyberspace
Target
Viruses
DoS
Weapon
IPR
Spam
Accessory
Fraud
Id-Theft
FACTS AND FIGURES:FACTS AND FIGURES:
Almost two thirds of all adult web users globally have fallen victimAlmost two thirds of all adult web users globally have fallen victim
to some sort of cybercrime, from spam email scams to having theirto some sort of cybercrime, from spam email scams to having their
credit card details stolen.credit card details stolen. (the(the 20112011 Norton Cybercrime Report: The Human Impact studyNorton Cybercrime Report: The Human Impact study))
InIn 20102010, China, China had the most cybercrime victims, athad the most cybercrime victims, at 8383% of web% of web
users, followed by India and Brazil, atusers, followed by India and Brazil, at 7676% each, and then the US, at% each, and then the US, at
7373%.%.
The study, of overThe study, of over 77,,000000 InternetInternet users foundusers found thatthat 8080% of people% of people
believed the perpetrators would never be brought to justice. Fewerbelieved the perpetrators would never be brought to justice. Fewer
than half ever bother to report the crime to policethan half ever bother to report the crime to police..
FACTS AND FIGURES:FACTS AND FIGURES:
CybercrimeCybercrime is worth an estimatedis worth an estimated 105105 billionbillion dollars anddollars and
cybercriminals can earn aroundcybercriminals can earn around 2323,,000000 dollars a weekdollars a week..
(rival computer security firm(rival computer security firm McAfee)McAfee)
SeveralSeveral computer security consulting firms estimate globalcomputer security consulting firms estimate global
financial losses from viruses, worm attacks and other hostilefinancial losses from viruses, worm attacks and other hostile
computercomputer--based attacks to be between $based attacks to be between $1313 and $and $226226
billion.billion.
((the Congressional Research Service)the Congressional Research Service)
“One“One botnetbotnet of one million hosts could conservativelyof one million hosts could conservatively
generate enough traffic to take most Fortunegenerate enough traffic to take most Fortune 500500
companies collectively offline”companies collectively offline”,,
( Jeffrey Carr writes in his book Inside Cyber Warfare).( Jeffrey Carr writes in his book Inside Cyber Warfare).
FACTS AND FIGURES:FACTS AND FIGURES:
••The growth rate of cyberspace has been enormous,The growth rate of cyberspace has been enormous,
roughly doubling everyroughly doubling every 100100 days.days.
••Cybercrime in Africa is growing faster than anyCybercrime in Africa is growing faster than any
other continent.other continent.
••Out of the top ten countries in the world with aOut of the top ten countries in the world with a
high level of cybercrime prevalence, Africa is hosthigh level of cybercrime prevalence, Africa is host
to four of these countries (Nigeria, Cameroon,to four of these countries (Nigeria, Cameroon,
Ghana and South Africa).Ghana and South Africa).
••Estimates say that aboutEstimates say that about 8080 percent of PCs in thepercent of PCs in the
African continent are already infected with virusesAfrican continent are already infected with viruses
and other malicious software.and other malicious software.
(World Bank Survey)(World Bank Survey)
Platform
Mobile worms
on victims’
machines that
buy malicious
apps and steal
via tap-and-pay
NFC Malware that
blocks security
updates to
mobile phones
Mobile phone
Ransomware
“kits” that
allow criminals
without
programming
skills to extort
payments
Covert and
persistent
attacks deep
within and
beneath
Windows
Rapid
development of
ways to attack
Windows 8 and
HTML5
Large-scale
attacks like
Stuxnet that
attempt to
destroy
infrastructure,
rather than
make money
Snowshoe
spamming of
legitimate
products,
spreading out
the sources &
keeping spam
flowing.
further
narrowing of
Zeus-like
targeted attacks
using Citadel
Trojan, difficult
for security
products to
counter
The decline of
online
Hacktivists
Anonymous, to
be replaced by
