SlideShare une entreprise Scribd logo
1  sur  52
Télécharger pour lire hors ligne
SIMO Network 2012
I Foro Profesional TIC de ATI
Los nuevos enfoques de la gestión de la Seguridad
Madrid, 26 de septiembre de 2012
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación.
Unas reflexiones sobre la
CIBERGUERRA
Miguel GARCÍA-MENÉNDEZ | iTTi
Manolo PALAO | iTTi
info@ittrendsinstitute.org
iTTi | Instituto de Tendencias en Tecnologías e Innovación
Un FORO para la INVESTIGACIÓN y la REFLEXIÓN
[I]nformación
[F]ormación
[O]pinión
[R]ecomendación
3
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 3SET 2012
4
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 4SET 2012
Una presentación a nivel de divulgación
Fuente:http://teacherweb.craven.k12.nc.us/TPE/kindergarten/images/2A90C21B963545C1B3634CB0EE89A110.jpg
55
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación.
Agenda
6
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 6SET 2012
1. Se habla mucho de Ciberguerra.
La Ciberguerra está de moda
2. La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’.
La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
3. Debería interesar más la Ciberpaz
4. Ciberguerra y Ciberpaz se están tratando de forma incompleta.
Faltan –al menos- gobernanza y divulgación.
Faltan conceptos claros, magnitudes y métricas
5. Falta de consenso. Negacionistas vs objetivistas
6. Algunas referencias importantes
7. SEGURINFO España 2012
Unas reflexiones sobre la CIBERGUERRA
Fuente:
http://dy6g3i6a1660s.cloudfront.net/MeIr3omw
3O31hhBWDqGFqgJYAmc/mt-89/were-
inspired-christopher-shannons-floral-
menswear-makeup.jpg
77
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación.
Unasreflexionessobrela
CIBERGUERRA
8
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 8SET 2012
Fuente: http://www.victorioylucchino.com/
Fuente: http://www.victorioylucchino.com/
La Ciberguerra está de moda
Se habla mucho de Ciberguerra
9
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 9SET 2012
Fuente: https://www.google.es/search?q=ropa+de+trabajo&hl=en&client=firefox-a&rls=org.mozilla:es-ES:official&channel=fflb&prmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=kVhKUPu6FdS2hAe4-4CwCA&sqi=2&ved=0CMQBELAE&biw=1280&bih=661
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
10
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 10SET 2012
Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&hs=s5b&sa=X&rls=org.mozilla:es-
ES:official&channel=np&biw=1429&bih=738&tbm=isch&prmd=imvns&tbnid=RhZpxbM9oA094M:&imgrefurl=http://w
ww.strangecosmos.com/content/item/153075.html&docid=ADQVCeVzWgarSM&imgurl=http://www.strangecosmos.c
om/images/content/153075.jpg&w=700&h=458&ei=JP5KUIyUJsbB0QXk0IGwDw&zoom=1&iact=hc&vpx=314&vpy=288
&dur=80&hovh=181&hovw=278&tx=138&ty=86&sig=109245388514343874860&page=1&tbnh=105&tbnw=160&start
=0&ndsp=28&ved=1t:429,r:8,s:0,i:98
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
11
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 11SET 2012
Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&hs=s5b&sa=X&rls=org.mozilla:es-
ES:official&channel=np&biw=1429&bih=738&tbm=isch&prmd=imvns&tbnid=vDj36CA4SaojQM:&imgrefurl=
http://miafene.hu/category/vilag/&docid=6-0nswoE3uAZuM&imgurl=http://miafene.hu/wp-
content/2009/09/chinese-army-trianing-for-national-day-parade-60th-anniversary-01-
560x373.jpg&w=560&h=373&ei=JP5KUIyUJsbB0QXk0IGwDw&zoom=1&iact=hc&vpx=197&vpy=330&dur=
644&hovh=183&hovw=275&tx=145&ty=135&sig=109245388514343874860&page=2&tbnh=164&tbnw=228
&start=28&ndsp=20&ved=1t:429,r:0,s:28,i:163
http://4.bp.blogspot.com/__pHoqjgxkwI/SHwwWPEtiVI/AAAAAAAAA2Y/NAfd2BOQQIM/s400/103-0387_IMG_2.JPG
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
12
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 12SET 2012
Fuente: http://www.google.es/imgres?start=204&hl=en&client=firefox-a&rls=org.mozilla:es-ES:official&channel=np&biw=1429&bih=738&tbm=isch&tbnid=gQPsbIBy0qo-
tM:&imgrefurl=http://canadianchefscongress.com/site/2010/06/&docid=bW-aDivlKQL0hM&imgurl=http://canadianchefscongress.com/site/wp-
content/uploads/IMG_7565.jpg&w=640&h=426&ei=TwJLUPaQKK-
20QX69YHQDg&zoom=1&iact=rc&dur=543&sig=109245388514343874860&page=10&tbnh=167&tbnw=223&ndsp=23&ved=1t:429,r:0,s:204,i:83&tx=151&ty=77
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
13
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 13SET 2012
Fuente: http://www.wacs2000.org/images/news/uae/WACS_Global_Chefs_Challenge/edgechefs1.jpg
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
Fuente:http://ifc.dpz.es/recursos/publicaciones/31/78/06medina.pdf
14
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 14SET 2012
Fuente:http://passporttoeat.files.wordpress.com/2011/10/img_9970.jpg
Fuente:http://www.daviddarling.info/images/heart_transplant_surgery.jpg
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
15
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 15SET 2012
Fuente: https://www.google.com/calendar/render?tab=mc
La ‘moda’ atrae –proporcionalmente- más
titulares que la ‘realidad’
La atracción /gravitación depende de muchos
intereses (todo es ‘relativo’)
Fuente:http://2.bp.blogspot.com/-SDCtTSmkDYY/TcHSoG9Wv_I/AAAAAAAACGo/Z-F9X_N-Tfo/s1600/wildfox-couture-cobrasnake-shoot-with-atlanta-de-cadanet-taylor.jpg
16
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 16SET 2012
Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&rls=org.mozilla:es-
ES:official&channel=fflb&biw=1280&bih=661&tbm=isch&tbnid=CZInmKgEnWgaZM:&imgrefurl=http://es.123rf.com/photo_5629032_unico-permanente-rastreo-de-
punta-roja-9-mm-parabellum-cartucho-
aislado.html&docid=oO_2sg8pCW9RGM&imgurl=http://us.123rf.com/400wm/400/400/slavapolo/slavapolo0910/slavapolo091000007/5629032-unico-permanente-
rastreo-de-punta-roja-9-mm-parabellum-cartucho-
aislado.jpg&w=262&h=400&ei=A1ZKULjjC8a00QXr6ID4Ag&zoom=1&iact=hc&vpx=1065&vpy=187&dur=451&hovh=153&hovw=107&tx=150&ty=153&sig=10924538
8514343874860&page=4&tbnh=153&tbnw=107&start=57&ndsp=22&ved=1t:429,r:10,s:57,i:287
Si vis pacem,
para bellum
Debería interesar más la Ciberpaz
17
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 17SET 2012
Fuente: http://en.wikipedia.org/wiki/War
guerra (war) [10+ condiciones]
(1) organized, (2) armed, and, often, a (3) prolonged conflict that is
carried on between states, nations, or other parties typified by (4)
extreme aggression, (5) social disruption, and usually (6) high mortality.
War should be understood as an (7) actual, (8) intentional and (9)
widespread (10) armed conflict between political communities, and
therefore is defined as a form of political violence.
The set of techniques used by a group to carry out war is known as
warfare.
An absence of war (and other violence) is usually called peace.
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
Conflicto
1 organizado
2 armado
