SlideShare a Scribd company logo
Cyber Security
(yes, really)
(because we have to...)

13/10/13
Classification: unclassified

13/10/13
Challenge...

13/10/13
Clinton Ingrams
–

cfi@dmu.ac.uk

Cyber Security Centre
De Montfort University

(that's in Leicester)
Teaching PHP & pentesting
Undergrad & Postgrad

13/10/13
Threats
Agencies
Solutions

13/10/13
Cyber Security is...
●

Protecting people
–

and their information
●

13/10/13

on line
And the big problem is...
In humans we trust ...

13/10/13
Threats

13/10/13
Cyber Attacks
●

Estonia
– Multiple

DDoS
– 3 weeks, starting 27th April 2007
– First state-level cyber attack
● Now on NATO agenda

13/10/13
Cyber Attacks
●

Georgia
– Multiple

DDoS
– 7th August 2008
– In conjunction with military invasion
TTNET

Caucasus Cable

Caucasus Net

Delta Net
Transtelecom

TISCALI
Seabone

13/10/13

RETN
COGENT
Cyber Attacks
●

Syria
Israeli malware was (allegedly) installed in
Syrian Integrated Air Defence System
(IADS)
– 6th September 2007
– Disrupted Syrian nuclear research
–

www.defensetech.org/2007/11/26/israels-cyber-shot-at-syria/

13/10/13
Lost IPR
●

●

“the average business takes 300 days to
identify a data breach”
Small SMEs can lose ~£1M over 5-10 years

13/10/13
Other attack vectors

13/10/13
SMART...
●

Systems

●

Buildings
–
–

●

house
manufacturing

Cities
“arcologies”
Society
–

●

13/10/13
SCADA
●

Supervisory Control and Data Acquisition
Often programmed in software logic
blocks
Typically 30 year turnover in hardware/software
–

●

–
–

●

IET

13/10/13

Windows 95 still very common
Some equipment is 60 years old!
Malware
●

Stuxnet

●

Duku

●

Flame
–
–

13/10/13

now in the wild
have changed the face of modern warfare
People
●

Anonymous

●

Lulzsec

●

Julian Assange
–

●

Bradley (Chelsea) Manning

Edward Snowden
–
–

13/10/13

game changer
(insider threat)
Who's doing what???

13/10/13
HMG
●

Cabinet office

●

GCHQ

●

Centre for Protection of National
Infrastructure
–

13/10/13

CPNI
Police
●

National Crime Agency
–

National Cybercrime Unit

replaces
●

Serious Organised Crime Agency
–

13/10/13

SOCA
Cabinet Office
●

●

Create partnerships between businesses,
academics, HMG & international
£860m
–

over 5 years

–

From the NSCP
●

13/10/13

National Cyber Security Programme
National Cyber Security Strategy
Our vision is for the UK in 2015 to derive huge economic and social value from a
vibrant, resilient and secure cyberspace, where our actions, guided by our core
values of liberty, fairness, transparency and the rule of law, enhance prosperity,
national security and a strong society.
To achieve this vision by 2015 we want:
Objective 1:

Objective 2:

Objective 3:

The UK to tackle cyber
crime and be one of the
most secure places in the
world to do business in
cyberspace

The UK to be more
resilient to cyber attacks
and better able to protect
our interests in
cyberspace

The UK to have helped
shape an open, stable
and vibrant cyberspace
which the UK public can
use safely and that
supports open societies

Objective 4:
The UK to have the cross-cutting knowledge, skills and capability it needs to
underpin all our cyber security objectives
13/10/13
CPNI
●

Awareness raising
–

Physical vulnerabilities
●

–

Software vulnerabilities
●

13/10/13

Lots of “fireworks” demonstrations
???
What's to be done???

13/10/13
Coding
“Why is there never time or money to implement
proper application security before the launch date,
but always time and money to retro-fit security after
the first hack”
Anon

13/10/13
Testing
●

MoD – 4 levels of Vulnerability Assessment
–

Scanning

–

Toolkits
●

–

Penetration test
●

–

13/10/13

automated assessments
qualified & experienced expert

Physical test
TSI
●

Trustworthy Software Initiative
–

–

13/10/13

“Making software more secure, dependable and
reliable”
Partly as a documentation standards repository
Measuring
●

Security Analytics
–

13/10/13

are you safer/more secure now than you were
before?
Reading
Eg
Trustwave Global Security Report
– Checkpoint Security Report
– The Global Cyber Game report
–

