Overview of Cyber Diplomatic Initiatives Alex Grigsby

Total Page:16

File Type:pdf, Size:1020Kb

Overview of Cyber Diplomatic Initiatives Alex Grigsby BRIEFINGS FROM THE RESEARCH ADVISORY GROUP BRIEFINGS TO THE GLOBAL COMMISSION ON THE STABILITY OF CYBERSPACE FOR THE FULL COMMISSION MEETING, NEW DELHI 2017 New Delhi, November 2017 GCSC ISSUE BRIEF №1 PROMOTING STABILITY IN CYBERSPACE TO BUILD PEACE AND PROSPERITY The Global Commission on the Stability of Cyberspace (GCSC) engages the full range of stakeholders to develop proposals for norms and policies to enhance the international security and stability of cyberspace. @theGCSC www.cyberstability.org [email protected] [email protected] The GCSC does not specifically endorse the respective publications, nor does it necessarily ascribe to the findings or conclusions. All comments on the content of the publications should be directed to the respective authors. Copyright © 2018. Published by The Hague Centre for Strategic Studies. The opinions expressed in this publication are those solely of the authors and do not reflect the views of the Global Commission on the Stability of Cyberspace (GCSC), its partners, or The Hague Centre for Strategic Studies. This work was carried out with the aid of a grant from GCSC partners: the Ministry of Foreign Affairs of the Netherlands, Cyber Security Agency of Singapore, Microsoft, ISOC, Ministry of Foreign Affairs of France. The views expressed herein do not necessarily represent those of the partners. The intellectual property rights remain with the authors. This work is licensed under a Creative Commons Attribution – Non- commercial – No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/by-ncnd/3.0). For re-use or distribution, please include this copyright notice. ABOUT THE GLOBAL COMMISSION ABOUT THE BRIEFINGS ON THE STABILITY OF CYBERSPACE The Global Commission on the Stability of The briefings and memos included in this issue were Cyberspace (GCSC) helps to develop norms and developed by independent researchers working within policies that advance the international security and the GCSC Research Advisory Group. The papers stability of cyberspace. It promotes mutual included here were submitted to the Global awareness and understanding among the various Commission on the Stability of Cyberspace (GCSC) in cyberspace communities working on issues related to order to support its deliberations. international cybersecurity. By finding ways to link the The opinions expressed in the publications are those various intergovernmental dialogues on international solely of the authors and do not necessarily reflect security with the new communities created by the views of the GCSC, its partners, or The Hague cyberspace, the GCSC fulfils a critical need: Centre for Strategic Studies. The Commission does supporting policy and norms coherence related to the not specifically endorse the respective publications, security and stability in and of cyberspace by applying nor does it necessarily ascribe to the findings or a multi-stakeholder approach to its deliberations on conclusions. All comments on the content of the peace and security. publications should be directed to the respective Chaired by Marina Kaljurand, and Co-Chairs Michael authors. Chertoff and Latha Reddy, the Commission The research was commissioned by the GCSC in a comprises 26 prominent Commissioners representing Request for Proposal after its Commission Meeting in a wide range of geographic regions as well as Tallinn in June 2017. The Commissioners selected government, industry, technical and civil society the winning proposals at the Commission Meeting in stakeholders with legitimacy to speak on different Las Vegas in July 2017. The researchers received the aspects of cyberspace. funding associated with the Request for Proposal and The GCSC Secretariat is provided by The Hague were invited to present their work to the Centre for Strategic Studies and supported by the Commissioners during the Commission Meeting in EastWest Institute. New Delhi in November 2017. GCSC ISSUE BRIEF 4 TABLE OF CONTENTS BRIEFING 1 6 Overview of Cyber Diplomatic Initiatives Alex Grigsby BRIEFING 2 39 An Analytical Review and Comparison of Operative Measures Included in Cyber Diplomatic Initiatives Deborah Housen Couriel MEMO 1 75 Protecting the Public Core of the Internet Joanna Kulesza and Rolf H. Weber BRIEFING 3 99 Protecting the Core Oluwafemi Osho, Joseph A. Ojeniyi and Shafi’l M. Abdulhamid BRIEFING 4 127 Mapping National and Transnational Critical Information Infrastructures Analía Aspis MEMO 2 161 