3 prolongado
4 extremo
5 perturbación
6 mortandad
7 real
8 intencionado
9 amplio
10 político
18
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 18SET 2012
Fuente: http://en.wikipedia.org/wiki/War#Types_of_warfare
Conflicts in the following list are currently causing at
least 1,000 violent deaths per year, a categorization
used by the Uppsala Conflict Data Program[57] and
recognized by the United Nations.
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
19
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 19SET 2012
Ciberguerra y Guerra
B
Guerra
Ciberguerra
B
A
A
Guerra
Ciberguerra
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
20
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 20SET 2012
Cyberwar: un enfoque tridimensional simplificado
Motivación
Ámbito
Duración
guerra mundial
guerra ofensiva
guerra defensiva (1)
batallas (2)
codicia – crimen organizado
codicia – sicarios / autónomos
vandalismo – odio – ideología – sabotaje
curiosidad – ego (script kids, hackers)
larga duración
permanente
continua
alta frecuencia
ocasional
estados – países – organizaciones - bloques
masivo (regional, nacional)
infraestructuras críticas
sectores industriales / regiones
personas - empresas – organismos (3) (4)
Copyright©2012byManuelPalao,MiguelGarcía-Menéndez,eiTTi
(*) http://brazil.kaspersky.com/sobre-a-kaspersky/centro-de-imprensa/blog-da-kaspersky/MaaS
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
21
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 21SET 2012
Fuente: http://securityaffairs.co/wordpress/8765/intelligence/state-sponsored-attack-or-not-thats-the-question.html?goback=.gde_1870711_member_165007262
Fuente:
http://www.lemonde.fr/spor
t/article/2012/09/18/le-sri-
lanka-accueille-la-4e-edition-
de-la-coupe-du-monde-de-twenty20_1761945_3242.ht
ml#xtor=EPR-32280274-
[NL_Sport]-20120918-[titres_principaux]
22
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 22SET 2012
Cyberwar: un enfoque ampliado de 5 dimensiones
Motivación
Duración
Interiorización
Ciberdependencia
Copyright©2012byManuelPalao,MiguelGarcía-Menéndez,eiTTi
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
Fortaleza/PoderTecnológico vs. Inercia/Exceso de confianza
De la GUERRA ELECTRÓNICA a la CIBERGUERRA
La TECNIFICACIÓN como AMENAZA
National Cyber Strength = f(cyberoffensiveness,
cyberdependency,
cyberdefensiveness)
Concienciación
Formación
Imputabilidad
Madurez cívica
National Accountability
Ámbito
A
M
B
23
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 23SET 2012
Like for the cyber-weapon definition, we have
to focus on three elements 1. context, 2. aim
and 3. losing party (subject/object) to
recognise if we are in front of a cyber-warfare
or a cyber-terrorism (even state-sponsored)
attack.
http://www.linkedin.com/groupAnswers?view
QuestionAndAnswers=&discussionID=1668838
32&gid=1836487&commentID=96507872&trk
=view_disc&ut=21C_4C4DGLZBo1
Stefano Mele •
Ciberguerra y Ciberpaz se están
tratando de forma incompleta
24
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 24SET 2012
“… as a doctrinal matter, the Pentagon has
formally recognized cyberspace as a new
domain in warfare . . . [which] has become
just as critical to military operations as
land, sea, air, and space.“
William J. Lynn, U.S. Deputy Secretary of Defense
http://securityaffairs.co/wordpress/8765/intelligence/state-sponsored-attack-or-not-thats-the-
question.html?goback=.gde_1870711_member_165007262
tierra
¿ciberespacio?
aire
mar
espacio
Falta de consenso
LTC Greg Conti, Assistant Professor, USMA-WestPoint
25
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 25SET 2012
‘Negacionistas’ [Naysayers]
Fuente: http://cyberarms.wordpress.com/2010/10/23/putting-the-cyber-in-cyber-warfare/
“… you can’t kill with Denial of
Service attacks.
… you can’t shut down the power
grid through the internet.”
‘CYBERWAR NAYSAYER’
About 20,900 results
https://www.google.es/#hl=en&output=search&sclient=psy-
ab&q=cyberwar+naysayer&oq=cyberwar+naysayer&gs_l=hp.12...10149.20162.1.22458.17.17.0.0.0.0.319.3119.0j12j4j1.17.0...0.0...1c.WR7dfo
ieoUs&psj=1&fp=1&biw=1024&bih=431&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.&cad=b
26
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 26SET 2012
‘Negacionistas’ [Naysayers]
Cyber war threat exaggerated claims security expert
http://www.bbc.com/news/technology-12473809
Bruce Schneier claims that emotive rhetoric around the term does not match the reality.
He warned that using sensational phrases such as "cyber armageddon" only inflames the
situation.
Mr Schneier, who is chief security officer for BT, is due to address the RSA security
conference in San Francisco this week.
His point of view was backed by Howard Schmidt, cyber security co-ordinator for the
White House.
27
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 27SET 2012
‘Negacionistas’ [Naysayers]
cyber-war-still-not-a-thing
http://reason.com/blog/2011/10/21/cyber-war-still-not-a-thing
Despite what your congressman may tell you, cyber war might never
happen, says a researcher in the Department of War Studies at King’s
College London.
Thomas Rid, also a fellow at Johns Hopkins’ School for Advanced
International Studies, writes that “Cyber War Will Not Take Place”, an
assessment that contrasts with those of many elected U.S. officials. Rid
claims that no online attack to date constitutes cyber war and that it’s
“highly unlikely that cyber war will occur in the future.”
Fuente:
http://www.beweddingplanner.com/inspirational-elie-
saab-prices.html/haute-couture-elie-saab-prices
28
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 28SET 2012
‘Negacionistas’ [Naysayers]
http://reason.com/archives/2011/07/25/the-cybersecurity-industrial-c/singlepage
The Cybersecurity-Industrial Complex. The feds erect a
bureaucracy to combat a questionable threat.
A rough … consensus has emerged that the United States is facing a grave and immediate
threat that can only be addressed by more public spending and tighter controls on
private network security practices.
But there is little clear, publicly verified evidence that cyber attacks are a serious threat.
What we are witnessing may be a different sort of danger: the rise of a Cybersecurity -
-industrial complex, much like the military-industrial complex of the Cold War, that not
only produces expensive weapons to combat the alleged menace but whips up demand
for its services by wildly exaggerating our vulnerability.
‘The New Industrial State’
(1967), John Kenneth Galbraith
http://en.wikipedia.org/wiki/File:John_Kenneth_
Galbraith.jpg
29
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 29SET 2012
‘Negacionistas’ [Naysayers]
Andrea Zapparoli Manzoni (20120926, CYBER
SECURITY Forum Initiative -
CSFI http://www.linkedin.com/groupAnswers?vie
wQuestionAndAnswers=&discussionID=1668838
