Programma Globale Sul Cyber Risk

Total Page:16

File Type:pdf, Size:1020Kb

Programma Globale Sul Cyber Risk Proposta destinata a: • Direzione Commerciale • Uffici Formazione Programma globale sul Cyber Risk 3 strumenti sul rischio cibernetico per • la comprensione del fenomeno e dei rischi emergenti • l’individuazione delle soluzioni e delle garanzie più idonee del mercato assicurativo italiano del rischio Cyber Destinatari: Il progetto si articola in: • Imprese assicuratrici: le Direzioni tecniche e le Direzioni commerciali 1. BENCHMARK TECNICO delle compagnie di assicurazione scopriranno la sulle 10 principali polizze offerte dal mercato particolarità dell’analisi del Benchmark tecnico di 10 polizze di mercato sezionate minuziosamente per dare un quadro delle soluzioni offerte. 2. COLLANA FORMATIVA • Intermediari (Agenti, Broker, Istituti di credito): ONLINE SUL RISCHIO CYBER avranno disponibili diversi servizi formativi che ga- La collana e-learning di formazione continua rantiscono un approccio professionale ed adeguato ed operativa dedicata alla scoperta delle prin- alle esigenze del cliente cipali tematiche del Cyber Risk. Un percorso di 20 ore strutturato in 18 • Risk Manager delle imprese commerciali: moduli formativi, con vari gradi di approfon- potranno verificare la soluzione più adatta per la dimento a seconda delle esigenze propria realtà aziendale 3. FORMAZIONE SUI Perchè un programma globale sul Cyber Risk? L’incremento costante dello smart working e il conse- PRODOTTI ASSICURATIVI guente utilizzo di strumenti personali e connessioni do- Progettazione, realizzazione ed erogazione di mestiche favoriscono in modo esponenziale la diffusio- corsi in webinar e/o e-learning sui prodotti ne di malware. Il rischio cyber è sempre più presente intermediati nelle cronache e nelle agende dei manager delle impre- se italiane, che richiedono ai propri consulenti assicura- tivi conoscenza del fenomeno e risposte adeguate. Maggiori informazioni sono disponibili su Le Imprese assicuratrici e gli intermediari hanno l’onere di approcciare in termini consulenziali le esigenze di www.assinformsolutions.it copertura dei propri clienti (imprese, pubblica ammi- nistrazione, terzo settore, famiglie) individuandone le specificità e conoscendo l’offerta dei competitors. Società certificata UNI EN ISO 9001:2015 Settori EA 37 - EA 08 - EA 35 7 1. Cyber Insurance Benchmark Benchmark tecnico di 10 polizze di mercato passate al setaccio! Assinform propone lo strumento che consente alle Compagnie e alle reti di intermediazione di valutare e confrontare qualitativamente i Prodotti presenti sul mercato. Uno studio volto a comprendere la complessità delle singole polizze attraverso un’approfondita analisi delle singole clausole. Il Cyber Insurance Benchmark si divide in tre parti: Sezione condizioni chiave Sezione Polizze Cyber Risk Glossario Viene indicata, per ogni polizza Vengono analizzate in modo ap- Lo strumento indispensabile per esaminata, la presenza o l’assenza profondito le singole coperture, sviare ogni dubbio e comprendere di ogni singola garanzia o aspetto entrando nel merito delle garanzie appieno il significato di termini e rilevante per consentire un raf- di ciascun contratto, indagando la garanzie. fronto facile e immediato. portata delle stesse e mettendo- ne in risalto i punti di forza e di miglioramento. Maggiori informazioni su https://www.assinformsolutions.it/ servizio/cyber-insurance-benchmark/ 8 2. Corso online sul Cyber Risk La collana e-learning di formazione continua ed operativa per gli intermediari di assicurazione Nella Lettera al mercato del 29.12.2017 l’IVASS ritiene fondamentale l’accrescimento delle conoscenze informatiche degli intermediari, dei col- 18 moduli laboratori e dipendenti. “A tal fine l’istituto si attende che una quota del 20% del monte ore di forma- zione biennale obbligatoria per l’aggiornamento professionale, ex articolo 7 20 ore del