Pearlfromsu

fsdff

May 15th, 2023
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C# 6.00 KB | None | 0 0
  1. для 16.05.23
  2. Profiling hackers
  3. #profile
  4. Everything we do, we show something of who we are"
  5. Hackers always leave digital traces(messages, calls), and personal tracesAnalysis of language is a key element in profiling.
  6. Any door is only secure as the person who is holding the key.
  7. "Humans are the weaked link in the cyber security chain"
  8. > 90% of cyber crimes caused by human error.
  9. "Amateurs hack systems, professionals hack people" - Bruce Scheiner.
  10. "Black hat" (90% male, 81% is under 30y.o., well educated).
  11. Motives:
  12. - financial gain
  13. - espionage
  14. - thrill-seeking(fun)
  15. - ego
  16. -challenge to beat the system.
  17.  
  18. #methods
  19. 1) Misdirection(trick with egg)
  20. They hack you while telling you that you have been hackerd(eliminate your critical thinking).
  21. - Phishing mails, short messages
  22. - Urgent do now without thinking
  23. 2) Sympathy principle(girl with flash drive)
  24. Our tendency to trust and to like people(silk road)
  25. Many crimes: and spies are veery successful because they don't look like criminals, they unsuspiciout
  26. 3) Authority principle
  27. We are much more influencable when we consider someone an authority. (Doctor's Best TV commercial)
  28. Hackers use authority symbols, logos, brands(FBI, Bank of America) to gain people's trust.
  29. Hackers play with human emotions like a piano.
  30.  
  31. #defence
  32. Team "It won't hit us", "I don't care",
  33. "We are not interesting enough.
  34. There is only two kinds of companies: company that has ben attacked and that will be attacked.
  35. The key to defence CS attacks is awareness to prevent cybercrime.
  36.  
  37.  
  38.  
  39.  
  40. What hacker's biggest fear?
  41. Hackers:
  42. 1) crackers
  43. 2) someone whi finds a novel way of doing something
  44. - How to become a hacker?(learn scripting language, develop your skils)
  45. - The most dangerous kind of hacker?(that tampers with control system for devices, like elevator)
  46. - The biggest fear? (Getting hacked)
  47. - The biggest financial fraud?(TJ Maxx, 45 bill cards)
  48. - How to avoid an attack? (Get off the Internet)
  49.  
  50.  
  51.  
  52.  
  53. Inside the Mind of a Hacker.
  54. Hackers: manupulative, deceitful, exploilative, cynical.
  55. 1) White hat - ethical hackers
  56. 2) Gray hat - "hacktivists", hack for ideological reason
  57. 3) Black hat - crackers, motivated by personal gain.
  58. Motives:
  59. 1) Good guys - narcissists
  60. 2) Oppose authority
  61. 3) Thrill-seeking
  62.  
  63. The researchers developed
  64. - scales to determine 3 categories:
  65. - scale to measure perception of the probability of being caught
  66.  
  67. Criminal activity gives a choice of consequences and opportunities.
  68.  
  69. How can organizations reduce secutiry breaches:
  70. 1) Multifactor authentification(to prevent unathorized access)
  71. 2) Use personality traits to evaluate employees
  72.  
  73.  
  74.  
  75.  
  76.  
  77. We have to reconsider the way we do cybersecurity.
  78.  
  79. Security leaders need to collaborate and rethink the way we do cybersecurity. (company's Cyber Security Weekend - Meta, Jordan).
  80. Meta - Middle East, Turkey, Africa.
  81.  
  82. Special focus: emerging technologies(robotics, IOT, critical industrial - specific threats),
  83. They should be addressed thought a secure(Cyber Immunity)
  84.  
  85. 1) Expands discussed various topics and threats, shared thread predictions for next year.
  86.  
  87. Cyber Immune products with innate protection.
  88. Thread statistics:
  89. - Every 3rd user in META was affected by thread 01.09.22
  90. - Qatar 39.8%, Bahrain 36.5%, Saudi Arabia 33.3%, UAE 32.9%, Kuwait 32.5%, Egypt 28%, Jordan 28%(online)
  91. APT - Advanced Persistent Thread.
  92. In 2028 has been increased in the number of sophisticated attacks(Metador targeting telecommunication).
  93.  
  94.  
  95. 2023 predictions:
  96. The largest cyber epidemics occur every 6-7 years(Last WannyCry ransomware - word, next in 2023)
  97.  
  98. Current global tensions greatly increase the chance that Shadow Brokers - style hack-and-leak could take place.
  99. - Major shift will be reflected in new types of attack(mixing phhysical and cyber intrusions, employing drons)
  100. - Malware - the most wide spread, extremely hard to spot.
  101. - Destructive attacks:
  102.   * affecting both government sector and key industries
  103.   * look like pseudo-ransomware
  104. - mail servers become priority targets(store key intellesence)
  105. - APT use satellite technologies(Viasat is a provider of high-speed satellite broadband services and secure networking systems)
  106. - Hack and leak(hybrid conflit)
  107.  
  108.  
  109.  
  110.  
  111.  
  112.  
  113.  
  114.  
  115.  
  116.  
  117. What is cyber immunity?
  118. Because of specificity of the IOT sphere, products is made as cheap as possible.
  119. Cybersecurity risks are the biggest concern for 57% of organizations that are planning to implement IOT.
  120.  
  121. Antivirus can't have algorithms against all types of attacks. New sophisticated attack appears every day.
  122.  
  123. Everything that can be hacked, will be hacked.
  124.  
  125. Therefore, Kaspersky experts concentrate an efford not only on eliminating all known vulnerabilities.
  126. They shift the paradigm and concentrate an effort on building systems architecture, so that the use of vulnerabilities becomes very difficult.
  127. Attack is just not cost-effective.
  128. Four principles of Cyber Immunity:
  129. 1) Isolation(one model is infected, others - no)
  130. 2) Interaction control(every interaction is checked)
  131. 3) Minimalism(as small code as possible)
  132. 4) Security development process(life cycle)
  133. Design -> development -> testing -> requarements
  134.  
  135. What could be cyber immune?
  136. - IOT
  137. - Industrial devices
  138. - Smart city systems
  139. - Mobile devices
  140.  
  141. Cyber Immune Products:
  142. - IoT gateway
  143. - thin client(virtual desktop infrostruction)
  144. (The fewer operations are performed on the client side, the safer the system is.)
  145.  
  146.  
  147.  
  148. From CyberSecurity to CyberImmunity.
  149. 342000 malware samples is catched per day.
  150. Mirai botnet is still alive.
  151.  
  152. Reasons of being infected:
  153. - no antivirus
  154. - no updates
  155.  
  156. IoT: house(smart TV, fire alarm systems)
  157. city(transport, street lights, cell tower)
  158. office(pc)
  159.  
  160. Kill antivirus -> security revolution
  161. Cost of attack > cost of damage(Immunity)
  162.  
  163. System architecture:
  164. 1) Standart(old version): there is no requarements. It looks like a "house of cards".
  165. 2) New one Micro-lernel Architecture. Applications cur in little independent pieces.
  166. Every model under strict control.
  167. There security layer is located between OS and App layers.
  168.  
  169.  
  170.  
  171.  
  172.  
Add Comment
Please, Sign In to add comment