Cybersecurity o o Threats Risks Vulnerabilities 6 Environments o o o Cyber risks o o o o Competitive Environment Technological Environment Infrastructure Mobile devices Asymetrical SoMe - Social media o NCIS Tue night?? Slide 1 of 48 Cybersecurity October is cybersecurity month Slide 2 of 48 Cybersecurity October cybersecurity month Includes a section on Mobile device and smartphone security Slide 3 of 48 Cybersecurity o o Threats Risks Vulnerabilities 6 Environments o o o Cyber risks o o o o Competitive Environment Technological Environment Infrastructure Mobile devices Asymetrical SoMe - Social media o NCIS Tue night?? Slide 4 of 48 TRV 101 Threats Risks the chance a bad thing can happen, at all is the consequence when that bad thing is very likely to actually happen to you Vulnerabilities is the chances of success of a particular threat against some asset Slide 5 of 48 Cyber Threat trends Top 8 trends Mobile everything Data breaches Malware Usernames and passwords compromised Used to gather personal profile info Malware on mobile devices Social Media hacking Twitter accounts, Facebook pages Slide 6 of 48 Cyber Threat trends Web Server errors Government data breaches Increase in downtime Outsourcing ! Highly specific ID theft of individuals who have “high net worth” Obamacare… healthcare data hacks Slide 7 of 48 Cybersecurity What terms and situations are you familiar with already? Phishing? Domain name hacking Spear Phishing Humint and Teckint Osint !! MacKenzie Institute 2013 Oct Slide 8 of 48 Cybersecurity “regular crime” vs. “cyber crime” Big influencer is “magnitude” More damage can be done On a larger scale In a shorter period of time Slide 9 of 48 Cybersecurity “regular crime” “cyber crime” Prevention Prevention Who – where Detection Detection Reaction Intangible evidence Reaction Countermeasures and deterrence Problem of jurisdiction and enforceability Slide 10 of 48 Six groups of “clear and present danger” Deliberate acts Inadvertant acts Third parties / outsourcing A consequence of the intense Competitive Environment 4th party Slide 11 of 48 Six groups of “clear and present danger” Acts of God – weather extremes (the Geographic Environment) Technical failures Hardware software Management failures Slide 12 of 48 Cybersecurity Deliberate acts on a large scale garner publicity and motivate politicians to react Attacks on cyber structures at the national level 1 min 25 sec MacKenzie Institute 2013 Oct Slide 13 of 48 Influencing environments Competitive Political – Legal – Regulatory (example, Naver in R.O.K.) Economic MacKenzie Institute 2013 Oct Slide 14 of 48 Influencing environments Social – cultural SoMe – Social Media Technological Geographic – weather extremes MacKenzie Institute 2013 Oct Slide 15 of 48 Competitive Environment …intensely competitive Companies are facing competition from other firms Other organizations offering the same product or service now Other organizations offering similar products or services now Other organizations offering a variation on a product or service, that you cannot Organizations that could offer the same or similar products or services in the future Organizations that could remove the need for a product or service we sell MacKenzie Institute 2013 Oct Slide 16 of 48 Competitive Environment Intense competition forces companies to do outsourcing to cut costs MacKenzie Institute 2013 Oct Slide 17 of 48 Competitive Environment - outsourcing “outsourcing the design, implementation and maintenance of ICT across all sectors to third-party providers, including developing countries, cloud computing and large data fusion centres, along with the use of off-the-shelf commercial technologies, has increased vulnerabilities and risks.” Gendron and Rudner “Assessing Cyber Threats To Canadian Infrastructure 4th party !! MacKenzie Institute 2013 Oct Slide 18 of 48 Competitive Environment and Economic Environment Market Development more than Market Penetration Gaining market share is too hard so you concentrate on making more off each customer CRM, CLV, extending the PLC MacKenzie Institute 2013 Oct Slide 19 of 48 Environments - political Ian MacLeod Aug 14th 2013 Quoting Angela Gendron MacKenzie Institute 2013 Oct Slide 20 of 48 Background papers Written by Prof. Martin Rudner and Prof. Angela Gendron http://www.csis-scrs.gc.ca/pblctns/cdmctrch/20121001_ccsnlpprs-eng.asp MacKenzie Institute 2013 Oct Slide 21 of 48 Future Threats, Risks and Vulnerabilities - Infrastructure MacKenzie Institute 2013 Oct Risks “the industrial control systems governing the operations of utilities, from water storage and purification to nuclear power reactors, pose a growing risk to national security and Canada’s economic and societal well-being. ” Slide 22 of 48 Economic Environment Economic Environment The economics of information MacKenzie Institute 2013 Oct Slide 23 of 48 Technological Environment New inventions being created by new enterprises “Apps” Applications Materials