Regolamento IVASS n. 6/2014, sia dedicata, a partire dal 2018, ai temi della sicurezza informatica.” complessive Scuola Assicurativa Assinform ha progettato e realizzato una collana for- mativa e-learning da 20 ore complessive che illustrano in modo semplice 4 unità ma esausitivo le principali tematiche del cyber risk, con numerosi casi didattiche pratici risolti. • Analisi dei casi in base alla frequenza di rischio Il programma complessivo è strutturato per analizzare tutte le princi- 72 casi concreti pali tematiche del cyber risk, dando priorità agli eventi che accadono con maggior frequenza. • 18 moduli da un’ora ciascuno, a loro volta composti da 4 unità di- Percorso formativo dattiche in cui vengono analizzati e approfonditi vari casi reali. personalizzabile A norma IVASS Reg. 40/2018. selezionando solo i moduli d’interesse • Coinvolgimento continuo L’approccio pratico consente al discente di riflettere sulle sue abitudi- ni e grazie alle nuove tecniche di storytelling si sente costantemente Caratteristiche tecniche coinvolto e stimolato a migliorarle. Formato SCORM1.2/xAPI HTML5 Maggiori informazioni e demo su www.assinformsolutions.it/ servizio/corso-cyber-risk/ 9 I 18 moduli 1° modulo (1h 30’) 10° modulo (1h) 16° modulo (1h) Il cybercrime Trojan bancari • • • Malware sLoad: PEC sotto Phishing Casi reali stuxnet • • attacco La navigazione Web Rischi dei social network • • • Cyber Security e Polizia Postale Uso di dispositivi Mobili Hacking Team • • • Attacco NoiPA, il phishing che Le connessioni Wi-Fi • ruba le buste paga (reti pubbliche) 11° modulo (1h) • Furto di identità: le frodi creditizie • Attacchi attraverso Shodan 2° modulo (1h 30’) • Sicurezza dei browser • Password • Casi reali - un attacco 17° modulo (1h) • La posta elettronica ransomware • SCA: quando la norma non è al • App Malevole e Permessi • Casi reali - il mondo della passo con la tecnologia • La Crittografia cybersecurity • La BOTnet: i computer zombie • Il Cyber Criminale: conosci il tuo 3° modulo (1h 30’) 12° modulo (1h) nemico • Sicurezza Wi-Fi • APT e Hacking Governativo • Attacco APT: il caso di Red Apollo • I Cookie • Casi reali - Crittovalute, TOR, • Ransomware Dark Web 18° modulo (1h) • Vettori di Attacco - • La riforma del copyright e il • Password più sicure: le nuove Dispositivi USB GDPR regole del NIST • Il futuro e il presente • Mobile Forensics: lo scontro 4° modulo (1h) dell’hacking / attacchi ai veicoli Apple-FBI • Malware e Antivirus • L’attacco Pharming: attenzione ai • Allegati e Link Malevoli 13° modulo (1h) siti-trappola • Backup e Ripristino • Aggiornamenti Windows perchè • Cyber Security: le sfide del 2020 • Ingegneria Sociale sono tanto importanti? • La Supremazia Quantistica possi- 5° modulo (1h) bilità infinite, rischi concreti • La firma digitale • Deep Fake - sono pericolosi? • Cosa sono i trojan • L’attacco ForkBomb un caso di • Le connessioni VPN Denial of Service • Cifratura nei dispositivi mobili 6° modulo (1h) 14° modulo (1h) • Sicurezza bluetooth • Internet Of Things - la ‘S’ sta per • Cifratura della posta sicurezza • Attacchi reali • Clearview - la fine della privacy • Gestione dei dati sensibili per come la conosciamo • L’Intelligenza Artificiale a servizio 7° modulo (1h) contro il phishing • Keylogger • Il protocollo WPA3 - è davvero • Dati online e privacy sicuro? • Smart card e sicurezza • Smishing e vishing 15° modulo (1h) • La Rete 5G: novità e minacce 8° modulo (1h) • Sito INPS al collasso: un caso • Sicurezza in viaggio concreto di DoS • Pharming • COVID-19 e cyber crime: alcune • Attacchi mirati strategie di attacco • Spyware worm e botnet • Furto di Account: la tua vita in mano ad altri 9° modulo (1h) • IoT • Cloud e sicurezza • Data breach • Come funziona un ransomware Per informazioni tel: 0434 26136 Mauro Venier - [email protected] Società certificata UNI EN ISO 9001:2015 Settori EA 37 - EA 08 - EA 35 Chiara Vialmin - [email protected] 10.