32&gid=1836487&commentID=96645448&trk=vi
ew_disc&ut=0WJneMXcjW-Bo1
[acerca de unos ataques DDoS a la Banca de
EEUU]
- this is definitely not cyber war (simply because
such a thing doesn't exist, like the Unicorn)
30
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 30SET 2012
Analistas, Auditores y ‘Objetivistas’
SEGURINFO,
Madrid,
20121121
“Unfortunately too many published
assessmentshave favored
sensationalism over careful analysis”
“… few single foreseeable cyber-
related events have the capacity to
propagate onwards and become a full-
scale ―global shock”.
“A critical feature of any worthwhile
analysis is discipline in the use of
language”.
“Cyber espionage is not ―a few clicks
away from cyberwar, it is spying which
is not normally thought of as ―war”.
31
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 31SET 2012
Analistas, Auditores y ‘Objetivistas’
“By the same token a short-term
attack by hacktivists is not cyberwar
either”.
“A pure cyberwar, that is one fought
solely with cyber-weapons, is
unlikely”.
“On the other hand in nearly all future
wars as well as the skirmishes that
precede them policymakers must
expect the use of cyberweaponry”.
“… the Internet was designed from the
start to be robust so that failures in
one part are routed around…”
32
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 32SET 2012
Analistas, Auditores y ‘Objetivistas’
“In terms of cyber attacks the one
overwhelming characteristic is that
most of the time it will be impossible
for victims to ascertain the identity of
the attacker – the problem of
attribution.
This means that a defense doctrine
based on deterrence will not work.
The most immediately effective action
that governments can take is to
improve the security standards of their
own critical information systems.
33
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 33SET 2012
Analistas, Auditores y ‘Objetivistas’
The report addressed web/email attacks. The techniques used bypass both
signature and heuristic security means.
I. Web
225% increase in web infections in last 6 months. 643/week now.
Attacks vary by industry:
Healthcare - 100% increase Financial Services - spike in April/May - from Latvia
Technology - high volume - stable trend - target is Intellectual Property
Energy/Utility - 60% increase - target is smart grid
II. Email
56% increase in malicious email in last 6 months
Two methods used: malicious links in email and email attachments. Links are
growing faster.
"Throw away*" domains are being used more - those used 1-10 times and discarded.
This is to circumvent filters and black lists by domain. (*also known as Limited Use
Domains/Crafted Domains)
Attachments: increase in variance by type of attachment. Target vulnerabilities in
serving applications. (Example: pdf/Abode)
Michael S Hines
mshines@purdue.edu
<083b01cd98d7$34dfdf90$9e9f9eb0$@purdue.edu>
"FireEye Advanced Threat Report - First Half 2012"
Thesis of the report: Advanced attacks bypass
traditional security like Firewalls, Intrusion
Prevention, and Anti-virus.
34
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 34SET 2012
Analistas, Auditores y ‘Objetivistas’
III. Files
Filter and limit by type. Examine inbound for malicious content.
Examine outbound for proprietary information.
Many attacks are trying to obtain data more now.
Files are being extracted using the HTTP (port:80) protocol - which is usually more
open.
IV. Some protective moves you can make.
#1. User education regarding risks in email (links and attachments) and web sites
(links).
#2. Defense in depth - key - protecting not only the front door, but internal networks
for the proper access controls (users/data paths)
#3. Secure coding best practices (never trust user input - audit/examine/test/validate).
(Example: a web site that queries a database: if the user enters a "*" and no check is
made and the "*" is passed to SQL, the request is to return all rows in the table - a very
easy exploit - and most likely not what you want to happen).
Michael S Hines
mshines@purdue.edu
<083b01cd98d7$34dfdf90$9e9f9eb0$@purdue.edu>
35
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 35SET 2012
“We have met the enemy and he is us”
Fuente: Walt Kelly .
http://wiki.answers.com/Q/What_is_the_origin_of_the_phrase_'I_have_found_the
_enemy_and_it_is_us'#ixzz264CPrYv4
Fuentehttp://2.bp.blogspot.com/_JnCUXFEdVus/TObNm8kA-
fI/AAAAAAAABuw/CR3NldAsfBQ/s1600/6a00d8341ca4d953ef013481cb7b9e970c-800wi.jpg
Analistas, Auditores y ‘Objetivistas’
Fuente:
http://dy6g3i6a1660s.cloudfront.n
et/MeIr3omw3O31hhBWDqGFqgJ
YAmc/mt-89/were-inspired-
christopher-shannons-floral-
menswear-makeup.jpg
36
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 36SET 2012
Algunas referencias importantes
37
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 37SET 2012
Algunas referencias importantes
38
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 38SET 2012
Algunas referencias importantes
39
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 39SET 2012
Algunas referencias importantes
40
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 40SET 2012
Algunas referencias importantes
41
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 41SET 2012
Algunas referencias importantes
42
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 42SET 2012
Algunas referencias importantes
43
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 43SET 2012
Algunas referencias importantes
44
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 44SET 2012
Algunas referencias importantes
45
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 45SET 2012
Algunas referencias importantes
46
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 46SET 2012
Algunas referencias importantes
47
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 47SET 2012
Algunas referencias importantes
48
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 48SET 2012
Algunas referencias importantes
49
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 49SET 2012
" ... to define a common language for describing IA work
and work components, in order to provide commercial
certification providers and training vendors with targeted
information to enhance their learning offerings.”
Fuente: IT Security EBK: A Competency and Functional Framework for IT
Security Workforce Development Section 1. Introduction. http://www.us-
cert.gov/ITSecurityEBK/EBK2008.pdf
information
assurance
Algunas referencias importantes
Fuente: http://ris.fashion.telegraph.co.uk/RichImageService.svc/imagecontent/1/TMG7843655/p/milan_versace_gett_1662788a.jpg
50
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 50SET 2012
Algunas referencias importantes
Fuente: iTTi
51
SIMO 2012 ATI Ciberguerra -iTTi-
© Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 51SET 2012
Fuente: www.SegurInfo.org
info@ittrendsinstitute.org

