preparing for a cyber attack by jeffrey carr ceo and founder, greylogic.us author, "inside...
TRANSCRIPT
Preparing for a Cyber Attack
By Jeffrey CarrCEO and Founder, GreyLogic.us
Author, "Inside Cyber Warfare" (O'Reilly Media, 2009)
O'Reilly Gov 2.0 WebcastApril 29, 2010
Threat Vectors
Computer network attacks Cyber espionage Cyber terrorism Cyber crime Network infiltration of Critical Infrastructure Repression of Internal Opposition Groups Hybrid warfare Information warfare
State ActorsDefinition: Nation States who engage in one or more types of cyber
operations
Russian Federation Kyrgyzstan
Ukraine Estonia
Georgia Ingushetia
Peoples Republic of China
Taiwan
Israel Iran
Palestinian National Authority (Hamas)
Myanmar (Burma)
U.S. Turkey
Pakistan Germany
Zimbabwe Australia
State-Sponsored Actors
Definition: Non-state actors who are engaged by States to perform one or more types of cyber operations.
Partial list of States known to or suspected of sponsoring Actors
Russian Federation
Peoples Republic of China
Turkey
Iran
United States
Myanmar
Israel
Non-State Actors
Definition: Non-state actors who engage in cyber crime and/or patriotic hacking (aka hacktivists)
Too numerous too list
Cyber Self Defense
You cannot protect all your dataYou cannot stop every attack
Therefore,1) Reduce your attack surface2) Segregrate and protect your critical data3) Establish access norms and monitor for anomalies4) When you are attacked, report it. Transparency = Security
R&D Priorities: RF, PRCRussian Federation Peoples Republic of China
Nanoelectronics Core electronic components
Cloud computing High end generic chips
Cognitive systems and robotics
Extra large scale integrated chips
Digital libraries Next gen wireless mobile comms
ICT for patient safety, Large scale oil, gas, and coal mining
Semiconductor components and miniaturization systems
Water pollution control and treatment
Photonics
Contact Jeffrey Carr
Blog: http://IntelFusion.net Website: http://Greylogic.us Skype: greylogic Email: [email protected]