Top Banner
Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast April 29, 2010
13

Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Dec 17, 2015

Download

Documents

Jeremy Cannon
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Preparing for a Cyber Attack

By Jeffrey CarrCEO and Founder, GreyLogic.us

Author, "Inside Cyber Warfare" (O'Reilly Media, 2009)

O'Reilly Gov 2.0 WebcastApril 29, 2010

Page 2: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Cyber Landscape

Source: DHS, "Securing the Nation’s Critical Cyber Infrastructure

Page 3: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Threat Vectors

Computer network attacks Cyber espionage Cyber terrorism Cyber crime Network infiltration of Critical Infrastructure Repression of Internal Opposition Groups Hybrid warfare Information warfare

Page 4: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Actors

State

State-Sponsored

Non-State

Page 5: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

State ActorsDefinition: Nation States who engage in one or more types of cyber

operations

Russian Federation Kyrgyzstan

Ukraine Estonia

Georgia Ingushetia

Peoples Republic of China

Taiwan

Israel Iran

Palestinian National Authority (Hamas)

Myanmar (Burma)

U.S. Turkey

Pakistan Germany

Zimbabwe Australia

Page 6: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

State-Sponsored Actors

Definition: Non-state actors who are engaged by States to perform one or more types of cyber operations.

Partial list of States known to or suspected of sponsoring Actors

Russian Federation

Peoples Republic of China

Turkey

Iran

United States

Myanmar

Israel

Page 7: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Non-State Actors

Definition: Non-state actors who engage in cyber crime and/or patriotic hacking (aka hacktivists)

Too numerous too list

Page 8: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Cyber Self Defense

You cannot protect all your dataYou cannot stop every attack

Therefore,1) Reduce your attack surface2) Segregrate and protect your critical data3) Establish access norms and monitor for anomalies4) When you are attacked, report it. Transparency = Security

Page 9: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

R&D Priorities: RF, PRCRussian Federation Peoples Republic of China

Nanoelectronics Core electronic components

Cloud computing High end generic chips

Cognitive systems and robotics

Extra large scale integrated chips

Digital libraries Next gen wireless mobile comms

ICT for patient safety, Large scale oil, gas, and coal mining

Semiconductor components and miniaturization systems

Water pollution control and treatment

Photonics

Page 10: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Contact Jeffrey Carr

Blog: http://IntelFusion.net Website: http://Greylogic.us Skype: greylogic Email: [email protected]

Page 11: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Extra Slides

Page 12: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Initiate an Active Defense Posture

Source: Verdasys Enterprise Information Protection

Page 13: Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Data Exfiltration Operation

Source: Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009, p. 61)