SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
00
Some considerations
on ICT security
and cyber attacks
Marco R. A. Bozzetti
CEO Malabo Srl
Member of the Board and Comms. Officer of AIPSI, Italian Chapter of ISSA
CCIP, Chamber of Cooperation and Incentive for Partnership
Security, Cybercrime and Fraud
Milan, March 25 th 2014
11
Looking for computer security….
Social networks
Consumerization (BYOD)
personal/home
environment
working
environment
Cloud and
outsourced
services
Cloud and
outsourced
services
Informatics Systems
(Enterprise and PA)
Fixed + mobile
Internet
DCS
VDS, PLC, A/D Conv.
Internet of Things
Domotics
Smart city
The absolute security does not exist and it is increasingly complex to manage
All these aspects impact on the computer systems of banks
22
• ICT security is a key element for ensuring :
- the Business Continuity
» that is a business problem
- compliance with the various standards and
certifications
» very demanding and heavy for banks
• information and ICT resources are an enterprise asset
and as such they should be protected and managed.
The
ICT
security
has
to
be
governed
(ICT
governance)by
the
Board
(top
m
anagers) and
to
be
aligned
with
the
business
needs
Computer security … not only a technical problem
33
Sponsor
Patronage
OAI, Osservatorio Attacchi Informatici in Italia
Publisher
Report 2013 OAI : 4° Edition of the OAI initiative in
collaboration with Italian Postal Police
44
OAI 2013: Main ICT attacks 2012- First half 2013
(multiple answers)
0,0
10,0
20,0
30,0
40,0
50,0
60,0
70,0
M
alware
SocialEngineering
ICT
devices'theft
DoS/DD
oS
Vulnerability
exploitation
Data
theftby
m
obile
System
unauthorized
access
ICT
Froud
Netw
ork
attack
Sw
unauthorized
access
and/orm
odification
Data
unauthorized
access
and/orm
odification
Data
theftby
fixed
device
Physicalsecurity
attack
Targeted
Attack
&
APT
ICT
blackm
ailO
ther
%respondents
2012
First half 2013
© OAI 2013
always the same as the first four
places in all editions of OAI (1998-
2013)
55
69%
5%
20%
6%
65%
7%
21%
8%
1-10 cases with low
impacts
1-10 cases with high
impacts
>10 cases with low impacts
>10 cases with high
impacts
%respondents
2012 First half 2013
OAI 2013: Impacts after an attack
© OAI 2013
66
43%
24%
6% 6%
4% 4% 4% 3% 2% 1% 1%
Manufacture
Industry
Service-
Distribution
Local Public
Administration
Health Central Public
Administration
Telecom-
Media
Trasport-
Logistic-
Tourism
Utility Finance-Bank-
Insurance
Instruction-
R&D
Primary Sector
%respondents
OAI 2013: Industry sectors of the respondents (299)
© OAI 2013
77
Worldwide attacks status in 2013
Source: IBM X-Force Report 1Q2014
88
Data breach cost per capita
Source: Ponemon Institute Research Report 2013
99
Total Online Banking Malware Infections , 2012 and 2013
Source: Trend Micro Labs Report 2013
1010
Malicious and High-Risk Mobile App Growth, 2013
Source: Trend Micro Labs Report 2013
1111
Top Mobile Phishing Targets, 2013
Source: Trend Micro Labs Report 2013
1212
Key Vulnerabilities (non-exhaustive list)
• Threats and attacks are all based on technical and / or human-organizational vulnerabilities
• Technical vulnerabilities (software systems and applications, architectures and configurations):
- Operating systems and middleware
- Web sites and collaborative platforms
- Smartphones and mobility tablettes ++ 14,000 malware
- Virtualized systems
- Outsourcing and Cloud (XaaS)
- Between 30 and 40% of software vulnerabilities has no patches from the development companies
Zero Day vulnerability
• Human Vulnerability : the ICT user's behavior
- Social Engineering and Phishing
- Use of social networks, even at the enterprise level
• Organizational vulnerabilities
- Lack or non-use of organizational procedures and informatics support
- Inadequate or non-use of standards and best practices
- Lack of training and awareness from top managers to end users
- Lack of systematic monitoring and controls of the ICT resources
- Limited or missing Risk analysis
- Not effective control of providers
- Limited or missing SoD, Separation of Duties
1313
Application vulnerabilities 2013
Source: IBM X-Force Report 1Q2014
1414
Black market and the cyber criminal ware prices
1515
49% 48%
43%
37%
35%
32%
27%
25%
21%
17% 16% 15% 14%
12%
1%
M
alw
are
IC
T
devices'theft
D
ata
theftby
m
obile
and
fixed
deviceD
oS/D
D
oS
SocialEngineering
Physicalsec.attack
Vulnerability
exploitation
N
etw
ork
attack
D
ata
unauth.access
System
unauth.accessIC
T
FroudTA
&
APT
IC
T
blackm
ail
Sw
unauth.access
O
ther
%respondents
OAI 2013: Most feared attacks in the next future
© OAI 2013
1616
Threats and attacks: main trend worldwide (1)
• A personal synthesis by recent reports of CSA, Enisa, Microsoft, IBM XForce,
McAfee, Sophos, TrendMicro, Websense
• Two main directions:
• ++ Massive attacks: relatively simple, such as social engineering-phishing,
virus, etc.
• ++ Targeted attacks: very sophisticated, such as APT, Watering hole, etc.
• ++ Malware
• + New sophisticated
• + revitalization of old ones and/or based on obsolete middleware still “in
production”
• + lock-screen ransomware
• ++ cryptographic ransomware
• +++ new sophisticated for mobile and apps (tablet and smartphone)
• ++ Social engineering
• +++ Digital identity theft
• + Attacks to big data repositories
• ++ DoS/DDoS, Denial of Service/ Distributed DoS
1717
Threats and attacks: main trend worldwide (2)
• ++ DoS/DDoS, Denial of Service/ Distributed DoS
• + exploitation of basic software vulnerabilities and in particular of HTML5 and Java
• ++ attacks to cloud services (XaaS)
- The Notorious Nine Top Threats: data breaches, data loss, account hijacking,
insecure APIs, malicious insiders, abuse of cloud services, insufficient due
diligence, shared technology issues
• + consolidation of new exploit kits, such as Neutrino and Redkit, which will replace the
well-known and popular Blackhole
• ++ Internet of Things‘ attacks
- Smart cities (Expo 2015)
- Domotics
• ++ TA and APT
• + (?) attacks to Bitcoin and virtual coins
- especially with the use of mobile devices
1818
References
marco.bozzetti@malaboadvisoring.it
www.malaboadvisoring.it