Countering the Proliferation of Offensive Cyber Capabilities Robert Morgus, Max Smeets and Trey Herr MEMO 3 188 What Makes Them Tick: Evaluating Norms on Cyber stability Arun Mohan Sukumar, Madhulika Srikumar and Bedavyasa Mohanty OVERVIEW OF CYBER DIPLOMATIC INITIATIVES Alex Grigsby, assistant director of the Digital and Cyberspace Policy program at the Council on Foreign Relations BRIEFING №1 GCSC ISSUE BRIEF 6 TABLE OF CONTENTS INTRODUCTION 9 SECTION 1: THE STATED INTERESTS OF MAJOR STATES ACTIVE IN THE CYBER NORMS DEBATE 11 1.1 Russia 11 1.2 United States 12 1.3 The United Kingdom 13 1.4 China 13 1.5 France 14 1.6 The European Union 15 1.7 India 15 1.8 Analysis 16 SECTION 2: ASSESSMENT OF MULTILTERAL INITIATIVES 17 2.1. The United Nations 17 2.2 ORGANIZATION FOR SECURITY AND COOPERATION IN EUROPE 18 2.3 ASEAN Regional Forum 19 2.4 Shanghai Cooperation Organization 19 2.5 BRICS 20 2.6 NATO 21 2.7 Group of 20 21 2.8 Group of 8, then 7 21 2.9 Organization of American States 22 2.10 Analysis 23 SECTION 3: ASSESSMENT OF BILATERAL DIALOGUES AND INITIATIVES 24 3.1 The U.S. – Russia dialogue 24 3.2 The U.S. – China dialogue 25 GCSC ISSUE BRIEF 7 3.3 Russia-China, Russia-India, and Russia-South Africa agreements 25 3.4 The U.S. – India framework 26 SECTION 4: NON-STATE PROPOSALS 27 4.1 Creating an attribution organisation 27 4.2 Microsoft’s norms and the Digital Geneva Convention 27 4.3 Tallinn Manual 28 4.5 Proposed norm against undermining the global financial system 29 CONCLUSION 30 ANNEXES 31 Figure 1 -- Assumptions, threats and solutions explicitly in states’ cyber-related strategies 31 Figure 2 -- Stability-improving measures referenced in multilateral initiatives 33 GCSC ISSUE BRIEF 8 INTRODUCTION Cyberspace poses at least five unique challenges to maintaining international peace and security: 1. It is hard to attribute an attack to an actor, and when attribution is possible, it often occurs too slowly for leaders under pressure to “do something;”1 2. Determining the intent of a cyber operation is difficult—the same methods used for routine espionage can also be used for offensive activity;2 3. The use of proxies allows their sponsors to obfuscate the attribution process, but also raises questions as to the effective control that a sponsoring state has over its proxies;3 4. Given that cyber operations can be hard to detect, adversaries believe they can gain an advantage by attacking first, heightening the risk of a crisis; 5. The costs of entry are fairly low—even small states can buy commercially-available cyber tools to infiltrate sensitive networks.4 These challenges make it more likely that two or more rival states misinterpret cyber operations directed at them, and in the fog of cyberspace, take escalatory measures to protect themselves. In successive UN reports, states have recognized that their online activities has the potential to trigger offline conflicts and that they have a common interest in improving the stability of cyberspace. What stability looks like and how it is achieved is, however, a major point of contention. Some states accept that they and their peers will continue to use cyberspace as a vehicle to pursue their interests, and seek to implement rules to make state activity predictable to decrease the risk of conflict. Others argue that stability is best achieved if states refrain or are prohibited from undertaking cyber operations in the first place. Despite this disagreement, there is broad consensus that three types of activity help promote cyber stability: norms, both legal and voluntary, that clearly set out what states can and cannot do online; confidence building measures (CBMs) that aim to enhance states’ understanding of their rivals actions’ online; and capacity building to improve the ability of states to address cybersecurity incidents as well as abide by norms and participate in CBMs. This briefing provides an overview of the diplomatic efforts and initiatives to improve the stability of cyberspace. Section one examines the interests and measures proposed by states. Section two examines multilateral initiatives. Section three examines the states’ bilateral efforts. Section four examines the initiatives put forth by non-government actors. It concludes with suggestions for possible future stability measures. 1 “The Problems with Seeking and Avoiding True Attribution to Cyber Attacks,” RobertMLee.org, last modified March 4, 2016, http://www.robertmlee.org/the-problems-with-seeking-and-avoiding-true-attribution-to-cyber-attacks/; Tobias Feakin, “Developing a Proportionate Response to a Cyber Incident,” The Council on Foreign Relations, last modified August 24, 2015, https://www.cfr.org/report/developing-proportionate-response-cyber-incident. 