ciber conflictos y ciber defensa - · pdf filerespuesta y manejo de incidentes x x stride ......
Post on 06-Feb-2018
224 Views
Preview:
TRANSCRIPT
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 1
Ciber conflictos y Ciber defensa Conceptos y retos
Jeimy J. Cano M., Ph.D, CFE
JCM-14 All rights reserved 1
Agenda
• Introducción
• Algunos apuntes sobre ciber seguridad
• Teoría básica de los conflictos
• Teoría básica de los ciber conflictos
• Analizando el territorio de los ciber
conflictos
• Retos para la ciber defensa
• Conclusiones
• Referencias
JCM-14 All rights reserved 2
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 2
Introducción
JCM-14 All rights reserved 3
Introducción
JCM-14 All rights reserved 4
http://paulsparrows.files.wordpress.com/2014/07/techniques-june-2014.png Tomado de: http://blog.thomsonreuters.com/index.php/tag/cyber-attacks/
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 3
Algunos apuntes sobre ciberseguridad
JCM-14 All rights reserved 5
Algunos apuntes sobre ciber seguridad
JCM-14 All rights reserved 6
Tomado de: ISO 27032 – Information Technology- Security
Techniques – Guidelines for cybersecurity.
Security Safety Security+Safety
“Evitar que el
mundo exterior
afecte al sistema”
“Evitar que el
sistema afecte al
mundo exterior”
“Asegurar que el
sistema siga
operando, sin
afectar el mundo
exterior, a pesar
de los ataques”
Sistema
Mundo
Exterior
Ataques
Impactos
y daños
Impactos
y daños
Ataques
Mundo
Exterior
Tomado de: ALXELROD, W.C (2013) Engineering Safe and Secure Software
Systems. Artech House
Ciberseguridad
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 4
Algunos apuntes sobre ciber seguridad
JCM-14 All rights reserved 7
Amenaza Definición Principio y/o
servicio de
seguridad
Spoofing Suplantar algo o alguien. Autenticación
Tampering Modificar o alterar algo en
disco, en la red o en la
memoria Integridad
Repudiation Negarse a aceptar que ha
efectuado una acción. No repudio
Information Disclosure Revelar información a una
persona no autorizada Confidencialidad
Denial of Service Consumir los recursos que
son requeridos para
prestar el servicio Disponibilidad
Elevation of Privilege Permitir a otra persona o
proceso hacer algo que no
tiene autorizado hacer Autorización
Modelo de Amenazas STRIDE. (Adaptado de SHOSTACK 2014, pág. 63)
Controles Críticos del SANS Institute
Versión 5 TI OT STRIDE
Inventario de dispositivos autorizados y
no autorizados X ST
Inventario de software autorizados y no
autorizados X ST
Configuraciones seguras para hardware
y software en dispositivos móviles,
ordenadores portátiles, estaciones de
trabajo y servidores
X TE
Remediación y Evaluación continua de
vulnerabilidades X STRIDE
Defensas frente al malware X T Seguridad en las aplicaciones X STRIDE Control de acceso inalámbrico X S Capacidad de recuperación de datos X X D Evaluación de Habilidades y formación
adecuadas en seguridad X STRIDE
Configuraciones seguras para los
dispositivos de red, tales como firewalls,
routers y switches X ST
Limitación y control de los puertos de
red, protocolos y servicios X X ST
Uso controlado de privilegios
administrativos X X STR
Validación de flujos de información entre
componentes X STRIDE
Mantenimiento, Monitoreo y Análisis de
Registros de auditoría X E
Acceso controlado con base en la
necesidad de conocer X S
Supervisión y control de cuentas de
acceso X X SIE
Protección de datos X I Respuesta y Manejo de Incidentes X X STRIDE Diseño de redes confiables X STRIDE Pruebas de Penetración y simulaciones
de ataques X STRIDE
Tabla - Vista de Controles SANS, TI, OT y STRIDE
Algunos apuntes sobre ciber seguridad
JCM-14 All rights reserved 8
Tomado de: Hathaway, Melissa. "Cyber Readiness Index 1.0." Paper, Science, Technology, and Public Policy Program, Belfer
Center for Science and International Affairs, Harvard Kennedy School, November 8, 2013.
