understanding and distinguishing among cyber activities dave piscitello vp security and ict...

16
understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

Upload: neil-dalton

Post on 11-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

understanding and distinguishing among cyber activities

Dave Piscitello

VP Security and ICT Coordination,

ICANN

Page 2: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cy·ber (sībər) adjective

of, relating to, or characteristic of the culture

of computers, information technology, and

virtual reality

this formal definition is often unhelpful when

cyber is used in conjunction with other terms

because it does not provide context

Page 3: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

context for cyber activities

MEANS FINANCIALability to finance actions

TECHNOLOGICAL ability to digitally mediate actions

INTELLECTUALability to plan and act (talent)

MOTIVE POLITICAL AIMBUSINESS AIMFINANCIAL GAINNOTORIETY…

OPPORTUNITY

ACCESS TO INTERNETthe digital mediation playing field

Page 4: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

closer look at… means• technology and talent for cyber activities must be

financed

– these are cost centers for legitimate or criminal enterprises

• commercial, NGO, or government financing is

largely pay for digital goods, bounties, or open

source (and sweat equity)

• criminal financing encompasses use of stolen or

exploited goods and bartering for digital goods –

credit cards, botnets, software – in an underground

economy

• activism uses open source; hacktivism may use

criminal means

Page 5: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

a closer look at… opportunity• the Internet is an open access, common

technology infrastructure

• its power derives from adaptability

• these characteristics serve all actors,

according to their aim

Page 6: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

a closer look at… motive

• political aim: everything from controlling,

oppressing, or inciting citizenry to

opposition against suppression of rights

or free speech

• commercial aim: from corporate

espionage to tracking/profiling consumers

Page 7: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cybersecurity body of

practices and

measures to

protect

networks,

computers, and

data from

digitally-

mediated

attacks

https://www.flickr.com/photos/splorp/

Page 8: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cyberattackan “online” or

digitally

mediated attack

against digital or

physical world

assets or

infrastructures

1100 1110 01111010 1101 0000 1010 0100 0111 1111

0111 1101 0000 1010 1010 0100 01111010 1111 1121

1100 1110 1010 0111 110 1101 0000 1010 1010 1010

1100 1010 1110 0111 1101 0000 1010 0100 0111 1111

0111 1101 0000 1010 1010 1010 0100 0111 1111 1121

1010 1100 1110 0111 110 1101 0000 1010 1010 1010

1100 1010 1110 0111 1101 0000 1010 0100 0111 1111

0111 11011010 0000 1010 1010 0100 0111 1111 1121

1010 1100 1110 0111 110 1101 0000 1010 1010 1010

1100 1110 0111 1101 0000 1010 1010 0100 0111 1111

1010 0111 1101 0000 1010 1010 0100 0111 1111 1121

1100 1110 0111 110 1101 1010 0000 1010 1010 1010

1100 11101010 0111 1101 0000 1010 0100 0111 1111

0111 1101 0000 10101010 1010 0100 0111 1111 1121

1100 1110 0111 110 1101 0000 1010 1010 1010 1010

A T T A C K

Page 9: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cybercrime

online activity

that has been

classified as a

crime, or an

online activity

that is committed

in violation of lawhttps://www.flickr.com/photos/23905174@N00/

Page 10: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cyberwarfare

Digitally

mediated

attacks on a

nation state

by a nation

statehttps://www.flickr.com/photos/58687716@N05/

Page 11: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cyberterrorism

Digitally

mediated

intimidation

attack on a

nation’s

citizenry by

civilians to

personalize war

Page 12: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cybersurveillance

Digitally

mediated and

covert

information

monitoring or

collection

NDTV Convergence Limited

Page 13: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cyberactivism“hacktivism”

Digitally-mediated

protest against

commercial or

non-commercial

entities or a

nation state a

group or

individual

https://www.flickr.com/photos/foto_db/

Page 14: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

cybervandalism

Digitally-mediated

destruction of, or

damage to,

commercial or

non-commercial

entities or a nation

state a group or

individual

Page 15: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

activities are rarely “exclusively ciber”

• activities in cyberspace are not that

unique from activities in the physical world

• the Internet is the shared playing field

• consider M M O – means, motive,

opportunity – and you’ll find it easy to

distinguish activities

Page 16: Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN

questions?