Recommended publications
  • APT and Cybercriminal Targeting of HCS June 9, 2020 Agenda
    APT and Cybercriminal Targeting of HCS June 9, 2020 Agenda • Executive Summary Slides Key: • APT Group Objectives Non-Technical: managerial, strategic • APT Groups Targeting Health Sector and high-level (general audience) • Activity Timeline Technical: Tactical / IOCs; requiring • TTPs in-depth knowledge (sysadmins, IRT) • Malware • Vulnerabilities • Recommendations and Mitigations TLP: WHITE, ID#202006091030 2 Executive Summary • APT groups steal data, disrupt operations, and destroy infrastructure. Unlike most cybercriminals, APT attackers pursue their objectives over longer periods of time. They adapt to cyber defenses and frequently retarget the same victim. • Common HPH targets include: • Healthcare Biotechnology Medical devices • Pharmaceuticals Healthcare information technology • Scientific research • HPH organizations who have been victim of APT attacks have suffered: • Reputational harm Disruption to operations • Financial losses PII/PHI and proprietary data theft • HC3 recommends several mitigations and controls to counter APT threats. TLP: WHITE, ID#202006091030 3 APT Group Objectives • Motivations of APT Groups which target the health sector include: • Competitive advantage • Theft of proprietary data/intellectual capital such as technology, manufacturing processes, partnership agreements, business plans, pricing documents, test results, scientific research, communications, and contact lists to unfairly advance economically. • Intelligence gathering • Groups target individuals and connected associates to further social engineering
    [Show full text]
  • Chrome Flaw Allows Sites to Secretly Record Audio
    Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication Sounds really scary! Isn’t it? But this scenario is not only possible but is hell easy to accomplish.A UX design flaw in the Google’s Chrome browser could allow malicious websites to record audio or video without alerting the user or giving any visual indication that the user is being spied on. AOL developer Ran Bar-Zik reported the vulnerability to Google on April 10, 2017, but the tech giant declined to consider this vulnerability a valid security issue, which means that there is no official patch on the way. How Browsers Works With Camera & Microphone Before jumping onto vulnerability details, you first need to know that web browser based audio-video communication relies on WebRTC (Web Real-Time Communications) protocol – a collection of communications protocols that is being supported by most modern web browsers to enable real-time communication over peer-to-peer connections without the use of plugins. However, to protect unauthorised streaming of audio and video without user’s permission, the web browser first request users to explicitly allow websites to use WebRTC and access device camera/microphone. Once granted, the website will have access to your camera and microphone forever until you manually revoke WebRTC permissions. In order to prevent ‘authorised’ websites from secretly recording your audio or video stream, web browsers indicate their users when any audio or video is being recorded. « Activating this API will alert the user that the audio or video from one of the devices is being captured, » Bar-Zik wrote on a Medium blog post.