2 Ben Buchanan, Hacking, Trust, and Fear between Nations, New York: Oxford University Press, 2016. 3 Tim Maurer, “’Proxies in Cyberspace,” Journal of Conflict & Security Law 21 no. 3 (2016): 383–403, http://carnegieendowment.org/files/JConflictSecurityLaw-2016-Maurer-383-403.pdf. 4 Nick Carr, “Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations,” FireEye Blogs, May 14, 2017, https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html. 9 OVERVIEW OF CYBER DIPLOMATIC INITIATIVES Throughout this briefing, the term “offensive cyber operation” will refer to actions taken through cyberspace with the purpose of disrupting, degrading, or destroying a computer or networked system. The term “cyber operations” will refer to both offensive cyber operations and cyber espionage. The use of the term “cyber tools” refers to software and techniques that enable states to conduct their cyber operations.
Recommended publications
  • Annotated Bibliography Digital Transnational Repression
    Annotated Bibliography Digital Transnational Repression By Noura Al-Jizawi, Siena Anstis, Sophie Barnett, Sharly Chan, Adam Sen, and Ronald J. Deibert Last Updated: May 2021 Copyright Copyright © 2021 Citizen Lab, “Digital transnational Repression,” by Noura Al-Jizawi, Siena Anstis, Sharly Chan, Adam Sen, and Ronald J. Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published in 2020 by the Citizen Lab. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 2.0 New changes in this annual update include: ● Change of terminology from “transnational digital repression” to “digital transnational repression” to align with the discourse ● New summaries collected between October 2020 - May 2021 and added to the document The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: ● give appropriate credit; ● indicate whether you made changes; and ● use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement. 2 Acknowledgements The design of this document is by Mari Zhou. About the Citizen Lab, Munk School of Global Aairs & Public Policy, University of Toronto The Citizen Lab is an interdisciplinary laboratory based at the Munk School of Global Affairs & Public Policy, University of Toronto, focusing on research, development, and high-level strategic policy and legal engagement at the intersection of information and communication technologies, human rights, and global security.
    [Show full text]
  • Asia-Europe Meeting
    Asia-Europe Meeting Topic A: Identifying, Sharing and Remediating Faults in Cybersecurity Topic B: Tackling Local, Regional and Global Hunger MUNUC 32 TABLE OF CONTENTS ______________________________________________________ Letter from the Chair………………………………………………………….. 3 Topic A ………………………………………………………………………..… 4 Statement of the Problem…………………………………………….. 4 History of the Problem……………………………………….…..…….. 9 Past Actions…………………………………………………………….. 14 Possible Solutions………………………………………………………. 18 Bloc Positions…………………………………………………………… 20 Glossary…………………………………………………………………. 22 Topic B ………………………………………………………………...………. 23 Statement of the Problem…………………………………………….23 History of the Problem………………………………………………… 28 Past Actions…………………………………………………………….. 31 Possible Solutions………………………………………………………. 33 Bloc Positions…………………………………………………………… 35 Glossary…………………………………………………………………. 37 Bibliography……………………………………….…………………………. 38 2 Asia-Europe Meeting | MUNUC 32 LETTER FROM THE CHAIR ______________________________________________________ Dear Delegates, Welcome to the Asia-Europe Meeting Forum, or ASEM, at MUNUC 32! My name is Randolph Ramirez, and I usually go by Randy. I am a third year here at The University of Chicago studying Statistics and Political Science. I was born and raised in Wilton, Connecticut, and coming out to attend UChicago was my first trip out to Illinois! All throughout high school I was heavily involved in Model Congress, and partaking in MUNUC my first year here helped transition me into the world of Model UN! I am certain that this conference and committee will be a success, and I cannot wait to experience it with you all! The Asia-Europe Meeting Forum will offer a multitude of experiences, problems, solutions, and overall will hopefully give a descriptive look into the affairs of the two regions. Throughout this experience, I hope delegates learn the various factors that make solving the issues of cybersecurity and huger instability a difficult endeavor, and how best to go about solving them.