more politically
committed or
extremist
groups
Malware that
renews a
connection even
after a botnet
has been taken
down, allowing
infections to
grow again
services for $.
“Hacking as a
Service”:
Anonymous in
underground
forums
exchange
malware kits &
development
services for $.
Nation states
and armies will
be more
frequent sources
and victims of
cyberthreats
SMS spam from
infected phones.
The Nimitz-class super
carriers are a class of 10
nuclear-powered aircraft
carriers in service with the
US-Navy.
$4.5 billion with
operation costs of
$22 billion a year
The McDonnell Douglas
(now Boeing) F-15 Strike
Eagle is an all-weather
multirole fighter
$100 million (not
including
maintenance), 221-US,
69-Saudia and 61-
S.Korea
The M1 Abrams tank is a
US-third-generation
main battle tank (68.4
tons)
M1A2 cost $8.58 million.
Total estimated cost of
entire M1 tank program
to date $40 billion
The Chinese Army
(2,285,000 soldiers on
active duty) (800,000 on
reserve)
The estimated Chinese
budget for the Army in
2013 is $114.2 billion.
•The Cary Titan world’s
fastest super computer
(27 petaflops, 2012).
1 petaflop = Thousand Trillion floating
point operations per second
•Cost $200 million
design and build.
Operation cost 6.5
million a year
•High-end password
cracking desktop attempt
350 billion PW/Sec
•Custom built desktop
PW cracking rig with
25 powerful graphic
cards cost $5000.
•MacBook Pro attempt
40 million/hashes/Sec
using Nvidia 650M GC
•Properly configured cost
$2000 brand new
MacBook Pro.
•Jailbreak Smartphone
with Back-Track (Free
Pen-testing SW); highly
mobile hacker platform used by
any semi-competent hacker.
•Top of the line Droid
(runs Linux)
Smartphone cost
$600.
Space of conflict largely separate
from civilians.
Offensive & Defensive
technologies often in rough
balance.
Attribution to adversary
presumed.
Capabilities of non-state actors
relatively small.
Significance of distance large.
National boundaries important.
Clear lines between attacking &
spying as security threats.
Effects reasonably predictable.
Usually declared or observed
explicitly
There are clear International
mechanisms (UN, NATO etc)
Space of conflict is where
civilians live and work.
Offensive & Defensive
technologies largely OUT of
balance.
Attribution hard, slow, uncertain.
Capabilities of non-state actors
relatively large.
Significance of distance minimal.
National boundaries irrelevant.
Attacks & spying hard to
distinguished; no clear line.
Effects hard to predict or control.
Rarely declared or observed
explicitly.
No clear International
mechanisms (IG, ICANN, ITU).
Challenges:Challenges:
••lack of understanding, education, training, unclearlack of understanding, education, training, unclear
policies of government.policies of government.
••The fact that the vast majority of cyber crime is notThe fact that the vast majority of cyber crime is not
reported would impact all statistics, as a clearreported would impact all statistics, as a clear
picture cannot be given without all the information.picture cannot be given without all the information.
••Explosion of the Internet.Explosion of the Internet.
Efforts:Efforts:
••Creation of National Information Security Authority (NISSA).Creation of National Information Security Authority (NISSA).
••Development of Policies, Legislations & Laws.Development of Policies, Legislations & Laws.
••Building of Computer Security Readiness Team (CERT).Building of Computer Security Readiness Team (CERT).
••Foundation of PKI, CloudFoundation of PKI, Cloud--Sec, MobileSec, Mobile--Sec, NetworkSec, Network--Sec.Sec.
••Cyber security awareness workshops and trainings.Cyber security awareness workshops and trainings.
••International CooperationInternational Cooperation
•Data
•APPLICATIONS
•NETWORK
•HUMAN
Esam Abulkhirat's Presentation on Cybersecurity Challenges
Esam Abulkhirat's Presentation on Cybersecurity Challenges
Esam Abulkhirat's Presentation on Cybersecurity Challenges
Esam Abulkhirat's Presentation on Cybersecurity Challenges