    [Show full text]
  • 31 July 2020
    FINANCIAL REPORTING AUTHORITY (CAYFIN) Delivery Address: th Mailing Address: 133 Elgin Ave, 4 Floor P.O. Box 1054 Government Administrative Building Grand Cayman KY1-1102 Grand Cayman CAYMAN ISLANDS CAYMAN ISLANDS Direct Tel No. (345) 244-2394 Tel No. (345) 945-6267 Fax No. (345) 945-6268 Email: [email protected] Financial Sanctions Notice 31/07/2020 Cyber-Attacks Introduction 1. Council Regulation (EU) 2019/796 (“the Regulation”) imposing financial sanctions against Cyber- Attacks has been amended so that an asset freeze now applies to the persons listed in the Annex to this Notice. Notice summary (Full details are provided in the Annex to this Notice) 2. The 9 entries listed in the Annex to this notice have been added to the consolidated list and are now subject to an asset freeze. What you must do 3. You must: i. check whether you maintain any accounts or hold any funds or economic resources for the persons set out in the Annex to this Notice; ii. freeze such accounts, and other funds or economic resources; iii. refrain from dealing with the funds or assets or making them available (directly or indirectly) to such persons unless licensed by the Governor; iv. report any findings to the FRA at [email protected] , together with any additional information that would facilitate compliance with the Regulation; v. provide any information concerning the frozen assets of designated persons to the FRA at [email protected] by completing and submitting a Compliance Reporting Form (CRF). Information reported to FRA may be passed on to other regulatory authorities or law enforcement.
    [Show full text]
  • Press Release
    31 July 2020 NOTICE RE: Financial Sanctions 1. The Cayman Islands Monetary Authority (“CIMA”) hereby notifies you that it has received a new Notice from the Office of Financial Sanctions Implementation, HM Treasury (“OFSI”), which is attached as an Annex to this Notice. 2. What you must do: A. In the case of an addition or amendment of a person to the Consolidated List and asset freeze: i. Check whether you maintain any accounts or hold any funds or economic resources for the persons set out in the OFSI Notice; ii. Freeze any such accounts and other funds or economic resources. iii. Refrain from dealing with the funds or assets or making them available (directly or indirectly) to such persons unless licensed by the Governor. iv. Report any findings to the Financial Reporting Authority (“FRA”) at [email protected] together with any additional information that would facilitate compliance with the relevant legislative requirements. v. Provide any information concerning the frozen assets of designated persons to the FRA at [email protected] and submitting a compliance reporting form. Information reported to FRA may be passed to other regulatory authorities or law enforcement. B. In the case of the removal of a person from the Consolidated List and unfreezing of assets i. Check whether you have frozen assets of any person or entity removed from the Consolidated List and verify that the person is no longer subject to an asset freeze. ii. Remove the person from your institution’s list of persons or entities subject to financial sanction. iii. Un-freeze the assets of the person and where necessary re-activate all relevant accounts.
    [Show full text]
  • Digital Warfare Or Organized Crime
    Breakfast Seminars in Information Security Digital warfare or organized crime (Professional Master in Information Security) Dr. Anders Carlsson, ([email protected]) Anders Carlsson 25y Royal Swedish Navy ÖrlKn (Lt Cmd) Submarines < 20year in BTH teacher & researcher Phd in Cyber Security from National University of Radio Electronics Kharkiv Ukraine last years www.engensec.eu to develop a Msc in Cyber Security EU + Ukraine + Russia agenda - The last year’s changed threat against the countries, companies and organizations. - PROMIS general information - Courses - How to apply Actors then threat opponent…… Coalition Coalition Nation Nation Organization Organization Group Group Individual Individual From Hacktivism organized crime that make BIG money using Hybrid War to overtake a country I managed to take over Georgia 2008, Crimea 2014 and manipulate US-election 2016, nobody stop me Threat Report, Survey, from shows a dramatically increase in ransomware attack against: • CrowdStrike • companies • municipal • ESET • governments and • agencies • KasperskyLab • healthcare providers • EMISOFT A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files. The cyber-attack that sent an Alaskan community back in time US-Security reports shows that during 2019 966 government agencies, educational establishments and healthcare providers at a potential cost in excess of $7.5 billion. 113 state and municipal governments and agencies. 764 healthcare providers. 89 universities, colleges A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware attack Lake City voted to pay hackers in $??? In Bitcoin after two weeks downed computer Coastal suburb Riviera Beach recently paid hackers $600,000 following a similar incident that locked municipal staff out of important files.
