230 likes | 427 Views
Cybersecurity & Current Global Challenges. Presenter: Muhammad Zubair Warsaji Project Manager Systems Integration - GTR. The Digital Universe.
E N D
Cybersecurity & Current Global Challenges Presenter: Muhammad Zubair Warsaji Project Manager Systems Integration - GTR
The Digital Universe It was 29th, October 1969 when researchers at University of California, Los Angeles were able to transmit the first electronic message from one of their computers (SDS Sigma7) to another host computer (SRI SDS940) at Standford Research Institute. It was not just data transmission but was actually the birth of a Digital Universe, that we call today as the Cyberspace.
Vital Part of the Cyberspace The major and vital part of this digital population constitutes Infrastructure that is so critical that its incapacitation or sabotage has a direct impact on National, regional and global security. SPACE LAND AIR SEA 1 2 3 4
Cybercrime Simply speaking – It is Crimes conducted using computer systems / Internet / interconnected digital means Credit card frauds SALAMI ATTACK e - Fund Transfer Frauds PHISHING BOTnets and Zombies Software Piracy …....... Pornography Cyber criminals make more money than drug dealers US DPT Treasury
Cybercrime Shamoon Malware which damaged about 30,000+ computers of Saudi’s Aramco Oil company on August 15th, 2012 deleting their files and halting their operations. It took Aramco 10 days to restore their internal network. Here ten days for one of the world’s top most oil production companies mean a loss of hundreds of millions of dollars.
Cyberhactivism Hacktivists are Politically motivated Hackers and they conduct coordinated Cyber Attacks – Not Motivated by Money OP#Israel OP#Syria OP#Eygpt OP#NSA
Cyberhactivism BUT Hacktivism still Continues OP#NSA Has recently started
Afghan Cyberspace under Terrorist Attacks Hackers are always trying to establish their nest in a country where the network gateways are open. If we do not take this issue seriously, we fear that one day Afghanistan would become a safe heaven for hackers across the world to launch their attacks. Mohammad Aimal Marjan – DG ICT MCIT In a Interview with BBC Farsi March 15th, 2012 Web Attacks DDOS Zombies
Cyberespionage Government Espionage Industrial Espionage Corporate Espionage Symantec Corporation Internet Security Threat Report 2013 :: Volume 18
Cyberwarfare Today Cyberspace has become so critical to military, that it is counted in the same category of importance as land, air, sea and space. Who would have thought that one day this digital universe would become so critical that Pentagon would recognize it as “the fifth domain of warfare”
What does US say about Cyberspace? Leon Panetta, the US defense secretary said in an interview, “There’s no question that if a cyber attack, you know, crippled our power grid in this country, took down our financial systems, took down our government systems, that would constitute an act of war.”
Cyberwarfare Stuxnet and the use of multiple Zero-Day attacks on Industrial Control Systems. – Used many Zero-Day exploits so that it would not attack the second time STUXNET Elder Wood Gang STUXNET Command and Control Center Infected Systems can Talk to Each other Can Control Nuclear Reactors
WHY IS ALL THIS? Increase in Exploit Kits Easy to Use Hackers Swiss Army Knife
Afghanistan is building Security Backbone Afghanistan is adopting high end technology solutions and since the past years, we have been victim of Cyber Attacks from different sources across the region. We are taking every measure to ensure National Information Security. Zmarialai Wafa – Director Info. Sec. & CISO MCIT – Islamic Republic of Afghanistan Cybersecurity Strategy Encryption, Hashing and Digital Signatures everywhere Cybersecurity Policy PKI – For Afghanistan
What to Do? Strategic Approach Onion Model Diversity of Defense Approach Anomaly based Prevention Solutions
What to Do? A blue team of: 1. Solution Architects 2. Programming Wizards 3. Internetwork Experts Deploy “Security that is least visible and most felt” (Turialai Wafa)