More Related Content

What's hot

Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Project Cyber Dawn: Libya
Project Cyber Dawn: LibyaProject Cyber Dawn: Libya
Project Cyber Dawn: LibyaAmr Ali
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 

What's hot (20)

Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Project Cyber Dawn: Libya
Project Cyber Dawn: LibyaProject Cyber Dawn: Libya
Project Cyber Dawn: Libya
 
CyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency Management
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 

Similar to Esam Abulkhirat's Presentation on Cybersecurity Challenges

"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 

Similar to Esam Abulkhirat's Presentation on Cybersecurity Challenges (20)

"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Esam Abulkhirat's Presentation on Cybersecurity Challenges

  • 1. Mr. Esam Abulkhirat Deputy General Director NISSA ‫ا‬.‫ات‬‫ﺮ‬‫ـــــــــــــــــــــــــ‬ ‫اﳋ‬ ‫اﺑﻮ‬ ‫ﺪي‬ ‫اﳌﻬ‬ ‫ﻋﺼــــــــــــــﺎم‬ ‫ﻋـــــــــــــــﺎم‬ ‫ﺮ‬‫ﻣﺪ‬ ‫ﺋﺐ‬ ‫اﳌﻌﻠﻮﻣﺎت‬ ‫وﺳﻼﻣﺔ‬ ‫ﻷﻣﻦ‬ ‫اﻟﻮﻃﻨﯿﺔ‬ ‫اﻟﻬﯿﺌﻮ‬
  • 2. •Introduction & Overview. •Why Cybersecurity is Important. •Kinetics Vs Cyber. •Challenges & Combating Efforts •Conclusion.
  • 3.
  • 4. IntroductionIntroduction:: CybercrimeCybercrime is the fastest growing crime in the world with millions ofis the fastest growing crime in the world with millions of people affected every day. The effects of one successful attack on apeople affected every day. The effects of one successful attack on a corporation can have farcorporation can have far--reaching implications, including financialreaching implications, including financial losses at the corporate level, to stock losses and money lost forlosses at the corporate level, to stock losses and money lost for consumers or stock holders.consumers or stock holders. LawsLaws have been swiftly put into placehave been swiftly put into place to halt these types of attacks, but criminals find haven in countriesto halt these types of attacks, but criminals find haven in countries with lax cybercrime laws.with lax cybercrime laws.
  • 5.
  • 6.
  • 7.
  • 8. Crime Space Security Law Cyber The term “cybercrime” is usually referred to as any criminal offense committed against or with the use of a computer or computer network A set of activities and other measures, technical and non- technical intended to protect data, information and information systems from unauthorized access, use, disclosure, disruption, modification and destruction. Virtual world of information networks. The global information space. The digital era. is a term used to describe the legal issues related to use of ICTs, particularly cyberspace
  • 10.
  • 11. FACTS AND FIGURES:FACTS AND FIGURES: Almost two thirds of all adult web users globally have fallen victimAlmost two thirds of all adult web users globally have fallen victim to some sort of cybercrime, from spam email scams to having theirto some sort of cybercrime, from spam email scams to having their credit card details stolen.credit card details stolen. (the(the 20112011 Norton Cybercrime Report: The Human Impact studyNorton Cybercrime Report: The Human Impact study)) InIn 20102010, China, China had the most cybercrime victims, athad the most cybercrime victims, at 8383% of web% of web users, followed by India and Brazil, atusers, followed by India and Brazil, at 7676% each, and then the US, at% each, and then the US, at 7373%.%. The study, of overThe study, of over 77,,000000 InternetInternet users foundusers found thatthat 8080% of people% of people believed the perpetrators would never be brought to justice. Fewerbelieved the perpetrators would never be brought to justice. Fewer than half ever bother to report the crime to policethan half ever bother to report the crime to police..
  • 12. FACTS AND FIGURES:FACTS AND FIGURES: CybercrimeCybercrime is worth an estimatedis worth an estimated 105105 billionbillion dollars anddollars and cybercriminals can earn aroundcybercriminals can earn around 2323,,000000 dollars a weekdollars a week.. (rival computer security firm(rival computer security firm McAfee)McAfee) SeveralSeveral computer security consulting firms estimate globalcomputer security consulting firms estimate global financial losses from viruses, worm attacks and other hostilefinancial losses from viruses, worm attacks and other hostile computercomputer--based attacks to be between $based attacks to be between $1313 and $and $226226 billion.billion. ((the Congressional Research Service)the Congressional Research Service) “One“One botnetbotnet of one million hosts could conservativelyof one million hosts could conservatively generate enough traffic to take most Fortunegenerate enough traffic to take most Fortune 500500 companies collectively offline”companies collectively offline”,, ( Jeffrey Carr writes in his book Inside Cyber Warfare).( Jeffrey Carr writes in his book Inside Cyber Warfare).