    [Show full text]
  • Operation Cloud Hopper
    www.pwc.co.uk/cyber Operation Cloud Hopper Exposing a systematic hacking operation with an unprecedented web of global victims April 2017 In collaboration with Contents Foreword 3 Executive summary 4 APT10 as a China-based threat actor 5 Motivations behind APT10’s targeting 14 Shining a light on APT10’s methodology 16 Conclusion 20 Appendices 21 2 Operation Cloud Hopper Foreword This report is an initial public release of research PwC UK and BAE Systems have conducted into new, sustained global campaigns by an established threat actor against managed IT service providers and their clients as well as several directly targeted organisations in Japan. Given the scale of those campaigns, the activity identified here is likely to reflect just a small portion of the threat actor’s operations. This report is primarily fact-based. Where we have made an assessment this has been made clear by phraseology such as “we assess”, and the use of estimative language as outlined in Appendix A. By publicly releasing this research, PwC UK and BAE Systems hope to facilitate broad awareness of the attack techniques used so that prevention and detection capabilities can be configured accordingly. It is also hoped that rapid progress can be made within the broader security community to further develop the understanding of the campaign techniques we outline, leading to additional public reports from peers across the security community. As a part of our research and reporting effort, PwC UK and BAE Systems have collaborated with the UK’s National Cyber Security Centre (NCSC) under its Certified Incident Response (CIR) scheme to engage and notify managed IT service providers, known affected organisations and other national bodies.
    [Show full text]
  • Kristen E. Eichensehr
    THE LAW & POLITICS OF CYBERATTACK ATTRIBUTION 67 UCLA L. REV. __ (forthcoming 2020). Kristen E. Eichensehr Attribution of cyberattacks requires identifying those responsible for bad acts, prominently including states, and accurate attribution is a crucial predicate in contexts as diverse as criminal indictments, insurance coverage disputes, and cyberwar. But the difficult technical side of attribution is just the precursor to highly contested legal and policy questions about when and how to accuse governments of responsibility for cyberattacks. Although politics may largely determine whether attributions are made public, this Article argues that when cyberattacks are publicly attributed to states, such attributions should be governed by legal standards. Instead of blocking the development of evidentiary standards for attribution, as the United States, United Kingdom, and France are currently doing, states should establish an international law requirement that public attributions must include sufficient evidence to enable cross-checking or corroboration of the accusations. This functionally defined standard harnesses both governmental and non-governmental attribution capabilities to shed light on states’ actions in cyberspace, and understanding state practice is a necessary precondition to establishing norms and customary international law to govern state behavior. Moreover, setting a clear evidentiary standard for attribution in the cybersecurity context has the potential to clarify currently unsettled general international law on evidentiary rules. The Article also engages debates about institutional design for cyberattack attribution. Companies and think tanks have made several recent proposals for an international entity to handle attribution of state-sponsored cyberattacks. Although these proposals have much to recommend them, the Article argues that such an entity should supplement, not replace, the current decentralized system of attribution.
    [Show full text]
  • What Are the Security Challenges Concerning Maintenance Data in the Railway Industry
    What Are the Security Challenges Concerning Maintenance Data in the Railway Industry Hiba Khan Information Security, master's level (120 credits) 2019 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Abstract Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. Many research brought innovations that offer enormous benefits for rail travel. The current research focuses on the railway industries, as they want to reap the benefits of IT concept such as Cloud Computing, Information Security, and Internet of Things (IoT). Railway industries are generating a large volume of data every day from different sources. In addition, machine and human interactions are rapidly increasing along with the development of technologies. This data need to be properly gathered, analysed and shared in a way that it is safe from different types of cyberattacks and calamities. To overcome smart devices’ and Cloud’s limitations, the new paradigm known as Fog computing has appeared. In which an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits of Fog, computing brings into IoT- based environments, privacy and security issues remain the main challenge for its implementation. Hence, the primary purpose of this research is to investigate the potential challenges, consequences, threats, vulnerabilities, and risk management of data security in the railway infrastructure in the context of eMaintenance. Keywords: Cloud computing, Railway, Identification, Authorization, Authentication, Internet of Things (IoT).
