Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity Forum Für Datensicherheit, Datenschutz Und Datenethik 23 3. JAHRESTAGUNG CYBERSECURITY FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK 23. APRIL 2020, FRANKFURT AM MAIN #cyberffm Premium-Partner: Veranstaltungspartner: 3. JAHRESTAGUNG CYBERSECURITY DEUTSCHLAND — DIGITAL — SICHER — BSI Die Schadsoftware »Emotet« hat uns in den letzten Wochen und Monaten erneut schmerzhaft vor Augen geführt, welche Auswirkungen es haben kann, wenn man die Vorteile der Digitalisierung genießt, ohne die dafür unabdingbar notwendige Infor- mationssicherheit zu gewährleisten. Stadtverwaltungen, Behörden, Krankenhäuser und Universitäten wurden lahmgelegt, Unternehmen mussten zeitweise den Betrieb einstellen. Die Folgen sind für jeden von uns spürbar: Arbeitsplätze sind in Gefahr, Waren und Dienstleistungen können nicht mehr angeboten und verkauft werden, Krankenhäuser müssen die Patientenannahme ablehnen. Stadtverwaltungen sind nicht mehr arbeitsfähig und schließen ihre Bürgerbüros. Bürgerinnen und Bürger konnten keine Ausweise und Führerscheine beantragen, keine Autos anmelden und keine Sperrmüllabfuhr bestellen. Sogar Hochzeiten mussten verschoben werden. Und wie würde die Lage wohl erst aussehen, wenn wir tatsächlich in einer voll digitalisierten Welt lebten? Das BSI beschäftigt sich damit, in welchen Anwendungsfeldern der Digitalisierung Risiken entstehen könnten und wie wir diese Risiken kalkulierbar und beherrschbar machen können. Unsere Stärke ist es, Themen der Informationssicherheit gebündelt fachlich zu analysieren und aus der gemeinsamen Analyse heraus konkrete Angebote für unterschiedliche Zielgruppen abzuleiten. Wir gestalten innovative Digitalisierungsbereiche und unterstützen insbesondere den Bund, Länder und Kommunen bei der sicheren Ausgestaltung ihrer Digitali- sierungsvorhaben. Als die Cyber-Sicherheitsbehörde des Bundes setzen wir uns dafür ein, dass »Security by Design« und »Security by Default« als Grundregeln der Informationstechnik etabliert werden. Durch Informa- tionsangebote, technische Anforderungen und Standards schaffen wir Rahmenbedingungen, um ein sicheres und selbstbestimmtes Handeln von Wirtschaft und Gesellschaft in der digitalen Welt zu ermöglichen. Wir zeigen auf, wie Informationssicherheit als neues Qualitätsmerkmal »Made in Germany« in der Digitalisierung funktionieren kann. Wer die Digitalisierung nutzen will, kann nicht nur A, sondern muss auch B sagen. Genauso selbstverständlich wie wir uns im Auto anschnallen oder zu Hause die Tür abschließen, so müssen wir auch in der digitalen Welt angemessene Sicherheitsvorkehrungen ergreifen. Dies wird uns nicht im Alleingang gelingen. Daher sind Veranstaltungen wie die Jahrestagung Cybersecurity willkommene und sinnvolle Plattformen des Austauschs. Ich wünsche Ihnen angeregte und informative Gespräche und Diskussionen! Arne Schönbohm Präsident des Bundesamts für Sicherheit in der Informationstechnik (BSI) 2 FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK, 23. APRIL 2020, FRANKFURT AM MAIN 8.30 UHR REGISTRIERUNG UND EMPFANG DER GÄSTE 9.15 UHR ERÖFFNUNG 9.20 UHR BEGRÜSSUNG 9.30 UHR KEYNOTE-IMPULS MIT ANSCHLIESSENDEM GESPRÄCH FLÄCHENDECKENDE IT-UNSICHERHEIT— WAS KANN STAATLICHE REGULIERUNG ERREICHEN, WAS NICHT? 