SlideShare a Scribd company logo
1 of 28
Download to read offline
Security Tuesday
"Celui qui part à la chasse"
19 novembre 2013
Enrico Branca
Information Security
Definition
"the practice of defending information from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection,
recording or destruction. It is a general term that can be used
regardless of the form the data may take (electronic, physical, etc...) "

(http://en.wikipedia.org/wiki/Information_security)
"Safe-guarding an organization's data from unauthorized access or
modification to ensure its availability, confidentiality, and integrity."
(http://www.businessdictionary.com/definition/informationsecurity.html)
2
Information Security
Combine basic principles in information security:

1) You cannot secure what you cannot manage
2) You cannot manage what you cannot measure

3) You cannot measure what you are not aware of
WITH MONEY
4) You cannot make monetize what you are not aware it
even exists
NEW TASK  “Measure” information security to sell it

3
Quantitative Information Security
Definition of 'Quantitative Analysis'
A business or financial analysis technique that seeks to understand behavior by
using complex mathematical and statistical modeling, measurement and research.
By assigning a numerical value to variables, quantitative analysts try to replicate
reality mathematically.
(http://www.investopedia.com/terms/q/quantitativeanalysis.asp)

Quantitative research
"The objective of quantitative research is to develop and employ mathematical
models, theories and/or hypotheses pertaining to phenomena. The process of
measurement is central to quantitative research because it provides the
fundamental connection between empirical observation and mathematical
expression of quantitative relationships. Quantitative data is any data that is in
numerical form such as statistics, percentages, etc."
(http://en.wikipedia.org/wiki/Quantitative_research)

4
Quantitative Information Security
-- 1998 -“Quantitative Evaluation of Information System Security”
(http://homepages.laas.fr/deswarte/Publications/98107.pdf)
-- 2004 -"Computer Security Strength & Risk: A Quantitative Approach"
(http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.5276&rep=rep1&type=pdf)
-- 2009 -"Computer Safety, Reliability, and Security"
(28th International Conference, SAFECOMP 2009, ISBN 978-3-642-04468-7)
-- 2012 -Towards quantitative measures of Information Security: A Cloud Computing case study
(sdiwc.net/digital-library/web-admin/upload-pdf/00000315.pdf)
-- 2013 -"A QUANTITATIVE, EXPERIMENTAL APPROACH TO MEASURING PROCESSOR SIDE-CHANNEL SECURITY"
(http://www.cs.columbia.edu/~jdd/papers/micro13_svf.pdf)

5
Google Search Trends

6
Economic Intelligence (English)
"..vocabulary evolved also, shifting from ‘economic war’, ‘competitive intelligence’ and
‘economic watch’ only, to ‘economic intelligence’, which aims to encompass all aspects
of the globalised risks and opportunities and that is based on an upstream
understanding and a multidisciplinary approach of the threats that need to be
addressed.“
"Today, economic intelligence is recognised as a professional tool for strategy and
management for States and companies in the globalised world. Its implementation is
based on three main pillars:
(1) The mastering of strategic information
(2) Economic security, which is defensive and directed at protecting economic assets
(3) Influence –active or offensive–, be at the cutting edge for seeking opportunities
and innovation and to be able to act on one’s environment (regulations, norms,
image…) and not only be passively dependent on it
(http://www.realinstitutoelcano.org/wps/portal/rielcano_eng/Content?WCM_GLOBAL_CONTEXT=/elcano/elca
no_in/zonas_in/defense+security/ari134-2010)

7
Intelligence Economique
« Avantage concurrentiel de l'intelligence économique »

• détecter ce qui peut donner à l'entreprise un avantage
concurrentiel
• mobiliser les acteurs internes de l'entreprise

• tirer les conclusions pour la meilleure exploitation possible
L'information fournie doit présenter
certaines qualités :

1) exactitude
2) mise à jour
3) liée au contexte.

8

De manière formelle:

1) elle doit être traitée rapidement
2) être explicite
3) accessible économiquement.
Intelligence Economique
-- 1999 -" L'intelligence économique "
Achard, Pierre, Bernat, Jean-Pierre, BBF, 1999, n° 6, p. 123-125

-- 2003 -"INTELLIGENCE ÉCONOMIQUE ÉCONOMIQUE ET STRATÉGIQUE"
(http://www.adec.fr/files_upload/documentation/200607201512060.Cigref_IE_internet.pdf)
-- 2009 --