Índice de preparación frente a la ciberseguridad
Establecer la
autoridad en el tema
a nivel nacional
Establecer el equipo
que dará respuesta a
los incidentes de
alcance nacional e
internacional
Contar con la
articulación jurídica y
los protocolos
internacionales para
la persecución de los
delitos informáticos
Establecer protocolos y
estrategias para compartir
información sensible para
incrementar la capacidad
de respuesta y
preparación de las
empresas y país.
Establecer los niveles
de inversión y las
capacidades requeridas
para producir
estándares y prácticas
relevantes en el
contexto actual y en el
futuro
Estrategia Nacional de Ciberseguridad
Equipo de atención de respuesta a incidentes
Compromiso en la lucha contra el cibercrimen
Mecanismos para compartir información
Investigación y desarrollo en ciberseguridad
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 5
Teoría básica de los conflictos
JCM-14 All rights reserved 9
Teoría básica de los conflictos
JCM-14 All rights reserved 10
Territorio
Activos
Estratégicos
Población
civil
Bando A
Bando B
Considerando las reflexiones de diferentes
analistas internacionales, podríamos definir
que un conflicto es:
“Es un enfrentamiento de dos o más posiciones
(generalmente estados) por poder, dinero y
control de activos o recursos estratégicos
ubicados en un territorio (con una población
civil), donde los adversarios son conocidos, así
como sus capacidades e intenciones para
debilitar o dominar a su contraparte.”
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 6
Teoría básica de los conflictos
JCM-14 All rights reserved 11
Bando A
Bando B
Territorio
Actividades, Operaciones, Ataques
Activos
Estratégicos
Población
civil
Armas
Tropas
Doctrina
Estrategias
Capacidades
Armas
Tropas
Doctrina
Estrategias
Capacidades
Teoría básica de los conflictos
JCM-14 All rights reserved 12
Bando A
Bando B
Territorio
Actividades, Operaciones, Ataques
Activos
Estratégicos
Población
civil
¿Qué busca?
Defender
Proteger
Debilitar
Dominar
¿Qué busca?
Defender
Proteger
Debilitar
Dominar
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 7
Teoría básica de los conflictos
JCM-14 All rights reserved 13
Territorio
Activos
Estratégicos
Población
civil
Bando A
Bando B
Capacidades
Generales Definición
Defensivas Proteger e incrementar su posición estratégica
en el dominio de operación.
Ofensivas Debilitar, comprometer, dañar o dominar su
contraparte.
Disuasivas Desanimar a su contraparte para efectuar
ataques en su contra.
Diplomáticas Negociar a través de reglas y protocolos para
cesar las hostilidades entre las partes.
Inteligencia
Recolectar y analizar información clave para
generar ventajas estratégicas, tácticas y
operativas frente a la contraparte.
Para lograr sus objetivos cada Bando desarrolla
y usa sus capacidades.
Teoría básica de los ciber conflictos
JCM-14 All rights reserved 14
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 8
Ciber conflictos
JCM-14 All rights reserved 15
Ciber espacio
Activos
Estratégicos
Actores
Bando A
Bando B
Considerando las reflexiones previamente
planteadas, podríamos definir que un
ciberconflicto es:
“Es un enfrentamiento de dos o más posiciones
(no necesariamente estatales) por poder, dinero
y control de activos o recursos estratégicos
ubicados en el ciberespacio (con unos actores),
donde los adversarios son desconocidos e
inciertos, así como sus capacidades e
intenciones para debilitar o dominar a su
contraparte.”
Ciber conflictos
JCM-14 All rights reserved 16
Bando A
Bando B
Ciberespacio
Ciber actividades, Ciber operaciones, Ciber ataques
Plataformas
tecnológicas y de
telecomunicaciones
Actores
¿Qué busca?
