1 / 22

Cybersecurity & Current Global Challenges

Cybersecurity & Current Global Challenges. Presenter: Muhammad Zubair Warsaji Project Manager Systems Integration - GTR. The Digital Universe.

Download Presentation

Cybersecurity & Current Global Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity & Current Global Challenges Presenter: Muhammad Zubair Warsaji Project Manager Systems Integration - GTR

  2. The Digital Universe It was 29th, October 1969 when researchers at University of California, Los Angeles were able to transmit the first electronic message from one of their computers (SDS Sigma7) to another host computer (SRI SDS940) at Standford Research Institute. It was not just data transmission but was actually the birth of a Digital Universe, that we call today as the Cyberspace.

  3. Vital Part of the Cyberspace The major and vital part of this digital population constitutes Infrastructure that is so critical that its incapacitation or sabotage has a direct impact on National, regional and global security. SPACE LAND AIR SEA 1 2 3 4

  4. What is going on in Cyberspace? (Challenges)

  5. Cybercrime Simply speaking – It is Crimes conducted using computer systems / Internet / interconnected digital means Credit card frauds SALAMI ATTACK e - Fund Transfer Frauds PHISHING BOTnets and Zombies Software Piracy …....... Pornography Cyber criminals make more money than drug dealers US DPT Treasury

  6. Cybercrime Shamoon Malware which damaged about 30,000+ computers of Saudi’s Aramco Oil company on August 15th, 2012 deleting their files and halting their operations. It took Aramco 10 days to restore their internal network.  Here ten days for one of the world’s top most oil production companies mean a loss of hundreds of millions of dollars.

  7. Cybercrime statistics 2012

  8. What is going on in Cyberspace?

  9. Cyberhactivism Hacktivists are Politically motivated Hackers and they conduct coordinated Cyber Attacks – Not Motivated by Money OP#Israel OP#Syria OP#Eygpt OP#NSA

  10. Cyberhactivism

  11. Cyberhactivism

  12. Cyberhactivism BUT Hacktivism still Continues OP#NSA Has recently started

  13. Afghan Cyberspace under Terrorist Attacks Hackers are always trying to establish their nest in a country where the network gateways are open. If we do not take this issue seriously, we fear that one day Afghanistan would become a safe heaven for hackers across the world to launch their attacks. Mohammad Aimal Marjan – DG ICT MCIT In a Interview with BBC Farsi March 15th, 2012 Web Attacks DDOS Zombies

  14. Cyberespionage Government Espionage Industrial Espionage Corporate Espionage Symantec Corporation Internet Security Threat Report 2013 :: Volume 18

  15. Cyberwarfare Today Cyberspace has become so critical to military, that it is counted in the same category of importance as land, air, sea and space. Who would have thought that one day this digital universe would become so critical that Pentagon would recognize it as “the fifth domain of warfare”

  16. What does US say about Cyberspace? Leon Panetta, the US defense secretary said in an interview, “There’s no question that if a cyber attack, you know, crippled our power grid in this country, took down our financial systems, took down our government systems, that would constitute an act of war.”

  17. Cyberwarfare Stuxnet and the use of multiple Zero-Day attacks on Industrial Control Systems. – Used many Zero-Day exploits so that it would not attack the second time STUXNET Elder Wood Gang STUXNET Command and Control Center Infected Systems can Talk to Each other Can Control Nuclear Reactors

  18. WHY IS ALL THIS? Increase in Exploit Kits Easy to Use Hackers Swiss Army Knife

  19. Afghanistan is building Security Backbone Afghanistan is adopting high end technology solutions and since the past years, we have been victim of Cyber Attacks from different sources across the region. We are taking every measure to ensure National Information Security. Zmarialai Wafa – Director Info. Sec. & CISO MCIT – Islamic Republic of Afghanistan Cybersecurity Strategy Encryption, Hashing and Digital Signatures everywhere Cybersecurity Policy PKI – For Afghanistan

  20. What to Do? Strategic Approach Onion Model Diversity of Defense Approach Anomaly based Prevention Solutions

  21. What to Do? A blue team of: 1. Solution Architects 2. Programming Wizards 3. Internetwork Experts Deploy “Security that is least visible and most felt” (Turialai Wafa)

  22. Thanks

More Related