Make Web, Not War - Installfest: Extend Your Web Server, Rodney Buike
Web war
-
date post
19-Oct-2014 -
Category
Technology
-
view
610 -
download
1
description
Transcript of Web war
The Shape of New Conflict
Agenda Cyberspace Ecosystem
Cases of Cyber Incidents
Cyberspace Ecosystem Cyberspace: What is It?
Physical Domain/Operating Environment A domain characterized by the use of electronics and the
electromagnetic spectrum to store,modify, and exchange data via networked systems and associated infrastructures -- DOD Definition
Governed by physical laws and rules of code
Electromagnetism & light; protocols and operating systems
Man-made and highly mutable
Cyberspace Ecosystem Threat Source Motivation Threat Action
Hacker, Cracker Challenge Ego Rebellion
Hacking Social Engineering System intrusion Unauthorized system access
Computer Criminal Destruction of information Illegal information disclosure Monetary gain Unauthorized data alteration
Malware Spoofing Cyber stalking Information bribery
Terrorist Blackmail Destruction Exploitaton Revenge
Bomb/Terrorrism Info warfare Denial of servie System penetration System tampering
Cyberspace Ecosystem Threat Source Motivation Threat Action
Industrial Spies (companies, governments)
Competitive advantage Economic espionage
Economic exploitation Information Theft Access to classified, proprietary, and/or technology related information
Insiders (poorly trained, disgruntled, malicious employees)
Curiousity Ego Intelligence Monetary gain Revenge Sin of omissions and commisions
Assault on an employee Blackmail Computer Abuse Fraud nd Theft Falsified and Corrupted data Unauthorized system access
Cyberspace Ecosystem
Crimeware Business Environment
Cyberspace Ecosystem
General Attack Trend
Cyber Conflicts Denying Access
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts
Cases
• Palestinian-Israeli Cyber War (Sep 2000)
• Estonia Web War I (May 2007)
Denying Access
Cyber Conflicts Extorting Money
The Archiveus Case, 2006
Cyber Conflicts Espionage
• Michael and Ruth Haephrati Case
Cyber Conflicts Stealing Information
Cyber Conflicts Stealing Information
Cyber Conflicts Botnets
Prevalence (2006)
• China: 12 million • Netherlands:
1.5 million
Cyber Conflicts Botnets
• Specialist knowledge not required
• Downloadable tools and source codes
Cyber Conflicts Botnets
Auctioned Botnets
• USD 50 – 60 per 1,000 – 2,000 IP
• USD 33 cents per IP
Cyber Conflicts Market Players Impacts to
ISPs Affected profitability = cost –revenue Customer support and abuse management cost
eCommerce companies Costly services CIA of customer data
Software vendors Reputation effects Costly response measures Develoing/testing/applying patches
DNS Registrars Increase number of formal and informal abuse notifications Cost to proving the identity of registrants
End Users Erosion of trust and confidence in the Cyberspace
IP based Networks Disruption/damage to services
Cyber Conflicts
Cyber Conflicts
Way Ahead
Revisit strategy for National Cybersecurity :
(a) reinforces current policy and operational measures to reduce vulnerability in the cyberspace under Philippine jurisdiction;
(b) nurtures a culture of cyber security amongst users and critical sectors; and
(c) strengthens self-reliance in terms of information security technologies and human resources.
Cyberspace: The Shape of New Conflict