270 likes | 282 Views
Learn about the latest cybersecurity challenges in defense including vectors of attack, malware threats, cyber-attack characteristics, and global perspectives. Discover key solutions discussed at the 13th ARF Security Policy Conference by regional defense officials. Explore the importance of public-private sector cooperation, ASEAN initiatives, and enhancing international cybersecurity efforts.
E N D
ARF Defense Officials' Dialogue 13th ARF Security Policy Conference REGIONAL CYBER SECURITY CHALLENGES Dir. NEBUCHADNEZZAR ALEJANDRINO Chief, cybersecurity division Department of national defense P h I l I p p I n e s
5DOMAINS OF MILITARY OPERATIONS
VECTORS OF ATTACK TROJANS CROSS SITE REQUEST FORGERY ARBITRARY FILE DOWNLOADS DNS CHANGES VIRUSES REMOTE STACK BUFFER OVERFLOW MAN IN THE MIDDLE ATTACKS HEAP OVERFLOWS ARBITRARY COMMAND EXECUTION FRANKENMALWARE KEYLOGGERS MALVERTISING BLENDED THREATS ADDRESS BAR SPOOFING CRIMEVERTISING FORMAT STRINGS SHELL UPLOADS FILE OVERWRITE PRIVILEGE ESCALATIONS LOCAL STACK BUFFER OVERFLOW DATA EXFILTRATION ADVANCED PERSISTENT THREATS MALWARE SPYWARE REMOTE CODE EXECUTION CODE INJECTIONS SQL INJECTIONS INFORMATION DISCLOSURES SCAREWARE DATA AGGREGATION ATTACKS DENIAL OF SERVICE NULL BYTE INJECTION WORMS STACK POINTER UNDERFLOW BACKDOORS TOJAN-DOWNLOADERS CROSS SITE SCRIPTING LOCAL FILE INCLUSIONS HTTP PARAMETER POLLUTION ARRAY INTEGER OVERFLOWS FORCED TWEET COOKIE DISCLOSURES ROOTKITS MAN IN THE BROWSER ATTACKS ADWARE DNS POISONING REMOTE CODE INJECTION BUFFER OVERFLOWS OPEN REDIRECTION DIRECTORY TRAVERSALS REMOTE COMMAND EXECUTIONS
CHARACTERISTICS OF CYBER ATTACK BLOODLESS NO BOUNDARIES ACCESSIBLE ASSYMMETRICAL ANONIMITY ATTRIBUTION PROBLEM CHEAP
TOP 10 ARF’S INTERNET USER PENETRATION & INTERNET SPEED http://www.telegraph.co.uk/travel/maps-and-graphics/Mapped-The-world-according-to-Internet-connection-speeds/ http://www.internetlivestats.com/internet-users-by-country/
ARF COUNTRIES AVERAGE INTERNET SPEED http://www.telegraph.co.uk/travel/maps-and-graphics/Mapped-The-world-according-to-Internet-connection-speeds/ http://www.internetlivestats.com/internet-users-by-country/
ACTUAL CYBER ATTACKS REPORTED US vs IRAN ISRAEL vs IRAN AND OTHERS…
STUXNET ONLY COST US$ 1M The Stuxnet virus cost an estimated US$1 million to create and the formerCIA Director Michael Haydensaid “it was sophisticated enough to have required the backing of one or more nation states”. http://www.thenational.ae/business/industry-insights/technology/former-cia-chief-speaks-out-on-iran-stuxnet-attack
“A nation with less wealth can now compete with a nation of more wealth”!
GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Complexity of threats • Dilemma of attribution • State and non-state actors • No common understanding of “cyber” terminology • Public-Private sector cooperation
GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Insufficient R&D • Unavailability of expertise • Public awareness • Civil liberties • Political unity
GLOBAL & REGIONAL CHALLENGES OF COMMON INTEREST • Varying development and priorities • ASEAN way
SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Permanent Coordinating Mechanism • Establish a Robust ASEAN-CERT • Security of the ASEAN Secretariat
SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Create a Cyber Security Hub of Excellence • Creation of a “Cyber-Secured Zone” • Increase Public Awareness and Civil Liberties’ Protection
SOLUTIONS TO GLOBAL AND REGIONAL CHALLENGES • Enhance Defense Cooperation and Law Enforcement • Agree a Common Position on Responsible State Behavior • Further Strengthen International Cooperation
MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations 12th ASEAN TELMIN (Telecommunications & Information Technology Ministers Meeting) 16 November 2012 – Mactan, Cebu, Philippines.
MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations • 1. International and regional collaboration • “Conducive, safe, secured, and trusted environment • 3. Safe and secured fixed and mobile broadband. • 4. Promotion of a secure online environment
MACTAN CEBU DECLARATION Connected ASEAN: Enabling Aspirations • 5. Facilitating robust and resilient information infrastructure • 6. Best practices on data protection • 7. ASEAN CERT Collaboration
Center for Strategic and International Studies www.csis-tech.org http://www.csis-tech.org/cyber-incident-timeline/
Hackmageddon - Information Security Timelines and Statistics www. hackmageddon.com http://www.hackmageddon.com/2016/02/16/january-2016-cyber-attacks-statistics/
ZONE-H UNRESTRICTED INFORMATION zone-h.org/archive/ http://zone-h.org/archive/special=1
LIVE ATTACK MAPS DIGITAL ATTACK MAP WWW.DIGITALATTACKMAP.COM CHECKPOINT THREATCLOUD WWW.CHECKPOINT.COM
ARF Defense Officials' Dialogue 13th ARF Security Policy Conference THANK YOU Dir. NEBUCHADNEZZAR ALEJANDRINO Chief, cybersecurity division Department of national defense P h I l I p p I n e s