"Guide des bonnes pratiques en matière d’intelligence économique"
(http://c.asselin.free.fr/french/guide_des_bonnes_pratiques_en_matiere_d_ie-1.pdf)
-- 2011 -"Le concept français d’ “intelligence économique”: histoire et tendances"
(http://archivesic.ccsd.cnrs.fr/docs/00/64/64/67/PDF/MHArtIEfrWorkingpaper20101213FRfinal.pdf)
-- 2012 -"L’INFORMATION AU CŒUR DE L’INTELLIGENCE ECONOMIQUE STRATEGIQUE"
http://rrien.univ-littoral.fr/wp-content/uploads/2012/03/doc27-rri.pdf

9
Open Data Sources
Internet-Wide Scan Data Repository (https://scans.io/)
The Internet-Wide Scan Data Repository is a public archive of research data collected
through active scans of the public Internet.
The repository is hosted by the ZMap Team at the University of Michigan and was founded in
collaboration with Rapid7.
• University of Michigan · HTTPS Ecosystem Scans
• University of Michigan · Hurricane Sandy ZMap Scans
• Rapid7 · Critical.IO Service Fingerprints
• Rapid7 · SSL Certificates
• Rapid7 · Reverse DNS
• Rapid7 · HTTP-GET (port 80)
•A JSON interface to the repository is available at https://scans.io/json

10
Open Data Sources
Internet Census 2012

“Port scanning /0 using insecure
embedded devices” (Carna Botnet)
http://internetcensus2012.bitbucket.org/paper.html
All data collected during the Internet Census 2012 is available for
download via BitTorrent.

The full download is 568GB large. Decompressing all data results in
9TB of raw log files in text format. If recompressed into gzip files the
dataset should be ~1.5TB.
http://internetcensus2012.bitbucket.org/download.html
11
Open Data Sources
European Union Open Data Portal
http://open-data.europa.eu/

Pan European data portal
http://publicdata.eu/dataset

Linked Open Data Around-The-Clock
http://latc-project.eu/datasets

Plateforme d’ouverture des données publiques
http://www.data.gouv.fr/

12

Institut national de la statistique et des études économiques
http://www.insee.fr/fr/bases-de-donnees/default.asp
http://www.bdm.insee.fr/bdm2/index.action
Server Access Logs
Google query for Web Server logs
 intext:"Mozilla/5.0" filetype:txt
 filetype:log user_agents
TOP 5 - BOT useragents (sample from 2012 logs)
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)
Mozilla/5.0 (compatible; Ezooms/1.0; ezooms.bot@gmail.com)

2910357
1067432
632752
619931
479867

TOP 5 - BROWSER useragents (sample from 2012 logs)
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0)
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)

1824893
806615
646110
433263
387967

13
Server Access Logs
User Agents by Phone Manufacturer
HTC

User Agents by Operating System
72027

Nokia

35699

BlackBerry

31951

SonyEricsson

31049

LG
MOTOROLA
Alcatel

18322
2474

156

SunOS

User Agents by Layout Engine
10662928

12469607

14

AppleWebKit

Trident

Linux

Mac

Windows

User Agents by Browser
13850653

961715
Presto

Android

Gecko

MSIE
Firefox
Safari
Chrome
Opera
Outlook-Express
Iceweasel
SeaMonkey
Microsoft Office

16339858
12949308
9725335
5517233
1007251
67470
20093
18687
5653
Bots behavior (example)
On Bots – analysis 2005/2006 – http://drunkmenworkhere.org/219
YAHOO

MSNBOT

15

GOOGLE
Data Analysis Constants
Economic Parameters for FRANCE

Constants for IT market in France (as averages)

Average work hours a week

35

A

Cost Server Install or Restore

6000 €

M

Days of festivities a year

122

B

Server worked daily in France

30

N

Average days on holidays

35

C

Daily Financial loss (Server Down)

1500 €

P

Average working days a year

208

D

Days to reconfigure a server

7

Q

Average working hours a year

3120

E

Cost SSL Certificate (2048bit RSA)

500 €

R

19.6 %

F

Cost Securing Server Installation

2000 €

S

45 %

G

Systems that could to be secured

52568234

T

2764 €

H

Systems with faulty SSL setup

11360349

U

990 €

W

Company tax rate
Private tax rate
Average monthly salary (gross)

Cost of an offline server in the SME market:
“Financial loss + Restore + New SSL certificate”
[(P) X (Q)] + [(M) x 1] + [(R) x 1] = 17.000 €
Cost to fix all systems with faulty SSL setup:
{[(W) + (S) + (R)] x (U)} = 39.647.618.010 €

16

Average daily cost of IT engineer

Market for server security maintenance:
Market = {[(T) x (S)] + [(W) x (Q) x (T)]}
Market: 574.570.797.620 €
Secure Communication Market
( Some examples of worst cases)