Defender
Proteger
Debilitar
Dominar
¿Qué busca?
Defender
Proteger
Debilitar
Dominar
Servicios,
Aplicaciones y
contenidos
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 9
Ciber conflictos
JCM-14 All rights reserved 17
Se puede considerar como una campaña que se basa exclusivamente o
principalmente en las operaciones en el ciberespacio (ciber operaciones).
Tomado de Martin Libicki, Ph.D – Rand Corporation
Ciber actividades
Ciber operaciones
Ciber ataques
Ciber guerra
Empleo de ciber capacidades cuyo principal propósito es alcanzar un
objetivo en o por el uso del ciber espacio. Tallin Manual – Pág.15
Es una ciber operación, bien sea ofensiva o defensiva, que espera
razonablemente causar lesiones o la muerte a personas o daño o
destrucción de objetos. Tallin Manual – Regla No. 30
Acciones o actividades que ocurren debajo del nivel del “uso de la fuerza”,
como puede ser la cibercriminalidad, modificación de páginas web, difusión
de propaganda terrorista por internet, entre otras. Tallin Manual – Pág.4
Ciber conflictos
JCM-14 All rights reserved 18
ciberespacio
Activos
Estratégicos
Población
civil
Bando A
Bando B
Ciber capacidades Definición
Defensivas Representadas por tecnologías de seguridad y
contramedidas técnicas en operación
Ofensivas Códigos maliciosos a la medida, ciber armas, engaños
técnicos activos o encubiertos, DDoS, entre otros.
Disuasivas
* Acciones ofensivas actuales que responden
inmediatamente a los ataques.
* Acciones ofensivas alternas que son más poderosas
que las actuales.
* Capacidades redundantes para continuar atacando,
aún se haya debilitado o comprometido sus defensas.
* Desarrollo de ciber armamento con capacidades no
conocidas.
Diplomáticas Negociar a través de reglas y protocolos para cesar las
hostilidades entre las partes. (Tallin Manual)
Inteligencia Recolectar y analizar información clave para generar
ventajas estratégicas, tácticas y operativas frente a la
contraparte. (Honeynets abiertas y encubiertas)
Para lograr sus objetivos cada Bando desarrolla
y usa sus ciber capacidades.
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 10
Analizando el territorio de los ciber conflictos
JCM-14 All rights reserved 19
Ciber espacio
JCM-14 All rights reserved 20
Contexto físico
Plataforma tecnológica
Plataforma de telecomunicaciones
Fundamentos lógicos
Software base y especializado
Servicios disponibles
Contenidos
Almacenados Transmitidos Transformados
Actores Entidades y usuarios con diferentes intereses y roles que participan
Adaptado de: CLARK, R. y KNAKE, R. (2010) Cyber war: The next threat to National Security and what to do about it. HarperCollins.
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 11
Ciber espacio
JCM-14 All rights reserved 21
Atemporal e instantáneo
Ubicuo
Permeable
Fluido Participativo
Múltiples identidades
Autoregulado
Características
Del
Ciber espacio
Adaptado de: CHOUCRI, N. (2012) Cyberpolitics in international relations. MIT Press. Pág.4
En todas
partes
Transnacional
Revolución
permanente
Universal y
popular
Anonimato
Neutralidad
Uso de actores no-estatales
JCM-14 All rights reserved 22
Uso de actores
no-estatales para
desarrollar ciber
conflictos
Tomado de: Cyber warfare. Jukko Vankka. National Defence University. Irlanda. 2014
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 12
Ciber ataques
JCM-14 All rights reserved 23
“Acciones no autorizadas realizadas de un
sistema informático a otro, en el cual se
comprometen la confidencialidad, la
integridad y la disponibilidad del objetivo o
la información allí residente.
Adaptado de: Institute for Security Technologies Studies
y Ponemon Institute.
Gráfica tomada de: http://www.time.com/time/business/article/0,8599,2079423,00.html
Empleo de ciber capacidades cuyo principal propósito es
alcanzar un objetivo en o por el uso del ciber espacio.