10.00 UHR IMPULSVORTRAG PHÄNOMEN DIGITALER IDENTITÄTSDIEBSTAHL — DIMENSION UND ABHILFE 10.20 UHR KEYNOTE KI UND IT-SECURITY AUF DEM WEG— ZUR INTELLIGENTEN FIREWALL 10.40 UHR KEYNOTE FUNKTIONALE SICHERHEIT TRIFFT AUF CYBERSICHERHEIT 11.00 UHR KAFFEEPAUSE 11.30 UHR ONE-ON-ONE SECURITY INTERNATIONAL — BEST PRACTICE IN THE FINANCE INDUSTRY 11.50 UHR PANEL HERAUSFORDERUNG DIGITALISIERUNG DER BANKEN UND FINANZWELT — ÜBER DIE ANGRIFFSSZENARIEN SENSIBLER (KUNDEN-)DATEN UND WELCHE SCHUTZSTRATEGIEN GREIFEN 12.20 UHR KURZE PAUSE 12.30 UHR WORKSHOP-SESSION l (4 WORKSHOPS PARALLEL) #1 ANGRIFFE AUF PROZESS- UND FERTIGUNGSINDUSTRIE. VERHINDERN, ERKENNEN UND ABWEHREN! #2 MODERNE ANGRIFFE ERFORDERN MODERNE ABWEHRMECHANISMEN #3 CYBERCRIME UND INCIDENT RESPONSE HERAUSFORDERUNGEN — IN DER FORENSISCHEN DATENANALYSE #4 QUANTIFIZIERUNG VON CYBER-RISIKEN: MIT NEUEN METHODEN BESSERE ENTSCHEIDUNGEN TREFFEN UND SMART INVESTIEREN 13.20 UHR MITTAGSPAUSE 14.20 UHR WORKSHOP-SESSION l l (4 WORKSHOPS PARALLEL) #5 VERTRAUEN IN DER CYBERSECURITY #6 ALLE SPRECHEN VON DER TOP-MANAGEMENT-VERANTWORTUNG BEI CYBER — WIE SINNVOLL IST DAS WIRKLICH? #7 AUFSPÜREN VON CYBERANGRIFFEN IN CLOUD-, RECHENZENTRUMS- UND UNTERNEHMENSINFRASTRUKTUREN MIT HILFE VON KI #8 AKTUELLE BEDROHUNGSLAGE & EFFEKTIVE ABWEHRMASSNAHMENDIE CISCO-SICHT — 15.10 UHR KAFFEEPAUSE 15.40 UHR IMPULSVORTRAG ÜBER IMMER UNKONVENTIONELLERE ANGRIFFSFLÄCHEN IN DER WEB-WELT — DIE NOTWENDIGKEIT EINER EIGENSTÄNDIGEN BKA-ABTEILUNG GEGEN CYBERKRIMINALITÄT 16.00 UHR ONE-ON-ONE AUS DER PRAXIS: ATTACKEN-ZIEL IT-KONZERN: STRATEGIE, TOOLS UND VORKOMMNISSE — WELCHE MASSNAHMEN GREIFEN? 16.20 UHR PANEL BIG DATA UND GESELLSCHAFT: IT-SECURITY IN ZEITEN VON IOT, IIOT UND KI — ÜBER DEFIZITE, HAUSAUFGABEN UND NEUE LÖSUNGSANSÄTZE IM UMGANG MIT DATEN 16.50 UHR IMPULS AUS DER PRAXIS CYBERSICHERHEIT: VOM ANALOGEN INS ALLTAGSGESCHICHTEN DIGITALE — EINES HACKERS 17.10 UHR ENDE DES KONGRESSES 3 3. JAHRESTAGUNG CYBERSECURITY 8.30 UHR REGISTRIERUNG UND EMPFANG DER GÄSTE 9.15 UHR ERÖFFNUNG Detlev Leisse Geschäftsführer, Convent Gesellschaft für Kongesse und Veranstaltungsmanagement mbH Leisse 9.20 UHR BEGRÜSSUNG Melanie Nolte Vizepräsidentin, IHK Frankfurt am Main Nolte 9.30 UHR KEYNOTE-IMPULS MIT ANSCHLIESSENDEM GESPRÄCH FLÄCHENDECKENDE IT-UNSICHERHEIT WAS KANN STAATLICHE REGULIERUNG Neumann ERREICHEN, WAS NICHT? Linus Neumann Netzaktivist, Chaos Computer Club e.V. im Gespräch mit Claas Tatje Wirtschaftsredakteur, DIE ZEIT Tatje 10.00 UHR IMPULSVORTRAG PHÄNOMEN DIGITALER IDENTITÄTSDIEBSTAHL DIMENSION UND ABHILFE Meier Prof. Dr. Michael Meier Inhaber des Lehrstuhls