SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Downloaden Sie, um offline zu lesen
Gohsuke Takama /          , Meta Associates, 2011   11



                                       http://www.slideshare.net/gohsuket
Friday, November 4, 2011
about…

                 ✴ Gohsuke Takama
                       ✴ Meta Associates (http://www.meta-associates.com/)
                           ✴founder & president, connector, analyst, planner
                           ✴ local organizer of security conferences: BlackHat Japan, PacSec
                           ✴ liaison of security businesses: Patch Advisor, SecWest
                           ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/
                           ✴ organizer of tech entrepreneur / startup support events
                           ✴ independent tech journalist for over 10 years
                       ✴ Privacy International (London, UK http://www.privacyinternational.org/)
                           ✴advisory board member
                       ✴ Computer Professionals for Social Responsibility (http://cpsr.org/)
                           ✴Japan chapter founding supporter




Friday, November 4, 2011
A
                           Attacks




Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,     ,      ...

                    •      Stuxnet, Duqu

                    •      Sony PSN

                    •      Wikileaks *new

                    •      Anonymous *new

                    •                       (MENA) *new

                    •      Indira Gandhi

Friday, November 4, 2011
"what happened in the last 2 years"

                    •      OperationAurora, ShadyRAT,             ,            ...
                           =                    = APT (Advanced Persistent Threat)

                    •      Stuxnet = SCADA

                    •      Sony PSN:        3       , DDoS,           ,

                    •      Wikileaks *new =                   :

                    •      Anonymous *new =                       +

                    •                           *new=

                    •      Indira Gandhi        =
Friday, November 4, 2011
"whom targeted, why"




                      http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/
Friday, November 4, 2011
"whom targeted, why"

                    •                   ,

                    •      Sony PSN, Sony

                    •              ,

                    •
                    •              :




Friday, November 4, 2011
"Stuxnet"




Friday, November 4, 2011
"Anonymous"




                            http://www.youtube.com/watch?v=2Tm7UKo4IBc
                           http://www.youtube.com/watch?v=kZNDV4hGUGw
Friday, November 4, 2011
"know your enemy: techniques"

                    •      phishing            •   website spoofing
                    •      targeted phishing   •   content altering
                    •      trojan              •   XSRF
                    •      spyware             •   XSS
                    •      keylogger           •   code injection
                    •      rootkit             •   IP hijacking
                    •      botnet DDoS         •   rogue WiFi AP
                                               •   sniffer



Friday, November 4, 2011
"emerging attack techniques"

                    •      malware:                                 ,


                    •      VM                       , bios
                    •                         : VNC, Spycam,

                    •                     : keylogger, GPS logger
                    •                         : Stuxnet

                    •       DDoS:
                           JavaScript    (LOIC)
                                                                    ($8/h~),



Friday, November 4, 2011
"know your enemy: techniques"




                              http://www.ipa.go.jp/security/vuln/newattack.html
Friday, November 4, 2011
"layer approach"




                                •examle: OSI model




Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
                                 6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
                                 3 OS/Application
                                 2 Hardware
                                 1 Physical
Friday, November 4, 2011
"a security layer model "

                                 7 Psychological       ,
       Human Factor              6 Custom (Habit)      ,
                                 5 Operation
                                 4 Content
            Intangibles
                                 3 OS/Application
                                 2 Hardware
               Tangibles
                                 1 Physical
Friday, November 4, 2011
"attacks vs. counter measures "

                             APT, espionage, phishing,
   Psychological
                                social engineering                   ?
                                spoofing, pharming,    accustomed best practice,
            Custom           phishing spam, XSS, XSRF,   awareness, CIRT, PKI,
                              spyware, ID spoof/theft digital ID, SSL certificate
                             DoS, spam, ransom-ware,     routing, filtering, policy,
        Operation
                                  sabotage-ware                  audit, CIRT

                             sniffing, spyware, spam,      encryption, filtering,
           Content
                                    alteration             content-scan, host IDS

          OS/                DoS, vuln exploit, 0day,    Firewall, network IDS, IPS,
      Application                 rootkit, botnet         anti-virus, OS/app patch

                             direct access, tampering,     perimeter guard, anti-
         Hardware
                                    alteration              tampering, hard seal