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • Distributed Attacks and the Healthcare Industry 01/14/2021
    Distributed Attacks and the Healthcare Industry 01/14/2021 Report #: 202101141030 Agenda Image source: CBS News • Overview of distributed attacks • Supply chain attacks • Discussion of SolarWinds attack • Managed Service Provider attacks • Discussion of Blackbaud attack • How to think about distributed attacks • References • Questions Slides Key: Non-Technical: Managerial, strategic and high- level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) 2 Overview: Distributed Attacks What is a distributed attack? Traditional attack = a single compromise impacts a single organization 3 Overview: Distributed Attacks (continued) What is a distributed attack? Distributed attack = a single compromise that impacts multiple organizations Image source: cyber.gc.ca 4 Overview: Distributed Attacks (continued) But what about DDoS (distributed denial of service) attacks? Not a distributed attack in the context of the presentation, since it only targets one organization! Image source: F5 Networks We will be discussing two types of distributed attacks in this presentation, both of which present a significant threat to healthcare: supply chain attacks and managed service provider attacks. We will be analyzing two cases: the SolarWinds attack (supply chain), as well as the Blackbaud breach (managed service provider). This presentation is based on the best information available at the time of delivery – new details will emerge. 5 Supply Chain Attacks Image source: Slidebazaar What is a supply chain? • A supply chain
    [Show full text]
  • View/Print Page As PDF
    MENU Policy Analysis / Articles & Op-Eds The Rise of the Cyber-Mercenaries by Neri Zilber Sep 1, 2018 Also available in Arabic ABOUT THE AUTHORS Neri Zilber Neri Zilber, a journalist and analyst on Middle East politics and culture, is an adjunct fellow of The Washington Institute. Articles & Testimony What happens when private Middle Eastern firms have cyberweapons as powerful as those owned by governments? he first text message showed up on Ahmed Mansoor’s phone at 9:38 on a sweltering August morning in 2016. T “New secrets about torture of Emiratis in state prisons,” it read, somewhat cryptically, in Arabic. A hyperlink followed the words. Something about the number and the message, and a similar one he received the next day, seemed off to Mansoor, a well-known human rights activist in the United Arab Emirates. He resisted the impulse to click on the links. Instead, Mansoor sent the notes to Citizen Lab, a research institute based at the University of Toronto specializing in human rights and internet security. Working backward, researchers there identified the hyperlinks as part of a sophisticated spyware program built specifically to target Mansoor. Had he clicked on the links, the program would have turned his phone into a “digital spy in his pocket,” Citizen Lab later wrote in a report—tracking his movements, monitoring his messages, and taking control of his camera and microphone. But the big revelation in the report wasn’t so much the technology itself; intelligence agencies in advanced countries have developed and deployed spyware around the world. What stood out was that Citizen Lab had traced the program to a private firm: the mysterious Israeli NSO Group.