  • 13. FACTS AND FIGURES:FACTS AND FIGURES: ••The growth rate of cyberspace has been enormous,The growth rate of cyberspace has been enormous, roughly doubling everyroughly doubling every 100100 days.days. ••Cybercrime in Africa is growing faster than anyCybercrime in Africa is growing faster than any other continent.other continent. ••Out of the top ten countries in the world with aOut of the top ten countries in the world with a high level of cybercrime prevalence, Africa is hosthigh level of cybercrime prevalence, Africa is host to four of these countries (Nigeria, Cameroon,to four of these countries (Nigeria, Cameroon, Ghana and South Africa).Ghana and South Africa). ••Estimates say that aboutEstimates say that about 8080 percent of PCs in thepercent of PCs in the African continent are already infected with virusesAfrican continent are already infected with viruses and other malicious software.and other malicious software. (World Bank Survey)(World Bank Survey)
  • 14.
  • 15.
  • 16.
  • 17.
  • 19. Mobile worms on victims’ machines that buy malicious apps and steal via tap-and-pay NFC Malware that blocks security updates to mobile phones Mobile phone Ransomware “kits” that allow criminals without programming skills to extort payments Covert and persistent attacks deep within and beneath Windows Rapid development of ways to attack Windows 8 and HTML5 Large-scale attacks like Stuxnet that attempt to destroy infrastructure, rather than make money Snowshoe spamming of legitimate products, spreading out the sources & keeping spam flowing. further narrowing of Zeus-like targeted attacks using Citadel Trojan, difficult for security products to counter The decline of online Hacktivists Anonymous, to be replaced by more politically committed or extremist groups Malware that renews a connection even after a botnet has been taken down, allowing infections to grow again services for $. “Hacking as a Service”: Anonymous in underground forums exchange malware kits & development services for $. Nation states and armies will be more frequent sources and victims of cyberthreats SMS spam from infected phones.
  • 20.
  • 21.
  • 22.
  • 23. The Nimitz-class super carriers are a class of 10 nuclear-powered aircraft carriers in service with the US-Navy. $4.5 billion with operation costs of $22 billion a year The McDonnell Douglas (now Boeing) F-15 Strike Eagle is an all-weather multirole fighter $100 million (not including maintenance), 221-US, 69-Saudia and 61- S.Korea The M1 Abrams tank is a US-third-generation main battle tank (68.4 tons) M1A2 cost $8.58 million. Total estimated cost of entire M1 tank program to date $40 billion The Chinese Army (2,285,000 soldiers on active duty) (800,000 on reserve) The estimated Chinese budget for the Army in 2013 is $114.2 billion.
  • 24. •The Cary Titan world’s fastest super computer (27 petaflops, 2012). 1 petaflop = Thousand Trillion floating point operations per second •Cost $200 million design and build. Operation cost 6.5 million a year •High-end password cracking desktop attempt 350 billion PW/Sec •Custom built desktop PW cracking rig with 25 powerful graphic cards cost $5000. •MacBook Pro attempt 40 million/hashes/Sec using Nvidia 650M GC •Properly configured cost $2000 brand new MacBook Pro. •Jailbreak Smartphone with Back-Track (Free Pen-testing SW); highly mobile hacker platform used by any semi-competent hacker. •Top of the line Droid (runs Linux) Smartphone cost $600.
  • 25. Space of conflict largely separate from civilians. Offensive & Defensive technologies often in rough balance. Attribution to adversary presumed. Capabilities of non-state actors relatively small. Significance of distance large. National boundaries important. Clear lines between attacking & spying as security threats. Effects reasonably predictable. Usually declared or observed explicitly There are clear International mechanisms (UN, NATO etc) Space of conflict is where civilians live and work. Offensive & Defensive technologies largely OUT of balance. Attribution hard, slow, uncertain. Capabilities of non-state actors relatively large. Significance of distance minimal. National boundaries irrelevant. Attacks & spying hard to distinguished; no clear line. Effects hard to predict or control. Rarely declared or observed explicitly. No clear International mechanisms (IG, ICANN, ITU).
  • 26.
  • 27. Challenges:Challenges: ••lack of understanding, education, training, unclearlack of understanding, education, training, unclear policies of government.policies of government. ••The fact that the vast majority of cyber crime is notThe fact that the vast majority of cyber crime is not reported would impact all statistics, as a clearreported would impact all statistics, as a clear picture cannot be given without all the information.picture cannot be given without all the information. ••Explosion of the Internet.Explosion of the Internet.
  • 28. Efforts:Efforts: ••Creation of National Information Security Authority (NISSA).Creation of National Information Security Authority (NISSA). ••Development of Policies, Legislations & Laws.Development of Policies, Legislations & Laws. ••Building of Computer Security Readiness Team (CERT).Building of Computer Security Readiness Team (CERT). ••Foundation of PKI, CloudFoundation of PKI, Cloud--Sec, MobileSec, Mobile--Sec, NetworkSec, Network--Sec.Sec. ••Cyber security awareness workshops and trainings.Cyber security awareness workshops and trainings. ••International CooperationInternational Cooperation
  • 29.