SlideShare a Scribd company logo
C y b e r
P o r t e n t s
&
P r e c u r s o r s
Shireen Walton
Peter Cochrane OBE, DSc
https://www.embroker.com/blog/cyber-attack-statistics/
CYBER CRIME
Cost to Global Business
Source:
We Are Losing
THE CYBER WAR
CYBER ATTACKS
All originate from human action
https://www.embroker.com/blog/cyber-attack-statistics/
Outsiders Outsiders + Insiders
Criminal Groups
Cyber Security
Industry Focus
B i g g e s t T h r e a t ?
L a r g e l y I n v i s i b l e
What About
Diverse 45%
IoT Elements
Wi de Open -
U n p r o t e c t e d
E x p o n e n t i a l
Growing Risk
Source:
“The Threat Landscapes gets bigger and
more complex year-on-year with reactive
defenders always behind the wave”
THERMODYNAMICS
“All things in the natural & unnatural worlds, experience failures and death”
“Acts of war, terrorism, and criminality wear a cloak of
causality that renders them recognisable as unnatural
in the schema of failures ”
“In general, these exhibit random distributions at scale”
“Patterns are thus key in charactering and
identifying failure types and likely cause”
“The Celestial Ratchet that governs
everything in the universe”
HYPOTHESIS 1
“Everything in the natural world; be it biological, geological, climatic,
astronomical, et al, exhibit precursor indicators to major events”
Eg Hormonal and Chemical Changes, Tremors, Pressure, Humidity,
Temperature, Trajectory Deviations etc
HYPOTHESIS 2
“Everything in the unnatural world, be it electrical, mechanical,
electronic, photonic, mechatronic, robotic, AI et al, exhibit precursor
indicators to major failures and events”
Eg Excessive Heat, Vibration, Packet Loss, Data Storage, Processing
and Decision Failures,
E l e c t r o -
MECHANICAL
E x a m p l e
Unwanted Resonances
Failure Precursors
Speci
fi
c Element in
Wear Out Phase
Vibration spectrum identi
fi
es reducing machine
performance pending total failure
Time
Machine
Conditio
n/Funct
ion
E l e c t r o -
MECHANICAL
S Y S T E M S
Multi-spectrum monitoring quickly identi
fi
es
reducing machine performance pending total
failure / a need for preventative maintenance
Electronic
fibre optic
E x a m p l e
Bit, Byte, Block, Frame, Addressing, Routing,
Decision Errors+++
Commissioning In Service Change Out
Low Level Quasi-Constant Accelerating
Overall Failure Rate
Infant Mortality Random End of Life
Failures
Cause
Timeline Not to Scale
Stage
Production
& Install
Inherent
Natural
Ageing
C o n V e n t i o n a l
Failure Timing
“System fails are generally clustered at the
start and end of a systems life, but Cyber
Attacks tend to be more evenly spread”
“Cyber Attacks span the natural and unnatural worlds with people and
technology in concert, and precursors are therefore highly likely”
“Malware, Spam, Insider/Outsider Activity will exhibit unusual patterns
of Physical/MetaPhysical behaviour across all Networks, and Devices”
HYPOTHESIS 3
Key Question 1
“Can we detect deviations from the behavioural norm of Networks,
Hubs, Severs, Terminals, Devices (“and people”) with su
ffi
cient
fi
delity to identify a pending or ‘in progress’ Cyber Attack?”
“There is only one course of action open to us - take a look see”
Components: people, PC, device, router,
switch, hub,
fi
rewall, network, server, cloud,
tra
ffi
c and data activity
Cyber Attack
Pre-Emptive
Probe + HIT
Pre-cursor
to full on
attack
Initial investigation in Vienna of
available Interpol Data @ SAIL Labs
ffi
Fourier ?
ANALYtics
Looking for needles in haystacks - or will it all be
blindingly obvious - what/where are the
fl
ags?
ffi
Fourier ?
ANALYtics
Looking for needles in haystacks - or will it all be
blindingly obvious - what/where are the
fl
ags?
ffi
Fourier ?
ANALYtics
Looking for needles in haystacks - or will it all be
blindingly obvious - what/where are the
fl
ags?
ffi
Fourier ?
ANALYtics
Looking for needles in haystacks - or will it all be
blindingly obvious - what/where are the
fl
ags?
ffi
Fourier ?
ANALYtics
Looking for needles in haystacks - or will it all be
blindingly obvious - what/where are the
fl
ags?
People
Systems
Networks
Monitoring
People
Systems
Networks
All Operations Disabled
All Systems Failing
Visible
Operational
Noise
Sporadic
Outages
Multi-System Critical
Fails-Unpredictable
Up Times
Inexplicable
Productivity
Reductions
CYBER
ATTACK
Undetected
Attack Build
Up + Hidden
Precursors