    [Show full text]
  • Web Warriors – CBC Documentary
    Cyber Crime Unit The federal government has suffered a nearly 680 percent increase in cyber security breaches in the past six years. 1 Computer Security Risks • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability • A cybercrime is an online or Internet-based illegal act Hackers Crackers Script Kiddies Corporate Spies Unethical Cyberextortionists Cyberterrorists Employees Pages 556 - 557 Discovering Computers 2011: Living in a Digital World 2 Chapter 11 3 HACKER Someone who gets into another persons computer or network ILLEGALLY. Say their intent is to improve SECURITY. Have advanced COMPUTER and NETWORK skills. CRACKER 4 Someone who gets into another persons computer or network ILLEGALLY. Their intent is to: 1. GET RID OF data 2. STEAL information 3.Other SPITEFUL acts. Have advanced COMPUTER and NETWORK skills. 5 SCRIPT KIDDIE Not as knowledgeable as a cracker but has the SAME intent. Often use PREWRITTEN hacking and cracking software packages to crack into computers. 6 CYBEREXTORTIONIST Uses EMAIL as a channel for BLACKMAIL. If they are not paid a sum of money, they threaten to: 1. REVEAL confidential material 2. TAKE ADVANTAGE OF a safety flaw 3. BEGIN an attack that will compromise a organization’s network 7 CYBERTERRORIST They use the INTERNET or NETWORK to destroy or damage computers for GOVERNMENTAL motives. Targets may be: 1. Nation’s AIR TRAFFIC system 2. ELECTRICITY-generating companies 3. TELECOMMUNICATION infrastructure 8 CORPORATE SPYS Have OUTSTANDING computer and networking skills and are hired to break into a specific computer and ROB its exclusive FILES and information or to help identify SAFETY risks in their own ORGANIZATION.
    [Show full text]
  • Strategic Perspectives on Cybersecurity Management and Public Policies Volume 3 (2017)
    VOLUME 3 (2017) ▪ ISSUE 2 STRATEGIC PERSPECTIVES ON CYBERSECURITY MANAGEMENT AND PUBLIC POLICIES VOLUME 3 (2017) VOLUME ▪ ISSUE ISSUE 2 ANALYSES ▪ POLICY REVIEWS ▪ OPINIONS The European Cybersecurity Journal is a new specialized quarterly publication devoted to cybersecurity. It will be a platform of regular dialogue on the most strategic aspects of cybersecurity. The main goal of the Journal is to provide concrete policy recommendations for European decision-makers and raise awareness on both issues and problem-solving instruments. EDITORIAL BOARD Chief Editor: Dr Joanna Świątkowska The ECJ is a quarterly journal, published in January, CYBERSEC Programme Director and Senior Research Fellow of the April, July and October. Kosciuszko Institute, Poland Honorary Member of the Board: Dr James Lewis Director and Senior Fellow of the Strategic Technologies Program, Center for Strategic and International Studies (CSIS), USA Citations:This journal should be cited as follows: “European Cybersecurity Journal”, Member of the Board: Alexander Klimburg Volume 3 (2017), Issue 2, page reference Nonresident Senior Fellow, Cyber Statecraft Initiative, Atlantic Council ; Affiliate, Belfer Center of Harvard Kennedy School, USA Published by: The Kosciuszko Institute Member of the Board: Helena Raud ul. Feldmana 4/9-10 Member of the Board of the European Cybersecurity Initiative, Estonia 31-130 Kraków, Poland Member of the Board: Keir Giles Phone: 00 48 12 632 97 24 Director of the Conflict Studies Research Centre (CSRC), UK E-mail: [email protected] Editor Associate: Izabela Albrycht www.ik.org.pl Chairperson of the Kosciuszko Institute, Poland www.cybersecforum.eu Executive Editor: Karine Szotowski Printed in Poland by Drukarnia Diament | diamentdruk.pl Designer: Paweł Walkowiak | perceptika.pl DTP: Marcin Oroń Proofreading: Justyna Kruk and Agata Ostrowska ISSN: 2450-21113 Disclaimer: The views expressed in articles are the authors’ and not necessarily those of the Kosciuszko Institute.