Contenu connexe

En vedette (11)

The iTTi Manifesto
The iTTi ManifestoThe iTTi Manifesto
The iTTi Manifesto
 
Msc & my creations overview
Msc & my creations overviewMsc & my creations overview
Msc & my creations overview
 
Film slideshare
Film slideshareFilm slideshare
Film slideshare
 
Mdg 5
Mdg 5Mdg 5
Mdg 5
 
Dead women talking (in morocco)
Dead women talking (in  morocco)Dead women talking (in  morocco)
Dead women talking (in morocco)
 
Gender and NRHM
 Gender and NRHM Gender and NRHM
Gender and NRHM
 
Aprovisionamiento de servicios de TI. Foto-resumen de la sesión (Spanish)
Aprovisionamiento de servicios de TI. Foto-resumen de la sesión (Spanish)Aprovisionamiento de servicios de TI. Foto-resumen de la sesión (Spanish)
Aprovisionamiento de servicios de TI. Foto-resumen de la sesión (Spanish)
 
Addressing declining sex ratios
Addressing declining sex ratiosAddressing declining sex ratios
Addressing declining sex ratios
 
Radiografía de COBIT
Radiografía de COBITRadiografía de COBIT
Radiografía de COBIT
 
Health rights, accountability and human rights
Health rights, accountability  and human rightsHealth rights, accountability  and human rights
Health rights, accountability and human rights
 
Feminist research in health
Feminist research in healthFeminist research in health
Feminist research in health
 

Similaire à Unas reflexiones sobre la ciberguerra (Spanish)

UITIC Italy - Carlo Alberto Carnevale Maffè
UITIC Italy - Carlo Alberto Carnevale MaffèUITIC Italy - Carlo Alberto Carnevale Maffè
UITIC Italy - Carlo Alberto Carnevale MaffèUITICItaly
 
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...AnuragSingh1049
 
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy”  Task Force Meeting - Andrew WyckoffG20 “Digital Economy”  Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoffinnovationoecd
 
Lourdes china book 2020v2 uscbc
Lourdes china book 2020v2 uscbcLourdes china book 2020v2 uscbc
Lourdes china book 2020v2 uscbcLourdes Casanova
 
Smooth Operations - Tiffany Misrahi
Smooth Operations - Tiffany MisrahiSmooth Operations - Tiffany Misrahi
Smooth Operations - Tiffany MisrahiSITA
 
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...Digital Business. Countries – leaders, issues, initiatives. Companies – shift...
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...Natalia Berdyeva
 
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...EmmanuelGillet
 
2015 innovation strategy ppt
2015 innovation strategy ppt2015 innovation strategy ppt
2015 innovation strategy pptinnovationoecd
 
INDUSTRY 5.0 - OTGM AUDIT
INDUSTRY 5.0 - OTGM AUDITINDUSTRY 5.0 - OTGM AUDIT
INDUSTRY 5.0 - OTGM AUDITMichael Rada
 
Manufacturing - Canada -February 2022 and March 2022.pptx
Manufacturing - Canada -February 2022 and March 2022.pptxManufacturing - Canada -February 2022 and March 2022.pptx
Manufacturing - Canada -February 2022 and March 2022.pptxpaul young cpa, cga
 
Ritesh Harvard Hyperlink
Ritesh Harvard Hyperlink Ritesh Harvard Hyperlink
Ritesh Harvard Hyperlink Dr Ritesh Malik
 
10 key trends to watch for 2014 from GlobalTrends.com
10 key trends to watch for 2014 from GlobalTrends.com 10 key trends to watch for 2014 from GlobalTrends.com
10 key trends to watch for 2014 from GlobalTrends.com Tracey Keys
 
F**NEWS- nº1 jul23_EN.pdf
F**NEWS- nº1 jul23_EN.pdfF**NEWS- nº1 jul23_EN.pdf
F**NEWS- nº1 jul23_EN.pdfChristian Palau
 
Business Transformation V6
Business Transformation V6Business Transformation V6
Business Transformation V6RekaNext Capital
 

Similaire à Unas reflexiones sobre la ciberguerra (Spanish) (20)

UITIC Italy - Carlo Alberto Carnevale Maffè
UITIC Italy - Carlo Alberto Carnevale MaffèUITIC Italy - Carlo Alberto Carnevale Maffè
UITIC Italy - Carlo Alberto Carnevale Maffè
 
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...
A quest towardsfashiondesignprotectionmodelfortheintellectualpropertyrightsgl...
 
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy”  Task Force Meeting - Andrew WyckoffG20 “Digital Economy”  Task Force Meeting - Andrew Wyckoff
G20 “Digital Economy” Task Force Meeting - Andrew Wyckoff
 
Lourdes china book 2020v2 uscbc
Lourdes china book 2020v2 uscbcLourdes china book 2020v2 uscbc
Lourdes china book 2020v2 uscbc
 
Smooth Operations - Tiffany Misrahi
Smooth Operations - Tiffany MisrahiSmooth Operations - Tiffany Misrahi
Smooth Operations - Tiffany Misrahi
 
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...Digital Business. Countries – leaders, issues, initiatives. Companies – shift...
Digital Business. Countries – leaders, issues, initiatives. Companies – shift...
 
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
 
2015 innovation strategy ppt
2015 innovation strategy ppt2015 innovation strategy ppt
2015 innovation strategy ppt
 
INDUSTRY 5.0 - OTGM AUDIT
INDUSTRY 5.0 - OTGM AUDITINDUSTRY 5.0 - OTGM AUDIT
INDUSTRY 5.0 - OTGM AUDIT
 
Innovation and r&d
Innovation and r&dInnovation and r&d
Innovation and r&d
 
Manufacturing - Canada -February 2022 and March 2022.pptx
Manufacturing - Canada -February 2022 and March 2022.pptxManufacturing - Canada -February 2022 and March 2022.pptx
Manufacturing - Canada -February 2022 and March 2022.pptx
 
Fei Presentation 2010
Fei Presentation 2010Fei Presentation 2010
Fei Presentation 2010
 
Ritesh Harvard Hyperlink
Ritesh Harvard Hyperlink Ritesh Harvard Hyperlink
Ritesh Harvard Hyperlink
 
Brooks
BrooksBrooks
Brooks
 
10 key trends to watch for 2014 from GlobalTrends.com
10 key trends to watch for 2014 from GlobalTrends.com 10 key trends to watch for 2014 from GlobalTrends.com
10 key trends to watch for 2014 from GlobalTrends.com
 