Time
IT
Systems
Conditio
n/Funct
ion
“The attacks to really worry about are the ones
you never detected and know nothing about”
Key Question 2
“Can we establish the behavioural characteristics of individual hackers/
hacks with su
ffi
cient
fi
delity to initiate Pre-Emptive action and ward o
ff
pending Cyber Attacks?”
“This demands the behavioural analysis/characterisation of known
systems, equipments and individuals across a su
ffi
ciently large sample!”
NSA EXEMPLAR
A dramatisation of actuality!
Edward Snowden - disillusioned &
sure he is right, based on a limited
perspective of operations
I n s i d e r T h r e at
What has become very evident…
They are often:
- trusted employees
- tend to be lone wolves
- have a sense of Justice
- abuse access privileges
- commit acts of treachery
- have an incomplete picture
- convinced they are in the right
- may have external actor relationships
Disregarded security
policies
Social engineering by
insiders or outsiders
Disgruntled
employees sabotage.
Financial gain
Compliance/policies
insufficient or
ignored
Accidents and
errors?
Lack of cyber security
awareness
I n s i d e r T h r e at
o p p o r t u n i t i e s
Ignorance/unawareness
cavalier attitudes
Blasé/Ignorant board
and/or management
Yang et al (2018) identified the traits of
Edward Snowden and dismisses his
claimed motivation as justice, and
presents his underlying pathology as
narcissistic
O v e r S i m p l i f i e d
A n a ly s i s ?
WHISTLEBLOWERS often motivated by :
• Hubris
• Naive beliefs
• Misguided purpose
• Distorted perceptions
• Incomplete/distorted view of operations
AND guilty of:
• Laxity when engaging with external threat actors
• Positive emotions ‘of above’ amplified post breach
O B S E R V A T I O N S
vulnerable
HABITUALITY
“Imitating & emulating others can be a powerful attack tool/strategy”
“It might even be the highest risk and opportunity space!”
“Attackers/Defenders - near impossible to change their operating modes”
Insider Positive Emotions: Engagement
( Used own
strengths)
Positive
Relationship
( Team worker)
Meaning and
Purpose
Accomplishment
(Had a goal)
Edward
Snowden
√ √ √ √ √
Katharine
Gun
? ? ? √ ?
Chelsea
Manning
√ √ √ √ √
Julian
Assange
√ √ √ √ √
I n i t i a l R e v i e w o f
s e c o n d a r y d a t a
H A C K E R S u r v e y
Preliminary results from interviews…
Motivation
Curiosity
C
a
u
s
e
$$
$
Computing
Self
Educated
Loner
Refuge
Pitiless
Remorseless
Odd
Socially
20 -
40 -
60 -
80 -
100 -
0 -
% Scores
• Secondary data is extremely limited
• Organisational integrity, reputation, potential damage
• Reluctance to reveal attacks & share insider threat data
• Widespread corporate bias and truth distortion in reporting
• Insider Threat Management responsibility CISO? CEO? CFO?
• Corporate ignorance, inaction, underfunding, fatalistic attitudes
• Cognitive bias in reporting and research
• Inconsistency across research bodies
C H A L L E N G E S
S o l u t i o n S p a c e ?
• Create a balanced behavioural and motivational assessment for individuals
• Provide intervention strategies for those who have access to data
• Provide behavioural guidelines for those operating in a digital space
• Establish the motivations/targets of organised crime and state actors
• Create automated early attack warning and defence protocols
“Educate people in ‘effective self
regulation’ behaviours/actions -
this is a team game”
• Identify hidden themes embedded in much larger secondary data samples
• Confirm the statistical significance of key behavioural characteristics
• Correlate with published threat surveys – hackers, state actors, et al
• Identify primary weaknesses in currently used defence solutions
• Evaluate current organisational defence/resilience strategies
• Identify key weaknesses and propose new solutions
• Estimate the potential cost of ineffective defences
B e h a v i o u r s
W h at N e x t ?
• Recruit a PhD student with a good hardware/software/math ability
• Confirm the significance of ‘observed’ network attack precursors
• Configure ‘honeypot’ machine(s) to attract real device attacks
• Identify primary waveform characteristics v attack type
• Create an ‘attack alarm’ monitoring strategy
• Construct a demonstration prototype
A T T A C K P R E D I C T I O N
W h at N e x t w i s h l i s t ?
Thank You
www.petercochrane.com

