Micro Focus Presentation Template

Total Page:16

File Type:pdf, Size:1020Kb

Micro Focus Presentation Template Live Hack Passwords are HIGH RISK How hackers act and what you can do Tom Hofmann System Engineer Identity, Access & Security Disclaimer All data and information provided in this webcast are for informational purposes only. The Micro Focus webcast related to Hacking is only for informational and educational purpose. The tutorial and demo provided is only for those who’re willing and curious to know and learn about Ethical Hacking, Security and Penetration Testing. Any time the word “Hacking” that is used on this site shall be regarded as Ethical Hacking. Micro Focus will not be responsible for any action performed by any attendee. http://linkedin.com/in/onlinesecurity/ SE LinkedIn http://slideshare.net/TomHofmann/ Slideshare http://twitter.com/WickedProbl3ms Twitter Tom Hofmann System Engineer IAS 3 Hacking is unauthorized intrusion into a computer or a network. The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system. Technopedia 4 „A hacker is someone who tries to find a way to make a toast with a coffee machine. “ Wau Holland, Founder of Chaos Computer Club 5 Question 1: Is Cybersecurity a strategic topic in your organisation & do you also have the resources to implement it? h0W +0 bEcom A h4x0r H4x0r Starter Kit Hacker Hoodie 89.50 € Guy Fawkes Maske 10 € Laptop Sticker 9.95 € Bildschirmschoner Freeware 8 “Real hacker” APT 28 / Sofacy / Fancy Bear ‒ RUAG, Thyssen Krupp ‒ DeutscherBundestag ‒ En Marche, US Demokraten DNC ‒ Most probably Russian Government Lazarus Group ‒ Sony Hack ‒ SWIFT Hack / Bangladesh Bank heist ‒ WannaCry ‒ Most probably North Korean Gov. Equation Group ‒ Stuxnet ‒ Eternal Blue ‒ NSA ANT Catalog ‒ “Most probably” U.S.A. Gov. / NSA APT 10 / MenuPass / Stone Panda ‒ Managed Service Providers ‒ ”Cloud Hopper” ‒ “Red Leaves” Malware ‒ Most probably Chinese Government 9 State backed hacking, the threat is real! 10 Question 2: Do you have a dedicated Cybersecurity team? Five steps to a happy hack Reconnaissance Assessment Exploitation Execution Have fun 12 Recon Reconnaissance Intelligence SIGINT (COMINT, ELINT): Signal Intelligence (Communication Intelligence & Electronic Intelligence) OSINT: Open Source Intelligence HUMINT: Human Intelligence 13 Assess Assessment Vulnerabilities Electronic vulnerabilites: Software bugs Social vulnerabilites: Human weaknesses Physical vulnerabilites: Building access, etc. 14 Exploit Exploitation Exploits Electronic exploits: Specific software, malicious data packages Social exploits: (Spear) Phishing, calls, manipulation Physical exploits: Installation Rogue WLAN access points, MITM devices 15 Exec Execution Payloads RAT: Remote Access Tools Logging: Video, Screen, Keystrokes Shells: Remote accessible shells 16 Party Have fun 17 Small selection ▪ Vulnerability scanner: checks ▪ Password cracking: recovering assets for known weaknesses passwords from data stored or transmitted by computer systems ▪ Root kit: represents a set of programs which work to subvert ▪ Packet sniffer: capture data control of an operating system packets in transit over networks from legitimate operators ▪ Social engineering: an attack ▪ Trojan horse: serves as a back vector that relies heavily on door in a computer system to human interaction allow an intruder to gain access to the system later ▪ Spoofing attack: involves websites which falsify data by ▪ Viruses: self-replicating programs, mimicking legitimate sites inserting copies of the same program into other executable ▪ Post exploitation: Tools used code files or documents after successful infiltration. Popular tools are psexec, ▪ Key loggers: tools designed to mimikatz, wmic and powershell record every keystroke 18 Question 3: Do you implement and operate Cybersecurity Resilience? Let´s be a h4x0r From leaked cyber weapons to WannaCry, Petya & NotPetya 20 Cyber weapons gone wild 1 3 5 Equation Group WannaCry NotPetya Linked to NSA Ransomware Damage, ransom, credential stealing 2 4 ShadowBrokers Petya Software Dump Wiper disguised as ransomware 21 Try it yourself ▪ https://github.com/x0rz/EQGRP_Lost_in_Translation ▪ https://usa.kaspersky.com/resource- center/infographics/equation ▪ https://securelist.com/equation-the-death-star-of-malware- galaxy/68750/ ▪ https://securelist.com/files/2015/02/Equation_group_questi