17
Secure Communication Market
Question : Is there a market for secure communication?
(fictional data)
Inventing some numbers :
• 97.454.086 Total IP
• 18.213.972 Self-Signed Certs
• 66.365.935 No SSL
• 19.312.637 No Trusted Certs
• 31.088.151 SSL
• 29.525.183 Weak Ciphers
• 19.727.802 Safe SSL
• 33.724.344 Weak Keys
• 18.360.349 Weak SSL
• 58.321.312 Old Software
WEAK SSL DETAILS
Series1
5
4
3

19%

SSL USAGE

Series2
81%

53%

47%

59%

41%

2

73%

27%

1

74%

26%

100,000,000.00
90,000,000.00
80,000,000.00
70,000,000.00
60,000,000.00
50,000,000.00
40,000,000.00
30,000,000.00
20,000,000.00
10,000,000.00
0.00
1

18

2

3

4

5
Estimate Cyber Security Market
Parameters
A= 100.000 servers
B= 50.000 SSL srv.
C= 40.000 vulner.
D= 35 working hours/week E= 5 hours/day
F= 19.6% corp.tax
G= 45% indiv.tax
H= 6000€ install server
J= 1500€/day finan. loss
K= 500€ cert cost
L= 2000€ check server
M= 7 days to install server
N= 3960€ gross salary/month O= project time 3 years P= 4 hours check server
Total working days/year= 365 - 122 (festivities) - 35 (holiday) = 208 days
Total working hours/year= 208 x 5 = 1040 hours
Annual Salary= (N x 12) = 47520€ / year
Human Daily Cost= (N x 12) / 208 = 228.46 €
Technical Cost reinstall 1 server= H + (Jx7) + K = 17.000 €
Human cost reinstall 1 server= (228.46 x 7) = 1599.22 €
Total Cost reinstall 1 server= 17.000 + 1599.22 = 18599.22 €

19
Estimate Cyber Security Market
Technical Cost reinstall 1 server= H + (Jx7) + K = 17.000 €
Human cost reinstall 1 server= (228.46 x 7) = 1599.22 €
Total Cost reinstall 1 server= 17.000 + 1599.22 = 18599.22 €
Total Cost reinstall 40.000 SSL server= (18599.22 x 40.000) = 743.968.800 €
Total Cost maintain 40.000 SSL server= (L x 40.000) = 80.000.000 €
Total cost secure 40.000 SSL servers= 743.968.800 + 80.000.000 = 823.968.800 €
People to check 40.000 SSL servers in 3 years= ((P x 40.000) / (1040 x 3))= 51
Vulnerable Servers = 18.360.349
Problematic SSL servers = 8.996.571
Total cost secure SSL servers = 185.322.345.274,62 €
People to check SSL servers in 3 years= ((P x 8966571) / (1040 x 3))= 11495
Total Cost reinstall ALL server= (18599.22 x 18.360.349) = 341.488.170.327,78 €
Total Cost maintain ALL server= (L x 18.360.349) = 36.720.698.000 €
Total cost secure ALL servers= 378.208.868.327,78 €
People to check ALL servers in 3 years= ((P x 18.360.349) / (1040 x 3))= 23.539

20
Secure Communication Market
How big is the market for IT server
maintenance to change SSL certs?
Data analysis revealed that the market is
estimated to be on average 185 billion euro and
will involve 11.495 IT professionals over a
period of time of 3 years.

Server Preparedness level
Safe

Unsafe

21

Risky

Vulnerable

No Data

(fictional data)
Estimate Cyber Security Market
Can you estimate the market size
related to cyber defense security?
A research on revealed that France has a
potential market of 378 billion euro with an
average cost for each cyber attack of 17.500
euro.
The forecasted potential market for cyber
criminal resulted to be 341 billion euro and
this risk could be mitigated by
implementing a cyber defense system.

Server Preparedness level
Safe

Unsafe

22

Risky

Vulnerable

No Data

An investment of 37 billion euro to
maintain and check current servers would
prevent all potential losses and ensure an
increase in skilled engineers of around
23.539 units.

(fictional data)
EXTRA

EXTRA SECTION
HOW TO DEVELOP A LOGICAL MODEL
(Example)

23
EXTRA – DEVELOPING A MODEL
“What is our company’s exposure to cyber attacks and cyber risks?”
To answer we have first to understand the question and to do so we divide it in logical sections.
1. our: client is interested in a comparison between he and everyone else, a reference is needed
2. company: information about the business, not related to private or governmental entities
3. exposure: psychological aspect, how client feels unprotected compared to his peers
4. risk: psychological aspect, not measurable unless derived from impact and probability
5. cyber: identifies the environment in which the client perceives a problem, so the subject
6. attacks: psychological aspect, non measurable unless derived from surrounding environment
And now that we know what the client wants we can rewrite the question in a way that can allow
us to take direct and measurable actions:
“Can we tell the client how well he operates, compared to his peers operating in the same
business environment, by measuring the probability of being a target and the impact of this action
and generate a relative measure of the risk related to the subject, so he can understand how
distant his way of conducting the business is to the reference of the industry?”