für IT-Sicherheit, Institut für Informatik, Universität Bonn; Leiter der Abteilung Cyber Security, Fraunhofer FKIE 4 FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK, 23. APRIL 2020, FRANKFURT AM MAIN 10.20 UHR KEYNOTE KI UND IT-SECURITY AUF DEM WEG ZUR INTELLIGENTEN FIREWALL von Gernler Alexander von Gernler Leiter der Forschung, genua GmbH; Vizepräsident, Gesellschaft für Informatik e.V. (GI) 10.40 UHR KEYNOTE FUNKTIONALE SICHERHEIT TRIFFT AUF CYBERSICHERHEIT • Technologiekonvergenz resultiert in neue Risiken Kiener • Cyberangriffe auf Gebäudeinfrastruktur können Menschen bedrohen Wolfgang Kiener Global Head, Advanced Threat Center of Excellence, TÜV Rheinland AG Joerg Krämer Krämer Geschäftsfeldleiter Funktionale Sicherheit und Cyber-Security, TÜV Rheinland AG 11.00 UHR KAFFEEPAUSE 11.30 UHR ONE-ON-ONE SECURITY INTERNATIONAL BEST PRACTICE IN THE FINANCE INDUSTRY (IN ENGLISCHER SPRACHE) Zwijnenberg Beate Zwijnenberg Global Chief Information Security Officer, ING im Gespräch mit Jens Tönnesmann Wirtschaftsredakteur, DIE ZEIT Tönnesmann 5 3. JAHRESTAGUNG CYBERSECURITY 11.50 UHR PANEL HERAUSFORDERUNG DIGITALISIERUNG DER BANKEN UND FINANZWELT Wolf ÜBER DIE ANGRIFFSSZENARIEN SENSIBLER (KUNDEN-)DATEN UND WELCHE SCHUTZSTRATEGIEN GREIFEN Heiko Wolf Head of Non Financial Risk Management, ING Deutschland Meywirth Carsten Meywirth Leiter der Abteilung Cybercrime, Bundeskriminalamt (BKA) Moderation: Jens Tönnesmann Wirtschaftsredakteur, DIE ZEIT Tönnesmann 12.20 UHR KURZE PAUSE 12.30 UHR WORKSHOP-SESSION l (4 WORKSHOPS PARALLEL) #1 ANGRIFFE AUF PROZESS- UND FERTIGUNGSINDUSTRIE. VERHINDERN, ERKENNEN UND ABWEHREN! TÜV RHEINLAND Kiener • Technologiekonvergenz resultiert in neue Risiken • Cyberangriffe auf Gebäudeinfrastruktur können Menschen bedrohen Wolfgang Kiener Global Head, Advanced Threat Center of Excellence, TÜV Rheinland AG Krämer Joerg Krämer Geschäftsfeldleiter Funktionale Sicherheit und Cyber-Security, TÜV Rheinland AG 6 FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK, 23. APRIL 2020, FRANKFURT AM MAIN 12.30 UHR WORKSHOP-SESSION l (FORTSETZUNG) #2 MODERNE ANGRIFFE ERFORDERN MODERNE ABWEHRMECHANISMEN DELL • Was ist modernes Cybercrime Scheurle • Mit welchen Technologien arbeiten Hacker und warum sind sie heutzutage so erfolgreich • Was kann ich als Unternehmen tun, um mich zu schützen Andreas Scheurle OSS Product Specialist, Endpoint Security, Dell Technologies #3 CYBERCRIME UND INCIDENT RESPONSE — HERAUSFORDERUNGEN IN DER FORENSISCHEN DATENANALYSE WARTH & KLEIN GRANT THORNTON Helmut Brechtken Brechtken Partner, Warth & Klein Grant Thornton AG #4 QUANTIFIZIERUNG VON CYBER-RISIKEN: MIT NEUEN METHODEN BESSERE ENTSCHEIDUNGEN TREFFEN UND SMART INVESTIEREN KPMG WIRTSCHAFTSPRÜFUNGSGESELLSCHAFT Falk Dr. Michael Falk Partner, Consulting, Cyber Security, KPMG AG Wirtschaftsprüfungsgesellschaft Laszlo Hargitai Manager, Cyber Security, Hargitai KPMG AG Wirtschaftsprüfungsgesellschaft 13.20 UHR