Más contenido relacionado

La actualidad más candente

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)Wail Hassan
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 

La actualidad más candente (20)

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 

Destacado

Luke height Esafty pp quiz
Luke height Esafty pp quizLuke height Esafty pp quiz
Luke height Esafty pp quiztonybattista
 
Amy Pooley Esafty Quiz
Amy Pooley Esafty QuizAmy Pooley Esafty Quiz
Amy Pooley Esafty Quiztonybattista
 
Esafty quiz Charlotte Palmer
Esafty quiz Charlotte PalmerEsafty quiz Charlotte Palmer
Esafty quiz Charlotte Palmertonybattista
 
Punctuation Powerpoint
Punctuation PowerpointPunctuation Powerpoint
Punctuation Powerpointconno1ej
 

Destacado (6)

Luke height Esafty pp quiz
Luke height Esafty pp quizLuke height Esafty pp quiz
Luke height Esafty pp quiz
 
Amy Pooley Esafty Quiz
Amy Pooley Esafty QuizAmy Pooley Esafty Quiz
Amy Pooley Esafty Quiz
 
Esafty quiz Charlotte Palmer
Esafty quiz Charlotte PalmerEsafty quiz Charlotte Palmer
Esafty quiz Charlotte Palmer
 
esafty
esaftyesafty
esafty
 
Punctuation powerpoint presentation
Punctuation powerpoint presentationPunctuation powerpoint presentation
Punctuation powerpoint presentation
 
Punctuation Powerpoint
Punctuation PowerpointPunctuation Powerpoint
Punctuation Powerpoint
 

Similar a Considerazioni su ITC Security e sui Cyber Attacks

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxRykaBhatt
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSIAEME Publication
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...MOBIQUANT TECHNOLOGIES
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelSURFnet
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 

Similar a Considerazioni su ITC Security e sui Cyber Attacks (20)

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
188
188188
188
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 

Más de seeweb

Web Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskWeb Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskseeweb
 
Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020seeweb
 
Disaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebDisaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebseeweb
 
