130 likes | 334 Vues
Israeli Innovation in Cyber Technology. Meet Mr Hacker!. Fake Identity. Huge Amounts of Data. Encryption. The (Black-Hat) Hackers are Winning !. http://www.pwc.com/en_US/us/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf. IAI Cyber Innovation Drivers.
E N D
Meet Mr Hacker! Fake Identity Huge Amounts of Data Encryption
The (Black-Hat) Hackers are Winning ! http://www.pwc.com/en_US/us/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
IAI Cyber Innovation Drivers • Cyber as an EVOLUTION and not (only) a REVOLUTION • Adapting legacy Radar, Electronic Warfare, C4I and Comm. Capabilities • Diverse competencies • Collaborating with Israeli (& other) Start-Up companies • Establishing Cyber Innovation, Research & Development Centers • Protecting IAI’s IP, firmware, network & systems • A test-bed for IAI’s Cyber capabiltie
Cyber as an EVOLUTION and not (only) a REVOLUTIONUtilizing Radar and EW Techniques in Cyber • The Challenge in Creating a Radar Situation Picture • Similar practices in Cyber Analytics – The Identity challenge
IAI’s Cyber R&D Centers Combining White Hat Hackers, Researchers and Engineers Target System vulnerability & protocol research Identifying Exploit Solution proof of concept & prototype Lab Testing Productization SOPs Deployment & Support Ongoing: Handling changes in Target System & protocol Hacking Engineering Custodio – IAI’s Cyber Early Warning R&D Center (Singapore) Cyberia – IAI’s Cyber Accessibility Research Center (Israel)
Ensuring Innovation with a Cyber Early Warning Center - A Service Oriented Approach • Government offices and CNIs as subscribers • Centralized Handling of Cyber Threat Monitoring • Forming a national database and forensic center capabilities for Cyber threats • Populating news, threats and security measuresAbility to perform forensics at the national level • Bi-Directional relationship with subscribers • To CEWC: Collection, information, new threats/virus/malware • From CEWC: intelligence, new threats/virus/malware, policies and procedures