SlideShare una empresa de Scribd logo
1 de 24
What is it? And what is its importance?
Cyber-Warfare:

       ▪ is the use of computers and the Internet in
         conducting warfare in cyberspace.




       V.S.
    Information Security:

       ▪ protecting information and information systems from unauthorized
         access, use, disclosure, disruption, modification or destruction.
The ACTUAL tools used in Information Security
Rand Report 1970



    MULTICS



    Computer Viruses, Worms, and Trojan Horses



    Anti-virus Software



    Encryption/Decryption

How much does Google really know about you?
What you are searching for
1.
     What web pages you visit
2.
     What blogs you read – Google Reader
3.
     Your financial information – AdSense /
4.
     Google Checkout
     Strength / Popularity of your website –
5.
     Google Analytics / Google Page Creator
6. Who and what you’re emailing –
  Gmail
7. What’s on your PC – Google Desktop
8. Your research paper, bills, etc. –
  uploading documents to Google
9. Your schedule – Google Calendar
10. Your social network and interests –
  Google indexes
  (Orkut, Facebook, Digg)
11. When you’re going to get the flu – Google
  flu tracker
12. Where you and your friends are – Google
  Latitude / Google Maps
13. What you’re watching on You Tube –
  Google owns You Tube
14. What and where you study – Google
  Books, Scholar, and University
15. Everything you’re looking at online –
  Google Chrome
16. Your problems – searching Google
 for answers
17. Your medical issues – Google Health
18. Your home address – Google
 Maps, AdSense, or Checkout
19. Mobile number – SM, Google
 Mobile, and Gmail
20. How your voice sounds – Google Talk
21. What you, your friends and family look
  like and do – Picasa
22. Everything you do online – Google Secure
  Access encrypts your data
23. What you want to buy and have bought –
  product search and catalog
24. What you business is about – Adwords
  share information with Google
25. What’s important to you – Google Alerts
Against Video Privacy Act?

 Every video on You Tube, the judge required
  Google to turn over to Viacom the login name of
  every user who had watched it and the address
  of their computer (IP)
 Viacom claims information will be safeguarded
  and will be used only to press charges against
  Google ($1 billion copyright suit)
 Public afraid of information being used against
  them
Identity Theft / Stalker / Target Ads

     Full name
     Hometown
     School
     Class schedule
     Email
     Phone Number
     Picture
     Religion
     Activities / Interests
150 million users

    Businesses can look at your Facebook

    Check privacy settings

    http://news.bbc.co.uk/2/hi/technology/737

    6738.stm
Doomsday April 1st?

    Conficker is a computer worm that exploits

    the weaknesses in Microsoft’s Windows
    12 million machines infected with software

    code that will connect the infected machine
    it controls to a powerful computer known as
    botnet
    Microsoft announces a $250,000 reward for

    information leading to the capture of the
    Conficker author
“Perhaps the most obvious frightening aspect of
  Conficker is its clear potential to do harm.
  Perhaps in the best case, Conficker may be
  used as sustained and profitable platform for
  massive Internet fraud and theft. In the worst
  case, Conficker could be turned into a powerful
  offensive weapon for performing concerted
  information warfare attacks that could disrupt
  not just countries, but the Internet itself.”
                   Phillip Porras
                 -
      Research Director at SRI International
Cyber Terrorism
Cyber Warfare:

     The term cyber-warfare has many manifestations, ranging
      between website vandalism, iWar (information
      warfare), to destroying a country's critical infrastructure!
    Government Vulnerability:

     Large dependency on information platforms linked to the
      internet. Such as power
      grids, water, fuel, communications, and public
      transportation. They are all vulnerable to a cyber attack.
           An example that highlights this is the Russian-Georgian war in 2008.
    Cyber Warfare still a relatively new type of war. Most

    of the research is based on “potential-harm”.
Cyber-war highlights:

      ▪ Jordan's’ Techno power:
             Those involved in cyber warfare have a vast amount of techno power. As
              these “hackers” can destroy a country from inside out in a short time, and
              with complete anonymity. The true manifestation of “power”. Or they can
              manipulate any corporation, steal money, the limits are endless. They can
              access anythign connected to cyber space.
      ▪ Marvin’s Experts:
             The experts that can engage in cyber warfare are put above all others in
              the realm of the internet.
    Why?

