1 / 47

Cybersecurity

Cybersecurity. Threats Risks Vulnerabilities 6 Environments Competitive Environment Technological Environment Cyber risks Infrastructure Mobile devices Asymetrical SoMe - Social media NCIS Tue night??. Cybersecurity. October is cybersecurity month. Cybersecurity.

leobower
Télécharger la présentation

Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Threats Risks Vulnerabilities 6 Environments Competitive Environment Technological Environment Cyber risks Infrastructure Mobile devices Asymetrical SoMe - Social media NCIS Tue night??

  2. Cybersecurity October is cybersecurity month

  3. Cybersecurity October cybersecurity month Includes a section on Mobile device and smartphone security

  4. TRV 101 Threats the chance a bad thing can happen, at all Risks is the consequence when that bad thing is very likely to actually happen to you Vulnerabilities is the chances of success of a particular threat against some asset

  5. Cyber Threat trends Top 8 trends Mobile everything Data breaches Usernames and passwords compromised Malware Used to gather personal profile info Malware on mobile devices Social Media hacking Twitter accounts, Facebook pages

  6. Cyber Threat trends Web Server errors Increase in downtime Government data breaches Outsourcing ! Highly specific ID theft of individuals who have “high net worth” Obamacare… healthcare data hacks

  7. CybersecurityWhat terms and situations are you familiar with already? • Phishing? • Domain name hacking • Spear Phishing • Humint and Teckint • Osint !!

  8. Cybersecurity “regular crime” vs. “cyber crime” Big influencer is “magnitude” More damage can be done On a larger scale In a shorter period of time

  9. “regular crime” Prevention Detection Reaction “cyber crime” Prevention Who – where Detection Intangible evidence Reaction Countermeasures and deterrence Problem of jurisdiction and enforceability Cybersecurity

  10. Six groups of “clear and present danger” Deliberate acts Inadvertant acts Third parties / outsourcing A consequence of the intense Competitive Environment

  11. Six groups of “clear and present danger” Acts of God – weather extremes(the Geographic Environment) Hot weather in GTA 2014… Technical failures Hardware software Management failures

  12. Cybersecurity • Deliberate acts on a large scale garner publicity and motivate politicians to react • Attacks on cyber structures at the national level 1 min 25 sec

  13. Influencing environments • Competitive • Political – Legal – Regulatory • (example, Naver in R.O.K.) • Economic

  14. Influencing environments • Social – cultural • SoMe – Social Media • Technological • Geographic – weather extremes

  15. Competitive Environment …intensely competitive Companies are facing competition from other firms Other organizations offering the same product or servicenow  Other organizations offering similarproducts or services now  Other organizations offering a variation on a product or service, that you cannot Organizations that could offer the same or similar products or services in the future  Organizations that could remove the need for a product or service we sell

  16. Competitive Environment Intense competition forces companies to do outsourcing to cut costs

  17. Competitive Environment - outsourcing • “outsourcing the design, implementation and maintenance of ICT across all sectors to third-party providers, including developing countries, cloud computing and large data fusion centres, along with the use of off-the-shelf commercial technologies, has increased vulnerabilities and risks.” • Gendron and Rudner • “Assessing Cyber Threats To Canadian Infrastructure • 4th party !!

  18. Competitive Environment and Economic Environment Market Development more than Market Penetration Gaining market share is too hard so you concentrate on making more off each customer CRM, CLV, extending the PLC

  19. Environments - political Ian MacLeod Aug 14th 2013 Quoting Angela Gendron

  20. Background papers Written by Prof. Martin Rudner and Prof. Angela Gendron http://www.csis-scrs.gc.ca/pblctns/cdmctrch/20121001_ccsnlpprs-eng.asp

  21. Future Threats, Risks and Vulnerabilities - Infrastructure Risks “the industrial control systems governing the operations of utilities, from water storage and purification to nuclear power reactors, pose a growing risk to national security and Canada’s economic and societal well-being. ”

  22. Economic Environment Economic Environment The economics of information

  23. Technological Environment • New inventions being created by new enterprises • “Apps” Applications • Materials • Electronic circuitry • Increasing miniaturization of components • Increasing connectivity – Bluetooth and WiFi everywhere + A-GPS