MITTAGSPAUSE 7 3. JAHRESTAGUNG CYBERSECURITY 14.20 UHR WORKSHOP-SESSION l I (4 WORKSHOPS PARALLEL) #5 VERTRAUEN IN DER CYBERSECURITY BUNDESDRUCKEREI Dr. Kim Nguyen Nguyen Geschäftsführer, D-Trust GmbH; Fellow, Bundesdruckerei GmbH #6 ALLE SPRECHEN VON DER TOP-MANAGEMENT-VERANTWORTUNG BEI CYBER — WIE SINNVOLL IST DAS WIRKLICH? DELOITTE Wirnsperger • Regularien geben die Berichterstattung und die Einbeziehung des Top-Managements bei Cyber-Themen vor • In der Realität gibt es jedoch Wahrnehmungsunterschiede und die Umsetzung ist nicht eindeutig • Welche Ansätze haben sich in der freien Wildbahn etabliert? Peter J. Wirnsperger Partner | Cyber, Deloitte GmbH Wirtschaftsprüfungsgesellschaft 8 FORUM FÜR DATENSICHERHEIT, DATENSCHUTZ UND DATENETHIK, 23. APRIL 2020, FRANKFURT AM MAIN 14.20 UHR WORKSHOP-SESSION l I (FORTSETZUNG) #7 AUFSPÜREN VON CYBERANGRIFFEN IN CLOUD-, RECHENZENTRUMS-
Recommended publications
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • Superseding Indictment
    _.1{:~~")li~~lti:f~{ FilED ~'Y.:{fs;v, ~,;;rin>---- f-:V' . .. mOPEN COURT .. .1 ''· ··\wi IN THE UNITED STATES DISTRICT COURT F ~~ ffHE f 'f.i 2 EASTERN DISTRICT OF VIRGINIA I?_! ~ 'iJII~ J .·· CLEHI\ U.S. DISTRICT COURT Alexandria Division illgi\NDRIA, VIRGIN!~--~~-' UNITED STATES OF AMERICA Criminal No. 1:18-cr-111 (CMH) v. Count 1: 18 U.S.C. § 793(g) Conspiracy To Obtain and Disclose National JULIAN PAUL ASSANGE, Defense Information Defendant. Count 2: 18 U.S.C. § 371 Conspiracy to Commit Computer Intrusions Counts 3, 4: 18: 18 U.S.C §§ 793(b) and2 Obtaining National Defense Infmmation Counts 5-8: 18 U.S.C. §§ 793(c) and 2 Obtaining National Defense Information Counts 9-11: 18 U.S.C. §§ 793(d) and2 Disclosure ofNational Defense Infmmation Counts 12-14: 18 U.S.C. §§ 793(e) and 2 Disclosure ofNational Defense Information Counts 15-17: 18 U.S.C. § 793(e) Disclosure ofNational Defense Information SECOND SUPERSEDING INDICTMENT June 2020 Term- at Alexandria, Virginia . THE GRAND JURY CHARGES THAT: GENERAL ALLEGATIONS A. ASSANGE and WikiLeaks 1. From at least 2007,1 JULIAN PAUL ASSANGE ("ASSANGE"} was the public 1 When the Grand Jury alleges in this Superseding Indictment that an event occurred on a particular date, the Grand Jury means to convey that the event occmTed "on or about" that date. face of"WikiLeaks," a website he founded with others as an "intelligence agency ofthe people." To obtain information to release on the WikiLeaks website, ASSANGE recruited sources and predicated the success of WikiLeaks in pmi upon the recruitment of sources to (i) illegally circumvent legal safeguards on infonnation, including classification restrictions and computer and network access restrictions; (ii) provide that illegally obtained information to WikiLeaks for public dissemination; and (iii) continue the pattern of illegally procuring and providing classified and hacked information to WikiLeaks for distribution to the public.