Failure Of Nokia
Failure Of NokiaFailure Of Nokia
Failure Of Nokia
 
CIO & Technology Leaders Series Event Report: Stockholm
CIO & Technology Leaders Series Event Report: StockholmCIO & Technology Leaders Series Event Report: Stockholm
CIO & Technology Leaders Series Event Report: Stockholm
 
F**NEWS- nº1 jul23_EN.pdf
F**NEWS- nº1 jul23_EN.pdfF**NEWS- nº1 jul23_EN.pdf
F**NEWS- nº1 jul23_EN.pdf
 
Business Transformation V6
Business Transformation V6Business Transformation V6
Business Transformation V6
 
Innovation in Media - CII Big Picture Summit 2013
Innovation in Media - CII Big Picture Summit 2013Innovation in Media - CII Big Picture Summit 2013
Innovation in Media - CII Big Picture Summit 2013
 

Plus de iTTi Innovation &amp; Technology Trends Institute

Plus de iTTi Innovation &amp; Technology Trends Institute (17)

Monografía para "Novática" número 229. Invitación a la presentación
Monografía para "Novática" número 229. Invitación a la presentaciónMonografía para "Novática" número 229. Invitación a la presentación
Monografía para "Novática" número 229. Invitación a la presentación
 
El Manifiesto iTTi
El Manifiesto iTTiEl Manifiesto iTTi
El Manifiesto iTTi
 
Rendicion de cuentas sobre TI. Marco de toma de decisiones en materia tecnolo...
Rendicion de cuentas sobre TI. Marco de toma de decisiones en materia tecnolo...Rendicion de cuentas sobre TI. Marco de toma de decisiones en materia tecnolo...
Rendicion de cuentas sobre TI. Marco de toma de decisiones en materia tecnolo...
 
Rendicion de cuentas sobre TI. Caso "Novopay" (Spanish)
 Rendicion de cuentas sobre TI. Caso "Novopay" (Spanish) Rendicion de cuentas sobre TI. Caso "Novopay" (Spanish)
Rendicion de cuentas sobre TI. Caso "Novopay" (Spanish)
 
Rendicion de cuentas sobre TI. Bienvenida (Spanish)
Rendicion de cuentas sobre TI. Bienvenida (Spanish)Rendicion de cuentas sobre TI. Bienvenida (Spanish)
Rendicion de cuentas sobre TI. Bienvenida (Spanish)
 
Aprovisionamiento de servicios de TI. Una moneda de doble cara (Spanish)
Aprovisionamiento de servicios de TI. Una moneda de doble cara (Spanish)Aprovisionamiento de servicios de TI. Una moneda de doble cara (Spanish)
Aprovisionamiento de servicios de TI. Una moneda de doble cara (Spanish)
 
La importancia de las certificaciones TIC en un mundo globalizado (Spanish)
La importancia de las certificaciones TIC en un mundo globalizado (Spanish)La importancia de las certificaciones TIC en un mundo globalizado (Spanish)
La importancia de las certificaciones TIC en un mundo globalizado (Spanish)
 
CRISC online review course Spanish / Español (Intro)
CRISC online review course Spanish / Español (Intro)CRISC online review course Spanish / Español (Intro)
CRISC online review course Spanish / Español (Intro)
 
CGEIT online review course Spanish / Español (Intro)
CGEIT online review course Spanish / Español (Intro)CGEIT online review course Spanish / Español (Intro)
CGEIT online review course Spanish / Español (Intro)
 
CISM online review course Spanish / Español (Intro)
CISM online review course Spanish / Español (Intro)CISM online review course Spanish / Español (Intro)
CISM online review course Spanish / Español (Intro)
 
CISA online review course Spanish / Español (Intro)
CISA online review course Spanish / Español (Intro)CISA online review course Spanish / Español (Intro)
CISA online review course Spanish / Español (Intro)
 
Retos de la seguridad en la modernización de las Administraciones Públicas: E...
Retos de la seguridad en la modernización de las Administraciones Públicas: E...Retos de la seguridad en la modernización de las Administraciones Públicas: E...
Retos de la seguridad en la modernización de las Administraciones Públicas: E...
 
Sobre las certificaciones profesionales de carácter personal (Spanish)
Sobre las certificaciones profesionales de carácter personal (Spanish)Sobre las certificaciones profesionales de carácter personal (Spanish)
Sobre las certificaciones profesionales de carácter personal (Spanish)
 
COBIT 5: La Gran Mentira (por fin, desvelada) (Spanish)
COBIT 5: La Gran Mentira (por fin, desvelada) (Spanish)COBIT 5: La Gran Mentira (por fin, desvelada) (Spanish)
COBIT 5: La Gran Mentira (por fin, desvelada) (Spanish)
 
2009-2011. Dos años de Gobierno Corporativo de las TIC, en ISACA Madrid: Logr...
2009-2011. Dos años de Gobierno Corporativo de las TIC, en ISACA Madrid: Logr...2009-2011. Dos años de Gobierno Corporativo de las TIC, en ISACA Madrid: Logr...
2009-2011. Dos años de Gobierno Corporativo de las TIC, en ISACA Madrid: Logr...
 
Gobierno Corporativo y de TI, ¿compatibles? (Spanish)
Gobierno Corporativo y de TI, ¿compatibles? (Spanish)Gobierno Corporativo y de TI, ¿compatibles? (Spanish)
Gobierno Corporativo y de TI, ¿compatibles? (Spanish)
 
iTTi | Impulsando el crecimiento. Presentación corporativa (Spanish)
 iTTi | Impulsando el crecimiento. Presentación corporativa (Spanish) iTTi | Impulsando el crecimiento. Presentación corporativa (Spanish)
iTTi | Impulsando el crecimiento. Presentación corporativa (Spanish)
 

Dernier

Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 

Dernier (20)

Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 

Unas reflexiones sobre la ciberguerra (Spanish)