                               lock pick, break in,       surveillance, perimeter
         Physical
                                     vandalism               alarm, armed guard
Friday, November 4, 2011
"spoofing, phishing & targeted attack"
                            /                   1




Friday, November 4, 2011
"cybercrime, cyber espionage & identity "

                    ✴ APT,
                     •                   =

                     •
                     •               :           ,   ,

                     •       →   →           →
                    ✴            (                       )
                     •                   =

                     •
                     •
Friday, November 4, 2011
                                     →
"cybercrime, cyber espionage,
                           primary target = individual identity"




Friday, November 4, 2011
B
                           Behavior




Friday, November 4, 2011
"social change on Internet"
                               2000
                    •
                    •
                           •
                           •
                           •
                           •




Friday, November 4, 2011
"social change on Internet"
                               2001
                    •                            •
                    •                            •
                    •                            •
                    •                            •
                           •                     •
                           •                     •
                           •                     •             (Wiki   )

                           •        /            •
                           •                     •   3D

                                                 •
Friday, November 4, 2011
Friday, November 4, 2011
"real world vs. social data world"




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -




Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Law, Market, Norm, Architecture
                                        Power




              $Money                                         Ideology



                                                   -
                                                   -
                                                   -
                                                   -


                                       Control
Friday, November 4, 2011
"disseminate motives"
                           Autocracy, Crime, Extremism, Hacker
                                                 Power

                                                 Autocratic
                                                Government

                                                          Infra
                                              APT      Disruption

                                 Organized                        Extremist
              $Money              Crime                           Hacktivist   Ideology
                                             Theft      Hacktivism
                                             Fraud
                                                      Lulz
                                                                       :
                                                              -
                                                 Hacker       -
                                                 Cracker      -
                                                              -


                                               Control
Friday, November 4, 2011
I
                           Identity




Friday, November 4, 2011
"Identity"


                           entity, identity, relationship

                                   me = entity

                                 me{Attributes}

Friday, November 4, 2011
Identification & Authentication

          Identity             Identification          Authentication   Authorization
                              Credential{Identifier}




                                                                           Validation




     me{Attributes}
       me = entity




Friday, November 4, 2011
Identification & Authentication

          Identity             Identification                     Authentication   Authorization
                              Credential{Identifier}




                                                                                      Validation




     me{Attributes}
       me = entity




                                                      Identity


                                             Identification


Friday, November 4, 2011
"Identity"

                            Erik H. Erikson
                                 1967




                                              Sydney Shoemaker
                                                    1963




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
"Identity"


                           me{Attributes} * t→




Friday, November 4, 2011
AxBxI
                            = WTF?




Friday, November 4, 2011
"state of security methodology"

                    ✴                                   (F/W)
                     •(                                 +                    )
                    ✴
                     •=                  (                               )
                    ✴                :       100%
                     • (                                        ?)
                    ✴ PKI                    = DigiNotar
                    ✴                               =

                     •(
Friday, November 4, 2011
                                                                     )
"perspective for counter strategy"
                              set basic security measures:

                    ✴                           ,
                                                    =                    ,


                    ✴                           (APT                )
                           ✴   PET (        )

                    ✴                  prevention, detection, response

                     •
                     •
                     •
Friday, November 4, 2011
"perspective for counter strategy"
                                      be creative:

                    ✴ counter social engineering
                     •
                     •
                    ✴ social intelligence
                    ✴ soft power
                     •
                     •                       PR    deflective PR


Friday, November 4, 2011
"perspective for counter strategy"
                     be creative: Counter Social Engineering

                    •
                    •
                    •
                           •
                           •
                    •
                    •
                           •   (
                                   )
Friday, November 4, 2011
"perspective for counter strategy"
                                be creative: Soft Power

                    •         Soft Power = 1990        Joseph Nye


                    •                Hard Power
                    •
                    •      http://en.wikipedia.org/wiki/Soft_power
                    •                                     /

                    •
Friday, November 4, 2011
Friday, November 4, 2011
references

                    •      CEOs - the new corporate fraudstersds http://www.iol.co.za/
                           sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649

                    •      PwC Survey Says: Telecoms Are Overconfident About Security http://
                           www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php