    [Show full text]
  • Cyber-Attacks As an Instrument of Terrorism? – Motives – Skills – Likelihood – Prevention
    Cyber-Attacks as an Instrument of Terrorism? – Motives – Skills – Likelihood – Prevention DRAFT VERSION Hendrik Hoffmann / Kai Masser German University of Administrative Sciences Speyer / German Research Institute for Public Administration Speyer 05/08/2018 Paper to be presented at the 2018 IIAS (International Institute of Administrative Sciences) Congress, 25-29 June, Tunis, Tunisia: Strive, Adapt, Maintain: Resilience of Governance Systems Abstract “Cyber-Attacks” are mostly “Cyber-Crime”. Most attacks are “financially driven”. However, the most notorious ”cyber-attacks” like Stuxnet, WannaCry and Petya/NonPetya are linked to state or state- partisan activities. Seemingly, there is a growing market for “Cyber-Defense”. However, the cyber- attack arena is very much reminiscent to piracy of the 16th and 17th century with the ingredients money, power and a legal void. In the second part of the paper, we investigate technical aspects of the attacks introduced in the first part. First, we look at attack vectors with a critical examination of how to minimize the attack surface. We then suggest defensive approaches which lead to best practices. We conclude with a consideration of the cyber inherent issue of unattributeability in conjunction with false flag operations. Table of Contents Abstract ................................................................................................................................................... 1 A Introduction: The Pirates of the Cyberspace ......................................................................................
    [Show full text]
  • A History of Cyber Security Attacks 1980 to Present a History of Cyber Security Attacks 1980 to Present
    A History of Cyber Security Attacks 1980 to Present http://taylorandfrancis.com A History of Cyber Security Attacks 1980 to Present Bruce Middleton CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper International Standard Book Number-13: 978-1-4987-8586-0 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans- mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright .com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
    [Show full text]
  • Analysis of Google Search Trends 2004 - 2019
    Analysis of Google search trends 2004 - 2019 redscan.com CYBER SECURITY IN SEARCH REDSCAN Introduction Google’s annual ‘Year in search’ report offers fascinating insights into people’s online search behaviour. At Redscan, we wanted to use Google’s mass of search-related data to illustrate how the cyber security industry has changed over the last 15 years, including an examination of the people, events and trends that have shaped the industry. Contents 1. The most searched in cyber security p.3 1.1 People 1.2 Companies, hacking groups and scams 2. Popular terminology p.5 2.1 The decline of network security 2.2 Cybersecurity or cyber security? 3. The biggest cyber security events of all time p.6 3.1 Data breaches 3.2 Most searched for data breaches by year 3.3 Threats and vulnerabilities 3.4 Biggest privacy stories 4. Technological changes p.10 4.1 The decline of traditional antivirus 4.2 The rise of endpoint and cloud security 4.3 The popularity of SIEM 4.4 Passwords and authentication 5. The threat landscape p.13 5.1 Threat types 5.2 Cryptojacking 6. Compliance p.14 7. Future trends p.15 7.1 On the rise 7.2 The future of the cyber security profession 1. MOST SEARCHED REDSCAN 1. The most searched in cyber security 1.1 People Every year, Google reveals the most searched for music artists, athletes and actors, but we were interested to identify the most popular personalities in cyber security and how their popularity compares to other celebrities.