ons_and_answers.pdf ▪ https://www.kaspersky.com/about/press- releases/2015_equation-group-the-crown-creator-of-cyber- espionage 22 Framework Metasploit Aka Fuzzbunch Vulnerability Exploit Payload MS17-010 Metasploit Exploit RAT Meterpreter aka EternalBlue by risksense Aka DoublePulsar 23 But… patch? But… ZeroDay! Microsoft president Brad Smith said WannaCry "represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today – nation-state action and organized criminal action.” https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent- 24 collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/ TYPICAL PATCH MANAGEMENT PROCESS in ITIL Patch Config. Release Sources Mgmt Mgmt. Deploy Prio & Start Schedule Plan Build Test & Install Chng. Mgmt True Audit & Success? Close Assess End False 25 Heartbleed, a phishy PDF and a RAT (GoldenEye) 26 Hacking HR 1 3 5 Bewerbung Gefälschte BfA Your files have Reale Jobangebote Ausführen des Exploits been encrypted der BfA 2 4 ”Sauberes PDF” Fake System Check Der Türöffner Verschlüsselungs- payload 27 References ▪ https://nakedsecurity.sophos.com/2016/12/08/golden eye-ransomware-the-resume-that-scrambles-your- computer-twice/ ▪ https://www.heise.de/ct/ausgabe/2017-1- Verschluesselungstrojaner-Goldeneye-greift-gezielt- deutsche-Personalabteilungen-an-3575058.html ▪ https://de.business.f-secure.com/author/delayo16 28 Framework Metasploit Vulnerability Exploit Payload CVE-2010-1240 Social Engineering & RAT Adobe PDF Metasploit Exploit Meterpreter embedded EXE by attackresearch 29 Heartbleed 3 years later, still bleeding https://www.slideshare.net/TomHofmann/ heartbleed-2017-3-years-later-still-bleeding 30 Don’t always focus on the OS Bluetooth protocol BlueBorne Wifi Chipset BroadPwn Headphones SPEAKE(a)R the x86 processor fuzzer sandsifter 31 “…enable the installation of beacon implants directly into our targets' electronic devices. These devices are then re-packaged and placed back into transit…” Tailored Access Operations/Access Operations (AO - S326) Remote Operations Center (S321) 32 “(TS//SI//NF) In one recent case, after several months a beacon implanted through supply- chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network.” Security by obscurity doesn´t work Not even with three letter agencies On the Viability of Conspiratorial Beliefs 34 https://doi.org/10.1371/journal.pone.0147905 Recap What have we seen What can we do ▪ A quick peek at Cybersecurity ▪ Multi Factor Authentication ▪ Remote Exploit and ▪ SIEM ▪ Manual Exploit with Social Engineering ▪ Privileged Account Management ▪ Cybersecurity matters ▪ Active Configuration Change Management ▪ Hacks happen on various different levels and ▪ Enterprise & Web Access Management come in all shapes and sizes ▪ There is not only „one“ solution More to read MELANI on the RUAG Hack https://www.melani.admin.ch/melani/de/home/dokumentation/ber ichte/fachberichte/technical-report_apt_case_ruag.html BroadPwn (Chip level exploit) https://hackaday.com/2017/07/29/broadpwn-all-your-mobiles-are- belong-to-us/ Rogue WLAN Access Points http://www.hackingarticles.in/hack-password-using-rogue-wi-fi- access-point-attack-wifi-pumpkin/ Turning headphones into mics https://www.usenix.org/system/files/conference/woot17/woot17- paper-guri.pdf Breaking the x86 ISA https://github.com/xoreaxeaxeax/sandsifter Oauth and phishing attack at En Marche in France https://media.scmagazine.com/documents/295/trend_micro-two- years-of-pawn-_73730.pdf 36 MicroFocus Advanced Authentication 37 Hard Token Advanced Authentication Time based Event based OATH TOTP OATH HOTP Soft Token Infrastructure Authenticators Services OS Login Windows MacOS Linux SMS eMail OTP Radius Client Server Firewall Features VPN Fingerprint Finger Vein Biometric Advanced Analytics & Authentication Reporting NFC Group & Event Offline Login based controls Smartcard Contact less Contact based RFID 2nd Factor skipping iOS Android Windows FIDO U2F Phone Multi Site Smartphone Support Geolocation & Out of Band Live Ensure API Geofencing Yubikey USB & Smartcard FIDO U2F OATH Swisscom Bluetooth NFC HOTP & TOTP MobileID BLE Q&A 39 Questions, idea, anything else… http://linkedin.com/in/onlinesecurity/ SE LinkedIn http://slideshare.net/TomHofmann/ Slideshare http://twitter.com/WickedProbl3ms Twitter Tom Hofmann System Engineer IAS 40 Thank you. www.microfocus.com.