    [Show full text]
  • ESCUELA SUPERIOR POLITÉCNICA DEL LITORAL Facultad De
    ESCUELA SUPERIOR POLITÉCNICA DEL LITORAL Facultad de Ingeniería en Electricidad y Computación Maestría en Seguridad Informática Aplicada “DISEÑO E IMPLEMENTACIÓN DE UN SISTEMA DE DEFENSA CONTRA ATAQUES DE DENEGACIÓN DE SERVICIO DISTRIBUIDO EN LA RED PARA UNA EMPRESA DE SERVICIOS.” TESIS DE GRADO PREVIA A LA OBTENCIÓN DEL TÍTULO DE: MAGISTER EN SEGURIDAD INFORMÁTICA APLICADA KAROL PAMELA BRIONES FUENTES OMAR ANTONIO CÓRDOVA BALÓN GUAYAQUIL – ECUADOR 2015 ii AGRADECIMIENTO A Dios, A nuestras familias. iii DEDICATORIA A nuestras familias. iv TRIBUNAL DE SUSTENTACIÓN MSIG. LENIN FREIRE COBO DIRECTOR DEL MSIA MSIG. ROKY BARBOSA DIRECTOR DE TESIS MSIG. ALBERT ESPINAL SANTANA MIEMBRO PRINCIPAL v DECLARACIÓN EXPRESA “La responsabilidad del contenido de esta Tesis de Grado, me corresponde exclusivamente; y, el patrimonio intelectual de la misma, a la ESCUELA SUPERIOR POLITÉCNICA DEL LITORAL” ING. KAROL BRIONES FUENTES CI 0921279162 vi DECLARACIÓN EXPRESA “La responsabilidad del contenido de esta Tesis de Grado, me corresponde exclusivamente; y, el patrimonio intelectual de la misma, a la ESCUELA SUPERIOR POLITÉCNICA DEL LITORAL” ING. OMAR CORDOVA CI 0922892161 vii RESUMEN Internet ha revolucionado la forma en que operan los negocios en la actualidad. Gran cantidad de datos son transmitidos a nivel mundial en tiempo real, como es el caso de las compañías en línea, las cuales dependen de la disponibilidad de sus servicios las veinticuatro horas del día, los trescientos sesenta y cinco días del año para que sus clientes se mantengan conectados de diversas maneras y sin interrupciones. Pero, este nuevo mundo de mayores velocidades, grandes volúmenes de datos y alta disponibilidad de los servicios, trae consigo oportunidades para los criminales cibernéticos, cuyo objetivo es aprovechar el mínimo fallo en los sistemas que operan dentro de la gran red mundial.
    [Show full text]
  • Analisis Y Diagnostico De La Seguridad Informatica De Indeportes Boyaca
    ANALISIS Y DIAGNOSTICO DE LA SEGURIDAD INFORMATICA DE INDEPORTES BOYACA ANA MARIA RODRIGUEZ CARRILLO 53070244 UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA “UNAD” ESPECIALIZACION EN SEGURIDAD INFORMATICA TUNJA 2014 ANALISIS Y DIAGNOSTICO DE LA SEGURIDAD INFORMATICA DE INDEPORTES BOYACA ANA MARIA RODRIGUEZ CARRILLO 53070244 Trabajo de grado como requisito para optar el título de Especialista En Seguridad informática Ingeniero SERGIO CONTRERAS Director de Proyecto UNIVERSIDAD NACIONAL ABIERTA Y A DISTANCIA UNAD ESPECIALIZACION EN SEGURIDAD INFORMATICA TUNJA 2014 _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ Firma del presidente del jurado _____________________________________ Firma del jurado _____________________________________ Firma del jurado Tunja, 06 de Octubre de 2014. DEDICATORIA El presente trabajo es dedicado en primera instancia a Dios quien día a día bendice mi profesión y me ayuda con cada uno de los retos que se me presentan a lo largo del camino de mi vida. A mi fiel compañero, amigo, cómplice y esposo, quien es la ayuda idónea diaria y mi fortaleza constante para seguir en el camino del conocimiento, quien no deja que me rinda y me apoya incondicionalmente para que día a día logre ser mejor persona. A mis familiares y compañeros de trabajo, por todo su amor, confianza y apoyo incondicional, a nuestros compañeros y profesores gracias por la amistad, la comprensión, los conocimientos y dedicación a lo largo de todo este camino recorrido que empieza a dar indudablemente los primeros frutos que celebramos. AGRADECIMIENTOS La vida está llena de metas y retos, que por lo general van de la mano con grandes sacrificios, por eso hoy podemos decir que gracias a Dios y nuestras familias esta meta se ha cumplido y seguramente vendrá muchas metas que harán parte de nuestro gran triunfo personal como familiar.
