CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the...

18
CYBERSPACE, CYBERSECURITY & CYBERDEFENSE (DEVELOPMENT BASIS FOR AN INTEGRATED CYBERDEFENSE SYSTEM) CAPITAN DE NAVIO PABLO DANIEL SORRENTINO

Transcript of CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the...

Page 1: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

CYBERSPACE, CYBERSECURITY &

CYBERDEFENSE

(DEVELOPMENT BASIS FOR AN INTEGRATED CYBERDEFENSE SYSTEM)

CAPITAN DE NAVIO PABLO DANIEL SORRENTINO

Page 2: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in
Page 3: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in
Page 4: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in
Page 5: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in
Page 6: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

ATTACK ON DATA NETWORKS (ARD)

MEASURES TAKEN THROUGH THE USE OF COMPUTER NETWORKS TO DISRUPT, DENY, DEGRADE OR DESTROY INFORMATION HELD IN WORKSTATIONS AND COMPUTER NETWORKS OF THE ADVERSARY, OR WORKSTATIONS AND NETWORKS THEMSELVES.

CYBERATTACK PROCESS

INFILTRATION MANEUVER ATTACK

RECOGNITION

EXPLORATION

ACCESS

EXFILTRATION

ASSAULT

SUSTENTATION

Page 7: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

RECOGNITION

PUBLIC INFORMATION , WEB SITES & WEBS SERVERS

SOCIAL MEDIA – PIPL.COM – PHISHING – INDUCTION – EXTORTION – GARBAGE REVISION.

SEARCH ENGINES, GOOGLE HACKING, WHOIS.

DNS NSLOOKUP – DNSQUERY.ORG - DNSENUM

METADATA METAGOOFIL – EXFILTOOL – STRINGS – MALTEGO (DATA MINING)

Page 8: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

EXPLORATION

INFRASTRUCTURE DISCOVERY

PORT SCANNING

SERVICES INTERROGATION

OPERATING SYSTEMAS

VULNERABILITY EVALUATION

NMAP NESSUS

METAEX CANVAS

Page 9: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

ACCESS AND PRIVILEGE ESCALATION

AD

MIN

USER LEVEL N

:

USER LEVEL 2

USER LEVEL 1

UNAUTHENTICATED USER

HYDRA JHON THE RIPPER METAEXPL CANVAS

Page 10: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

•CONFIDENTIALITY •AVAILABILITY

ATTACK •HARDWARE •SOCIAL ENGINEERING

PHYSICAL RESOURCES

•NETCAT •OPENPUFF •OUTGUESS •BACKDOORS

LOGICAL RESOURCES

EXFILTRATION

Page 11: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

ASSAULT

• INFRAESTRUCTURE • PHYSICAL & LOGICAL • PLC • APT • SYN FLOOD • ICPM FLOOD • SMURF , UDP FLOOD

• SCADA ATTACK • HARDWARE • SOFTWARE • SIS. OPERATIVOS • APLICACIONES

• STACHELDARHT • DOS • DDOS • SYN FLOOD • ICPM FLOOD • SMURF • UDP FLOOD

• CAIN Y ABEL • ETTERCAP • NETCAT • MAN IN THE MIDDLE • ARP SPOFFING • DNS SPOFFING • WEB SPOFFING • MAIL SPOFFING • GPS SPOFFING • I P VOICE SPOFFING

DECEPTION DENEGATION

DEGRADATION DESTRUCTION

EFECT

Page 12: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

SUSTENTATION

CONCEALMENT

TOR

BIT BLINDER

PERFECT DARK

Page 13: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

PREDICTION

PREVENTION DETECTION

RESPONSE

CYBER DEFENSE CYCLE

CYBER INTELLIGENCE

* ACCESS CONTROL * SECURITY POLICIES * AUDIT

* MALWARE * APT *ANALITIC SECURITY

* CERT * CYBER OPs

Page 14: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

COMMUNICATIONS SECURITY (CRYPTOGRAPHIC SYSTEMS)

PERIMETER DEFENSE

ACCESS CONTROL

MALWARE ATTACKS

EXFILTRATION

APT ANALYSIS

C.OPs

ACTUAL FOCUS CYBER DEFENSE

Page 15: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

CICLO DE CIBERDEFENSA CYBER DEFENSE

CENTER

MALWARE PROTECTION

ACCESS CONTROL

APT PROTECTION

INTERNET

INTRANET

Page 16: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

DOCTRINE & REGULATIONS DEPARTMENT

CRYPTOSYSTEMS DEPARTMENT

SISG

CYBER DEFENSE DEPARTMENT

DIRECT CYBER DEFENSE

Ciberdefensa Directa INDIRECT CYBER

DEFENSE AUDIT

CYBER DEFENSE CENTRE

CERT DEPARTMENT

INSPECTION & CONTROL

PROJECTS

Page 17: CYBERSPACE, CYBERSECURITY CYBERDEFENSE · attack on data networks (ard) measures taken through the use of computer networks to disrupt, deny, degrade or destroy information held in

DEFENSE MINISTRY

JOINT CYBER COMMAND

ARMY CYBER COMMAND

NAVY CYBER COMMAND

AIR FORCE CYBER COMMAND

NATIONAL CERT

STATES CERT

MUNICIPAL CERT

CRITIC INFRAESTRUCTURE

PROTECTION

CYBER SECURITY SECRETARY

COORDINATION ALERTS-INCIDENTS-RESPONSES