Introduction
Introduction
Na Sambathchatovong
2015nsbctvong@gmail.com
012561046
2023
CONTENTS
It's not just computers or smart phones, it's not just the Internet, it's the network of
small computers and its sensors in your car, it's your pace-maker sending
information to your doctor, it's the network of controllers regulating industrial
control systems etc.
WHAT IS CYBER SECURITY?
CYBER THREAT: typical threats include unauthorized access, destruction, system overrun
and takeover, propagation of malicious code, data thieving and fabrication, … The attacks
are "cyber" themselves.
E.g., if your computer is stolen, that's not a breach of cyber security. If anybody manages to
access data on your stolen computer, that is an issue for cyber security.
Confidentiality Control:
Access Control Restrict
Encryption
Steganography: Hide information within images or other files.
INTEGRITY
Integrity Control:
Hash functions (MD5) if any change make to file detection
Digital Signature: Achieve goal of non-repudiation
AVAILABILITY
Availability: Ensures that information and systems are available for authorized users when
needed.
Denial attacks seek to undermine availability.
Availability Failure:
Malicious attackers
Component failure
Application failures
Utility failures
Availability Controls:
Redundant Components
High availability
Fault Tolerance
OS and application patch also enhance availability
WHAT ARE THE CHALLENGES?
Rather than mentioning a few specific problems, it is convenient to put in focus the fact that
the organization of our society and our lives are by now largely computer-supported, and this
creates a very significant vulnerability to all sorts of attacks to very different aspects of what
we do. For instance, it concerns
GOVERNMENT AND PUBLIC BODIES: the robustness to intrusion and tamper of electronic
services, which typically hold very sensitive information;
THE ECONOMIC PROCESSES: the protection of industrial secrets and practices, the
confidentiality of business information and tenders; the viability of the network economy, just
think of the banking
system.
THE CITIZEN: the privacy and legitimate use of personal data against de-anonymisation and
impersonation attacks from all sources; the challenged from cybercrime.
WHAT ARE THE CHALLENGES?
Government says that a lot can be achieved by educating users. Similarly, Government
points out that Cyber Security is a board level responsibility for companies.
Yet, to put the burden on the end-users is somehow unfair. The issue we face can be
extraordinarily complex and subtle.
WHAT DO WE NEED?
Carry out the research to come up with systematic countermeasure, with security
frameworks and infrastructures able to react quickly to new attacks.
Identify and develop the cyber security professionals to go our there on the network and
patrol it, to be the good guys in the cyberspace.
EDUCATION is an EMERGENCY.
All this in the respect of the rights of the citizen. The risk of falling into hyper-restrictive
regulations exists. That is why I believe that research (both in Law and technical) will
help also in this respect, by empowering us.
THE HARSH REALITY IN FIGURES (MANDIANT 2011)
UPDATED DATA (2012)
A MOST SHOCKING FIGURE
MORE TRENDS (2013)
1. employ dedicated “cyber incident” handler team — even if one person only!—
whose full time job is to chase intruders.
2. equip the team with tools to collect and analyze network data.
3. understand that this is a daily job, count the number of incidents, measure the
response time.