Tallin Manual – Pág.15
Ciber ataques
JCM-14 All rights reserved 24
Profundidad
Am
pli
tud
Superficial Profundo
Amplia
• Lista amplia de objetivos
• Efectos limitados no-destructivos de la
infraestructura digital
• Daños colaterales limitados
• Lista amplia de objetivos, asociados
con infraestructura crítica
• Efectos ilimitados destructivos tanto
de la infraestructura digital como de
la física y pérdidas humanas
• Daños colaterales impredecibles
Cerrada
• Limitada cantidad de objetivos
• Efectos limitados no-destructivos de la
infraestructura digital
• Daños colaterales limitados
• Objetivos seleccionados
• Efectos ilimitados destructivos tanto
de la infraestructura digital como de
la física y pérdidas humanas
• Daños colaterales pero predecibles
Tomado de: Naval Postgraduate School (2014) Deterrence and cyber-weapons. Pág.26
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 13
Ciber armas
JCM-14 All rights reserved 25 Gráfica y texto tomado de: http://hackmageddon.com/2012/04/22/what-is-a-cyber-weapon/
Precisión - Capacidad de
atacar sólo el objetivo
específico y reducir los daños
colaterales.
Intrusión - Nivel de
penetración en el interior del
objetivo.
Visibilidad - Capacidad de ser
detectados.
Facilidad de implementar -
Recursos necesarios para
desarrollar el arma informática
específica.
Ciber armas
JCM-14 All rights reserved 26
Características de
las ciber armas
Invisibilidad
Componentes no detectables
Remoción de rastros
Desactivación/Autodestrucción
Mutación, Expansión y ocultamiento
Operación
Dragonfly
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 14
Retos para la ciber defensa
JCM-14 All rights reserved 27
Riesgo sistémico
Generación C
JCM-14 All rights reserved 28 http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 15
Riesgos Globales
Generación C
JCM-14 All rights reserved 29 http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf
Contexto actual del ciber espacio
JCM-14 All rights reserved 30
Grandes datos y analítica
Redes sociales
Computación móvil
Computación en la nube
Internet de las cosas
Generación C
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 16
Nueva carrera ciber armamentista
JCM-14 All rights reserved 31
Tomado de: http://www.impomag.com/articles/2007/03/protecting-your-plant-attack-how-keep-facilities-safe-physical-or-cyber-aggression
Ciber amenazas
JCM-14 All rights reserved 32
To
ma
do
de
: http
://ww
w.a
lme
nd
ron
.co
m/trib
un
a/la
s-c
ibe
rce
lula
s-u
na
-
ca
pa
cid
ad-p
ara
-la-c
ibe
rse
gu
rida
d-y
-la-c
ibe
rde
fen
sa-n
acio
na
les/
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 17
Ciber riesgos
JCM-14 All rights reserved 33
Lo que conoce
la NACIÓN
Lo que desconoce
la NACIÓN
Lo que conoce
el entorno
Lo que
desconoce
el entorno
Conocidos Latentes
Focalizados Emergentes
Ciber terrorismo, Ciber
espionaje, ciber armas,
Amenazas persistentes
avanzadas, iframes
Ciber crimen, ciber
acoso, ciber fraudes,
ramsonware, fuga de
información
Ciber ataques, ciber
sabotaje, Hacktivismo,
vulnerabilidades
SCADA
Ciber conflictos, Técnicas
de evasión avanzadas,
forensia ofensiva
Ventana de AREM- Instrumento Creado y desarrollado por: Jeimy J. Cano M., Ph.D
Desarrollo y aplicación de ciber capacidades
JCM-14 All rights reserved 34
Postura Defensiva. Tomado de: http://www.linkedin.com/today/post/article/20140321192402-
1699356-defensible-security-posture-part-1 Tomado de: http://www.itu.int/osg/csd/cybersecurity/gca/new-gca-brochure.pdf
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 18
Resiliencia Empresarial y Nacional
JCM-14 All rights reserved 35
http://www.weforum.org/reports/risk-and-responsibility-hyperconnected-world-pathways-global-cyber-resilience
Conclusiones
JCM-14 All rights reserved 36
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 19
Ciber seguridad y Ciber defensa
JCM-14 All rights reserved 37
Ciber seguridad
Estándares y aseguramiento
de su cumplimiento
Regulaciones y normas
Marco de entrenamiento
y formación
Proveedores de Hardware y
software
Responsabilidad ejecutiva
Ciber defensa
Capacidades Ofensivas
Capacidades defensiva
Capacidades disuasivas
Capacidades de Inteligencia
Capacidades diplomáticas
INVESTIGACIÓN, DESARROLLO E
INNOVACIÓN
(I+D+i)
Diferencia entre los conflictos tradicionales y los
ciber conflictos
JCM-14 All rights reserved 38
Conflicto tradicional Ciber conflictos
El espacio del conflicto esta separado de los civiles. El espacio del conflicto es donde los civiles viven y
trabajan.
