Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Past, Present and Future of Cyber-security
Transcript of Past, Present and Future of Cyber-security
Viruses and Worms:
Main Threat/Target 1980s:
“We are at risk. Increasingly, America depends on computers. [...] Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”
(National Academy of Sciences, “Computers at Risk”, 1991, p. 7).
Military/ Pentagon increasing target
1994, Rome Lab incident
1998, Solar Sunrise
1998, Moonlight Maze
Main Threat/Target 1990s:
ESpionage + Terror + War
Al-Qaida + Cyber ?
Main Threat/Target 2000:
Consolidation of the Threat Perception
Stuxnet: Computerworm discovered in July 2010
complex, relatively expensive
Estimate (Symantec): 8-10 people programmed for at least 6 months
Non-typical behaviour of malware
no data theft, no Botnet function, only specific installation infected
Sabotage function (centrifugues)
High infection rate in Iran / Delay in nuclear programme
main target: Natanz?
Organised Crime / Cybercrime
Nation / State
+ Part of a broader security political trend
Systems Vulnerability Thinking
Total War, Strategic Bombing, Vital Targets,
Vulnerability Mapping ...
"Operation Olympic Games"
Main Threat/Target 2013:
Zero-Day Exploits - Cyber-war
quantitative: more incidents
qualitative: more powerful attacks
"from highly disruptive to highly secretive"
Reasons: Professionalisation of black market
Role of State Actors!
The Internet of Things