24
EXTRA – DEVELOPING A MODEL
PREPARATION (PREREQUISITES):
1. Find the list of businesses (peers) that are competitors or providers of our client [Peers]
2. Find the market in which both client and peers are operating [Environment]
3. Find which kind of operational indicators (KPI) are important for the client [ClientKPI]
4. Find which kind of operational indicators (KPI) are important for the peers [PeersKPI]
5. Find which kind of operational indicators (KPI) are important for the subject [SubjectKPI]
6. Find which kind of technical indicators are relevant for client [ClientTI]
7. Find which kind of technical indicators are relevant for peers [PeersTI]
8. Find which kind of technical indicators are relevant for subject [SubjectTI]
9. Find or create a table that measures the probability an action has to happen [Probability]
10. Find or create a table that measures how important is the impact of a given action [Impact]
To correlate the information we assign a code to each prerequisite action:
1 = [Peers]
4 = [PeersKPI]
7 = [PeersTI]
10 = [Impact]

25

2 = [Environment]
5 = [SubjectKPI]
8 = [SubjectTI]

3 = [ClientKPI]
6 = [ClientTI]
9 = [Probability]
EXTRA – DEVELOPING A MODEL
The “+” sign represents a correlation been created between two objects.
11=[1]+[2]= [Market]
12=[3]+[6]= [ClientIndex]
13=[4]+[7]= [PeersIndex]
14=[5]+[8]= [SubjectIndex]
15=[9]+[10]= [Risk]
16=[11]+[15]= [MarketRisk]
17=[12]+[15]= [ClientRisk]
18=[13]+[15]= [PeersRisk]
19=[14]+[15]= [SubjectRisk]
20=[16]+[19]= [EnvironmentRisk]
21=[17]+[18]= [BusinessRisk]
22=[20]+[21]= [IndustryRisk]
23=[3]+[4]= [DomainKPI]
24=[6]+ [7]= [DomainTI]
25=[15]+[23]= [PerformanceRisk]
26=[15]+[24]= [OperationalRisk]
27=[23]+[24]= [IndustryAverage]
28=[25]+[26]= [EconomicalRisk]
29=[27]+[28]= [IndustryReference]
The system of measurements has converted quantitative data, indicators, in human emotions,
risk and fear, and now we have to convert again fear into something measurable, so it can be
measured and managed as expected by the society and therefore used in business.
Sub-Question-1: (quantitative)
“how well he operates, compared to his peers?”
Answer= “[12] + [27]”

26

Sub-Question-2: (qualitative)
“a relative measure of the risk related to the subject?”
Answer= “[17] + [19]”
EXTRA – DEVELOPING A MODEL

27
THANK YOU

enrico.branca@awebof.info

28

More Related Content

What's hot

IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityDeniseFerniza
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research dataTomppa Järvinen
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorCloudMask inc.
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkIGF Indonesia
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALRuss Dietz
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 

What's hot (20)

IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
D5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINALD5_Cyber Security Directions-Transform2016-FINAL
D5_Cyber Security Directions-Transform2016-FINAL
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 

Similar to ISSA France Chapter Meeting Supporting Slides November 2013

Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublishedAlain Ducass
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdfKunjJoshi14
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerJoe Hessmiller
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...IJNSA Journal
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 

Similar to ISSA France Chapter Meeting Supporting Slides November 2013 (20)

14 june
14 june14 june
14 june
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Forensics
ForensicsForensics
Forensics
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
HYBRIDIZED MODEL FOR DATA SECURITY BASED ON SECURITY HASH ANALYSIS (SHA 512) ...
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 

More from ISSA France Security Tuesday

Tour d’horizon des méthodes de vol d’information
Tour d’horizon des méthodes de vol d’informationTour d’horizon des méthodes de vol d’information
Tour d’horizon des méthodes de vol d’informationISSA France Security Tuesday
 
Communiqué de Presse Lancement Afterwork Régionaux PACA
Communiqué de Presse Lancement Afterwork Régionaux PACACommuniqué de Presse Lancement Afterwork Régionaux PACA
Communiqué de Presse Lancement Afterwork Régionaux PACAISSA France Security Tuesday
 