                    •      Cyber attack led to IGI shutdown http://www.indianexpress.com/news/
                           cyber-attack-led-to-igi-shutdown/851365/

                    •      Anonymous announces global plans http://www.digitaltrends.com/
                           computing/video-anonymous-announces-global-plans/

                    •      ANONYMOUS - OPERATION PAYBACK - Sony Press Release http://
                           www.youtube.com/watch?v=2Tm7UKo4IBc

                    •      Operation Payback - Anonymous Message About ACTA Laws, Internet
                           Censorship and Copyright http://www.youtube.com/watch?
                           v=kZNDV4hGUGw

                    •      Anonymous: Message to Scientology http://www.youtube.com/watch?
                           v=JCbKv9yiLiQ

                    •                        Anonymous                 http://www.atmarkit.co.jp/
                           fsecurity/special/161dknight/dknight01.html
Friday, November 4, 2011
references

                    •      28 Nation States With Cyber Warfare Capabilities http://
                           jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html

                    •                                                                         Far East
                           Research    http://scan.netsecurity.ne.jp/archives/52017036.html

                    •      CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability
                           http://www.youtube.com/watch?v=DP_rRf468_Y

                    •      MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/
                           204792193/MYBIOS_Is_BIOS_infection_a_reality

                    •      McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/
                           html/identity_theft/NAVirtualCriminologyReport07.pdf

                    •                  Google Zeitgeist                          http://blog.f-secure.jp/
                           archives/50630539.html

                    •       "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V
                           http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959



Friday, November 4, 2011
references

                    •                                                             -- DEFCON CTF
                                   http://scan.netsecurity.ne.jp/archives/52002536.html

                    •      PET
                                                  http://www.soumu.go.jp/denshijiti/pdf/
                           jyumin_p_s3.pdf

                    •      PIA
                           http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf

                    •                                                                      http://
                           jp.reuters.com/article/topNews/idJPJAPAN-21406320110527

                    •                                         GIE
                           http://d.hatena.ne.jp/ukky3/20110829/1314685819

                    •         Diginotar      Black.Spook
                           http://blog.f-secure.jp/archives/50626009.html


Friday, November 4, 2011
references

                    •       Computer virus hits US Predator and Reaper drone fleet http://
                           arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits-
                           drone-fleet.ars

                    •      F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case
                           R2D2") http://www.f-secure.com/weblog/archives/00002249.html

                    •       State-sponsored spies collaborate with crimeware gang | The Unholy APT-
                           botnet union http://www.theregister.co.uk/2011/09/13/
                           apt_botnet_symbiosis/

                    •       NISC                              10 7     http://www.nisc.go.jp/
                           conference/seisaku/index.html#seisaku27

                    •
                                                 http://news.livedoor.com/article/detail/5685674/




Friday, November 4, 2011
references

                    •                                                       http://
                           www.sakimura.org/2011/06/1124/

                    •                  http://ja.wikipedia.org/wiki/

                    •                       http://ja.wikipedia.org/wiki/




Friday, November 4, 2011

Weitere ähnliche Inhalte

Andere mochten auch

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナーGohsuke Takama
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...Gohsuke Takama
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageGohsuke Takama
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本Gohsuke Takama
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーGohsuke Takama
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本Gohsuke Takama
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Gohsuke Takama
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Gohsuke Takama
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30Gohsuke Takama
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?Winston & Strawn LLP
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataarx-deidentifier
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymizationarx-deidentifier
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 

Andere mochten auch (16)

Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
標的型(サイバースパイ)攻撃とソーシャルエンジニアリング, KPMGセミナー
 
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
BCL WhiteSalon "Convergence of Bio X Silicon X Robotics may bring us to the C...
 