  • 1. SIMO Network 2012 I Foro Profesional TIC de ATI Los nuevos enfoques de la gestión de la Seguridad Madrid, 26 de septiembre de 2012 © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. Unas reflexiones sobre la CIBERGUERRA Miguel GARCÍA-MENÉNDEZ | iTTi Manolo PALAO | iTTi
  • 2. info@ittrendsinstitute.org iTTi | Instituto de Tendencias en Tecnologías e Innovación Un FORO para la INVESTIGACIÓN y la REFLEXIÓN [I]nformación [F]ormación [O]pinión [R]ecomendación
  • 3. 3 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 3SET 2012
  • 4. 4 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 4SET 2012 Una presentación a nivel de divulgación Fuente:http://teacherweb.craven.k12.nc.us/TPE/kindergarten/images/2A90C21B963545C1B3634CB0EE89A110.jpg
  • 5. 55 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. Agenda
  • 6. 6 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 6SET 2012 1. Se habla mucho de Ciberguerra. La Ciberguerra está de moda 2. La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’. La atracción /gravitación depende de muchos intereses (todo es ‘relativo’) 3. Debería interesar más la Ciberpaz 4. Ciberguerra y Ciberpaz se están tratando de forma incompleta. Faltan –al menos- gobernanza y divulgación. Faltan conceptos claros, magnitudes y métricas 5. Falta de consenso. Negacionistas vs objetivistas 6. Algunas referencias importantes 7. SEGURINFO España 2012 Unas reflexiones sobre la CIBERGUERRA Fuente: http://dy6g3i6a1660s.cloudfront.net/MeIr3omw 3O31hhBWDqGFqgJYAmc/mt-89/were- inspired-christopher-shannons-floral- menswear-makeup.jpg
  • 7. 77 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. Unasreflexionessobrela CIBERGUERRA
  • 8. 8 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 8SET 2012 Fuente: http://www.victorioylucchino.com/ Fuente: http://www.victorioylucchino.com/ La Ciberguerra está de moda Se habla mucho de Ciberguerra
  • 9. 9 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 9SET 2012 Fuente: https://www.google.es/search?q=ropa+de+trabajo&hl=en&client=firefox-a&rls=org.mozilla:es-ES:official&channel=fflb&prmd=imvns&tbm=isch&tbo=u&source=univ&sa=X&ei=kVhKUPu6FdS2hAe4-4CwCA&sqi=2&ved=0CMQBELAE&biw=1280&bih=661 La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
  • 10. 10 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 10SET 2012 Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&hs=s5b&sa=X&rls=org.mozilla:es- ES:official&channel=np&biw=1429&bih=738&tbm=isch&prmd=imvns&tbnid=RhZpxbM9oA094M:&imgrefurl=http://w ww.strangecosmos.com/content/item/153075.html&docid=ADQVCeVzWgarSM&imgurl=http://www.strangecosmos.c om/images/content/153075.jpg&w=700&h=458&ei=JP5KUIyUJsbB0QXk0IGwDw&zoom=1&iact=hc&vpx=314&vpy=288 &dur=80&hovh=181&hovw=278&tx=138&ty=86&sig=109245388514343874860&page=1&tbnh=105&tbnw=160&start =0&ndsp=28&ved=1t:429,r:8,s:0,i:98 La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
  • 11. 11 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 11SET 2012 Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&hs=s5b&sa=X&rls=org.mozilla:es- ES:official&channel=np&biw=1429&bih=738&tbm=isch&prmd=imvns&tbnid=vDj36CA4SaojQM:&imgrefurl= http://miafene.hu/category/vilag/&docid=6-0nswoE3uAZuM&imgurl=http://miafene.hu/wp- content/2009/09/chinese-army-trianing-for-national-day-parade-60th-anniversary-01- 560x373.jpg&w=560&h=373&ei=JP5KUIyUJsbB0QXk0IGwDw&zoom=1&iact=hc&vpx=197&vpy=330&dur= 644&hovh=183&hovw=275&tx=145&ty=135&sig=109245388514343874860&page=2&tbnh=164&tbnw=228 &start=28&ndsp=20&ved=1t:429,r:0,s:28,i:163 http://4.bp.blogspot.com/__pHoqjgxkwI/SHwwWPEtiVI/AAAAAAAAA2Y/NAfd2BOQQIM/s400/103-0387_IMG_2.JPG La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
  • 12. 12 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 12SET 2012 Fuente: http://www.google.es/imgres?start=204&hl=en&client=firefox-a&rls=org.mozilla:es-ES:official&channel=np&biw=1429&bih=738&tbm=isch&tbnid=gQPsbIBy0qo- tM:&imgrefurl=http://canadianchefscongress.com/site/2010/06/&docid=bW-aDivlKQL0hM&imgurl=http://canadianchefscongress.com/site/wp- content/uploads/IMG_7565.jpg&w=640&h=426&ei=TwJLUPaQKK- 20QX69YHQDg&zoom=1&iact=rc&dur=543&sig=109245388514343874860&page=10&tbnh=167&tbnw=223&ndsp=23&ved=1t:429,r:0,s:204,i:83&tx=151&ty=77 La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
  • 13. 13 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 13SET 2012 Fuente: http://www.wacs2000.org/images/news/uae/WACS_Global_Chefs_Challenge/edgechefs1.jpg La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’) Fuente:http://ifc.dpz.es/recursos/publicaciones/31/78/06medina.pdf
  • 14. 14 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 14SET 2012 Fuente:http://passporttoeat.files.wordpress.com/2011/10/img_9970.jpg Fuente:http://www.daviddarling.info/images/heart_transplant_surgery.jpg La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’)
  • 15. 15 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 15SET 2012 Fuente: https://www.google.com/calendar/render?tab=mc La ‘moda’ atrae –proporcionalmente- más titulares que la ‘realidad’ La atracción /gravitación depende de muchos intereses (todo es ‘relativo’) Fuente:http://2.bp.blogspot.com/-SDCtTSmkDYY/TcHSoG9Wv_I/AAAAAAAACGo/Z-F9X_N-Tfo/s1600/wildfox-couture-cobrasnake-shoot-with-atlanta-de-cadanet-taylor.jpg
  • 16. 16 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 16SET 2012 Fuente:http://www.google.es/imgres?hl=en&client=firefox-a&rls=org.mozilla:es- ES:official&channel=fflb&biw=1280&bih=661&tbm=isch&tbnid=CZInmKgEnWgaZM:&imgrefurl=http://es.123rf.com/photo_5629032_unico-permanente-rastreo-de- punta-roja-9-mm-parabellum-cartucho- aislado.html&docid=oO_2sg8pCW9RGM&imgurl=http://us.123rf.com/400wm/400/400/slavapolo/slavapolo0910/slavapolo091000007/5629032-unico-permanente- rastreo-de-punta-roja-9-mm-parabellum-cartucho- aislado.jpg&w=262&h=400&ei=A1ZKULjjC8a00QXr6ID4Ag&zoom=1&iact=hc&vpx=1065&vpy=187&dur=451&hovh=153&hovw=107&tx=150&ty=153&sig=10924538 8514343874860&page=4&tbnh=153&tbnw=107&start=57&ndsp=22&ved=1t:429,r:10,s:57,i:287 Si vis pacem, para bellum Debería interesar más la Ciberpaz
  • 17. 17 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 17SET 2012 Fuente: http://en.wikipedia.org/wiki/War guerra (war) [10+ condiciones] (1) organized, (2) armed, and, often, a (3) prolonged conflict that is carried on between states, nations, or other parties typified by (4) extreme aggression, (5) social disruption, and usually (6) high mortality. War should be understood as an (7) actual, (8) intentional and (9) widespread (10) armed conflict between political communities, and therefore is defined as a form of political violence. The set of techniques used by a group to carry out war is known as warfare. An absence of war (and other violence) is usually called peace. Ciberguerra y Ciberpaz se están tratando de forma incompleta Conflicto 1 organizado 2 armado 3 prolongado 4 extremo 5 perturbación 6 mortandad 7 real 8 intencionado 9 amplio 10 político