More Related Content

Similar to Cyber Portents and Precursors

DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
Alexander Hutton
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Evolving it security Threats and Solutions
Evolving it security  Threats and SolutionsEvolving it security  Threats and Solutions
Evolving it security Threats and Solutions
University of Hertfordshire
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
M. Isaiah McGowan
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Evaluating and ImprovingBomb Threat Planning Process.pdf
Evaluating and ImprovingBomb Threat Planning Process.pdfEvaluating and ImprovingBomb Threat Planning Process.pdf
Evaluating and ImprovingBomb Threat Planning Process.pdf
eliasox
 
Biometrics of ID and Security
Biometrics of ID and SecurityBiometrics of ID and Security
Biometrics of ID and Security
University of Hertfordshire
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
Haystax Technology
 
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Julie Tsai
 
The law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligenceThe law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligence
PyData
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
Roger Grimes
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
SecurityStudio
 
Retrospecting our Retrospectives
Retrospecting our RetrospectivesRetrospecting our Retrospectives
Retrospecting our Retrospectives
Jessica DeVita
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
ecarrow
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
Paul W. Taylor
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
Aaron Rinehart
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Pukhraj Singh
 

Similar to Cyber Portents and Precursors (20)

DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Evolving it security Threats and Solutions
Evolving it security  Threats and SolutionsEvolving it security  Threats and Solutions
Evolving it security Threats and Solutions
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Evaluating and ImprovingBomb Threat Planning Process.pdf
Evaluating and ImprovingBomb Threat Planning Process.pdfEvaluating and ImprovingBomb Threat Planning Process.pdf
Evaluating and ImprovingBomb Threat Planning Process.pdf
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Biometrics of ID and Security
Biometrics of ID and SecurityBiometrics of ID and Security
Biometrics of ID and Security
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
Building Towards the New Security & Privacy Landscape: Where Do We Go From Here?
 
The law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligenceThe law and ethics of data-driven artificial intelligence
The law and ethics of data-driven artificial intelligence
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
Retrospecting our Retrospectives
Retrospecting our RetrospectivesRetrospecting our Retrospectives
Retrospecting our Retrospectives
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 

More from University of Hertfordshire

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
University of Hertfordshire
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
University of Hertfordshire
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
University of Hertfordshire
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
University of Hertfordshire
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
University of Hertfordshire
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
University of Hertfordshire
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
University of Hertfordshire
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
University of Hertfordshire
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
University of Hertfordshire
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
University of Hertfordshire
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
University of Hertfordshire
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
University of Hertfordshire
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
University of Hertfordshire
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
University of Hertfordshire
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
University of Hertfordshire
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
University of Hertfordshire
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
University of Hertfordshire
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
University of Hertfordshire
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
University of Hertfordshire
 

More from University of Hertfordshire (20)

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Future Telecoms Challenges & Opportunities
Future Telecoms Challenges & OpportunitiesFuture Telecoms Challenges & Opportunities
Future Telecoms Challenges & Opportunities
 
Thermodynamics - Laws Embracing Our Universe
Thermodynamics -  Laws Embracing Our UniverseThermodynamics -  Laws Embracing Our Universe
Thermodynamics - Laws Embracing Our Universe
 
Applied Science - Engineering Systems
Applied Science - Engineering SystemsApplied Science - Engineering Systems
Applied Science - Engineering Systems
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
The Scientific Meme
The Scientific Meme The Scientific Meme
The Scientific Meme
 
Uncanny Valley and Human Destiny
Uncanny Valley and Human DestinyUncanny Valley and Human Destiny
Uncanny Valley and Human Destiny
 
Resurgence of Technology Driven Change
Resurgence of Technology Driven ChangeResurgence of Technology Driven Change
Resurgence of Technology Driven Change
 
Society 5.0: A Vital Symbiosis
Society 5.0: A Vital SymbiosisSociety 5.0: A Vital Symbiosis
Society 5.0: A Vital Symbiosis
 
Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?Technology Overlords Or A Symbiosis ?
Technology Overlords Or A Symbiosis ?
 
THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS THE FUTURE OF MOBILE NETWORKS
THE FUTURE OF MOBILE NETWORKS
 
Quantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence MathematicallyQuantifying Machine Intelligence Mathematically
Quantifying Machine Intelligence Mathematically
 
Technologies That Will Change Everything
Technologies That Will Change EverythingTechnologies That Will Change Everything
Technologies That Will Change Everything
 
Cyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The EnemyCyber Security - Thinking Like The Enemy
Cyber Security - Thinking Like The Enemy
 
Society 5.0 Redefined
Society 5.0 RedefinedSociety 5.0 Redefined
Society 5.0 Redefined
 
The Future WorkScape
The Future WorkScapeThe Future WorkScape
The Future WorkScape
 
Engineering Reliability and Resilience
Engineering Reliability and ResilienceEngineering Reliability and Resilience
Engineering Reliability and Resilience
 
Smart Materials and Structures
Smart Materials and StructuresSmart Materials and Structures
Smart Materials and Structures
 
TRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESSTRUTH, SITUATION, & CONTEXT AWARENESS
TRUTH, SITUATION, & CONTEXT AWARENESS
 

Recently uploaded

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Cyber Portents and Precursors

  • 1. C y b e r P o r t e n t s & P r e c u r s o r s Shireen Walton Peter Cochrane OBE, DSc
  • 2. https://www.embroker.com/blog/cyber-attack-statistics/ CYBER CRIME Cost to Global Business Source: We Are Losing THE CYBER WAR
  • 3. CYBER ATTACKS All originate from human action https://www.embroker.com/blog/cyber-attack-statistics/ Outsiders Outsiders + Insiders Criminal Groups Cyber Security Industry Focus B i g g e s t T h r e a t ? L a r g e l y I n v i s i b l e What About Diverse 45% IoT Elements Wi de Open - U n p r o t e c t e d E x p o n e n t i a l Growing Risk Source: “The Threat Landscapes gets bigger and more complex year-on-year with reactive defenders always behind the wave”
  • 4. THERMODYNAMICS “All things in the natural & unnatural worlds, experience failures and death” “Acts of war, terrorism, and criminality wear a cloak of causality that renders them recognisable as unnatural in the schema of failures ” “In general, these exhibit random distributions at scale” “Patterns are thus key in charactering and identifying failure types and likely cause” “The Celestial Ratchet that governs everything in the universe”
  • 5. HYPOTHESIS 1 “Everything in the natural world; be it biological, geological, climatic, astronomical, et al, exhibit precursor indicators to major events” Eg Hormonal and Chemical Changes, Tremors, Pressure, Humidity, Temperature, Trajectory Deviations etc
  • 6. HYPOTHESIS 2 “Everything in the unnatural world, be it electrical, mechanical, electronic, photonic, mechatronic, robotic, AI et al, exhibit precursor indicators to major failures and events” Eg Excessive Heat, Vibration, Packet Loss, Data Storage, Processing and Decision Failures,
  • 7. E l e c t r o - MECHANICAL E x a m p l e Unwanted Resonances Failure Precursors Speci fi c Element in Wear Out Phase Vibration spectrum identi fi es reducing machine performance pending total failure
  • 8. Time Machine Conditio n/Funct ion E l e c t r o - MECHANICAL S Y S T E M S Multi-spectrum monitoring quickly identi fi es reducing machine performance pending total failure / a need for preventative maintenance
  • 9. Electronic fibre optic E x a m p l e Bit, Byte, Block, Frame, Addressing, Routing, Decision Errors+++
  • 10. Commissioning In Service Change Out Low Level Quasi-Constant Accelerating Overall Failure Rate Infant Mortality Random End of Life Failures Cause Timeline Not to Scale Stage Production & Install Inherent Natural Ageing C o n V e n t i o n a l Failure Timing “System fails are generally clustered at the start and end of a systems life, but Cyber Attacks tend to be more evenly spread”
  • 11. “Cyber Attacks span the natural and unnatural worlds with people and technology in concert, and precursors are therefore highly likely” “Malware, Spam, Insider/Outsider Activity will exhibit unusual patterns of Physical/MetaPhysical behaviour across all Networks, and Devices” HYPOTHESIS 3
  • 12. Key Question 1 “Can we detect deviations from the behavioural norm of Networks, Hubs, Severs, Terminals, Devices (“and people”) with su ffi cient fi delity to identify a pending or ‘in progress’ Cyber Attack?” “There is only one course of action open to us - take a look see”
  • 13. Components: people, PC, device, router, switch, hub, fi rewall, network, server, cloud, tra ffi c and data activity Cyber Attack Pre-Emptive Probe + HIT Pre-cursor to full on attack Initial investigation in Vienna of available Interpol Data @ SAIL Labs
  • 14. ffi Fourier ? ANALYtics Looking for needles in haystacks - or will it all be blindingly obvious - what/where are the fl ags?
  • 15. ffi Fourier ? ANALYtics Looking for needles in haystacks - or will it all be blindingly obvious - what/where are the fl ags?
