Top Banner
The Shape of New Conflict
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 2: Web war

Agenda Cyberspace Ecosystem

Cases of Cyber Incidents

Page 3: Web war

Cyberspace Ecosystem Cyberspace: What is It?

Physical Domain/Operating Environment A domain characterized by the use of electronics and the

electromagnetic spectrum to store,modify, and exchange data via networked systems and associated infrastructures -- DOD Definition

Governed by physical laws and rules of code

Electromagnetism & light; protocols and operating systems

Man-made and highly mutable

Page 4: Web war

Cyberspace Ecosystem Threat Source Motivation Threat Action

Hacker, Cracker Challenge Ego Rebellion

Hacking Social Engineering System intrusion Unauthorized system access

Computer Criminal Destruction of information Illegal information disclosure Monetary gain Unauthorized data alteration

Malware Spoofing Cyber stalking Information bribery

Terrorist Blackmail Destruction Exploitaton Revenge

Bomb/Terrorrism Info warfare Denial of servie System penetration System tampering

Page 5: Web war

Cyberspace Ecosystem Threat Source Motivation Threat Action

Industrial Spies (companies, governments)

Competitive advantage Economic espionage

Economic exploitation Information Theft Access to classified, proprietary, and/or technology related information

Insiders (poorly trained, disgruntled, malicious employees)

Curiousity Ego Intelligence Monetary gain Revenge Sin of omissions and commisions

Assault on an employee Blackmail Computer Abuse Fraud nd Theft Falsified and Corrupted data Unauthorized system access

Page 6: Web war

Cyberspace Ecosystem

Crimeware Business Environment

Page 7: Web war

Cyberspace Ecosystem

General Attack Trend

Page 8: Web war

Cyber Conflicts Denying Access

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Page 9: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 10: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 11: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 12: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 13: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 14: Web war

Cyber Conflicts

Cases

• Palestinian-Israeli Cyber War (Sep 2000)

• Estonia Web War I (May 2007)

Denying Access

Page 15: Web war

Cyber Conflicts Extorting Money

The Archiveus Case, 2006

Page 16: Web war

Cyber Conflicts Espionage

• Michael and Ruth Haephrati Case

Page 17: Web war

Cyber Conflicts Stealing Information

Page 18: Web war

Cyber Conflicts Stealing Information

Page 19: Web war

Cyber Conflicts Botnets

Prevalence (2006)

• China: 12 million • Netherlands:

1.5 million

Page 20: Web war

Cyber Conflicts Botnets

• Specialist knowledge not required

• Downloadable tools and source codes

Page 21: Web war

Cyber Conflicts Botnets

Auctioned Botnets

• USD 50 – 60 per 1,000 – 2,000 IP

• USD 33 cents per IP

Page 22: Web war

Cyber Conflicts Market Players Impacts to

ISPs Affected profitability = cost –revenue Customer support and abuse management cost

eCommerce companies Costly services CIA of customer data

Software vendors Reputation effects Costly response measures Develoing/testing/applying patches

DNS Registrars Increase number of formal and informal abuse notifications Cost to proving the identity of registrants

End Users Erosion of trust and confidence in the Cyberspace

IP based Networks Disruption/damage to services

Page 23: Web war

Cyber Conflicts

Page 24: Web war

Cyber Conflicts

Page 25: Web war

Way Ahead

Revisit strategy for National Cybersecurity :

(a) reinforces current policy and operational measures to reduce vulnerability in the cyberspace under Philippine jurisdiction;

(b) nurtures a culture of cyber security amongst users and critical sectors; and

(c) strengthens self-reliance in terms of information security technologies and human resources.

Page 26: Web war

Cyberspace: The Shape of New Conflict