      ▪   Because they can.
      ▪   Power
      ▪   Contracted.
      ▪   Can sell skills to terrorist groups or governments for money.
As the Internet becomes more pervasive in all areas of

    human endeavor, individuals or groups can use the
    anonymity afforded by cyberspace to threaten
    citizens, specific groups (i.e. with membership based on
    ethnicity or belief), communities and entire
    countries, without the inherent threat of capture, injury, or
    death to the attacker that being physically present would
    bring.

    Leveraging of a target's computers and

    information, particularly via the Internet, to cause
    physical, real-world harm or severe disruption of
    infrastructure.
The targets usually consisted of normal individual

    internet users 10 – 15 years ago. Now targets can be
    countries, large corporations, etc; as society became
    more “digital”.
    Are only developed countries open to attack?

      ▪ Yes, the more developed countries are susceptible to cyber warfare.
        As most of the foundations of the country and population lie within
        the realms of communication based in cyberspace.
      ▪ Lesser developed countries can be effected just as much. Although
        it won’t hit the general population as hard.
    Future wars and terrorism will look to manipulate and

    target foundations with no losses.
On May 17, 2007 Estonia came under cyber attack. The

    Estonian parliament, ministries, banks, and media were
    targeted.
    On first week of September 2007, The Pentagon and

    various French, German and British government
    computers were attacked by hackers of Chinese origin.
    The Chinese government denies any involvement
    Georgian and Azerbaijani sites were attacked by hackers

    during the 2008 South Ossetia War.
    The United States had come under attack from computers

    and computer networks situated in China and Russia.
Cyber-warfare is still developing. Small attacks have been made

    and attempted, but there hasn’t been a “large-scale” cyber war.
    Still a war-type of the near future.
The following examples are just potential threats:
    Can cripple a country

      ▪   Inhibit or stop all communication that uses any technological medium
      ▪   Could take control of power, water, and other necessities
      ▪   Confidential documents/plans stolen
      ▪   Total Control over most technological platforms (including nuclear codes and
          access)…

    Cyber warfare in media: (Somewhat possible damages if it were to

    occur on a large scale)
      ▪ Eagle Eye
      ▪ Die Hard 4
http://delicious.com/acallon



    http://delicious.com/JulesRoa



    http://delicious.com/gfisk


Más contenido relacionado

La actualidad más candente

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 

La actualidad más candente (20)

Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 

Destacado

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Destacado (9)

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar a Clt3328fisk

Similar a Clt3328fisk (20)

Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Clt3328fisk

  • 1. What is it? And what is its importance?
  • 2. Cyber-Warfare:  ▪ is the use of computers and the Internet in conducting warfare in cyberspace. V.S. Information Security:  ▪ protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 3. The ACTUAL tools used in Information Security
  • 4.
  • 5. Rand Report 1970  MULTICS  Computer Viruses, Worms, and Trojan Horses  Anti-virus Software  Encryption/Decryption 
  • 6. How much does Google really know about you?
  • 7. What you are searching for 1. What web pages you visit 2. What blogs you read – Google Reader 3. Your financial information – AdSense / 4. Google Checkout Strength / Popularity of your website – 5. Google Analytics / Google Page Creator
  • 8. 6. Who and what you’re emailing – Gmail 7. What’s on your PC – Google Desktop 8. Your research paper, bills, etc. – uploading documents to Google 9. Your schedule – Google Calendar 10. Your social network and interests – Google indexes (Orkut, Facebook, Digg)
  • 9. 11. When you’re going to get the flu – Google flu tracker 12. Where you and your friends are – Google Latitude / Google Maps 13. What you’re watching on You Tube – Google owns You Tube 14. What and where you study – Google Books, Scholar, and University 15. Everything you’re looking at online – Google Chrome
  • 10. 16. Your problems – searching Google for answers 17. Your medical issues – Google Health 18. Your home address – Google Maps, AdSense, or Checkout 19. Mobile number – SM, Google Mobile, and Gmail 20. How your voice sounds – Google Talk
  • 11. 21. What you, your friends and family look like and do – Picasa 22. Everything you do online – Google Secure Access encrypts your data 23. What you want to buy and have bought – product search and catalog 24. What you business is about – Adwords share information with Google 25. What’s important to you – Google Alerts
  • 12. Against Video Privacy Act?   Every video on You Tube, the judge required Google to turn over to Viacom the login name of every user who had watched it and the address of their computer (IP)  Viacom claims information will be safeguarded and will be used only to press charges against Google ($1 billion copyright suit)  Public afraid of information being used against them
  • 13. Identity Theft / Stalker / Target Ads   Full name  Hometown  School  Class schedule  Email  Phone Number  Picture  Religion  Activities / Interests
  • 14. 150 million users  Businesses can look at your Facebook  Check privacy settings  http://news.bbc.co.uk/2/hi/technology/737  6738.stm
  • 15. Doomsday April 1st?  Conficker is a computer worm that exploits  the weaknesses in Microsoft’s Windows 12 million machines infected with software  code that will connect the infected machine it controls to a powerful computer known as botnet Microsoft announces a $250,000 reward for  information leading to the capture of the Conficker author
  • 16. “Perhaps the most obvious frightening aspect of Conficker is its clear potential to do harm. Perhaps in the best case, Conficker may be used as sustained and profitable platform for massive Internet fraud and theft. In the worst case, Conficker could be turned into a powerful offensive weapon for performing concerted information warfare attacks that could disrupt not just countries, but the Internet itself.” Phillip Porras - Research Director at SRI International
  • 18. Cyber Warfare:   The term cyber-warfare has many manifestations, ranging between website vandalism, iWar (information warfare), to destroying a country's critical infrastructure! Government Vulnerability:   Large dependency on information platforms linked to the internet. Such as power grids, water, fuel, communications, and public transportation. They are all vulnerable to a cyber attack.  An example that highlights this is the Russian-Georgian war in 2008. Cyber Warfare still a relatively new type of war. Most  of the research is based on “potential-harm”.
  • 19. Cyber-war highlights:  ▪ Jordan's’ Techno power:  Those involved in cyber warfare have a vast amount of techno power. As these “hackers” can destroy a country from inside out in a short time, and with complete anonymity. The true manifestation of “power”. Or they can manipulate any corporation, steal money, the limits are endless. They can access anythign connected to cyber space. ▪ Marvin’s Experts:  The experts that can engage in cyber warfare are put above all others in the realm of the internet. Why?  ▪ Because they can. ▪ Power ▪ Contracted. ▪ Can sell skills to terrorist groups or governments for money.
  • 20. As the Internet becomes more pervasive in all areas of  human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Leveraging of a target's computers and  information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
  • 21. The targets usually consisted of normal individual  internet users 10 – 15 years ago. Now targets can be countries, large corporations, etc; as society became more “digital”. Are only developed countries open to attack?  ▪ Yes, the more developed countries are susceptible to cyber warfare. As most of the foundations of the country and population lie within the realms of communication based in cyberspace. ▪ Lesser developed countries can be effected just as much. Although it won’t hit the general population as hard. Future wars and terrorism will look to manipulate and  target foundations with no losses.
  • 22. On May 17, 2007 Estonia came under cyber attack. The  Estonian parliament, ministries, banks, and media were targeted. On first week of September 2007, The Pentagon and  various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies any involvement Georgian and Azerbaijani sites were attacked by hackers  during the 2008 South Ossetia War. The United States had come under attack from computers  and computer networks situated in China and Russia.
  • 23. Cyber-warfare is still developing. Small attacks have been made  and attempted, but there hasn’t been a “large-scale” cyber war. Still a war-type of the near future. The following examples are just potential threats: Can cripple a country  ▪ Inhibit or stop all communication that uses any technological medium ▪ Could take control of power, water, and other necessities ▪ Confidential documents/plans stolen ▪ Total Control over most technological platforms (including nuclear codes and access)… Cyber warfare in media: (Somewhat possible damages if it were to  occur on a large scale) ▪ Eagle Eye ▪ Die Hard 4
  • 24. http://delicious.com/acallon  http://delicious.com/JulesRoa  http://delicious.com/gfisk 