CitiZENSec CyberSecMonth Awareness Campaign Infographic
CitiZENSec CyberSecMonth Awareness Campaign InfographicCitiZENSec CyberSecMonth Awareness Campaign Infographic
CitiZENSec CyberSecMonth Awareness Campaign InfographicISSA France Security Tuesday
 
ISSA France Security Tuesday AfterWork September 2012
ISSA France Security Tuesday AfterWork September 2012ISSA France Security Tuesday AfterWork September 2012
ISSA France Security Tuesday AfterWork September 2012ISSA France Security Tuesday
 

More from ISSA France Security Tuesday (6)

ISSA France - Atteindre, Convaincre, Influer
ISSA France - Atteindre, Convaincre, InfluerISSA France - Atteindre, Convaincre, Influer
ISSA France - Atteindre, Convaincre, Influer
 
Tour d’horizon des méthodes de vol d’information
Tour d’horizon des méthodes de vol d’informationTour d’horizon des méthodes de vol d’information
Tour d’horizon des méthodes de vol d’information
 
Communiqué de Presse Lancement Afterwork Régionaux PACA
Communiqué de Presse Lancement Afterwork Régionaux PACACommuniqué de Presse Lancement Afterwork Régionaux PACA
Communiqué de Presse Lancement Afterwork Régionaux PACA
 
CitiZENSec CyberSecMonth Awareness Campaign Infographic
CitiZENSec CyberSecMonth Awareness Campaign InfographicCitiZENSec CyberSecMonth Awareness Campaign Infographic
CitiZENSec CyberSecMonth Awareness Campaign Infographic
 
SecurityTuesday Personal Branding 2012
SecurityTuesday Personal Branding 2012SecurityTuesday Personal Branding 2012
SecurityTuesday Personal Branding 2012
 
ISSA France Security Tuesday AfterWork September 2012
ISSA France Security Tuesday AfterWork September 2012ISSA France Security Tuesday AfterWork September 2012
ISSA France Security Tuesday AfterWork September 2012
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