Electronic circuitry Increasing miniaturization of components Increasing connectivity – Bluetooth and WiFi everywhere + A-GPS MacKenzie Institute 2013 Oct Slide 24 of 48 Technological Environment Magnitude of web based information is increasing at a rate which is phenomenal 1,800 Terabytes YouTube Instagram 40 secs MacKenzie Institute 2013 Oct Slide 25 of 48 The growth of the Technological Environment = T.M.I. The problem with T.M.I. is not being able to find things Technological Environment The pace of technological change Very very fast Example Cell phone cameras Most devices GPS enabled A-GPS MacKenzie Institute 2013 Oct Slide 27 of 48 Technological Environment Cell phone cameras Smartphones vs. superphones Smartphones take good pics Superphones take great video Tradecraft eclipsed by “teckint” ? MacKenzie Institute 2013 Oct Slide 28 of 48 Technological Environment Future Trends Web 2.0 Web 3.0 MacKenzie Institute 2013 Oct Slide 29 of 48 Technological Environment Future Trends Web 4.0 Marriage of human biologic capabilities with IT hardware and software MacKenzie Institute 2013 Oct Slide 30 of 48 Social – Cultural Environment Risks Household devices and appliances with IP addresses In condos and apts were there is a centrally wired structure Houses in micro-communities (gated communities or prestigious developments) where there is wired or bluetooth connectivity MacKenzie Institute 2013 Oct Slide 31 of 48 Social – Cultural Environment increasingly demanding and educated customers Demanding Educated Wikipedia Google Everyone is an expert But ppl don’t know how to discriminate MacKenzie Institute 2013 Oct Slide 32 of 48 Future Trends – Influencing Environments Political – Legal – Regulatory Environment Laws as a result of politicians responding to IT isssues Politically motivated cyber crime Challenges of cyber crime being outside the jurisdiction of a police / security agency MacKenzie Institute 2013 Oct Slide 33 of 48 Future Trends – Influencing Environments Political – Legal – Regulatory Environment The “ruling” Government is also the “policies” of the particular political party in power stay in power MacKenzie Institute 2013 Oct Suppress crime Slide 34 of 48 Future Trends – Influencing Environments Political – Legal – Regulatory Environment •National, regional, local •Surveillance technology MacKenzie Institute 2013 Oct Slide 35 of 48 Future Trends – Influencing Environments National Surveillance technology CBC News Wed Oct 9th New CSEC H.Q. in Ottawa One of the key themes is the requirement for massive amounts of CPU power Why? MacKenzie Institute 2013 Oct Slide 36 of 48 Requirements for computing power Mackenzie Institute as a word.doc file = 22 KB Mackenzie Institute as an audio file = 42 KB Mackenzie Institute as a video of someone speaking the words = 6,600 KB MacKenzie Institute 2013 Oct Slide 37 of 48 What does this mean in the context of the classical approach to Security Threat The nature of the threats are changing Who is who and where Example Internal employees also includes your outsourcing IT partners Risk Vulnerability – “who” is changing Not just computers MacKenzie Institute 2013 Oct Slide 38 of 48 Future Threats, Risks and Vulnerabilities Mobile web access Marketing and business MacKenzie Institute 2013 Oct Slide 39 of 48 Asymetric warfare MacKenzie Institute 2013 Oct Slide 40 of 48 Future Threats, Risks and Vulnerabilities Vulnerabilities Highly specific ID theft of individuals who have “high net worth” MacKenzie Institute 2013 Oct Slide 41 of 48 e 911 Trends 70% of calls to 911 in the U.S. are from mobile devices (over 50% in GTA) GPS functionality used for social media GPS, SPS, PPS Relates to marketing where people are “where” people are (victims and “bad guys”) http://www.witiger.com/ecommerce/mcommerceGPS.htm MacKenzie Institute 2013 Oct Slide 42 of 48 Smartphone security 2011 paper on smartphone security http://www.eecg.toronto.edu/ ~lie/papers/au-spsm2011.pdf Prof. David Lie Canada Research Chair in Secure and Reliable Computer Systems Dept. of Electrical and Computer Engineering University of Toronto http://www.eecg.toronto.edu /~lie/papers/au-spsm2011.pdf MacKenzie Institute 2013 Oct Slide 43 of 48 Future Trends – Influencing Environments Political – Legal – Regulatory Environment •Municipal police agencies and cyber crime MacKenzie Institute 2013 Oct Slide 44 of 48 Ritesh Kotak TPS http://www.torontopolice.on.ca/socialmedia/ Cyber tools to fight crime Co-operation and co-ordination MacKenzie Institute 2013 Oct Slide 46 of 48 conclusion Cybersecurity lends itself to a focus on teckint Will the solutions be mostly teckint? What role will humint play? Osint? MacKenzie Institute 2013 Oct Slide 47 of 48 Tim Richardson School of Marketing Seneca College tim.richardson@senecacollege.ca University of Toronto, CCIT Program, Mississauga and Dept. of Management, Scarborough richardson@utsc.utoronto.ca www.witiger.com http://people.senecac.on.ca/tim.richardson/powerpoints/