Recommended publications
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • Defeating Invisible Enemies:Firmware Based
    Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems — Linux Security Summit 2017 — George Wilson IBM Linux Technology Center Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation Agenda Introduction The Case for Firmware Security What OpenPOWER Is Trusted Computing in OpenPOWER Secure Boot in OpenPOWER Current Status of Work Benefits of Open Source Software Conclusion Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 2 Introduction Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 3 Disclaimer These slides represent my views, not necessarily IBM’s All design points disclosed herein are subject to finalization and upstream acceptance The features described may not ultimately exist or take the described form in a product Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 4 Background The PowerPC CPU has been around since 1990 Introduced in the RS/6000 line Usage presently spans embedded to server IBM PowerPC servers traditionally shipped with the PowerVM hypervisor and ran AIX and, later, Linux in LPARs In 2013, IBM decided to open up the server architecture: OpenPOWER OpenPOWER runs open source firmware and the KVM hypervisor with Linux guests Firmware and software designed and developed by the IBM Linux Technology Center “OpenPOWER needs secure and trusted boot!” Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 5 The Case for Firmware Security Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 6 Leaks Wikileaks Vault 7 Year 0 Dump NSA ANT Catalog Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 7 Industry Surveys UEFI Firmware Rootkits: Myths and Reality – Matrosov Firmware Is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities – Branco et al.
    [Show full text]
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • Internet Infrastructure Review Vol.27
    Internet Infrastructure Vol.27 Review May 2015 Infrastructure Security Increasingly Malicious PUAs Messaging Technology Anti-Spam Measure Technology and DMARC Trends Web Traffic Report Report on Access Log Analysis Results for Streaming Delivery of the 2014 Summer Koshien Inte r ne t In f r ast r uc t ure Review Vol.27 May 2015 Executive Summary ———————————————————3 1. Infrastructure Security ———————————————4 Table of Contents Table 1.1 Introduction —————————————————————— 4 1.2 Incident Summary ——————————————————— 4 1.3 Incident Survey ——————————————————— 11 1.3.1 DDoS Attacks —————————————————————— 11 1.3.2 Malware Activities ———————————————————— 13 1.3.3 SQL Injection Attacks —————————————————— 16 1.3.4 Website Alterations ——————————————————— 17 1.4 Focused Research —————————————————— 18 1.4.1 Increasingly Malicious PUAs —————————————— 18 1.4.2 ID Management Technology: From a Convenience and Security Perspective ————— 22 1.4.3 Evaluating the IOCs of Malware That Reprograms HDD Firmware —————————————————————— 25 1.5 Conclusion —————————————————————— 27 2. Messaging Technology —————————————— 28 2.1 Introduction ————————————————————— 28 2.2 Spam Trends ————————————————————— 28 2.2.1 Spam Ratios Decline Further in FY2014 ————————— 28 2.2.2 Higher Risks Despite Lower Volumes —————————— 29 2.3 Trends in Email Technologies ——————————— 29 2.3.1 The DMARC RFC ————————————————————— 29 2.3.2 Problems with DMARC and Reporting —————————— 30 2.3.3 Use of DMARC by Email Recipients ——————————— 30 2.3.4 Domain Reputation ——————————————————— 31 2.3.5
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 116 CONGRESS, FIRST SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 116 CONGRESS, FIRST SESSION Vol. 165 WASHINGTON, THURSDAY, MARCH 14, 2019 No. 46 House of Representatives The House met at 9 a.m. and was Pursuant to clause 1, rule I, the Jour- Mr. HARDER of California. Mr. called to order by the Speaker pro tem- nal stands approved. Speaker, this week, the administration pore (Mr. CARBAJAL). Mr. HARDER of California. Mr. released its proposed budget, and I am f Speaker, pursuant to clause 1, rule I, I here to share what those budget cuts demand a vote on agreeing to the actually mean for the farmers in my DESIGNATION OF THE SPEAKER Speaker’s approval of the Journal. home, California’s Central Valley. PRO TEMPORE The SPEAKER pro tempore. The Imagine you are an almond farmer in The SPEAKER pro tempore laid be- question is on the Speaker’s approval the Central Valley. Maybe your farm fore the House the following commu- of the Journal. has been a part of the family for mul- nication from the Speaker: The question was taken; and the tiple generations. Over the past 5 WASHINGTON, DC, Speaker pro tempore announced that years, you have seen your net farm in- March 14, 2019. the ayes appeared to have it. come has dropped by half, the largest I hereby appoint the Honorable SALUD O. Mr. HARDER of California. Mr. drop since the Great Depression. CARBAJAL to act as Speaker pro tempore on Speaker, I object to the vote on the Then you wake up this week and hear this day.
