Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber...

13
Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast April 29, 2010

Transcript of Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber...

Preparing for a Cyber Attack

By Jeffrey CarrCEO and Founder, GreyLogic.us

Author, "Inside Cyber Warfare" (O'Reilly Media, 2009)

O'Reilly Gov 2.0 WebcastApril 29, 2010

Cyber Landscape

Source: DHS, "Securing the Nation’s Critical Cyber Infrastructure

Threat Vectors

Computer network attacks Cyber espionage Cyber terrorism Cyber crime Network infiltration of Critical Infrastructure Repression of Internal Opposition Groups Hybrid warfare Information warfare

Actors

State

State-Sponsored

Non-State

State ActorsDefinition: Nation States who engage in one or more types of cyber

operations

Russian Federation Kyrgyzstan

Ukraine Estonia

Georgia Ingushetia

Peoples Republic of China

Taiwan

Israel Iran

Palestinian National Authority (Hamas)

Myanmar (Burma)

U.S. Turkey

Pakistan Germany

Zimbabwe Australia

State-Sponsored Actors

Definition: Non-state actors who are engaged by States to perform one or more types of cyber operations.

Partial list of States known to or suspected of sponsoring Actors

Russian Federation

Peoples Republic of China

Turkey

Iran

United States

Myanmar

Israel

Non-State Actors

Definition: Non-state actors who engage in cyber crime and/or patriotic hacking (aka hacktivists)

Too numerous too list

Cyber Self Defense

You cannot protect all your dataYou cannot stop every attack

Therefore,1) Reduce your attack surface2) Segregrate and protect your critical data3) Establish access norms and monitor for anomalies4) When you are attacked, report it. Transparency = Security

R&D Priorities: RF, PRCRussian Federation Peoples Republic of China

Nanoelectronics Core electronic components

Cloud computing High end generic chips

Cognitive systems and robotics

Extra large scale integrated chips

Digital libraries Next gen wireless mobile comms

ICT for patient safety, Large scale oil, gas, and coal mining

Semiconductor components and miniaturization systems

Water pollution control and treatment

Photonics

Contact Jeffrey Carr

Blog: http://IntelFusion.net Website: http://Greylogic.us Skype: greylogic Email: [email protected]

Extra Slides

Initiate an Active Defense Posture

Source: Verdasys Enterprise Information Protection

Data Exfiltration Operation

Source: Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009, p. 61)