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoEcommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoseeweb
 
Avviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTAvviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTseeweb
 
Quick security assessment
Quick security assessmentQuick security assessment
Quick security assessmentseeweb
 
Seeweb presentation
Seeweb presentationSeeweb presentation
Seeweb presentationseeweb
 
Seeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoSeeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoseeweb
 
Viral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaViral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaseeweb
 
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...seeweb
 
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...seeweb
 
Software Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsSoftware Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsseeweb
 
50 minutes as a DevOps
50 minutes as a DevOps50 minutes as a DevOps
50 minutes as a DevOpsseeweb
 
Ricerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchRicerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchseeweb
 
Presentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpPresentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpseeweb
 
Perché scegliere il Cloud?
Perché scegliere il Cloud?Perché scegliere il Cloud?
Perché scegliere il Cloud?seeweb
 
Validation ICANN
Validation ICANNValidation ICANN
Validation ICANNseeweb
 
Presentazione Coud Backup
Presentazione Coud BackupPresentazione Coud Backup
Presentazione Coud Backupseeweb
 
Cloudserver faq
Cloudserver faqCloudserver faq
Cloudserver faqseeweb
 
Schema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete SeewebSchema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete Seewebseeweb
 

Más de seeweb (20)

Web Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskWeb Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber risk
 
Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020
 
Disaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebDisaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seeweb
 
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoEcommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
 
Avviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTAvviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoT
 
Quick security assessment
Quick security assessmentQuick security assessment
Quick security assessment
 
Seeweb presentation
Seeweb presentationSeeweb presentation
Seeweb presentation
 
Seeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoSeeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamo
 
Viral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaViral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfetta
 
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
 
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
 
Software Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsSoftware Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environments
 
50 minutes as a DevOps
50 minutes as a DevOps50 minutes as a DevOps
50 minutes as a DevOps
 
Ricerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchRicerche performanti con ElasticSearch
Ricerche performanti con ElasticSearch
 
Presentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpPresentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUp
 
Perché scegliere il Cloud?
Perché scegliere il Cloud?Perché scegliere il Cloud?
Perché scegliere il Cloud?
 
Validation ICANN
Validation ICANNValidation ICANN
Validation ICANN
 
Presentazione Coud Backup
Presentazione Coud BackupPresentazione Coud Backup
Presentazione Coud Backup
 
Cloudserver faq
Cloudserver faqCloudserver faq
Cloudserver faq
 
Schema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete SeewebSchema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete Seeweb
 

Último

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 

Último (20)

Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 

Considerazioni su ITC Security e sui Cyber Attacks

  • 1. 00 Some considerations on ICT security and cyber attacks Marco R. A. Bozzetti CEO Malabo Srl Member of the Board and Comms. Officer of AIPSI, Italian Chapter of ISSA CCIP, Chamber of Cooperation and Incentive for Partnership Security, Cybercrime and Fraud Milan, March 25 th 2014
  • 2. 11 Looking for computer security…. Social networks Consumerization (BYOD) personal/home environment working environment Cloud and outsourced services Cloud and outsourced services Informatics Systems (Enterprise and PA) Fixed + mobile Internet DCS VDS, PLC, A/D Conv. Internet of Things Domotics Smart city The absolute security does not exist and it is increasingly complex to manage All these aspects impact on the computer systems of banks
  • 3. 22 • ICT security is a key element for ensuring : - the Business Continuity » that is a business problem - compliance with the various standards and certifications » very demanding and heavy for banks • information and ICT resources are an enterprise asset and as such they should be protected and managed. The ICT security has to be governed (ICT governance)by the Board (top m anagers) and to be aligned with the business needs Computer security … not only a technical problem
  • 4. 33 Sponsor Patronage OAI, Osservatorio Attacchi Informatici in Italia Publisher Report 2013 OAI : 4° Edition of the OAI initiative in collaboration with Italian Postal Police
  • 5. 44 OAI 2013: Main ICT attacks 2012- First half 2013 (multiple answers) 0,0 10,0 20,0 30,0 40,0 50,0 60,0 70,0 M alware SocialEngineering ICT devices'theft DoS/DD oS Vulnerability exploitation Data theftby m obile System unauthorized access ICT Froud Netw ork attack Sw unauthorized access and/orm odification Data unauthorized access and/orm odification Data theftby fixed device Physicalsecurity attack Targeted Attack & APT ICT blackm ailO ther %respondents 2012 First half 2013 © OAI 2013 always the same as the first four places in all editions of OAI (1998- 2013)
  • 6. 55 69% 5% 20% 6% 65% 7% 21% 8% 1-10 cases with low impacts 1-10 cases with high impacts >10 cases with low impacts >10 cases with high impacts %respondents 2012 First half 2013 OAI 2013: Impacts after an attack © OAI 2013
  • 7. 66 43% 24% 6% 6% 4% 4% 4% 3% 2% 1% 1% Manufacture Industry Service- Distribution Local Public Administration Health Central Public Administration Telecom- Media Trasport- Logistic- Tourism Utility Finance-Bank- Insurance Instruction- R&D Primary Sector %respondents OAI 2013: Industry sectors of the respondents (299) © OAI 2013
  • 8. 77 Worldwide attacks status in 2013 Source: IBM X-Force Report 1Q2014
  • 9. 88 Data breach cost per capita Source: Ponemon Institute Research Report 2013
  • 10. 99 Total Online Banking Malware Infections , 2012 and 2013 Source: Trend Micro Labs Report 2013
  • 11. 1010 Malicious and High-Risk Mobile App Growth, 2013 Source: Trend Micro Labs Report 2013
  • 12. 1111 Top Mobile Phishing Targets, 2013 Source: Trend Micro Labs Report 2013
  • 13. 1212 Key Vulnerabilities (non-exhaustive list) • Threats and attacks are all based on technical and / or human-organizational vulnerabilities • Technical vulnerabilities (software systems and applications, architectures and configurations): - Operating systems and middleware - Web sites and collaborative platforms - Smartphones and mobility tablettes ++ 14,000 malware - Virtualized systems - Outsourcing and Cloud (XaaS) - Between 30 and 40% of software vulnerabilities has no patches from the development companies Zero Day vulnerability • Human Vulnerability : the ICT user's behavior - Social Engineering and Phishing - Use of social networks, even at the enterprise level • Organizational vulnerabilities - Lack or non-use of organizational procedures and informatics support - Inadequate or non-use of standards and best practices - Lack of training and awareness from top managers to end users - Lack of systematic monitoring and controls of the ICT resources - Limited or missing Risk analysis - Not effective control of providers - Limited or missing SoD, Separation of Duties
  • 15. 1414 Black market and the cyber criminal ware prices
  • 16. 1515 49% 48% 43% 37% 35% 32% 27% 25% 21% 17% 16% 15% 14% 12% 1% M alw are IC T devices'theft D ata theftby m obile and fixed deviceD oS/D D oS SocialEngineering Physicalsec.attack Vulnerability exploitation N etw ork attack D ata unauth.access System unauth.accessIC T FroudTA & APT IC T blackm ail Sw unauth.access O ther %respondents OAI 2013: Most feared attacks in the next future © OAI 2013
  • 17. 1616 Threats and attacks: main trend worldwide (1) • A personal synthesis by recent reports of CSA, Enisa, Microsoft, IBM XForce, McAfee, Sophos, TrendMicro, Websense • Two main directions: • ++ Massive attacks: relatively simple, such as social engineering-phishing, virus, etc. • ++ Targeted attacks: very sophisticated, such as APT, Watering hole, etc. • ++ Malware • + New sophisticated • + revitalization of old ones and/or based on obsolete middleware still “in production” • + lock-screen ransomware • ++ cryptographic ransomware • +++ new sophisticated for mobile and apps (tablet and smartphone) • ++ Social engineering • +++ Digital identity theft • + Attacks to big data repositories • ++ DoS/DDoS, Denial of Service/ Distributed DoS
  • 18. 1717 Threats and attacks: main trend worldwide (2) • ++ DoS/DDoS, Denial of Service/ Distributed DoS • + exploitation of basic software vulnerabilities and in particular of HTML5 and Java • ++ attacks to cloud services (XaaS) - The Notorious Nine Top Threats: data breaches, data loss, account hijacking, insecure APIs, malicious insiders, abuse of cloud services, insufficient due diligence, shared technology issues • + consolidation of new exploit kits, such as Neutrino and Redkit, which will replace the well-known and popular Blackhole • ++ Internet of Things‘ attacks - Smart cities (Expo 2015) - Domotics • ++ TA and APT • + (?) attacks to Bitcoin and virtual coins - especially with the use of mobile devices