  • 18. 18 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 18SET 2012 Fuente: http://en.wikipedia.org/wiki/War#Types_of_warfare Conflicts in the following list are currently causing at least 1,000 violent deaths per year, a categorization used by the Uppsala Conflict Data Program[57] and recognized by the United Nations. Ciberguerra y Ciberpaz se están tratando de forma incompleta Ciberguerra y Ciberpaz se están tratando de forma incompleta
  • 19. 19 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 19SET 2012 Ciberguerra y Guerra B Guerra Ciberguerra B A A Guerra Ciberguerra Ciberguerra y Ciberpaz se están tratando de forma incompleta
  • 20. 20 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 20SET 2012 Cyberwar: un enfoque tridimensional simplificado Motivación Ámbito Duración guerra mundial guerra ofensiva guerra defensiva (1) batallas (2) codicia – crimen organizado codicia – sicarios / autónomos vandalismo – odio – ideología – sabotaje curiosidad – ego (script kids, hackers) larga duración permanente continua alta frecuencia ocasional estados – países – organizaciones - bloques masivo (regional, nacional) infraestructuras críticas sectores industriales / regiones personas - empresas – organismos (3) (4) Copyright©2012byManuelPalao,MiguelGarcía-Menéndez,eiTTi (*) http://brazil.kaspersky.com/sobre-a-kaspersky/centro-de-imprensa/blog-da-kaspersky/MaaS Ciberguerra y Ciberpaz se están tratando de forma incompleta
  • 21. 21 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 21SET 2012 Fuente: http://securityaffairs.co/wordpress/8765/intelligence/state-sponsored-attack-or-not-thats-the-question.html?goback=.gde_1870711_member_165007262 Fuente: http://www.lemonde.fr/spor t/article/2012/09/18/le-sri- lanka-accueille-la-4e-edition- de-la-coupe-du-monde-de-twenty20_1761945_3242.ht ml#xtor=EPR-32280274- [NL_Sport]-20120918-[titres_principaux]
  • 22. 22 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 22SET 2012 Cyberwar: un enfoque ampliado de 5 dimensiones Motivación Duración Interiorización Ciberdependencia Copyright©2012byManuelPalao,MiguelGarcía-Menéndez,eiTTi Ciberguerra y Ciberpaz se están tratando de forma incompleta Fortaleza/PoderTecnológico vs. Inercia/Exceso de confianza De la GUERRA ELECTRÓNICA a la CIBERGUERRA La TECNIFICACIÓN como AMENAZA National Cyber Strength = f(cyberoffensiveness, cyberdependency, cyberdefensiveness) Concienciación Formación Imputabilidad Madurez cívica National Accountability Ámbito A M B
  • 23. 23 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 23SET 2012 Like for the cyber-weapon definition, we have to focus on three elements 1. context, 2. aim and 3. losing party (subject/object) to recognise if we are in front of a cyber-warfare or a cyber-terrorism (even state-sponsored) attack. http://www.linkedin.com/groupAnswers?view QuestionAndAnswers=&discussionID=1668838 32&gid=1836487&commentID=96507872&trk =view_disc&ut=21C_4C4DGLZBo1 Stefano Mele • Ciberguerra y Ciberpaz se están tratando de forma incompleta
  • 24. 24 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 24SET 2012 “… as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space.“ William J. Lynn, U.S. Deputy Secretary of Defense http://securityaffairs.co/wordpress/8765/intelligence/state-sponsored-attack-or-not-thats-the- question.html?goback=.gde_1870711_member_165007262 tierra ¿ciberespacio? aire mar espacio Falta de consenso LTC Greg Conti, Assistant Professor, USMA-WestPoint
  • 25. 25 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 25SET 2012 ‘Negacionistas’ [Naysayers] Fuente: http://cyberarms.wordpress.com/2010/10/23/putting-the-cyber-in-cyber-warfare/ “… you can’t kill with Denial of Service attacks. … you can’t shut down the power grid through the internet.” ‘CYBERWAR NAYSAYER’ About 20,900 results https://www.google.es/#hl=en&output=search&sclient=psy- ab&q=cyberwar+naysayer&oq=cyberwar+naysayer&gs_l=hp.12...10149.20162.1.22458.17.17.0.0.0.0.319.3119.0j12j4j1.17.0...0.0...1c.WR7dfo ieoUs&psj=1&fp=1&biw=1024&bih=431&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.&cad=b
  • 26. 26 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 26SET 2012 ‘Negacionistas’ [Naysayers] Cyber war threat exaggerated claims security expert http://www.bbc.com/news/technology-12473809 Bruce Schneier claims that emotive rhetoric around the term does not match the reality. He warned that using sensational phrases such as "cyber armageddon" only inflames the situation. Mr Schneier, who is chief security officer for BT, is due to address the RSA security conference in San Francisco this week. His point of view was backed by Howard Schmidt, cyber security co-ordinator for the White House.
  • 27. 27 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 27SET 2012 ‘Negacionistas’ [Naysayers] cyber-war-still-not-a-thing http://reason.com/blog/2011/10/21/cyber-war-still-not-a-thing Despite what your congressman may tell you, cyber war might never happen, says a researcher in the Department of War Studies at King’s College London. Thomas Rid, also a fellow at Johns Hopkins’ School for Advanced International Studies, writes that “Cyber War Will Not Take Place”, an assessment that contrasts with those of many elected U.S. officials. Rid claims that no online attack to date constitutes cyber war and that it’s “highly unlikely that cyber war will occur in the future.” Fuente: http://www.beweddingplanner.com/inspirational-elie- saab-prices.html/haute-couture-elie-saab-prices
  • 28. 28 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 28SET 2012 ‘Negacionistas’ [Naysayers] http://reason.com/archives/2011/07/25/the-cybersecurity-industrial-c/singlepage The Cybersecurity-Industrial Complex. The feds erect a bureaucracy to combat a questionable threat. A rough … consensus has emerged that the United States is facing a grave and immediate threat that can only be addressed by more public spending and tighter controls on private network security practices. But there is little clear, publicly verified evidence that cyber attacks are a serious threat. What we are witnessing may be a different sort of danger: the rise of a Cybersecurity - -industrial complex, much like the military-industrial complex of the Cold War, that not only produces expensive weapons to combat the alleged menace but whips up demand for its services by wildly exaggerating our vulnerability. ‘The New Industrial State’ (1967), John Kenneth Galbraith http://en.wikipedia.org/wiki/File:John_Kenneth_ Galbraith.jpg
  • 29. 29 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 29SET 2012 ‘Negacionistas’ [Naysayers] Andrea Zapparoli Manzoni (20120926, CYBER SECURITY Forum Initiative - CSFI http://www.linkedin.com/groupAnswers?vie wQuestionAndAnswers=&discussionID=1668838 32&gid=1836487&commentID=96645448&trk=vi ew_disc&ut=0WJneMXcjW-Bo1 [acerca de unos ataques DDoS a la Banca de EEUU] - this is definitely not cyber war (simply because such a thing doesn't exist, like the Unicorn)