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionageA perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
 
データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本データプライバシーでのEUとアメリカ...そして日本
データプライバシーでのEUとアメリカ...そして日本
 
Privacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシーPrivacy in Digital Society デジタル社会におけるプライバシー
Privacy in Digital Society デジタル社会におけるプライバシー
 
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
パーソナルデータ保護の課題と国際情勢 2013 - 2014, EU, USA, と日本
 
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
Workshop「企画書・プレゼン・リリース作成に効く! ネットメディア時代のロジカル文章脳プログラミング術」
 
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
Startup Weekend Tokyo12 20 2009 Wubble Yoga App1
 
TGC Planning Sheet 1.30
TGC  Planning Sheet 1.30TGC  Planning Sheet 1.30
TGC Planning Sheet 1.30
 
Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical dataARX - a comprehensive tool for anonymizing / de-identifying biomedical data
ARX - a comprehensive tool for anonymizing / de-identifying biomedical data
 
An overview of methods for data anonymization
An overview of methods for data anonymizationAn overview of methods for data anonymization
An overview of methods for data anonymization
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 

Ähnlich wie サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection TechniquesArturo Filastò
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith Jones, PhD
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfnetisBin
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysisCharles Lim
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting WorkshopSplunk
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeDevSecCon
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Preventionrefaeli
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques begmohsin
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 

Ähnlich wie サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011 (20)

Censorship Detection Techniques
Censorship Detection TechniquesCensorship Detection Techniques
Censorship Detection Techniques
 
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysisKeith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
OWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdfOWASP_OSINT_Presentation.pdf
OWASP_OSINT_Presentation.pdf
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
H@dfex 2015 malware analysis
H@dfex 2015   malware analysisH@dfex 2015   malware analysis
H@dfex 2015 malware analysis
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security TechnologyAngelo Alviar OSINT 101 Presentation - Forensics and Security Technology
Angelo Alviar OSINT 101 Presentation - Forensics and Security Technology
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
Guy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node CodeGuy Podjarmy - Secure Node Code
Guy Podjarmy - Secure Node Code
 
GTB Data Loss Prevention
GTB Data Loss PreventionGTB Data Loss Prevention
GTB Data Loss Prevention
 
Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques Ethical Hacking Tools & Techniques
Ethical Hacking Tools & Techniques
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Osint
OsintOsint
Osint
 
Honeypot a trap to hackers
Honeypot a trap to hackersHoneypot a trap to hackers
Honeypot a trap to hackers
 