  24. Technological Environment Magnitude of web based information is increasing at a rate which is phenomenal 1,800 Terabytes YouTube Instagram 40 secs

  25. The growth of the Technological Environment = T.M.I. The problem with T.M.I. is not being able to find things

  26. Technological Environment • The pace of technological change • Very very fast • Example • Cell phone cameras • Most devices GPS enabled • A-GPS

  27. Technological Environment Cell phone cameras • Smartphones vs. superphones • Smartphones take good pics • Superphones take great video • Tradecraft eclipsed by “teckint” ?

  28. Technological EnvironmentFuture Trends Web 2.0 Web 3.0

  29. Technological EnvironmentFuture Trends • Web 4.0 • Marriage of human biologic capabilities with IT hardware and software

  30. Social – Cultural Environment • Risks • Household devices and appliances with IP addresses • In condos and apts were there is a centrally wired structure • Houses in micro-communities (gated communities or prestigious developments) where there is wired or bluetooth connectivity

  31. Social – Cultural Environment • increasingly demanding and educated customers • Demanding • Educated • Wikipedia • Google • Everyone is an expert • But ppl don’t know how to discriminate

  32. Future Trends – Influencing Environments Political – Legal – Regulatory Environment Laws as a result of politicians responding to IT isssues Politically motivated cyber crime Challenges of cyber crime being outside the jurisdiction of a police / security agency

  33. Future Trends – Influencing Environments Political – Legal – Regulatory Environment The “ruling” Government is also the “policies” of the particular political party in power stay in power Suppress crime

  34. Future Trends – Influencing Environments Political – Legal – Regulatory Environment • National, regional, local • Surveillance technology

  35. Future Trends – Influencing Environments National Surveillance technology CBC News Wed Oct 9th New CSEC H.Q. in Ottawa One of the key themes is the requirement for massive amounts of CPU power Why?

  36. Requirements for computing power Mackenzie Institute as a word.doc file = 22 KB Mackenzie Institute as an audio file = 42 KB Mackenzie Institute as a video of someone speaking the words = 6,600 KB

  37. What does this mean in the context of the classical approach to Security • Threat • The nature of the threats are changing • Who is who and where • Example • Internal employees also includes your outsourcing IT partners • Risk • Vulnerability – “who” is changing • Not just computers

  38. Future Threats, Risks and Vulnerabilities Mobile web access Marketing and business

  39. Asymetric warfare

  40. Future Threats, Risks and Vulnerabilities • Vulnerabilities • Highly specific ID theft of individuals who have “high net worth”

  41. e 911 http://www.witiger.com/ecommerce/mcommerceGPS.htm Trends • 70% of calls to 911 in the U.S. are from mobile devices (over 50% in GTA) • GPS functionality used for social media • GPS, SPS, PPS • Relates to marketing where people are • “where” people are (victims and “bad guys”)

  42. Smartphone security 2011 paper on smartphone securityhttp://www.eecg.toronto.edu/~lie/papers/au-spsm2011.pdf Prof. David Lie Canada Research Chair in Secure and Reliable Computer Systems Dept. of Electrical and Computer EngineeringUniversity of Torontohttp://www.eecg.toronto.edu/~lie/papers/au-spsm2011.pdf

  43. Future Trends – Influencing Environments Political – Legal – Regulatory Environment • Municipal police agencies and cyber crime

  44. Staff Inspector Bryce Evans Ritesh Kotak TPS http://www.torontopolice.on.ca/socialmedia/

  45. Cyber tools to fight crime Co-operation and co-ordination

  46. conclusion Cybersecurity lends itself to a focus on teckint Will the solutions be mostly teckint? What role will humint play? Osint?

  47. Tim Richardson School of Marketing Seneca College tim.richardson@senecacollege.ca University of Toronto, CCIT Program, Mississauga and Dept. of Management, Scarborough richardson@utsc.utoronto.ca www.witiger.com http://people.senecac.on.ca/tim.richardson/powerpoints/

More Related