  • 30. 30 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 30SET 2012 Analistas, Auditores y ‘Objetivistas’ SEGURINFO, Madrid, 20121121 “Unfortunately too many published assessmentshave favored sensationalism over careful analysis” “… few single foreseeable cyber- related events have the capacity to propagate onwards and become a full- scale ―global shock”. “A critical feature of any worthwhile analysis is discipline in the use of language”. “Cyber espionage is not ―a few clicks away from cyberwar, it is spying which is not normally thought of as ―war”.
  • 31. 31 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 31SET 2012 Analistas, Auditores y ‘Objetivistas’ “By the same token a short-term attack by hacktivists is not cyberwar either”. “A pure cyberwar, that is one fought solely with cyber-weapons, is unlikely”. “On the other hand in nearly all future wars as well as the skirmishes that precede them policymakers must expect the use of cyberweaponry”. “… the Internet was designed from the start to be robust so that failures in one part are routed around…”
  • 32. 32 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 32SET 2012 Analistas, Auditores y ‘Objetivistas’ “In terms of cyber attacks the one overwhelming characteristic is that most of the time it will be impossible for victims to ascertain the identity of the attacker – the problem of attribution. This means that a defense doctrine based on deterrence will not work. The most immediately effective action that governments can take is to improve the security standards of their own critical information systems.
  • 33. 33 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 33SET 2012 Analistas, Auditores y ‘Objetivistas’ The report addressed web/email attacks. The techniques used bypass both signature and heuristic security means. I. Web 225% increase in web infections in last 6 months. 643/week now. Attacks vary by industry: Healthcare - 100% increase Financial Services - spike in April/May - from Latvia Technology - high volume - stable trend - target is Intellectual Property Energy/Utility - 60% increase - target is smart grid II. Email 56% increase in malicious email in last 6 months Two methods used: malicious links in email and email attachments. Links are growing faster. "Throw away*" domains are being used more - those used 1-10 times and discarded. This is to circumvent filters and black lists by domain. (*also known as Limited Use Domains/Crafted Domains) Attachments: increase in variance by type of attachment. Target vulnerabilities in serving applications. (Example: pdf/Abode) Michael S Hines mshines@purdue.edu <083b01cd98d7$34dfdf90$9e9f9eb0$@purdue.edu> "FireEye Advanced Threat Report - First Half 2012" Thesis of the report: Advanced attacks bypass traditional security like Firewalls, Intrusion Prevention, and Anti-virus.
  • 34. 34 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 34SET 2012 Analistas, Auditores y ‘Objetivistas’ III. Files Filter and limit by type. Examine inbound for malicious content. Examine outbound for proprietary information. Many attacks are trying to obtain data more now. Files are being extracted using the HTTP (port:80) protocol - which is usually more open. IV. Some protective moves you can make. #1. User education regarding risks in email (links and attachments) and web sites (links). #2. Defense in depth - key - protecting not only the front door, but internal networks for the proper access controls (users/data paths) #3. Secure coding best practices (never trust user input - audit/examine/test/validate). (Example: a web site that queries a database: if the user enters a "*" and no check is made and the "*" is passed to SQL, the request is to return all rows in the table - a very easy exploit - and most likely not what you want to happen). Michael S Hines mshines@purdue.edu <083b01cd98d7$34dfdf90$9e9f9eb0$@purdue.edu>
  • 35. 35 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 35SET 2012 “We have met the enemy and he is us” Fuente: Walt Kelly . http://wiki.answers.com/Q/What_is_the_origin_of_the_phrase_'I_have_found_the _enemy_and_it_is_us'#ixzz264CPrYv4 Fuentehttp://2.bp.blogspot.com/_JnCUXFEdVus/TObNm8kA- fI/AAAAAAAABuw/CR3NldAsfBQ/s1600/6a00d8341ca4d953ef013481cb7b9e970c-800wi.jpg Analistas, Auditores y ‘Objetivistas’ Fuente: http://dy6g3i6a1660s.cloudfront.n et/MeIr3omw3O31hhBWDqGFqgJ YAmc/mt-89/were-inspired- christopher-shannons-floral- menswear-makeup.jpg
  • 36. 36 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 36SET 2012 Algunas referencias importantes
  • 37. 37 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 37SET 2012 Algunas referencias importantes
  • 38. 38 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 38SET 2012 Algunas referencias importantes
  • 39. 39 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 39SET 2012 Algunas referencias importantes
  • 40. 40 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 40SET 2012 Algunas referencias importantes
  • 41. 41 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 41SET 2012 Algunas referencias importantes
  • 42. 42 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 42SET 2012 Algunas referencias importantes
  • 43. 43 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 43SET 2012 Algunas referencias importantes
  • 44. 44 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 44SET 2012 Algunas referencias importantes
  • 45. 45 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 45SET 2012 Algunas referencias importantes
  • 46. 46 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 46SET 2012 Algunas referencias importantes
  • 47. 47 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 47SET 2012 Algunas referencias importantes
  • 48. 48 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 48SET 2012 Algunas referencias importantes
  • 49. 49 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 49SET 2012 " ... to define a common language for describing IA work and work components, in order to provide commercial certification providers and training vendors with targeted information to enhance their learning offerings.” Fuente: IT Security EBK: A Competency and Functional Framework for IT Security Workforce Development Section 1. Introduction. http://www.us- cert.gov/ITSecurityEBK/EBK2008.pdf information assurance Algunas referencias importantes Fuente: http://ris.fashion.telegraph.co.uk/RichImageService.svc/imagecontent/1/TMG7843655/p/milan_versace_gett_1662788a.jpg
  • 50. 50 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 50SET 2012 Algunas referencias importantes Fuente: iTTi
  • 51. 51 SIMO 2012 ATI Ciberguerra -iTTi- © Copyright 2012, iTTi, Innovation & Technology Trends Institute / Instituto de Tendencias en Tecnologías e Innovación. 51SET 2012 Fuente: www.SegurInfo.org