    [Show full text]
  • Under the Lens Financial Services: Challenger Banks
    Under the Lens Financial Services: Challenger Banks Cyber Threat Operations Q1 2020 Contents Introduction 2 Timeline of attacks 4 Incident themes 5 Case studies 9 Conclusion 11 Appendix 1: Analysis methodology 12 Appendix 2: PwC Threat Intelligence 13 Notes 14 Introduction The financial services sector is constantly evolving, whether customers, rather than necessarily a full retail bank offering. in response to technology advancement or regulatory Their predominant role is – as with wider financial services changes, and nowhere is that more evident than amongst – the management of money, making them an attractive challenger banks – both those that are ‘bricks and mortar’ target to criminals and anti-capitalist hacktivists alike. They and those that are technology-based. Yet the cyber threat provide services to a wide gamut of customers, and will landscape is also evolving, and the cyber threats facing the therefore hold sensitive data on these customers that is challenger banks also adapt to this changing attack surface. attractive to espionage threat actors, including state-backed threat actors. Indeed, a number of challenger banks A sometimes nebulous term, ‘challenger banks’ mainly themselves have been recipients of large amounts of comprise new retail banks that have been given banking investment capital, which itself could be target of espionage licences within the last ten years and are directly competing campaigns seeking insight into deals or private equity with longer-established banks. In many instances, they have activity. More broadly, financial services are often classed changed the way in which consumers interact with their as critical infrastructure,1,2 making the sector an attractive banking providers.
    [Show full text]
  • Cyberwar 27 Sept 2020
    LV Geostrategie und Geopolitik Fachbereich 1 49069 Osnabrück Cyberwar Grundlagen-Methoden-Beispiele 27.09.2020 Zusammenfassung Der Cyberwar (Cyberkrieg) ist die kriegerische Auseinandersetzung mit den Mitteln der Informationstechnologie. Dieses Arbeitspapier unternimmt eine aktuelle Bestandsaufnahme und geht auf die theoretischen und praktischen Probleme ein. In der Praxis ist der Cyberwar ein integraler Bestandteil militärischen Handelns, lässt sich jedoch nicht ganz von der Spionage trennen, da das Eindringen in und Aufklären von gegnerischen Systemen wesentlich für das weitere Vorgehen ist. Nach einem Überblick über Angriffsmethoden, Angreifer (Advanced Persistent Threats), Spionagetools, Cyberwaffen und der Cyberverteidigung liegt ein besonderes Augenmerk auf der Einordnung von Cyberangriffen (Attribution) und der Smart Industry (Industrie 4.0). Anschließend werden die Cyberwar-Strategien der USA, Chinas, Russlands und weiterer führender Akteure besprochen. Weitere Kapitel befassen sich der Künstlichen Intelligenz, der Smart Industry, smarten Systemen und biologischen Anwendungen. Cyberwar – 27.09.2020 1 apl. Prof. Dr. Dr. K. Saalbach Inhalt 1. Grundlagen ........................................................................................................... 7 1.1 Einführung ................................................................................................................ 7 1.2 Hintergrund ............................................................................................................... 7 1.3 Cyberwar
    [Show full text]
  • Economic Security in the Context of Sustenable Development
