Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
Past, Present and Future of Cyber-security
Transcript of Past, Present and Future of Cyber-security
Viruses and Worms:
Main Threat/Target 1980s:
“We are at risk. Increasingly, America depends on computers. [...] Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”
(National Academy of Sciences, “Computers at Risk”, 1991, p. 7).
Military/ Pentagon increasing target
1994, Rome Lab incident
1998, Solar Sunrise
1998, Moonlight Maze
Main Threat/Target 1990s:
ESpionage + Terror + War
Al-Qaida + Cyber ?
Main Threat/Target 2000:
Consolidation of the Threat Perception
Stuxnet: Computerworm discovered in July 2010
complex, relatively expensive
Estimate (Symantec): 8-10 people programmed for at least 6 months
Non-typical behaviour of malware
no data theft, no Botnet function, only specific installation infected
Sabotage function (centrifugues)
High infection rate in Iran / Delay in nuclear programme
main target: Natanz?
Organised Crime / Cybercrime
Nation / State
+ Part of a broader security political trend
Systems Vulnerability Thinking
Total War, Strategic Bombing, Vital Targets,
Vulnerability Mapping ...
"Operation Olympic Games"
Main Threat/Target 2013:
Zero-Day Exploits - Cyber-war
quantitative: more incidents
qualitative: more powerful attacks
"from highly disruptive to highly secretive"
Reasons: Professionalisation of black market
Role of State Actors!
The Internet of Things