●

http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

DefenseTech
– The Register
– etc
–

13/10/13
Cyber Security Vouchers
●

HMG

●

Department for Business, Innovation and Skils

●

Up to £5000 as a voucher
–

●

to spend improving the security of a client

http://news.bis.gov.uk/Press-Releases/Support-for-smallbusinesses-to-tackle-record-levels-of-cyber-attacks-68b5a.aspx

13/10/13
Training
●

Certified Application Security Tester
–

●

Certified Information Systems Security
Professional
–

●

CAST

CISSP

CESG Certified Professional
–

13/10/13

CCP
DMU
●

Cyber Security Centre

●

MSc Cyber Security (Deloitte)

●

MSc SCADA (EADS)

●

Free magazine
–

CyberTalk

–

multidisciplinary
http://softbox.co.uk/cybertalk
●

13/10/13
Questions??

13/10/13
●

http://www.dmu.ac.uk/research/research-faculties-andinstitutes/technology/cyber-security-centre/cyber-security-centre.aspx

●

https://www.gov.uk/government/publications/cyber-security-strategy

●

http://www.cpni.gov.uk/

●

http://www.ssgkc.com/strategic-initiatives/smart-city/

●

https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt

●

http://www.soca.gov.uk/

●

http://www.uk-tsi.org/

●

●

●

http://news.bis.gov.uk/Press-Releases/Support-for-small-businessesto-tackle-record-levels-of-cyber-attacks-68b5a.aspx
http://www.independent.co.uk/news/uk/home-news/more-than-amillion-british-youngsters-being-bullied-online-every-day8852097.html
http://www.scribd.com/doc/142553109/The-Global-Cyber-Game

13/10/13

More Related Content

PPTX
Internet safety
PDF
Cyber security
PPTX
Digital citizenship
PPTX
Internet secutity ppt by vaishnavi khandelwal
PDF
The Nine Elements
PPT
Network security
PPTX
Internet safety
Cyber security
Digital citizenship
Internet secutity ppt by vaishnavi khandelwal
The Nine Elements
Network security

Viewers also liked (6)

PDF
Cyber security 2013
PDF
CONTACT CENTER TRENDS 2014
PDF
2015 positioning security & networking
PDF
infra 2015 delivery
PDF
Risk mngt gov compliance security cyber
PDF
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
Cyber security 2013
CONTACT CENTER TRENDS 2014
2015 positioning security & networking
infra 2015 delivery
Risk mngt gov compliance security cyber
GRC 2013 Preventing Cyber Attacks for SAP - Onapsis Presentation
Ad

Similar to Phpnw 2013 cyber-security (20)

PDF
Global Maritime Cyber Strategy
PPTX
Security in IT (data and cyber security)
PPTX
security in it (data and cyber security)
PDF
Teori 1 pengantar keamanan
DOCX
GUL Network Infrastructure
PDF
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
PPTX
Module 1_ Introduction to Cyber Security.pptx
PDF
Publication in the International Journal Sangeetha
PDF
The red book
PPTX
CYBERSECURITY TRACK.pptx
PPTX
Career in cyber security
PDF
Cyber Security Strategies and Approaches
PPTX
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture).pptx
PPTX
cyber crime and security
PDF
625 -ESECURITY
PDF
Cybersecurity Technologies, Standards and Operations
PPTX
Cyber terrorism
PDF
cybersecurity- A.Abutaleb
PPT
CTO-Cybersecurity-2010-Dr. Martin Koyabe
Global Maritime Cyber Strategy
Security in IT (data and cyber security)
security in it (data and cyber security)
Teori 1 pengantar keamanan
GUL Network Infrastructure
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Module 1_ Introduction to Cyber Security.pptx
Publication in the International Journal Sangeetha
The red book
CYBERSECURITY TRACK.pptx
Career in cyber security
Cyber Security Strategies and Approaches
PPT Lecture 1.1 and 1.2(Database concepts and database system architecture).pptx
cyber crime and security
625 -ESECURITY
Cybersecurity Technologies, Standards and Operations
Cyber terrorism
cybersecurity- A.Abutaleb
CTO-Cybersecurity-2010-Dr. Martin Koyabe
Ad

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Encapsulation theory and applications.pdf
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
sap open course for s4hana steps from ECC to s4
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25-Week II
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools

Phpnw 2013 cyber-security