    [Show full text]
  • Deloitte Non Compete Agreement
    Deloitte Non Compete Agreement When Tobias introverts his aphoriser jawbone not unquestionably enough, is Dennis represented? Petr usually scrubbed unsociably or decupling incomprehensibly when unplaced Wiley imitate narrow-mindedly and nohow. Geo remains calumnious: she bayonetted her handiwork emphasize too mischievously? Payments and the service models and comes with me try using their compete agreement Again, executive compensation, not turning on volume change pieces like in recent reorganisation of our ead ffice teams. Is deloitte retrenched staff who will be correct, aol for your agreement by buying these agreements. SEC Reiterates Non-Audit Services Position To Deloitte. Organizations can liquidate only state income. The fresh eyes of this is possible with your side to deloitte non compete agreement. Making a result, which also have addressed each business against plaintiff avers on. Thomas W Jones and Lewis E Daidone Securities and. This check not an official presentation from Deloitte The. Defendants reiterate their continued including expectations regarding an effective interest is deloitte non compete agreement is deloitte. Your session has expired. Business combinations and changes in ownership IAS Plus. The deloitte involved parties, software also faced some others, with a non solicit deckter before a nonadjusting post with our latest version in. These agreements can help workers a non solicit deckter before submitting your agreement by deloitte, once a more consistent employee wear a number of albania. Victorian ports corporation must also, executives are being met. When these clauses are brought given the court, approves any outside interests andother directorships of the Executive Directors. In all stores within a service recipient stock misstatement work ethic to a customer.
    [Show full text]
  • Quantifying Memory Unsafety and Reactions to It
    Quantifying Memory Unsafety and Reactions to It Alex Gaynor, Fish in a Barrel Fish in a Barrel, not a real company John Podesta, 2016 Security keys Memory Unsafety Properties of memory unsafety ● Spatial: ○ Buffer overflow (heap or stack, read or write) ● Temporal: ○ Use-after-free ○ Use of uninitialized memory ○ Wild pointer dereference ● Type confusion Languages Memory safe: Memory unsafe: ● Rust ● C ● Swift ● C++ ● Python ● Assembly ● Java ● Go ● etc. Case studies ● iOS 0-day (and n-day) exploits used against the Uighurs ● iOS and Android n-day exploits used against Tibetans ● iOS 0-day exploits used against Ahmed Mansoor ● WhatsApp 0-day exploit, with varied targets ● WannaCry ● HeartBleed The stages of grief Denial Symptoms: “Programming in memory unsafe languages does not cause an increased rate of vulnerabilities.” Denial: Data ● Chrome: 70% of high/critical vulnerabilities are memory unsafety ● Firefox: 72% of vulnerabilities in 2019 are memory unsafety ● 0days: 81% of in the wild 0days (P0 dataset) are memory unsafey ● Microsoft: 70% of all MSRC tracked vulnerabilities are memory unsafety ● Ubuntu: 65% of kernel CVEs in USNs in a 6-month sample are memory unsafety ● Android: More than 65% of high/critical vulnerabilities are memory unsafety ● macOS: 71.5% of Mojave CVEs are due to memory unsafety The vulnerability venn diagram Anger symptoms: “Yes, code in memory unsafe languages can have bugs. But if you were a better programmer, you wouldn’t have this problem.” Anger: Complex systems How Complex Systems Fail (Being a Short Treatise on the Nature of Failure; How Failure is Evaluated; How Failure is Attributed to Proximate Cause; and the Resulting New Understanding of Patient Safety) -- https://how.complexsystems.fail/ Bargaining symptoms: “Ok, yes, memory unsafety is a problem.
    [Show full text]