cyber attacks

28
CYBER ATTACKS Jacky Altal

Upload: davis

Post on 10-Jan-2016

64 views

Category:

Documents


2 download

DESCRIPTION

Jacky Altal. Cyber Attacks. T O C. Hackers Terminology Cyber attacks in 2012 (so far…) Nations Conflict Cyber Motives Characteristics of CyberCrime DEMO – Client Side Attacks. Layer I The best of the best Ability to find Vulnerabilities - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyber Attacks

CYBER ATTACKSJacky Altal

Page 2: Cyber Attacks

T O C

Hackers Terminology Cyber attacks in 2012 (so far…) Nations Conflict Cyber Motives Characteristics of CyberCrime DEMO – Client Side Attacks

Page 3: Cyber Attacks

The Hacker Terminology

Layer IThe best of the bestAbility to find VulnerabilitiesAbility to write exploit code and tools to override security measures

Layer IIIT SavvyAbility to write scriptsUnderstand vulnerability and how they work

Layer IIIScript KiddieAbility to download tools from the internetDon’t have knowledge or willing to understand technology

Page 4: Cyber Attacks

Cyber Attacks

Cyber attacks accompany physical attacks (Stuxnet)

Cyber attacks are increasing in volume, sophistication, and coordination

Cyber attacks are attracted to high-value targets (Sony, stratfort, Special Forces, CIA, FBI etc.)

Page 5: Cyber Attacks

Cyber Attacks

Page 6: Cyber Attacks

Cyber Attacks

Page 7: Cyber Attacks

Cyber Attacks

Page 8: Cyber Attacks

Cyber Attacks

Page 9: Cyber Attacks

Cyber Attacks

Page 10: Cyber Attacks

Cyber Attacks

Page 11: Cyber Attacks

Cyber Attacks

Page 12: Cyber Attacks

Physical  Conflicts and Cyber  Attacks

The  Pakistan/India Conflict The Israel/(Palestinian, Turkish) Conflict The Former Republic of Yugoslavia

(FRY)/NATO Conflict in Kosovo The U.S. – China Surveillance Plane

Incident The Turkish/France Conflict

Page 13: Cyber Attacks

Cyber Threats

Against users, system administrators, hardware and software manufacturers.

Against documentation which includes confidential user information for hardware and software, administrative procedures, and policy documents, supplies that include paper and even printer cartridges

A cyber threats is an intended or unintended illegal activity, an unavoidable or inadvertent event that has the potential or could lead to unpredictable, unintended, and adverse consequences on a cyberspace resource.

Page 14: Cyber Attacks

Most cyber attacks can be put in one of the following categories:Natural or Inadvertent attack – including things

like accidents originating from natural disaster like fire, floods, windstorms, and they usually occur very quickly without warning, and are beyond human capacity, often causing serious damage

Human blunders, errors, and omissions – including things like unintentional human actions

Intentional Threats like illegal or criminal acts from either insiders or outsiders, recreational hackers, and criminal

Page 15: Cyber Attacks

Types of e-attacks:Penetration Attack Type -involves breaking into

a system using known security vulnerabilities to gain access to any cyberspace resource –○ There is steady growth of these attacks – see the

CERT

Denial of Service Attacks – they affect the system through diminishing the system’s ability to function, capable of bringing a system down without destroying its resources.

Page 16: Cyber Attacks

Motives of E-attacksRevenge Joke/Hoax/Prank The Hacker's Ethics Terrorism Political and Military Espionage Business ( Competition) Espionage Hate (national origin, gender, and race)Personal gain/Fame/Fun/Notoriety Ignorance

Page 17: Cyber Attacks

Potential  Cyber AttacksUnauthorized IntrusionsDefacementsDomain Name Server AttacksDistributed Denial of Service AttacksComputer Worms – Zeus, StuxnetRouting OperationsCritical InfrastructuresCompound Attacks

Page 18: Cyber Attacks

Critical  InfrastructuresCritical  infrastructures include gas, power, water, 

banking and finance, transportation, communications

All dependent to some degree on information systems

Insider threat - specialized skills Network attack – default passwords, unprotected

device, un updated system.

Page 19: Cyber Attacks

Topography of Attacks One-to-One One-to-Many Many-to-One Many-to-Many

Analysis of the motives and reasons why such attacks occur.

Study the most current security threats.

Page 20: Cyber Attacks

Vulnerability Types 

Computer basedPoor passwordsLack of appropriate protection/or improperly configured

protection Network based

Unprotected or unnecessary open entry points Personnel based

Temporary/staff firingsDisgruntled personnelLack of training

Facility basedServers in unprotected areasInadequate security policies

Page 21: Cyber Attacks

DEMO – Client Side Attack

Page 22: Cyber Attacks

The dark net / dark side of the internet

Page 23: Cyber Attacks

The dark net / dark side of the internet

Page 24: Cyber Attacks

The dark net / dark side of the internet

Page 25: Cyber Attacks

The dark net / dark side of the internet

Page 26: Cyber Attacks

The dark net / dark side of the internet

Page 27: Cyber Attacks

How to handle cyber threat System-Aware Cyber Security Architecture

Addresses supply chain and insider threatsEmbedded into the system to be protectedIncludes physical systems as well as information

systems Requires system engineering support tools for

evaluating architectures factors To facilitate reusability requires establishment of

candidate Design Pattern Templates and initiation of a design librarySecurity DesignSystem Impact Analyses

Page 28: Cyber Attacks

THANKS FOR LISTENNING

[email protected]