SlideShare una empresa de Scribd logo
1 de 52
Descargar para leer sin conexión
Gohsuke Takama /          , Meta Associates, 2011   11



                                       http://www.slideshare.net/gohsuket
Friday, November 4, 2011
about…

                 ✴ Gohsuke Takama
                       ✴ Meta Associates (http://www.meta-associates.com/)
                           ✴founder & president, connector, analyst, planner
                           ✴ local organizer of security conferences: BlackHat Japan, PacSec
                           ✴ liaison of security businesses: Patch Advisor, SecWest
                           ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/
                           ✴ organizer of tech entrepreneur / startup support events
                           ✴ independent tech journalist for over 10 years
                       ✴ Privacy International (London, UK http://www.privacyinternational.org/)
                           ✴advisory board member
                       ✴ Computer Professionals for Social Responsibility (http://cpsr.org/)
                           ✴Japan chapter founding supporter




Friday, November 4, 2011
A
                           Attacks




Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,     ,      ...

                    •      Stuxnet, Duqu

                    •      Sony PSN

                    •      Wikileaks *new

                    •      Anonymous *new

                    •                       (MENA) *new

                    •      Indira Gandhi

Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,             ,            ...
                           =                    = APT (Advanced Persistent Threat)

                    •      Stuxnet = SCADA

                    •      Sony PSN:        3       , DDoS,           ,

                    •      Wikileaks *new =                   :

                    •      Anonymous *new =                       +

                    •                           *new=

                    •      Indira Gandhi        =
Friday, November 4, 2011
"whom targeted, why"




                      http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/
Friday, November 4, 2011
"whom targeted, why"

                    •                   ,

                    •      Sony PSN, Sony

                    •              ,

                    •
                    •              :




Friday, November 4, 2011
"Stuxnet"




Friday, November 4, 2011
"Anonymous"




                            http://www.youtube.com/watch?v=2Tm7UKo4IBc
                           http://www.youtube.com/watch?v=kZNDV4hGUGw
Friday, November 4, 2011
"know your enemy: techniques"

                    •      phishing            •   website spoofing
                    •      targeted phishing   •   content altering
                    •      trojan              •   XSRF
                    •      spyware             •   XSS
                    •      keylogger           •   code injection
                    •      rootkit             •   IP hijacking
                    •      botnet DDoS         •   rogue WiFi AP
                                               •   sniffer



Friday, November 4, 2011
"emerging attack techniques"

                    •      malware:                                 ,


                    •      VM                       , bios
                    •                         : VNC, Spycam,

                    •                     : keylogger, GPS logger
                    •                         : Stuxnet

                    •       DDoS:
                           JavaScript    (LOIC)
                                                                    ($8/h~),



Friday, November 4, 2011
"know your enemy: techniques"




                              http://www.ipa.go.jp/security/vuln/newattack.html
Friday, November 4, 2011
"layer approach"




                                •examle: OSI model




Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
                                 6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
                                 3 OS/Application
                                 2 Hardware
                                 1 Physical
Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
       Human Factor              6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
            Intangibles
                                 3 OS/Application
                                 2 Hardware
               Tangibles
                                 1 Physical
Friday, November 4, 2011
"attacks vs. counter measures "

                             APT, espionage, phishing,
   Psychological
                                social engineering                   ?
                                spoofing, pharming,    accustomed best practice,
            Custom           phishing spam, XSS, XSRF,   awareness, CIRT, PKI,
                              spyware, ID spoof/theft digital ID, SSL certificate
                             DoS, spam, ransom-ware,     routing, filtering, policy,
        Operation
                                  sabotage-ware                  audit, CIRT

                             sniffing, spyware, spam,      encryption, filtering,
           Content
                                    alteration             content-scan, host IDS

          OS/                DoS, vuln exploit, 0day,    Firewall, network IDS, IPS,
      Application                 rootkit, botnet         anti-virus, OS/app patch

                             direct access, tampering,     perimeter guard, anti-
         Hardware
                                    alteration              tampering, hard seal

                               lock pick, break in,       surveillance, perimeter
         Physical
                                     vandalism               alarm, armed guard
Friday, November 4, 2011
"spoofing, phishing & targeted attack"
                            /                   1