    Economic Security in the Context Online International Scientific Practical Conference of Sustenable Development 1st Edition, December 11, 2020, Chișinău, Moldova KEY SEGMENTS OF THE DIGITAL SHADOW ECONOMICS ОСНОВНЫЕ СЕГМЕНТЫ ТЕНЕВОЙ ЦИФРОВОЙ ЭКОНОМИКИ Охрименко Сергей Доктор экономических наук, профессор Академия Экономичексих Знаний Молдовы e-mail: [email protected] Бортэ Григорий Кандидат экономических наук, доцент Академия Экономичексих Знаний Молдовы e-mail: [email protected] Abstract This article highlights and discusses new segments of the shadow digital economy. Among them, such as cyber weapons, as the concentration of all the achievements of information and communication technologies at the level of counteraction between states; targeted attacks and ATR groups; attack on cryptocurrency exchanges; identity theft. Statistical data characterizing these segments of the shadow digital economy is analyzed. Keywords: shadow digital economics, information security, threats in information security, cryptocurrencies, cryptoexchanges. JEL Classification: E26 F52 J46 H56 ВВЕДЕНИЕ Настоящая работа является логическим продолжением исследований теневой цифровой экономики (ТЦЭ), нашедших отражение в ряде публикаций авторов, в частности таких, как [2], [6], [7]. Одной из важных задач выступает не только определение категории ТЦЭ, но и ландшафта современных угроз. В частности, процессы цифровой трансформации экономики (например, реализация концепции «Индустрия 4.0») породили новые угрозы [4]: x атаки становятся все более изощренными за счет автоматизации и использования методов искусственного интеллекта и машинного обучения; x подключение огромного количества новых незащищенных устройств (промышленный интернет или интернет вещей, как сеть передачи данных между физическими объектами, которые оснащены встроенными средствами и технологиями взаимодействия друг с другом или с внешней средой). Хакеры используют для входа в сеть такие устройства как, видеокамеры, кофемашины и др.; x в результате резко возрастает количество целей для атак.
    [Show full text]
  • 2018 12 20 United States V. Zhu Hua Indictment
    USDC SD11 y UNITED STATES DISTRICT COURT DOCU f\1ENT SOUTHERN DISTRICT OF NEW YORK EL ECTRONIC ALLY F1 LED X DOC #: UNITED STATES OF AMERICA DATE FILED: DEC 1 7 2 18 -v. - SEALED INDICTMENT ZHU HUA, 18 Cr . a/k/a "Afwar," a/k/a "CVNX," a/k/a "Alayos," a/k/a "Godkiller," and ZHANG SHILONG, a/k/a "Baobeilong," a/k/a "Zhang Jianguo," a/k/a "Atreexp," Defendants. - - - - - - - - - - - - - - - X COUNT ONE (Conspiracy to Commit Computer Intrusions) The Grand Jury charges: OVERVIEW 1. At all times relevant to this Indictment, ZHU HUA (:~~), a/k/a "Afwar," a/k/a "CVNX," a/k/a "Alayos," a/k/a "Godkiller, II and ZHANG SHILONG (s*±ft) I a/k/a "Baobeilong, II a/k/a "Zhang Jianguo," a/k/a "Atreex p," the defendants, both of whom were nationals of the People's Republic of China ("China"), were membe rs of a hacking group operating in China known within the cyber security community as Advanced Persistent Threat 10 1 (the "APTl0 Group") 1 or alternatively as "Red Apollo 1 " "CVNX," "Stone Panda," "MenuPass," and "POTASSIUM." 2. From at least in or about 2006 up to and including in or about 2018 1 members of the APTl0 Group, including ZHU HUA, a/k/a "Afwar," a/k/a "CVNX," a/k/a "Alayos," a/k/a "Godkiller," 11 and ZHANG SHILONG, a/k/a "Baobeilong 1 " a/k/a "Zhang Jianguo, a/k/a "Atreexp," the defendants, conducted extensive campaigns of global intrusions into computer systems. The defendants worked for Huaying Haitai Science and Technology Development Company ("Huaying Haitai") in Tianjin, China, and acted in association with the Chinese Ministry of State Security's Tianjin State Security Bureau.
    [Show full text]