ISSA France Chapter Meeting Supporting Slides November 2013

  • 1. Security Tuesday "Celui qui part à la chasse" 19 novembre 2013 Enrico Branca
  • 2. Information Security Definition "the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...) " (http://en.wikipedia.org/wiki/Information_security) "Safe-guarding an organization's data from unauthorized access or modification to ensure its availability, confidentiality, and integrity." (http://www.businessdictionary.com/definition/informationsecurity.html) 2
  • 3. Information Security Combine basic principles in information security: 1) You cannot secure what you cannot manage 2) You cannot manage what you cannot measure 3) You cannot measure what you are not aware of WITH MONEY 4) You cannot make monetize what you are not aware it even exists NEW TASK  “Measure” information security to sell it 3
  • 4. Quantitative Information Security Definition of 'Quantitative Analysis' A business or financial analysis technique that seeks to understand behavior by using complex mathematical and statistical modeling, measurement and research. By assigning a numerical value to variables, quantitative analysts try to replicate reality mathematically. (http://www.investopedia.com/terms/q/quantitativeanalysis.asp) Quantitative research "The objective of quantitative research is to develop and employ mathematical models, theories and/or hypotheses pertaining to phenomena. The process of measurement is central to quantitative research because it provides the fundamental connection between empirical observation and mathematical expression of quantitative relationships. Quantitative data is any data that is in numerical form such as statistics, percentages, etc." (http://en.wikipedia.org/wiki/Quantitative_research) 4
  • 5. Quantitative Information Security -- 1998 -“Quantitative Evaluation of Information System Security” (http://homepages.laas.fr/deswarte/Publications/98107.pdf) -- 2004 -"Computer Security Strength & Risk: A Quantitative Approach" (http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.5276&rep=rep1&type=pdf) -- 2009 -"Computer Safety, Reliability, and Security" (28th International Conference, SAFECOMP 2009, ISBN 978-3-642-04468-7) -- 2012 -Towards quantitative measures of Information Security: A Cloud Computing case study (sdiwc.net/digital-library/web-admin/upload-pdf/00000315.pdf) -- 2013 -"A QUANTITATIVE, EXPERIMENTAL APPROACH TO MEASURING PROCESSOR SIDE-CHANNEL SECURITY" (http://www.cs.columbia.edu/~jdd/papers/micro13_svf.pdf) 5
  • 7. Economic Intelligence (English) "..vocabulary evolved also, shifting from ‘economic war’, ‘competitive intelligence’ and ‘economic watch’ only, to ‘economic intelligence’, which aims to encompass all aspects of the globalised risks and opportunities and that is based on an upstream understanding and a multidisciplinary approach of the threats that need to be addressed.“ "Today, economic intelligence is recognised as a professional tool for strategy and management for States and companies in the globalised world. Its implementation is based on three main pillars: (1) The mastering of strategic information (2) Economic security, which is defensive and directed at protecting economic assets (3) Influence –active or offensive–, be at the cutting edge for seeking opportunities and innovation and to be able to act on one’s environment (regulations, norms, image…) and not only be passively dependent on it (http://www.realinstitutoelcano.org/wps/portal/rielcano_eng/Content?WCM_GLOBAL_CONTEXT=/elcano/elca no_in/zonas_in/defense+security/ari134-2010) 7
  • 8. Intelligence Economique « Avantage concurrentiel de l'intelligence économique » • détecter ce qui peut donner à l'entreprise un avantage concurrentiel • mobiliser les acteurs internes de l'entreprise • tirer les conclusions pour la meilleure exploitation possible L'information fournie doit présenter certaines qualités : 1) exactitude 2) mise à jour 3) liée au contexte. 8 De manière formelle: 1) elle doit être traitée rapidement 2) être explicite 3) accessible économiquement.
  • 9. Intelligence Economique -- 1999 -" L'intelligence économique " Achard, Pierre, Bernat, Jean-Pierre, BBF, 1999, n° 6, p. 123-125 -- 2003 -"INTELLIGENCE ÉCONOMIQUE ÉCONOMIQUE ET STRATÉGIQUE" (http://www.adec.fr/files_upload/documentation/200607201512060.Cigref_IE_internet.pdf) -- 2009 -- "Guide des bonnes pratiques en matière d’intelligence économique" (http://c.asselin.free.fr/french/guide_des_bonnes_pratiques_en_matiere_d_ie-1.pdf) -- 2011 -"Le concept français d’ “intelligence économique”: histoire et tendances" (http://archivesic.ccsd.cnrs.fr/docs/00/64/64/67/PDF/MHArtIEfrWorkingpaper20101213FRfinal.pdf) -- 2012 -"L’INFORMATION AU CŒUR DE L’INTELLIGENCE ECONOMIQUE STRATEGIQUE" http://rrien.univ-littoral.fr/wp-content/uploads/2012/03/doc27-rri.pdf 9
  • 10. Open Data Sources Internet-Wide Scan Data Repository (https://scans.io/) The Internet-Wide Scan Data Repository is a public archive of research data collected through active scans of the public Internet. The repository is hosted by the ZMap Team at the University of Michigan and was founded in collaboration with Rapid7. • University of Michigan · HTTPS Ecosystem Scans • University of Michigan · Hurricane Sandy ZMap Scans • Rapid7 · Critical.IO Service Fingerprints • Rapid7 · SSL Certificates • Rapid7 · Reverse DNS • Rapid7 · HTTP-GET (port 80) •A JSON interface to the repository is available at https://scans.io/json 10