    [Show full text]
  • Gothic Panda Possibly Used Doublepulsar a Year Before The
    Memo 17/05/2019 - TLP:WHITE Gothic Panda possibly used DoublePulsar a year before the Shadow Brokers leak Reference: Memo [190517-1] Date: 17/05/2019 - Version: 1.0 Keywords: APT, DoublePulsar, China, US, Equation Group Sources: Publicly available sources Key Points Gothic Panda may have used an Equation Group tool at least one year before the Shadow Brokers leak. It is unknown how the threat group obtained the tool. This is a good example of a threat actor re-using cyber weapons that were originally fielded by another group. Summary According research conducted by Symantec, the Chinese threat actor known as Gothic Panda (APT3, UPS, SSL Beast, Clandestine Fox, Pirpi, TG-0110, Buckeye, G0022, APT3) had access to at least one NSA-associated Equation Group tool a year before they were leaked by the Shadow Brokers threat actor. On April 14, 2017, a threat actor called the Shadow Brokers released a bundle of cyber-attack tools purportedly coming from the US NSA, also referred to as the Equation Group. Among the released material there was the DoublePulsar backdoor implant tool, which was used alongside EternalBlue in the May 2017 destructive WannaCry attack. DoublePulsar is a memory-based kernel malware that allows perpetrators to run arbitrary shellcode payloads on the target system. It does not write anything on the hard drive and will thus disappear once the victim machine is rebooted. Its only purpose is to enable dropping other malware or executables in the system. According to Symantec, Gothic Panda used the DoublePulsar exploit as early as in 2016, a full year before the Shadow Brokers release.
    [Show full text]
  • Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23
    3. JAHRESTAGUNG CYBERSECURITY FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK 23. APRIL 2020, FRANKFURT AM MAIN #cyberffm Premium-Partner: Veranstaltungspartner: 3. JAHRESTAGUNG CYBERSECURITY DEUTSCHLAND — DIGITAL — SICHER — BSI Die Schadsoftware »Emotet« hat uns in den letzten Wochen und Monaten erneut schmerzhaft vor Augen geführt, welche Auswirkungen es haben kann, wenn man die Vorteile der Digitalisierung genießt, ohne die dafür unabdingbar notwendige Infor- mationssicherheit zu gewährleisten. Stadtverwaltungen, Behörden, Krankenhäuser und Universitäten wurden lahmgelegt, Unternehmen mussten zeitweise den Betrieb einstellen. Die Folgen sind für jeden von uns spürbar: Arbeitsplätze sind in Gefahr, Waren und Dienstleistungen können nicht mehr angeboten und verkauft werden, Krankenhäuser müssen die Patientenannahme ablehnen. Stadtverwaltungen sind nicht mehr arbeitsfähig und schließen ihre Bürgerbüros. Bürgerinnen und Bürger konnten keine Ausweise und Führerscheine beantragen, keine Autos anmelden und keine Sperrmüllabfuhr bestellen. Sogar Hochzeiten mussten verschoben werden. Und wie würde die Lage wohl erst aussehen, wenn wir tatsächlich in einer voll digitalisierten Welt lebten? Das BSI beschäftigt sich damit, in welchen Anwendungsfeldern der Digitalisierung Risiken entstehen könnten und wie wir diese Risiken kalkulierbar und beherrschbar machen können. Unsere Stärke ist es, Themen der Informationssicherheit gebündelt fachlich zu analysieren und aus der gemeinsamen Analyse heraus konkrete Angebote für unterschiedliche Zielgruppen
    [Show full text]
  • Guardian of the Galaxy: EU Cyber Sanctions and Norms in Cyberspace
    CHAILLOT PAPER / PAPER CHAILLOT 155 GUARDIAN OF GUARDIAN OF THE GALAXY THE GALAXY GUARDIAN OF THE GALAXY EU cyber sanctions and | EU CYBER SANCTIONS AND NORMS IN CYBERSPACE SANCTIONS EU CYBER norms in cyberspace Edited by Patryk Pawlak and Thomas Biersteker With contributions from Karine Bannelier, Nikolay Bozhkov, François Delerue, Francesco Giumelli, Erica Moret, Maarten Van Horenbeeck CHAILLOT PAPER / 155 October 2019 European Union Institute for Security Studies (EUISS) 100, avenue de Suffren 75015 Paris http://www.iss.europa.eu Director: Gustav Lindstrom © EU Institute for Security Studies, 2019. Reproduction is authorised, provided the source is acknowledged, save where otherwise stated. The views expressed in this publication are solely those of the authors and do not necessarily reflect the views of the EUISS or of the European Union. print ISBN 978-92-9198-849-5 online ISBN 978-92-9198-850-1 CATALOGUE NUMBER QN-AA-19-005-EN-C CATALOGUE NUMBER QN-AA-19-005-EN-N