Kürzlich hochgeladen

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011

  • 1. Gohsuke Takama / , Meta Associates, 2011 11 http://www.slideshare.net/gohsuket Friday, November 4, 2011
  • 2. about… ✴ Gohsuke Takama ✴ Meta Associates (http://www.meta-associates.com/) ✴founder & president, connector, analyst, planner ✴ local organizer of security conferences: BlackHat Japan, PacSec ✴ liaison of security businesses: Patch Advisor, SecWest ✴ security news: http://blog.f-secure.jp/ http://scan.netsecurity.ne.jp/ ✴ organizer of tech entrepreneur / startup support events ✴ independent tech journalist for over 10 years ✴ Privacy International (London, UK http://www.privacyinternational.org/) ✴advisory board member ✴ Computer Professionals for Social Responsibility (http://cpsr.org/) ✴Japan chapter founding supporter Friday, November 4, 2011
  • 3. A Attacks Friday, November 4, 2011
  • 4. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... • Stuxnet, Duqu • Sony PSN • Wikileaks *new • Anonymous *new • (MENA) *new • Indira Gandhi Friday, November 4, 2011
  • 5. "what happened in the last 2 years" • OperationAurora, ShadyRAT, , ... = = APT (Advanced Persistent Threat) • Stuxnet = SCADA • Sony PSN: 3 , DDoS, , • Wikileaks *new = : • Anonymous *new = + • *new= • Indira Gandhi = Friday, November 4, 2011
  • 6. "whom targeted, why" http://paulsparrows.wordpress.com/category/security/cyber-attacks-timeline/ Friday, November 4, 2011
  • 7. "whom targeted, why" • , • Sony PSN, Sony • , • • : Friday, November 4, 2011
  • 9. "Anonymous" http://www.youtube.com/watch?v=2Tm7UKo4IBc http://www.youtube.com/watch?v=kZNDV4hGUGw Friday, November 4, 2011
  • 10. "know your enemy: techniques" • phishing • website spoofing • targeted phishing • content altering • trojan • XSRF • spyware • XSS • keylogger • code injection • rootkit • IP hijacking • botnet DDoS • rogue WiFi AP • sniffer Friday, November 4, 2011
  • 11. "emerging attack techniques" • malware: , • VM , bios • : VNC, Spycam, • : keylogger, GPS logger • : Stuxnet • DDoS: JavaScript (LOIC) ($8/h~), Friday, November 4, 2011
  • 12. "know your enemy: techniques" http://www.ipa.go.jp/security/vuln/newattack.html Friday, November 4, 2011
  • 13. "layer approach" •examle: OSI model Friday, November 4, 2011
  • 14. "a security layer model " 7 Psychological , 6 Custom (Habit) , 5 Operation 4 Content 3 OS/Application 2 Hardware 1 Physical Friday, November 4, 2011
  • 15. "a security layer model " 7 Psychological , Human Factor 6 Custom (Habit) , 5 Operation 4 Content Intangibles 3 OS/Application 2 Hardware Tangibles 1 Physical Friday, November 4, 2011
  • 16. "attacks vs. counter measures " APT, espionage, phishing, Psychological social engineering ? spoofing, pharming, accustomed best practice, Custom phishing spam, XSS, XSRF, awareness, CIRT, PKI, spyware, ID spoof/theft digital ID, SSL certificate DoS, spam, ransom-ware, routing, filtering, policy, Operation sabotage-ware audit, CIRT sniffing, spyware, spam, encryption, filtering, Content alteration content-scan, host IDS OS/ DoS, vuln exploit, 0day, Firewall, network IDS, IPS, Application rootkit, botnet anti-virus, OS/app patch direct access, tampering, perimeter guard, anti- Hardware alteration tampering, hard seal lock pick, break in, surveillance, perimeter Physical vandalism alarm, armed guard Friday, November 4, 2011
  • 17. "spoofing, phishing & targeted attack" / 1 Friday, November 4, 2011
  • 18. "cybercrime, cyber espionage & identity " ✴ APT, • = • • : , , • → → → ✴ ( ) • = • • Friday, November 4, 2011 →
  • 19. "cybercrime, cyber espionage, primary target = individual identity" Friday, November 4, 2011
  • 20. B Behavior Friday, November 4, 2011
  • 21. "social change on Internet" 2000 • • • • • • Friday, November 4, 2011
  • 22. "social change on Internet" 2001 • • • • • • • • • • • • • • (Wiki ) • / • • • 3D • Friday, November 4, 2011
  • 24. "real world vs. social data world" Friday, November 4, 2011
  • 25. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 26. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 27. "disseminate motives" Law, Market, Norm, Architecture Friday, November 4, 2011
  • 28. "disseminate motives" Law, Market, Norm, Architecture - - - - Friday, November 4, 2011
  • 29. "disseminate motives" Law, Market, Norm, Architecture $Money - - - - Friday, November 4, 2011
  • 30. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Friday, November 4, 2011
  • 31. "disseminate motives" Law, Market, Norm, Architecture Power $Money - - - - Control Friday, November 4, 2011
  • 32. "disseminate motives" Law, Market, Norm, Architecture Power $Money Ideology - - - - Control Friday, November 4, 2011
