1 / 27

Global Cybersecurity Challenges and Solutions in Defense - ARF Security Policy Conference Overview

Learn about the latest cybersecurity challenges in defense including vectors of attack, malware threats, cyber-attack characteristics, and global perspectives. Discover key solutions discussed at the 13th ARF Security Policy Conference by regional defense officials. Explore the importance of public-private sector cooperation, ASEAN initiatives, and enhancing international cybersecurity efforts.

mcbeth
Download Presentation

Global Cybersecurity Challenges and Solutions in Defense - ARF Security Policy Conference Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ARF Defense Officials' Dialogue 13th ARF Security Policy Conference REGIONAL CYBER SECURITY CHALLENGES Dir. NEBUCHADNEZZAR ALEJANDRINO Chief, cybersecurity division Department of national defense P h I l I p p I n e s

  2. I

  3. 5DOMAINS OF MILITARY OPERATIONS

  4. VECTORS OF ATTACK TROJANS CROSS SITE REQUEST FORGERY ARBITRARY FILE DOWNLOADS DNS CHANGES VIRUSES REMOTE STACK BUFFER OVERFLOW MAN IN THE MIDDLE ATTACKS HEAP OVERFLOWS ARBITRARY COMMAND EXECUTION FRANKENMALWARE KEYLOGGERS MALVERTISING BLENDED THREATS ADDRESS BAR SPOOFING CRIMEVERTISING FORMAT STRINGS SHELL UPLOADS FILE OVERWRITE PRIVILEGE ESCALATIONS LOCAL STACK BUFFER OVERFLOW DATA EXFILTRATION ADVANCED PERSISTENT THREATS MALWARE SPYWARE REMOTE CODE EXECUTION CODE INJECTIONS SQL INJECTIONS INFORMATION DISCLOSURES SCAREWARE DATA AGGREGATION ATTACKS DENIAL OF SERVICE NULL BYTE INJECTION WORMS STACK POINTER UNDERFLOW BACKDOORS TOJAN-DOWNLOADERS CROSS SITE SCRIPTING LOCAL FILE INCLUSIONS HTTP PARAMETER POLLUTION ARRAY INTEGER OVERFLOWS FORCED TWEET COOKIE DISCLOSURES ROOTKITS MAN IN THE BROWSER ATTACKS ADWARE DNS POISONING REMOTE CODE INJECTION BUFFER OVERFLOWS OPEN REDIRECTION DIRECTORY TRAVERSALS REMOTE COMMAND EXECUTIONS

  5. CHARACTERISTICS OF CYBER ATTACK BLOODLESS NO BOUNDARIES ACCESSIBLE ASSYMMETRICAL ANONIMITY ATTRIBUTION PROBLEM CHEAP

  6. TOP 10 ARF’S INTERNET USER PENETRATION & INTERNET SPEED http://www.telegraph.co.uk/travel/maps-and-graphics/Mapped-The-world-according-to-Internet-connection-speeds/ http://www.internetlivestats.com/internet-users-by-country/

  7. ARF COUNTRIES AVERAGE INTERNET SPEED http://www.telegraph.co.uk/travel/maps-and-graphics/Mapped-The-world-according-to-Internet-connection-speeds/ http://www.internetlivestats.com/internet-users-by-country/

  8. ACTUAL CYBER ATTACKS REPORTED US vs IRAN ISRAEL vs IRAN AND OTHERS…

  9. STUXNET ONLY COST US$ 1M The Stuxnet virus cost an estimated US$1 million to create and the formerCIA Director Michael Haydensaid “it was sophisticated enough to have required the backing of one or more nation states”. http://www.thenational.ae/business/industry-insights/technology/former-cia-chief-speaks-out-on-iran-stuxnet-attack

  10. “A nation with less wealth can now compete with a nation of more wealth”!

  11. REVOLUTION IN MILITARY AFFAIRS

  12. II

  13. GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Complexity of threats • Dilemma of attribution • State and non-state actors • No common understanding of “cyber” terminology • Public-Private sector cooperation

  14. GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Insufficient R&D • Unavailability of expertise • Public awareness • Civil liberties • Political unity

  15. GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Varying development and priorities • ASEAN way

  16. SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Permanent Coordinating Mechanism • Establish a Robust ASEAN-CERT • Security of the ASEAN Secretariat

  17. SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Create a Cyber Security Hub of Excellence • Creation of a “Cyber-Secured Zone” • Increase Public Awareness and Civil Liberties’ Protection

  18. SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Enhance Defense Cooperation and Law Enforcement • Agree a Common Position on Responsible State Behavior • Further Strengthen International Cooperation

  19. MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations 12th ASEAN TELMIN (Telecommunications & Information Technology Ministers Meeting) 16 November 2012 – Mactan, Cebu, Philippines.

  20. MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations • 1. International and regional collaboration • “Conducive, safe, secured, and trusted environment • 3. Safe and secured fixed and mobile broadband. • 4. Promotion of a secure online environment

  21. MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations • 5. Facilitating robust and resilient information infrastructure • 6. Best practices on data protection • 7. ASEAN CERT Collaboration

  22. III

  23. Center for Strategic and International Studies www.csis-tech.org http://www.csis-tech.org/cyber-incident-timeline/

  24. Hackmageddon - Information Security Timelines and Statistics www. hackmageddon.com http://www.hackmageddon.com/2016/02/16/january-2016-cyber-attacks-statistics/

  25. ZONE-H UNRESTRICTED INFORMATION zone-h.org/archive/ http://zone-h.org/archive/special=1

  26. LIVE ATTACK MAPS DIGITAL ATTACK MAP WWW.DIGITALATTACKMAP.COM CHECKPOINT THREATCLOUD WWW.CHECKPOINT.COM

  27. ARF Defense Officials' Dialogue 13th ARF Security Policy Conference THANK YOU Dir. NEBUCHADNEZZAR ALEJANDRINO Chief, cybersecurity division Department of national defense P h I l I p p I n e s

More Related