Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Past, Present and Future of Cyber-security

English Version, Standard Intro
by

Myriam Dunn Cavelty

on 8 December 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Past, Present and Future of Cyber-security

Cyber(In)Security
1980
1990
2000
2020
2010
Viruses and Worms:
"Morris Worm"
Computer-
Crime
Cyber-Punk
Espionage
Main Threat/Target 1980s:
ESpionage
Data Theft
Government Computers
Gulf War:
Information Warfare
increasing networking
“We are at risk. Increasingly, America depends on computers. [...] Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”
(National Academy of Sciences, “Computers at Risk”, 1991, p. 7).
Military/ Pentagon increasing target
1994, Rome Lab incident
1998, Solar Sunrise
1998, Moonlight Maze
Main Threat/Target 1990s:
ESpionage + Terror + War
Critical Infrastructures
Society
9/11
Al-Qaida + Cyber ?
Operational Cyberwar
(Electronic Warfare)
Main Threat/Target 2000:
Cyberterror?
Cybercrime +
Consolidation of the Threat Perception
Wikileaks
Anonymous
Stuxnet
Stuxnet: Computerworm discovered in July 2010

complex, relatively expensive
Estimate (Symantec): 8-10 people programmed for at least 6 months

Non-typical behaviour of malware
no data theft, no Botnet function, only specific installation infected

Sabotage function (centrifugues)
High infection rate in Iran / Delay in nuclear programme
main target: Natanz?
Past
Present
Future
Organised Crime / Cybercrime
Main Threat/Target:
Cyberwar?
Nation / State
+ Part of a broader security political trend
LulzSecurity
Systems Vulnerability Thinking
Total War, Strategic Bombing, Vital Targets,
Vulnerability Mapping ...
"Operation Olympic Games"
+ Duqu
+ Flame
NSA Scandal
Main Threat/Target 2013:
Mass Surveillance
Espionage
Zero-Day Exploits - Cyber-war
Threat Evolution
quantitative: more incidents
qualitative: more powerful attacks
"from highly disruptive to highly secretive"
Reasons: Professionalisation of black market
Role of State Actors!
Tech Evolution
The Internet of Things
Full transcript