    [Show full text]
  • (1) SECRETARY of STATE for FOREIGN and COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Respondents
    IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT 14/85/CH BETWEEN: PRIVACY INTERNATIONAL Claimant and (1) SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Respondents IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT 14/120- 126/CH BETWEEN: GREENNET LIMITED RISEUP NETWORKS, INC MANGO EMAIL SERVICE KOREAN PROGRESSIVE NETWORK (“JINBONET”) GREENHOST MEDIA JUMPSTART, INC CHAOS COMPUTER CLUB Claimants -and- (1) SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Respondents WITNESS STATEMENT OF ERIC KING I, ERIC KING, Deputy Director of Privacy International of 62 Britton Street, London EC1M 5UY, SAY AS FOLLOWS: 1. I am the Deputy Director of Privacy International. I am authorised to make this statement on behalf of Privacy International. 2. I have worked on issues related to communications surveillance at Privacy International since 2011. My areas of interest and expertise are signals 1 intelligence, surveillance technologies and communications surveillance practices. I regularly speak at academic conferences, with government policy makers, and to international media. 3. The contents of this statement are true to the best of my knowledge, information and belief, and are the product of discussion and consultation with other experts. Where I rely on other sources, I have endeavoured to identify the source. 4. In this statement I will address, in turn, the following matters: a. Computer Network Exploitation: Introduction b. The Five Eyes c. What malware can do against an individual device i. Activating sensors ii. Obtaining stored data from devices iii. CNE as a alternative to intercept iv. Other CNE capabilities d. What malware can do against a server or network i.
    [Show full text]
  • European Cyber Security Perspectives 2019 | 1 Preface
    European 2019Cyber Security Perspectives European Cyber Security Perspectives 2019 | 1 Preface Dear reader, 2018 is a difficult year to summarize for Infosec. After the initial flurry of activity around Spectre and Meltdown in the beginning of January, we ended the year with global supply chain concerns brought about by the Super Micro story. Throughout the year we saw the geopolitical dilemmas of 2018 manifest in cyber security issues. Technology giants like Facebook and Google had a security reckoning. However in pure scariness the medical data breaches of MyHeritage (DNA) and MyFitnessPal (health) rank higher. The Starwood Marriot Hotel breach made every travelling executive nervous for the rest of the year, but probably not as nervous as the incident of CEO Fraud at Pathé. In an effort to alleviate some of that impact we are proud to publish the 6th European Cyber Security Perspectives (ECSP) report. The 2019 issue is filled with great articles from our partners ranging from government, universities and private companies. Special thanks goes out to all the partners who have submitted an article for the 6th edition of the ECSP. Also huge hugs to first time authors from de Piratenpartij, de Volksbank, Leiden University, University of Illinois, Hack in the Box and QuSoft. If IoT was the buzzword in 2017 then Artificial Intelligence (AI) was most definitely in 2018. AI and security seem to be intertwined and that is why you will find several articles about AI in this issue. This year the organization of Hack in the Box created a challenge which you can find at the bottom of the centerfold.
