Die Präsentation wird geladen. Bitte warten

Die Präsentation wird geladen. Bitte warten

Emerging Trends in IT (Cyber) Security

Ähnliche Präsentationen


Präsentation zum Thema: "Emerging Trends in IT (Cyber) Security"—  Präsentation transkript:

1 Emerging Trends in IT (Cyber) Security
Prof. Dr. Gabi Dreo Rodosek Wir leben in einer vernetzen Welt, die omnipräsent ist. Immer kleinere Geräte mit immer mehr Leistung ermöglichen die komfortable Nutzung verschiedenster komplexer Dienste (Apps), den Zugriff auf Daten von überall und jederzeit. Die IKT ermöglicht die Entwicklung immer „smarterer“ Technologien und Geräte so wie z.B. Smart Meter, Smart Grid, Smartphone, die uns das Leben wesentlich erleichtern. Es existieren jedoch auch Bedrohungen in dieser virtuellen Welt. Im Vortrag möchte ich zunächst auf den Paradigmen-Wechsel, den Stand der Technik und die neune Herausforderungen wenn über das Future Internet nachgedacht wird, erklären. Um in die Thematik einzuführen, möchte ich einen kleinen Filmbeitrag zeigen, der bei uns an der Uni gedreht wurde.

2 Our Life in Cyber Space …
We need to protect our life in cyber space Digital Identities Services, Content, Data … Critical infrastructures, … But we face Billions of mobile devices, bandwidths of 100 Gbit/s and more, heterogeneity, Cloud Computing , … and everything is getting smarter … Smartphone, Smart Meter, Smart Grid, Smart Home, Smart City, Smart Car, Smart Factory ... What needs to be done to prevent them in the future?

3 Interconnected World Finance, Industry plants,

4 Paradigm Shift Example: Smart Grid / Smart Meter
Manipulation of sensors in the Grid Manipulation of the electricity distribution Manipulation and reading of electricity consumption Download of malware on smart meters Analysis of usage profiles

5 Paradigm Shift Example: Car-IT, ConnectedDrive

6 Paradigm Shift Electrical Power Supply, Automotive Industry, Finance, Health, Production Control (Industry 4.0), ... Information and Communication Technology (ICT) is Key! New areas are not adequately protected! “All-over-IP” and “IP-over-All”

7 Cyber Attacks Today (1) 2009: Operation Aurora 2010: Stuxnet
2011: Attack on RSA SecurID 2012: Flamer, MiniFlamer Stuxnet almost ruined one-fifth of the Iranian nuclear centrifuge by spinning out of control while simultaneously replaying the recorded system values which shows the normal functioning centrifuge during the attack.[ The breach into RSA's network was carried out by crackers who sent phishing s to two targeted, small groups of employees of RSA.[16] Attached to the was an Excel file containing malware. When an RSA employee opened the Excel file, the malware exploited a vulnerability in Adobe Flash. The exploit allowed the hackers to use Poison Ivy Remote Administration Tool to gain control of machines and access servers in RSA's network.[

8 Cyber Attacks Today (2) Bank robbers are going online
June 2012 „High Roller“ attack Hacking Servers of Police and Customs („No-Name-Crew“) Aim: Getting Data! A global financial fraud scheme that uses an active and passive automated transfer system to siphon money from high balance accounts 60 million euros (US$75.1 million) and 2 billion euros

9 Smart Attack Today: Facing Smart Attacks immune stealth victim
(against existing countermeasures) difficult to detect stealth inconspicuous behaviour targeted victim goal Smart Attack persistent sleeper novel complex various attack vectors various vulnerabilities complex crafted camouflage efficient adaptable backdoor, command and control

10 Interconnected Systems Social Media, Cloud, Mobile Networks, Car2X ...
It‘s all about Data Processes Analytics Big Problem Big Data Big System Data Correlation (Time, Place, Source, Identity, System...) Automated Actions Interconnected Systems Social Media, Cloud, Mobile Networks, Car2X ...

11 Concluding Remarks Threats are diverse; cyber attacks are growing, are complex, targeted and anonymous Security-by-Design! Cyber defence is expensive; a non adequate defence is even more expensive New Technologies = New Threats New Technologies = New Possibilities! Smart Attacks require Smart Defence! State Office of Criminal Investigation Federal Office for Information Security Federal Armed Forces


Herunterladen ppt "Emerging Trends in IT (Cyber) Security"

Ähnliche Präsentationen


Google-Anzeigen