Friday, November 4, 2011
"cybercrime, cyber espionage & identity "

                    ✴ APT,
                     •                   =

                     •
                     •               :           ,   ,

                     •       →   →           →
                    ✴            (                       )
                     •                   =

                     •
                     •
Friday, November 4, 2011
                                     →
"cybercrime, cyber espionage,
                           primary target = individual identity"




Friday, November 4, 2011
B
                           Behavior




Friday, November 4, 2011
"social change on Internet"
                               2000
                    •
                    •
                           •
                           •
                           •
                           •




Friday, November 4, 2011
"social change on Internet"
                               2001
                    •                            •
                    •                            •
                    •                            •
                    •                            •
                           •                     •
                           •                     •
                           •                     •             (Wiki   )

                           •        /            •
                           •                     •   3D

                                                 •
Friday, November 4, 2011
Friday, November 4, 2011
"real world vs. social data world"




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money                                         Ideology



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Autocracy, Crime, Extremism, Hacker
                                                 Power

                                                 Autocratic
                                                Government

                                                          Infra
                                              APT      Disruption

                                 Organized                        Extremist
              $Money              Crime                           Hacktivist   Ideology
                                             Theft      Hacktivism
                                             Fraud
                                                      Lulz
                                                                       :
                                                              -
                                                 Hacker       -
                                                 Cracker      -
                                                              -


                                               Control
Friday, November 4, 2011
I
                           Identity




Friday, November 4, 2011
"Identity"


                           entity, identity, relationship

                                   me = entity

                                 me{Attributes}

Friday, November 4, 2011
Identification & Authentication

          Identity             Identification          Authentication   Authorization
                              Credential{Identifier}




                                                                           Validation




     me{Attributes}
       me = entity




Friday, November 4, 2011
Identification & Authentication

          Identity             Identification                     Authentication   Authorization
                              Credential{Identifier}




                                                                                      Validation




     me{Attributes}
       me = entity




                                                      Identity


                                             Identification


Friday, November 4, 2011
"Identity"

                            Erik H. Erikson
                                 1967




                                              Sydney Shoemaker
                                                    1963




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
AxBxI
                            = WTF?




Friday, November 4, 2011
"state of security methodology"

                    ✴                                   (F/W)
                     •(                                 +                    )
                    ✴
                     •=                  (                               )
                    ✴                :       100%
                     • (                                        ?)
                    ✴ PKI                    = DigiNotar
                    ✴                               =

                     •(
Friday, November 4, 2011
                                                                     )
"perspective for counter strategy"
                              set basic security measures:

                    ✴                           ,
                                                    =                    ,


                    ✴                           (APT                )
                           ✴   PET (        )

                    ✴                  prevention, detection, response

                     •
                     •
                     •
Friday, November 4, 2011
"perspective for counter strategy"
                                      be creative:

                    ✴ counter social engineering
                     •
                     •
                    ✴ social intelligence
                    ✴ soft power
                     •
                     •                       PR    deflective PR


Friday, November 4, 2011
"perspective for counter strategy"
                     be creative: Counter Social Engineering

                    •
                    •
                    •
                           •
                           •
                    •
                    •
                           •   (
                                   )
Friday, November 4, 2011
"perspective for counter strategy"
                                be creative: Soft Power

                    •         Soft Power = 1990        Joseph Nye


                    •                Hard Power
                    •
                    •      http://en.wikipedia.org/wiki/Soft_power
                    •                                     /

                    •
Friday, November 4, 2011
Friday, November 4, 2011
references

                    •      CEOs - the new corporate fraudstersds http://www.iol.co.za/
                           sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649

                    •      PwC Survey Says: Telecoms Are Overconfident About Security http://
                           www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php

                    •      Cyber attack led to IGI shutdown http://www.indianexpress.com/news/
                           cyber-attack-led-to-igi-shutdown/851365/

                    •      Anonymous announces global plans http://www.digitaltrends.com/
                           computing/video-anonymous-announces-global-plans/