    [Show full text]
  • The State of IT Security in Germany 2018 the STATE of IT SECURITY in GERMANY 2018
    The State of IT Security in Germany 2018 THE STATE OF IT SECURITY IN GERMANY 2018 2 THE STATE OF IT SECURITY IN GERMANY 2018 | FOREWORD Foreword Our modern, high-tech society depends on the functio- In its 2018 report on the state of IT security in Germany, nal integrity of information technologies and commu- the BSI has presented a well-founded and comprehen- nication systems, effective infrastructure and a secure sive overview of the threats facing our country, our supply of energy. These systems are the foundation for people and our economy in cyberspace. Above all, how- technical progress and economic development in our ever, it illustrates the successful and indispensable efforts country. the BSI undertakes on our behalf. Germany, its residents, businesses and governmental agencies remain in the As such systems grow more complex and all the areas crosshairs of those looking to carry out cyberattacks. of our information society become more interconnect- Taking on these challenges and devising rapid, efficient ed, however, the risks posed by disruptions and attacks responses to the latest dangers in cyberspace remains from within Germany or abroad are increasing as well. the central task of the BSI and its employees. Threats in cyberspace are highly dynamic, and cyber attacks are becoming more adaptive and professional. Both IT systems and the methods used to attack them are constantly evolving at a rapid pace. The Federal Government takes seriously its responsibili- ty to ensure security also in cyberspace by maintaining a framework of IT security laws, pursuing a cybersecurity strategy and strengthening the relevant agencies.
    [Show full text]
  • The Role of Malware in Reported Cyber Espionage: a Review of the Impact and Mechanism
    Information 2015, 6, 183-211; doi:10.3390/info6020183 OPEN ACCESS information ISSN 2078-2489 www.mdpi.com/journal/information Review The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism Gaute Wangen Norwegian Information Security Laboratory, Center for Cyber and Information Security, Gjøvik University College, Teknologivn. 22, 2815 Gjøvik, Norway; E-Mail: [email protected]; Tel.: +47-907-08-338 Academic Editors: Qiong Huang and Guomin Yang Received: 9 April 2015 / Accepted: 7 May 2015 / Published: 18 May 2015 Abstract: The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, types of operating systems and infection rates). This taxonomy provides information on recent cyber espionage attacks that can aid in defense against cyber espionage by providing both scholars and experts a solid foundation of knowledge about the topic. The classification also provides a systematic way to document known and future attacks to facilitate research activities. Geopolitical and international relations researchers can focus on the impacts, and malware and security experts can focus on the mechanisms. We identify several dominant patterns (e.g., the prevalent use of remote access Trojan and social engineering). This article concludes that the research and professional community should collaborate to build an open dataset to facilitate the geopolitical and/or technical analysis and synthesis of the role of malware in cyber espionage.
    [Show full text]
  • Evolution of Cyber Security Invotra
    Evolution of cyber security Invotra Digital Workplace, Intranet and Extranet 700 bc Scytale used by Greece and Rome to send messages And kids ever since.. Image Source: https://commons.wikimedia.org/wiki/File:Skytale.png 1467 Alberti Cipher was impossible to break without knowledge of the method. This was because the frequency distribution of the letters was masked and frequency analysis - the only known technique for attacking ciphers at that time was no help. Image Source: https://commons.wikimedia.org/wiki/File:Alberti_cipher_disk.JPG 1797 The Jefferson disk, or wheel cypher as Thomas Jefferson named it, also known as the Bazeries Cylinder. It is a cipher system using a set of wheels or disks, each with the 26 letters of the alphabet arranged around their edge. Image Source: https://en.wikipedia.org/wiki/Jefferson_disk#/media/File:Jefferson%27s_disk_cipher.jpg 1833 Augusta Ada King-Noel, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She is widely seen as the world's first programmer Image Source: https://commons.wikimedia.org/wiki/File:Ada_Lovelace_portrait.jpg 1903 Magician and inventor Nevil Maskelyne interrupted John Ambrose Fleming's public demonstration of Marconi's purportedly secure wireless telegraphy technology. He sent insulting Morse code messages through the auditorium's projector. Image Source: https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)#/media/File:Nevil_Maskelyne_circa_190 3.jpg 1918 The Enigma Machine. It was developed by Arthur Scherbius in 1918 and adopted by the German government and the nazi party Image Source: https://commons.wikimedia.org/wiki/File:Kriegsmarine_Enigma.png 1932 Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
    [Show full text]