  • 33. "disseminate motives" Autocracy, Crime, Extremism, Hacker Power Autocratic Government Infra APT Disruption Organized Extremist $Money Crime Hacktivist Ideology Theft Hacktivism Fraud Lulz : - Hacker - Cracker - - Control Friday, November 4, 2011
  • 34. I Identity Friday, November 4, 2011
  • 35. "Identity" entity, identity, relationship me = entity me{Attributes} Friday, November 4, 2011
  • 36. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Friday, November 4, 2011
  • 37. Identification & Authentication Identity Identification Authentication Authorization Credential{Identifier} Validation me{Attributes} me = entity Identity Identification Friday, November 4, 2011
  • 38. "Identity" Erik H. Erikson 1967 Sydney Shoemaker 1963 Friday, November 4, 2011
  • 39. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 40. "Identity" me{Attributes} * t→ Friday, November 4, 2011
  • 41. AxBxI = WTF? Friday, November 4, 2011
  • 42. "state of security methodology" ✴ (F/W) •( + ) ✴ •= ( ) ✴ : 100% • ( ?) ✴ PKI = DigiNotar ✴ = •( Friday, November 4, 2011 )
  • 43. "perspective for counter strategy" set basic security measures: ✴ , = , ✴ (APT ) ✴ PET ( ) ✴ prevention, detection, response • • • Friday, November 4, 2011
  • 44. "perspective for counter strategy" be creative: ✴ counter social engineering • • ✴ social intelligence ✴ soft power • • PR deflective PR Friday, November 4, 2011
  • 45. "perspective for counter strategy" be creative: Counter Social Engineering • • • • • • • • ( ) Friday, November 4, 2011
  • 46. "perspective for counter strategy" be creative: Soft Power • Soft Power = 1990 Joseph Nye • Hard Power • • http://en.wikipedia.org/wiki/Soft_power • / • Friday, November 4, 2011
  • 48. references • CEOs - the new corporate fraudstersds http://www.iol.co.za/ sundayindependent/ceos-the-new-corporate-fraudstersds-1.1144649 • PwC Survey Says: Telecoms Are Overconfident About Security http:// www.readwriteweb.com/cloud/2011/09/pwc-survey-says-telecoms-are-o.php • Cyber attack led to IGI shutdown http://www.indianexpress.com/news/ cyber-attack-led-to-igi-shutdown/851365/ • Anonymous announces global plans http://www.digitaltrends.com/ computing/video-anonymous-announces-global-plans/ • ANONYMOUS - OPERATION PAYBACK - Sony Press Release http:// www.youtube.com/watch?v=2Tm7UKo4IBc • Operation Payback - Anonymous Message About ACTA Laws, Internet Censorship and Copyright http://www.youtube.com/watch? v=kZNDV4hGUGw • Anonymous: Message to Scientology http://www.youtube.com/watch? v=JCbKv9yiLiQ • Anonymous http://www.atmarkit.co.jp/ fsecurity/special/161dknight/dknight01.html Friday, November 4, 2011
  • 49. references • 28 Nation States With Cyber Warfare Capabilities http:// jeffreycarr.blogspot.com/2011/09/27-nation-states-with-cyber-warfare.html • Far East Research http://scan.netsecurity.ne.jp/archives/52017036.html • CVE-2011-0611 : Adobe Flash Player SWF Memory Corruption Vulnerability http://www.youtube.com/watch?v=DP_rRf468_Y • MYBIOS. Is BIOS infection a reality? http://www.securelist.com/en/analysis/ 204792193/MYBIOS_Is_BIOS_infection_a_reality • McAfee Virtual Criminology Report 2007 http://us.mcafee.com/en-us/local/ html/identity_theft/NAVirtualCriminologyReport07.pdf • Google Zeitgeist http://blog.f-secure.jp/ archives/50630539.html • "The Tragedies in Oslo and on Utøya island" Speech held by King Harald V http://www.kongehuset.no/c27262/nyhet/vis.html?tid=92959 Friday, November 4, 2011
  • 50. references • -- DEFCON CTF http://scan.netsecurity.ne.jp/archives/52002536.html • PET http://www.soumu.go.jp/denshijiti/pdf/ jyumin_p_s3.pdf • PIA http://www.soumu.go.jp/denshijiti/pdf/jyumin_p_s2.pdf • http:// jp.reuters.com/article/topNews/idJPJAPAN-21406320110527 • GIE http://d.hatena.ne.jp/ukky3/20110829/1314685819 • Diginotar Black.Spook http://blog.f-secure.jp/archives/50626009.html Friday, November 4, 2011
  • 51. references • Computer virus hits US Predator and Reaper drone fleet http:// arstechnica.com/business/news/2011/10/exclusive-computer-virus-hits- drone-fleet.ars • F-Secure: Possible Governmental Backdoor found, MD5 hashes ("case R2D2") http://www.f-secure.com/weblog/archives/00002249.html • State-sponsored spies collaborate with crimeware gang | The Unholy APT- botnet union http://www.theregister.co.uk/2011/09/13/ apt_botnet_symbiosis/ • NISC 10 7 http://www.nisc.go.jp/ conference/seisaku/index.html#seisaku27 • http://news.livedoor.com/article/detail/5685674/ Friday, November 4, 2011
  • 52. references • http:// www.sakimura.org/2011/06/1124/ • http://ja.wikipedia.org/wiki/ • http://ja.wikipedia.org/wiki/ Friday, November 4, 2011