Las tecnologías ofensivas y defensivas generalmente están
balanceadas.
Las tecnologías ofensivas, con el tiempo, superan a las
tecnologías defensivas.
Se presume y advierte la presencia del adversario. La presencia del adversario es inestable, imperceptible y
generalmente incierta.
Las capacidades de los actores no-estatales es mínima. La capacidad de los actores no-estatales es relativamente
grande.
Las fronteras nacionales son importantes Las fronteras nacionales son irrelevantes
Se entienden con claridad los ataques y el espionaje como
amenazas de seguridad.
No se diferencia con claridad entre un ataque y las
acciones de espionaje.
Los efectos de los conflictos son razonablemente
predecibles.
Los efectos de los conflictos son difíciles de predecir o
controlar.
En consecuencia: Lo que sabemos sobre los conflictos tradicionales no se puede aplicar a los ciber conflictos
Adaptado de: LIN, H. (2014) Thoughts on cyber conflict and cyber warfare. Presentación Curso. Cybersecurity: The
intersection of policy and technology. Harvard Kennedy School. Jul 27-Ago 1.
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 All rights reserved Vista
Ciber conflictos y Ciber defensa 20
Referencias • CHOUCRI, N. (2012) Cyberpolitics in international relations. MIT Press.
• CLARK, R. y KNAKE, R. (2010) Cyber war: The next threat to National Security and what to do
about it. HarperCollins.
• MIRO LIINARES, F. (2012) El cibercrimen. Fenomenología y criminología de la delincuencia en el
ciberespacio. Ed. Macial Pons.
• CANO, J. (2013) La ventana de AREM. Una herramienta estratégica y táctica para visualizar la
incertidumbre. Blog IT-Insecurity. Disponible en: http://insecurityit.blogspot.com/2013/06/la-
ventana-de-arem-una-herramienta.html
• SEGURA SERRANO, A. y GORDO GARCÍA, F. (Coords) (2013) Ciberseguridad global.
Oportunidades y compromisos en el uso del ciberespacio. Universidad de Granada.
• STRAND, J. y ASADOORIAN, P. (2013) Offensive countermeasures: The art of active defense.
<sin editorial>
• NAVAL POSTGRADUATE SCHOOL (2014) Deterrence and cyber-weapons. Master Thesis.
• ALXELROD, W.C (2013) Engineering Safe and Secure Software Systems. Artech House.
• SHOSTACK, A. (2014) Threat modeling. Designing for security. John Wiley & Sons. Boulevard,
Indianapolis.
• MOWBRAY, T. (2014) Cybersecurity. Managing systems, conducting testing, and investigating
intrusions. John Wiley & Sons. Indianapolis.
JCM-14 All rights reserved 39
Jeimy J. Cano M., Ph.D, CFE
Blog:
http://insecurityit.blogspot.com
JCM-14 All rights reserved 40
Ciber conflictos y Ciber defensa Conceptos y retos
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
JCM-14 * All rights reserved
top related