  • 11. Open Data Sources Internet Census 2012 “Port scanning /0 using insecure embedded devices” (Carna Botnet) http://internetcensus2012.bitbucket.org/paper.html All data collected during the Internet Census 2012 is available for download via BitTorrent. The full download is 568GB large. Decompressing all data results in 9TB of raw log files in text format. If recompressed into gzip files the dataset should be ~1.5TB. http://internetcensus2012.bitbucket.org/download.html 11
  • 12. Open Data Sources European Union Open Data Portal http://open-data.europa.eu/ Pan European data portal http://publicdata.eu/dataset Linked Open Data Around-The-Clock http://latc-project.eu/datasets Plateforme d’ouverture des données publiques http://www.data.gouv.fr/ 12 Institut national de la statistique et des études économiques http://www.insee.fr/fr/bases-de-donnees/default.asp http://www.bdm.insee.fr/bdm2/index.action
  • 13. Server Access Logs Google query for Web Server logs  intext:"Mozilla/5.0" filetype:txt  filetype:log user_agents TOP 5 - BOT useragents (sample from 2012 logs) Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm) Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html) Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots) Mozilla/5.0 (compatible; Ezooms/1.0; ezooms.bot@gmail.com) 2910357 1067432 632752 619931 479867 TOP 5 - BROWSER useragents (sample from 2012 logs) Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1 Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0) Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) 1824893 806615 646110 433263 387967 13
  • 14. Server Access Logs User Agents by Phone Manufacturer HTC User Agents by Operating System 72027 Nokia 35699 BlackBerry 31951 SonyEricsson 31049 LG MOTOROLA Alcatel 18322 2474 156 SunOS User Agents by Layout Engine 10662928 12469607 14 AppleWebKit Trident Linux Mac Windows User Agents by Browser 13850653 961715 Presto Android Gecko MSIE Firefox Safari Chrome Opera Outlook-Express Iceweasel SeaMonkey Microsoft Office 16339858 12949308 9725335 5517233 1007251 67470 20093 18687 5653
  • 15. Bots behavior (example) On Bots – analysis 2005/2006 – http://drunkmenworkhere.org/219 YAHOO MSNBOT 15 GOOGLE
  • 16. Data Analysis Constants Economic Parameters for FRANCE Constants for IT market in France (as averages) Average work hours a week 35 A Cost Server Install or Restore 6000 € M Days of festivities a year 122 B Server worked daily in France 30 N Average days on holidays 35 C Daily Financial loss (Server Down) 1500 € P Average working days a year 208 D Days to reconfigure a server 7 Q Average working hours a year 3120 E Cost SSL Certificate (2048bit RSA) 500 € R 19.6 % F Cost Securing Server Installation 2000 € S 45 % G Systems that could to be secured 52568234 T 2764 € H Systems with faulty SSL setup 11360349 U 990 € W Company tax rate Private tax rate Average monthly salary (gross) Cost of an offline server in the SME market: “Financial loss + Restore + New SSL certificate” [(P) X (Q)] + [(M) x 1] + [(R) x 1] = 17.000 € Cost to fix all systems with faulty SSL setup: {[(W) + (S) + (R)] x (U)} = 39.647.618.010 € 16 Average daily cost of IT engineer Market for server security maintenance: Market = {[(T) x (S)] + [(W) x (Q) x (T)]} Market: 574.570.797.620 €
  • 17. Secure Communication Market ( Some examples of worst cases) 17
  • 18. Secure Communication Market Question : Is there a market for secure communication? (fictional data) Inventing some numbers : • 97.454.086 Total IP • 18.213.972 Self-Signed Certs • 66.365.935 No SSL • 19.312.637 No Trusted Certs • 31.088.151 SSL • 29.525.183 Weak Ciphers • 19.727.802 Safe SSL • 33.724.344 Weak Keys • 18.360.349 Weak SSL • 58.321.312 Old Software WEAK SSL DETAILS Series1 5 4 3 19% SSL USAGE Series2 81% 53% 47% 59% 41% 2 73% 27% 1 74% 26% 100,000,000.00 90,000,000.00 80,000,000.00 70,000,000.00 60,000,000.00 50,000,000.00 40,000,000.00 30,000,000.00 20,000,000.00 10,000,000.00 0.00 1 18 2 3 4 5
  • 19. Estimate Cyber Security Market Parameters A= 100.000 servers B= 50.000 SSL srv. C= 40.000 vulner. D= 35 working hours/week E= 5 hours/day F= 19.6% corp.tax G= 45% indiv.tax H= 6000€ install server J= 1500€/day finan. loss K= 500€ cert cost L= 2000€ check server M= 7 days to install server N= 3960€ gross salary/month O= project time 3 years P= 4 hours check server Total working days/year= 365 - 122 (festivities) - 35 (holiday) = 208 days Total working hours/year= 208 x 5 = 1040 hours Annual Salary= (N x 12) = 47520€ / year Human Daily Cost= (N x 12) / 208 = 228.46 € Technical Cost reinstall 1 server= H + (Jx7) + K = 17.000 € Human cost reinstall 1 server= (228.46 x 7) = 1599.22 € Total Cost reinstall 1 server= 17.000 + 1599.22 = 18599.22 € 19
