Cyber Security: Trends and
                Global War

                 21 September, 2012



                           Muhammad Nasir Mumtaz Bhutta
               Centre for Communication Systems Research
                                       University of Surrey
                                          Guildford, Surrey
                                                 GU2 7XH
                            Email: m.bhutta@surrey.ac.uk,
                                       Tel: 01483 68 3036

    www.surrey.ac.uk
Presentation Outline

• Brief History of Cyber Security.
• Discussion of different areas of Cyber
  Security.
• Future Trends in Cyber Security in
  different areas.
• Policies of Asia, Europe and America for
  Cyber Security Warfare.
• Top Ranked Areas in Cyber Security.
               www.ee.surrey.ac.uk/CCSR
History




                                                     French Cyber Machine : 16 Century




Lorenz Cipher Machine: used during World War II
                                                    Enigma: Cryptanalysis Machine


                                www.ee.surrey.ac.uk/CCSR
Impact of Cyber Crimes




              www.ee.surrey.ac.uk/CCSR
Cyber Security

• Computers vulnerable to attacks.




                 www.ee.surrey.ac.uk/CCSR
Vulnerabilities to Malwares




               www.ee.surrey.ac.uk/CCSR
OWASP Top 10




           www.ee.surrey.ac.uk/CCSR
Classification of different Cyber
Security Areas




                www.ee.surrey.ac.uk/CCSR
What Roles can be Played in
Cyber Security

• Forensics Expert
    •   Intrusion Detection/Prevention, Computer Forensics,
        Exploitation Techniques, Reverse Engineering etc
• Penetration Tester
    •   Systems, Networks, Web Hacking
•   Security Architect
•   Security Management
•   Intrusion Analyst
•   Vulnerability Researcher
                      www.ee.surrey.ac.uk/CCSR
Some Useful Links

• Hacking Tools List
  •   http://netsecurity.about.com/od/hackertools/Tools_and_Utilities_Commonly_Used_to_Hack_Computer_Systems.htm


• Some Top Blogs
  •   http://taosecurity.blogspot.co.uk/
  •   http://andyitguy.blogspot.co.uk/
  •   http://pauldotcom.com/about.html
  •   http://www.schneier.com/crypto-gram.html

• Top 15 Most Influential People in Security
  •   http://www.eweek.com/c/a/Security/The-15-Most-Influential-
      People-in-Security-Today/


                                    www.ee.surrey.ac.uk/CCSR
Global Security Wars




       http://www.youtube.com/watch?v=Tkcxi-D5_C0
                  www.ee.surrey.ac.uk/CCSR
Thank You !




              Discussions ?




              www.ee.surrey.ac.uk/CCSR

Cyber Security: Trends and Globar War

  • 1.
    Cyber Security: Trendsand Global War 21 September, 2012 Muhammad Nasir Mumtaz Bhutta Centre for Communication Systems Research University of Surrey Guildford, Surrey GU2 7XH Email: m.bhutta@surrey.ac.uk, Tel: 01483 68 3036 www.surrey.ac.uk
  • 2.
    Presentation Outline • BriefHistory of Cyber Security. • Discussion of different areas of Cyber Security. • Future Trends in Cyber Security in different areas. • Policies of Asia, Europe and America for Cyber Security Warfare. • Top Ranked Areas in Cyber Security. www.ee.surrey.ac.uk/CCSR
  • 3.
    History French Cyber Machine : 16 Century Lorenz Cipher Machine: used during World War II Enigma: Cryptanalysis Machine www.ee.surrey.ac.uk/CCSR
  • 4.
    Impact of CyberCrimes www.ee.surrey.ac.uk/CCSR
  • 5.
    Cyber Security • Computersvulnerable to attacks. www.ee.surrey.ac.uk/CCSR
  • 6.
    Vulnerabilities to Malwares www.ee.surrey.ac.uk/CCSR
  • 7.
    OWASP Top 10 www.ee.surrey.ac.uk/CCSR
  • 8.
    Classification of differentCyber Security Areas www.ee.surrey.ac.uk/CCSR
  • 9.
    What Roles canbe Played in Cyber Security • Forensics Expert • Intrusion Detection/Prevention, Computer Forensics, Exploitation Techniques, Reverse Engineering etc • Penetration Tester • Systems, Networks, Web Hacking • Security Architect • Security Management • Intrusion Analyst • Vulnerability Researcher www.ee.surrey.ac.uk/CCSR
  • 10.
    Some Useful Links •Hacking Tools List • http://netsecurity.about.com/od/hackertools/Tools_and_Utilities_Commonly_Used_to_Hack_Computer_Systems.htm • Some Top Blogs • http://taosecurity.blogspot.co.uk/ • http://andyitguy.blogspot.co.uk/ • http://pauldotcom.com/about.html • http://www.schneier.com/crypto-gram.html • Top 15 Most Influential People in Security • http://www.eweek.com/c/a/Security/The-15-Most-Influential- People-in-Security-Today/ www.ee.surrey.ac.uk/CCSR
  • 11.
    Global Security Wars http://www.youtube.com/watch?v=Tkcxi-D5_C0 www.ee.surrey.ac.uk/CCSR
  • 12.
    Thank You ! Discussions ? www.ee.surrey.ac.uk/CCSR