  • 16. ffi Fourier ? ANALYtics Looking for needles in haystacks - or will it all be blindingly obvious - what/where are the fl ags?
  • 17. ffi Fourier ? ANALYtics Looking for needles in haystacks - or will it all be blindingly obvious - what/where are the fl ags?
  • 18. ffi Fourier ? ANALYtics Looking for needles in haystacks - or will it all be blindingly obvious - what/where are the fl ags?
  • 19. People Systems Networks Monitoring People Systems Networks All Operations Disabled All Systems Failing Visible Operational Noise Sporadic Outages Multi-System Critical Fails-Unpredictable Up Times Inexplicable Productivity Reductions CYBER ATTACK Undetected Attack Build Up + Hidden Precursors Time IT Systems Conditio n/Funct ion “The attacks to really worry about are the ones you never detected and know nothing about”
  • 20. Key Question 2 “Can we establish the behavioural characteristics of individual hackers/ hacks with su ffi cient fi delity to initiate Pre-Emptive action and ward o ff pending Cyber Attacks?” “This demands the behavioural analysis/characterisation of known systems, equipments and individuals across a su ffi ciently large sample!”
  • 21. NSA EXEMPLAR A dramatisation of actuality! Edward Snowden - disillusioned & sure he is right, based on a limited perspective of operations
  • 22. I n s i d e r T h r e at What has become very evident… They are often: - trusted employees - tend to be lone wolves - have a sense of Justice - abuse access privileges - commit acts of treachery - have an incomplete picture - convinced they are in the right - may have external actor relationships
  • 23. Disregarded security policies Social engineering by insiders or outsiders Disgruntled employees sabotage. Financial gain Compliance/policies insufficient or ignored Accidents and errors? Lack of cyber security awareness I n s i d e r T h r e at o p p o r t u n i t i e s Ignorance/unawareness cavalier attitudes Blasé/Ignorant board and/or management
  • 24. Yang et al (2018) identified the traits of Edward Snowden and dismisses his claimed motivation as justice, and presents his underlying pathology as narcissistic O v e r S i m p l i f i e d A n a ly s i s ?
  • 25. WHISTLEBLOWERS often motivated by : • Hubris • Naive beliefs • Misguided purpose • Distorted perceptions • Incomplete/distorted view of operations AND guilty of: • Laxity when engaging with external threat actors • Positive emotions ‘of above’ amplified post breach O B S E R V A T I O N S
  • 26. vulnerable HABITUALITY “Imitating & emulating others can be a powerful attack tool/strategy” “It might even be the highest risk and opportunity space!” “Attackers/Defenders - near impossible to change their operating modes”
  • 27. Insider Positive Emotions: Engagement ( Used own strengths) Positive Relationship ( Team worker) Meaning and Purpose Accomplishment (Had a goal) Edward Snowden √ √ √ √ √ Katharine Gun ? ? ? √ ? Chelsea Manning √ √ √ √ √ Julian Assange √ √ √ √ √ I n i t i a l R e v i e w o f s e c o n d a r y d a t a
  • 28. H A C K E R S u r v e y Preliminary results from interviews… Motivation Curiosity C a u s e $$ $ Computing Self Educated Loner Refuge Pitiless Remorseless Odd Socially 20 - 40 - 60 - 80 - 100 - 0 - % Scores
  • 29. • Secondary data is extremely limited • Organisational integrity, reputation, potential damage • Reluctance to reveal attacks & share insider threat data • Widespread corporate bias and truth distortion in reporting • Insider Threat Management responsibility CISO? CEO? CFO? • Corporate ignorance, inaction, underfunding, fatalistic attitudes • Cognitive bias in reporting and research • Inconsistency across research bodies C H A L L E N G E S
  • 30. S o l u t i o n S p a c e ? • Create a balanced behavioural and motivational assessment for individuals • Provide intervention strategies for those who have access to data • Provide behavioural guidelines for those operating in a digital space • Establish the motivations/targets of organised crime and state actors • Create automated early attack warning and defence protocols “Educate people in ‘effective self regulation’ behaviours/actions - this is a team game”
  • 31. • Identify hidden themes embedded in much larger secondary data samples • Confirm the statistical significance of key behavioural characteristics • Correlate with published threat surveys – hackers, state actors, et al • Identify primary weaknesses in currently used defence solutions • Evaluate current organisational defence/resilience strategies • Identify key weaknesses and propose new solutions • Estimate the potential cost of ineffective defences B e h a v i o u r s W h at N e x t ?
  • 32. • Recruit a PhD student with a good hardware/software/math ability • Confirm the significance of ‘observed’ network attack precursors • Configure ‘honeypot’ machine(s) to attract real device attacks • Identify primary waveform characteristics v attack type • Create an ‘attack alarm’ monitoring strategy • Construct a demonstration prototype A T T A C K P R E D I C T I O N W h at N e x t w i s h l i s t ?