                    •      ANONYMOUS - OPERATION PAYBACK - Sony Press Release http://
                           www.youtube.com/watch?v=2Tm7UKo4IBc

                    •      Operation Payback - Anonymous Message About ACTA Laws, Internet
                           Censorship and Copyright http://www.youtube.com/watch?
                           v=kZNDV4hGUGw

                    •      Anonymous: Message to Scientology http://www.youtube.com/watch?
                           v=JCbKv9yiLiQ

                    •                        Anonymous                 http://www.atmarkit.co.jp/
                           fsecurity/special/161dknight/dknight01.html
Friday, November 4, 2011
references

                    •      28 Nation States With Cyber Warfare Capabilities http://
                           jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html

                    •                                                                         Far East
                           Research    http://scan.netsecurity.ne.jp/archives/52017036.html

                    •      CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability
                           http://www.youtube.com/watch?v=DP_rRf468_Y

                    •      MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/
                           204792193/MYBIOS_Is_BIOS_infection_a_reality

                    •      McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/
                           html/identity_theft/NAVirtualCriminologyReport07.pdf

                    •                  Google Zeitgeist                          http://blog.f-secure.jp/
                           archives/50630539.html

                    •       "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V
                           http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959



Friday, November 4, 2011
references

                    •                                                             -- DEFCON CTF
                                   http://scan.netsecurity.ne.jp/archives/52002536.html

                    •      PET
                                                  http://www.soumu.go.jp/denshijiti/pdf/
                           jyumin_p_s3.pdf

                    •      PIA
                           http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf

                    •                                                                      http://
                           jp.reuters.com/article/topNews/idJPJAPAN-21406320110527

                    •                                         GIE
                           http://d.hatena.ne.jp/ukky3/20110829/1314685819

                    •         Diginotar      Black.Spook
                           http://blog.f-secure.jp/archives/50626009.html


Friday, November 4, 2011
references

                    •       Computer virus hits US Predator and Reaper drone fleet http://
                           arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits-
                           drone-fleet.ars

                    •      F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case
                           R2D2") http://www.f-secure.com/weblog/archives/00002249.html

                    •       State-sponsored spies collaborate with crimeware gang | The Unholy APT-
                           botnet union http://www.theregister.co.uk/2011/09/13/
                           apt_botnet_symbiosis/

                    •       NISC                              10 7     http://www.nisc.go.jp/
                           conference/seisaku/index.html#seisaku27

                    •
                                                 http://news.livedoor.com/article/detail/5685674/




Friday, November 4, 2011
references

                    •                                                       http://
                           www.sakimura.org/2011/06/1124/

                    •                  http://ja.wikipedia.org/wiki/

                    •                       http://ja.wikipedia.org/wiki/




Friday, November 4, 2011

Más contenido relacionado

Destacado

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナーGohsuke Takama
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...Gohsuke Takama
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageGohsuke Takama
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本Gohsuke Takama
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーGohsuke Takama
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本Gohsuke Takama
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Gohsuke Takama
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Gohsuke Takama
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30Gohsuke Takama
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?Winston & Strawn LLP
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 

Destacado (16)

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 

Similar a サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection TechniquesArturo Filastò
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith Jones, PhD
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfnetisBin
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysisCharles Lim
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeDevSecCon
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 

Similar a サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011 (20)

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection Techniques
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Osint
OsintOsint
Osint
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