  • 20. Estimate Cyber Security Market Technical Cost reinstall 1 server= H + (Jx7) + K = 17.000 € Human cost reinstall 1 server= (228.46 x 7) = 1599.22 € Total Cost reinstall 1 server= 17.000 + 1599.22 = 18599.22 € Total Cost reinstall 40.000 SSL server= (18599.22 x 40.000) = 743.968.800 € Total Cost maintain 40.000 SSL server= (L x 40.000) = 80.000.000 € Total cost secure 40.000 SSL servers= 743.968.800 + 80.000.000 = 823.968.800 € People to check 40.000 SSL servers in 3 years= ((P x 40.000) / (1040 x 3))= 51 Vulnerable Servers = 18.360.349 Problematic SSL servers = 8.996.571 Total cost secure SSL servers = 185.322.345.274,62 € People to check SSL servers in 3 years= ((P x 8966571) / (1040 x 3))= 11495 Total Cost reinstall ALL server= (18599.22 x 18.360.349) = 341.488.170.327,78 € Total Cost maintain ALL server= (L x 18.360.349) = 36.720.698.000 € Total cost secure ALL servers= 378.208.868.327,78 € People to check ALL servers in 3 years= ((P x 18.360.349) / (1040 x 3))= 23.539 20
  • 21. Secure Communication Market How big is the market for IT server maintenance to change SSL certs? Data analysis revealed that the market is estimated to be on average 185 billion euro and will involve 11.495 IT professionals over a period of time of 3 years. Server Preparedness level Safe Unsafe 21 Risky Vulnerable No Data (fictional data)
  • 22. Estimate Cyber Security Market Can you estimate the market size related to cyber defense security? A research on revealed that France has a potential market of 378 billion euro with an average cost for each cyber attack of 17.500 euro. The forecasted potential market for cyber criminal resulted to be 341 billion euro and this risk could be mitigated by implementing a cyber defense system. Server Preparedness level Safe Unsafe 22 Risky Vulnerable No Data An investment of 37 billion euro to maintain and check current servers would prevent all potential losses and ensure an increase in skilled engineers of around 23.539 units. (fictional data)
  • 23. EXTRA EXTRA SECTION HOW TO DEVELOP A LOGICAL MODEL (Example) 23
  • 24. EXTRA – DEVELOPING A MODEL “What is our company’s exposure to cyber attacks and cyber risks?” To answer we have first to understand the question and to do so we divide it in logical sections. 1. our: client is interested in a comparison between he and everyone else, a reference is needed 2. company: information about the business, not related to private or governmental entities 3. exposure: psychological aspect, how client feels unprotected compared to his peers 4. risk: psychological aspect, not measurable unless derived from impact and probability 5. cyber: identifies the environment in which the client perceives a problem, so the subject 6. attacks: psychological aspect, non measurable unless derived from surrounding environment And now that we know what the client wants we can rewrite the question in a way that can allow us to take direct and measurable actions: “Can we tell the client how well he operates, compared to his peers operating in the same business environment, by measuring the probability of being a target and the impact of this action and generate a relative measure of the risk related to the subject, so he can understand how distant his way of conducting the business is to the reference of the industry?” 24
  • 25. EXTRA – DEVELOPING A MODEL PREPARATION (PREREQUISITES): 1. Find the list of businesses (peers) that are competitors or providers of our client [Peers] 2. Find the market in which both client and peers are operating [Environment] 3. Find which kind of operational indicators (KPI) are important for the client [ClientKPI] 4. Find which kind of operational indicators (KPI) are important for the peers [PeersKPI] 5. Find which kind of operational indicators (KPI) are important for the subject [SubjectKPI] 6. Find which kind of technical indicators are relevant for client [ClientTI] 7. Find which kind of technical indicators are relevant for peers [PeersTI] 8. Find which kind of technical indicators are relevant for subject [SubjectTI] 9. Find or create a table that measures the probability an action has to happen [Probability] 10. Find or create a table that measures how important is the impact of a given action [Impact] To correlate the information we assign a code to each prerequisite action: 1 = [Peers] 4 = [PeersKPI] 7 = [PeersTI] 10 = [Impact] 25 2 = [Environment] 5 = [SubjectKPI] 8 = [SubjectTI] 3 = [ClientKPI] 6 = [ClientTI] 9 = [Probability]
  • 26. EXTRA – DEVELOPING A MODEL The “+” sign represents a correlation been created between two objects. 11=[1]+[2]= [Market] 12=[3]+[6]= [ClientIndex] 13=[4]+[7]= [PeersIndex] 14=[5]+[8]= [SubjectIndex] 15=[9]+[10]= [Risk] 16=[11]+[15]= [MarketRisk] 17=[12]+[15]= [ClientRisk] 18=[13]+[15]= [PeersRisk] 19=[14]+[15]= [SubjectRisk] 20=[16]+[19]= [EnvironmentRisk] 21=[17]+[18]= [BusinessRisk] 22=[20]+[21]= [IndustryRisk] 23=[3]+[4]= [DomainKPI] 24=[6]+ [7]= [DomainTI] 25=[15]+[23]= [PerformanceRisk] 26=[15]+[24]= [OperationalRisk] 27=[23]+[24]= [IndustryAverage] 28=[25]+[26]= [EconomicalRisk] 29=[27]+[28]= [IndustryReference] The system of measurements has converted quantitative data, indicators, in human emotions, risk and fear, and now we have to convert again fear into something measurable, so it can be measured and managed as expected by the society and therefore used in business. Sub-Question-1: (quantitative) “how well he operates, compared to his peers?” Answer= “[12] + [27]” 26 Sub-Question-2: (qualitative) “a relative measure of the risk related to the subject?” Answer= “[17] + [19]”
  • 27. EXTRA – DEVELOPING A MODEL 27