Transcript

Agenda Cyberspace Ecosystem

Cases of Cyber Incidents

Cyberspace Ecosystem Cyberspace: What is It?

Physical Domain/Operating Environment A domain characterized by the use of electronics and the

electromagnetic spectrum to store,modify, and exchange data via networked systems and associated infrastructures -- DOD Definition

Governed by physical laws and rules of code

Electromagnetism & light; protocols and operating systems

Man-made and highly mutable

Cyberspace Ecosystem Threat Source Motivation Threat Action

Hacker, Cracker Challenge Ego Rebellion

Hacking Social Engineering System intrusion Unauthorized system access

Computer Criminal Destruction of information Illegal information disclosure Monetary gain Unauthorized data alteration

Malware Spoofing Cyber stalking Information bribery

Terrorist Blackmail Destruction Exploitaton Revenge

Bomb/Terrorrism Info warfare Denial of servie System penetration System tampering

Cyberspace Ecosystem Threat Source Motivation Threat Action

Industrial Spies (companies, governments)

Competitive advantage Economic espionage

Economic exploitation Information Theft Access to classified, proprietary, and/or technology related information

Insiders (poorly trained, disgruntled, malicious employees)

Curiousity Ego Intelligence Monetary gain Revenge Sin of omissions and commisions

Assault on an employee Blackmail Computer Abuse Fraud nd Theft Falsified and Corrupted data Unauthorized system access

Cyberspace Ecosystem

Crimeware Business Environment

Cyberspace Ecosystem

General Attack Trend

Cyber Conflicts Denying Access

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Cyber Conflicts Extorting Money

The Archiveus Case, 2006

Cyber Conflicts Espionage

• Michael and Ruth Haephrati Case

Cyber Conflicts Stealing Information

Cyber Conflicts Stealing Information

Cyber Conflicts Botnets

Prevalence (2006)

• China: 12 million • Netherlands:

1.5 million

Cyber Conflicts Botnets

• Specialist knowledge not required

• Downloadable tools and source codes

Cyber Conflicts Botnets

Auctioned Botnets

• USD 50 – 60 per 1,000 – 2,000 IP

• USD 33 cents per IP

Cyber Conflicts Market Players Impacts to

ISPs Affected profitability = cost –revenue Customer support and abuse management cost

eCommerce companies Costly services CIA of customer data

Software vendors Reputation effects Costly response measures Develoing/testing/applying patches

DNS Registrars Increase number of formal and informal abuse notifications Cost to proving the identity of registrants

End Users Erosion of trust and confidence in the Cyberspace

IP based Networks Disruption/damage to services

Cyber Conflicts

Cyber Conflicts

Way Ahead

Revisit strategy for National Cybersecurity :

(a) reinforces current policy and operational measures to reduce vulnerability in the cyberspace under Philippine jurisdiction;

(b) nurtures a culture of cyber security amongst users and critical sectors; and

(c) strengthens self-reliance in terms of information security technologies and human resources.

Cyberspace: The Shape of New Conflict

top related