  • 1. Gohsuke Takama / , Meta Associates, 2011 11 http://www.slideshare.net/gohsuket Friday, November 4, 2011
  • 2. about… ✴ Gohsuke Takama ✴ Meta Associates (http://www.meta-associates.com/) ✴founder & president, connector, analyst, planner ✴ local organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of security businesses: Patch Advisor, SecWest ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/ ✴ organizer of tech entrepreneur / startup support events ✴ independent tech journalist for over 10 years ✴ Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member ✴ Computer Professionals for Social Responsibility (http://cpsr.org/) ✴Japan chapter founding supporter Friday, November 4, 2011
  • 3. A Attacks Friday, November 4, 2011
  • 4. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... • Stuxnet, Duqu • Sony PSN • Wikileaks *new • Anonymous *new • (MENA) *new • Indira Gandhi Friday, November 4, 2011
  • 5. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... = = APT (Advanced Persistent Threat) • Stuxnet = SCADA • Sony PSN: 3 , DDoS, , • Wikileaks *new = : • Anonymous *new = + • *new= • Indira Gandhi = Friday, November 4, 2011
  • 6. "whom targeted, why" http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/ Friday, November 4, 2011
  • 7. "whom targeted, why" • , • Sony PSN, Sony • , • • : Friday, November 4, 2011
  • 9. "Anonymous" http://www.youtube.com/watch?v=2Tm7UKo4IBc http://www.youtube.com/watch?v=kZNDV4hGUGw Friday, November 4, 2011
  • 10. "know your enemy: techniques" • phishing • website spoofing • targeted phishing • content altering • trojan • XSRF • spyware • XSS • keylogger • code injection • rootkit • IP hijacking • botnet DDoS • rogue WiFi AP • sniffer Friday, November 4, 2011
  • 11. "emerging attack techniques" • malware: , • VM , bios • : VNC, Spycam, • : keylogger, GPS logger • : Stuxnet • DDoS: JavaScript (LOIC) ($8/h~), Friday, November 4, 2011
  • 12. "know your enemy: techniques" http://www.ipa.go.jp/security/vuln/newattack.html Friday, November 4, 2011
  • 13. "layer approach" •examle: OSI model Friday, November 4, 2011
  • 14. "a security layer model " 7 Psychological , 6 Custom (Habit) , 5 Operation 4 Content 3 OS/Application 2 Hardware 1 Physical Friday, November 4, 2011
  • 15. "a security layer model " 7 Psychological , Human Factor 6 Custom (Habit) , 5 Operation 4 Content Intangibles 3 OS/Application 2 Hardware Tangibles 1 Physical Friday, November 4, 2011
  • 16. "attacks vs. counter measures " APT, espionage, phishing, Psychological social engineering ? spoofing, pharming, accustomed best practice, Custom phishing spam, XSS, XSRF, awareness, CIRT, PKI, spyware, ID spoof/theft digital ID, SSL certificate DoS, spam, ransom-ware, routing, filtering, policy, Operation sabotage-ware audit, CIRT sniffing, spyware, spam, encryption, filtering, Content alteration content-scan, host IDS OS/ DoS, vuln exploit, 0day, Firewall, network IDS, IPS, Application rootkit, botnet anti-virus, OS/app patch direct access, tampering, perimeter guard, anti- Hardware alteration tampering, hard seal lock pick, break in, surveillance, perimeter Physical vandalism alarm, armed guard Friday, November 4, 2011
  • 17. "spoofing, phishing & targeted attack" / 1 Friday, November 4, 2011
  • 18. "cybercrime, cyber espionage & identity " ✴ APT, • = • • : , , • → → → ✴ ( ) • = • • Friday, November 4, 2011 →
  • 19. "cybercrime, cyber espionage, primary target = individual identity" Friday, November 4, 2011
  • 20. B Behavior Friday, November 4, 2011
  • 21. "social change on Internet" 2000 • • • • • • Friday, November 4, 2011
  • 22. "social change on Internet" 2001 • • • • • • • • • • • • • • (Wiki ) • / • • • 3D • Friday, November 4, 2011
  • 24. "real world vs. social data world" Friday, November 4, 2011
  • 25. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 26. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 27. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 28. "disseminate motives" Law, Market, Norm, Architecture - - - - Friday, November 4, 2011
  • 29. "disseminate motives" Law, Market, Norm, Architecture $Money - - - - Friday, November 4, 2011
  • 30. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Friday, November 4, 2011
  • 31. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Control Friday, November 4, 2011