ISSN 1017-7566 ISSN 1683-4917 DOI 10.2815/04457 DOI 10.2815/672270 Published by the EU Institute for Security Studies and printed in Belgium by Bietlot. Luxembourg: Publications Office of the European Union, 2019. Cover image credit: NASA/JPL-Caltech GUARDIAN OF THE GALAXY EU cyber sanctions and norms in cyberspace Edited by Patryk Pawlak and Thomas Biersteker With contributions from Karine Bannelier, Nikolay Bozhkov, François Delerue, Francesco Giumelli, Erica Moret, Maarten Van Horenbeeck CHAILLOT PAPER / 155 October 2019 Acknowledgements This Chaillot Paper is the outcome of several months of reflection and discussions conduct- ed in the framework of the EUISS Task Force on Restrictive Measures Related to Malicious Activities in Cyberspace (hereafter ‘EUISS Task Force on Cyber Sanctions’).
    [Show full text]
  • The Cyber Threat to UK Business 2016/2017 Report Page 1
    The cyber threat to UK business 2016/2017 Report Page 1 Contents Foreword (Ciaran Martin - NCSC) ..................................................................................................................................... 2 Foreword (Donald Toon - NCA) ........................................................................................................................................ 3 Executive summary ........................................................................................................................................................... 4 What is the threat? ........................................................................................................................................................... 5 The year in review: pivotal incidents of 2016 ................................................................................................................ 10 Horizon scanning: future threats .................................................................................................................................... 13 Fighting back: what can business do? ............................................................................................................................ 15 Case studies illustrating UK LEA and industry joint protect work ................................................................................. 19 Debate: can we stop the Internet from being used for crime? .................................................................................... 20 Page 2 The
    [Show full text]
  • Cyberwar: the ISIL Threat & Resiliency in Operational Technology
    Cyberwar: The ISIL Threat & Resiliency in Operational Technology Thesis Presented to the Faculty of the Department of Information and Logistics Technology University of Houston In Partial Fulfillment of the Requirements for the Degree Master’s of Information Systems Security By Gregory S. Anderson May 2017 Cyberwar: The ISIL Threat & Resiliency in Operational Technology ____________________________________ Gregory S. Anderson Approved: Committee Chair: ____________________________________ Wm. Arthur Conklin, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Chris Bronk, PhD Computer Information Systems and Information System Security Committee Member: ____________________________________ Paula deWitte, PhD Computer Information Systems and Information System Security ____________________________________ ____________________________________ Rupa Iyer, PhD Dan Cassler Associate Dean for Research and Graduate Interim Chair for Department of Information Studies, College of Technology and Logistics Technology THIS PAGE INTENTIONALLY LEFT BLANK Acknowledgments First, I would like to thank Dr. Chris Bronk and Dr. Art Conklin for their support and guidance throughout my time at the University of Houston. Their dedication to students is unparalleled for any other professor I have come across during my education. I would also like to thank my family for their ongoing encouragement and love. The fostering environment to peruse knowledge and “never settle for less” has been a constant inspiration throughout my life. Lastly, to my partner of 7 years, Lorelei. None of my achievements these past few years would have come to fruition without her continuous love, support, and willingness to sacrifice for the greater good is deeply appreciated. Thank you for being the most patient and steadfast person I have ever known, I love you.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]