  • 32. "disseminate motives" Law, Market, Norm, Architecture Power $Money Ideology - - - - Control Friday, November 4, 2011
  • 33. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Infra APT Disruption Organized Extremist $Money Crime Hacktivist Ideology Theft Hacktivism Fraud Lulz : - Hacker - Cracker - - Control Friday, November 4, 2011
  • 34. I Identity Friday, November 4, 2011
  • 35. "Identity" entity, identity, relationship me = entity me{Attributes} Friday, November 4, 2011
  • 36. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Friday, November 4, 2011
  • 37. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Identity Identification Friday, November 4, 2011
  • 38. "Identity" Erik H. Erikson 1967 Sydney Shoemaker 1963 Friday, November 4, 2011
  • 39. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 40. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 41. AxBxI = WTF? Friday, November 4, 2011
  • 42. "state of security methodology" ✴ (F/W) •( + ) ✴ •= ( ) ✴ : 100% • ( ?) ✴ PKI = DigiNotar ✴ = •( Friday, November 4, 2011 )
  • 43. "perspective for counter strategy" set basic security measures: ✴ , = , ✴ (APT ) ✴ PET ( ) ✴ prevention, detection, response • • • Friday, November 4, 2011
  • 44. "perspective for counter strategy" be creative: ✴ counter social engineering • • ✴ social intelligence ✴ soft power • • PR deflective PR Friday, November 4, 2011
  • 45. "perspective for counter strategy" be creative: Counter Social Engineering • • • • • • • • ( ) Friday, November 4, 2011
  • 46. "perspective for counter strategy" be creative: Soft Power • Soft Power = 1990 Joseph Nye • Hard Power • • http://en.wikipedia.org/wiki/Soft_power • / • Friday, November 4, 2011
  • 48. references • CEOs - the new corporate fraudstersds http://www.iol.co.za/ sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649 • PwC Survey Says: Telecoms Are Overconfident About Security http:// www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php • Cyber attack led to IGI shutdown http://www.indianexpress.com/news/ cyber-attack-led-to-igi-shutdown/851365/ • Anonymous announces global plans http://www.digitaltrends.com/ computing/video-anonymous-announces-global-plans/ • ANONYMOUS - OPERATION PAYBACK - Sony Press Release http:// www.youtube.com/watch?v=2Tm7UKo4IBc • Operation Payback - Anonymous Message About ACTA Laws, Internet Censorship and Copyright http://www.youtube.com/watch? v=kZNDV4hGUGw • Anonymous: Message to Scientology http://www.youtube.com/watch? v=JCbKv9yiLiQ • Anonymous http://www.atmarkit.co.jp/ fsecurity/special/161dknight/dknight01.html Friday, November 4, 2011
  • 49. references • 28 Nation States With Cyber Warfare Capabilities http:// jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html • Far East Research http://scan.netsecurity.ne.jp/archives/52017036.html • CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability http://www.youtube.com/watch?v=DP_rRf468_Y • MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/ 204792193/MYBIOS_Is_BIOS_infection_a_reality • McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/ html/identity_theft/NAVirtualCriminologyReport07.pdf • Google Zeitgeist http://blog.f-secure.jp/ archives/50630539.html • "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959 Friday, November 4, 2011
  • 50. references • -- DEFCON CTF http://scan.netsecurity.ne.jp/archives/52002536.html • PET http://www.soumu.go.jp/denshijiti/pdf/ jyumin_p_s3.pdf • PIA http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf • http:// jp.reuters.com/article/topNews/idJPJAPAN-21406320110527 • GIE http://d.hatena.ne.jp/ukky3/20110829/1314685819 • Diginotar Black.Spook http://blog.f-secure.jp/archives/50626009.html Friday, November 4, 2011
  • 51. references • Computer virus hits US Predator and Reaper drone fleet http:// arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits- drone-fleet.ars • F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case R2D2") http://www.f-secure.com/weblog/archives/00002249.html • State-sponsored spies collaborate with crimeware gang | The Unholy APT- botnet union http://www.theregister.co.uk/2011/09/13/ apt_botnet_symbiosis/ • NISC 10 7 http://www.nisc.go.jp/ conference/seisaku/index.html#seisaku27 • http://news.livedoor.com/article/detail/5685674/ Friday, November 4, 2011
  • 52. references • http:// www.sakimura.org/2011/06/1124/ • http://ja.wikipedia.org/wiki/ • http://ja.wikipedia.org/wiki/ Friday, November 4, 2011