SlideShare ist ein Scribd-Unternehmen logo
1 von 48
Security Wars Ikuo Takahashi
A long time ago in a  network far ,far away The word “hacker”used to be a  respectful word for the master of computer.However many hackers fell  into the Dark World led by  dark side of their  power-anger, exhibitionism and temporary joy. Internet has been messed up by the unprecedented  attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. This "Saga" is about the epic of the battle with the society, Engineers who crossed the line of social activity, and ISP who stand up against the messed up Internet. ……………… .. ハッカーは、選ばれし者。 多数の者が、怒り、自己顕示欲、楽しみのために堕ちていった。 社会は、暗黒の技術者と永遠の初心者からネットワークを 守る決心をした。
Episodes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],エピソートⅠ 闇に堕ちたハッカー エピソードⅡ 匿名軍団の攻撃 エピソードⅢ 希望か絶望か
Episode 1 Dark Side of Hackers エピソートⅠ ハッカーと暗黒面
Dark side of Hackers ,[object Object],[object Object],[object Object],[object Object],ハッカーは、尊称であった  怒りや恐れから暗黒面に堕ちるのか
“ Office” case in JP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ACCS ハッカー事件 シンポジウムでの「侵入」事件の公表
Hacking method-Office ,[object Object],[object Object],[object Object],[object Object],[object Object],二つのステップを踏んで、エクセルファイルを取得
Issues in  Office’s case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],不正アクセス禁止法の適用、脆弱性情報の公開手法、メディア対応の問題など
Sentenced guilty ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],アクセス管理者は、そのような行為によるアクセスは認めていない
Tsunami hacker case in UK ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],英国におけるツナミ ハッカー事件
Winny Network ,[object Object],[object Object],[object Object],[object Object],Winny ネットワーク  P2P  バックでの複製 暗号化 匿名性特徴 Key (summarized Information) Nord file Key (summarized Information)
Winny programmer criminal case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],正犯者事件あり 作者への刑事事件  「提供行為」についての違法性が認定されている
Kaneko’s allegation ,[object Object],[object Object],[object Object],金子氏は、無罪を主張
Kyoto District court  Dec.13,2006 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],一五○万円の罰金 主観面において、当時の状況を認容して・アップロードして提供
Comments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],公訴事実 状況を前提としてアップロード ( 誤解されがち ) ソースコードの鑑定はないのに意思を判断している
Harada virus case introduced in Ms.Koyama’s presentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],原田ウイルス事件 ウイルス作成罪がない ( 日本 )  自己顕示欲を認定
Society’s Combat ,[object Object],[object Object],[object Object],[object Object],[object Object],「侵入者」への厳しい対処の必要性 脆弱性情報の開示への制限 サイバー犯罪条約
Information Security Early Warning Partnership Discoverers of Vulnerability ,[object Object],[object Object],[object Object],[object Object],Users (System Administrators, Individual Users, etc.) Foreign CSIRTs (CERT/CC, NISCC, etc.) Coordination IT Vendors Cooperation Vulnerability Information Portal Site (JVN) http://jvn.jp/ Vulnerability Information Countermeasures JPCERT/CC IPA Countermeasures System Integrators Countermeasures Vulnerability Information Countermeasures from METI presentation
Outline of the Partnership Reporting Receiving Organization Discoverer (JPCERT/CC) Coordinating Organizations Notification Users [Web Applications] Reporting Notification [Software Products] Vendors Coordination Website Operation Manager Foreign CERTs System Integrators Coordinate SPREAD Publicity Portal Site  (JPN: JP Vendor Status Notes)  Publicity* (IPA) (IPA) Analysis Analyzing Organization -  Governments -  Companies -  Individuals *: When personal data has leaked.
Cyber Crime Convention ,[object Object],[object Object],[object Object],[object Object],サイバー犯罪条約六条 ハッカーツールの禁止
Computer Misuse Act through the Police and Justice Act 2006; ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],英国 コンピュータミスユース法の改正 悪用されるだろうという意識のもとでの提供が有罪とされる。作成については、犯罪利用目的が必要
“ Hackers” concern  ,[object Object],[object Object],[object Object],学術的研究なのに? 悪用の可能性まではビジョンを見れない? 一線を画す?
guidelines  for the application of Computer Misuse Act. ,[object Object],[object Object],[object Object],[object Object],英国 コンピュータミスユース法の適用についてのガイドライン ちゃんとした会社なのか、CMAへの意識はどうか 違反意図はあるのか
If you cannot find Mater Yoda, ,[object Object],[object Object],[object Object],[object Object],倫理的セキュリティテスト評議会
Sec Wars Episode2 Attack of  anonymous troops エピソード2 匿名軍団の攻撃
Anonymous Troops ,[object Object],[object Object],[object Object],[object Object],[object Object],匿名軍団 ・匿名BBS ・ボットネット
Change of backgrounds  of Cyber crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],サイバー犯罪の組織化・金銭目的化・国際化
Dark side of Web 2.0 ,[object Object],cannot be defraud defraud
ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
Measure Site Honey pots PCs infected by Bot Programs ・・ ・・ Analysis of source attacking ISP !! Making removal tool 【 CCC Cleaner 】 Analysis Isolation Cyber Clean Center ② Number of unique specimens : 215,338 [Since a number of the specimens collected are the same, those that are identical in size and external characteristics are removed to separate unique specimens (binary files).] ④ Number of specimens reflected in removal tools: 7,833 [Unknown specimens are analyzed to create bot removal tools for those that are high-risk and currently infecting many PCs.] ⑤ Bot-removal tools Updated: 61 times [Bot-removal tools are updated every week.] ⑥  Security alerts: 232,487 times [This is the number of security alerts that cooperating ISPs provided to infected users.] Number of recipients: 54,703 ⑦  Ratio of security alert recipients who download bot-removal tools: 29% 1 2 3 4 8 Cyber Clean Center The Cyber Clean Center is a shared initiative of the Ministry of Internal Affairs and Communications and the Ministry of Economy, Trade and Industry. ①  Total number of specimens collected: 7,673,279 [Specimens, such as bot programs are collected from among the countless (binary files).] ③  Number of unknown specimens : 10,082 [Unique specimens are examined using commercial anti-virus software, then those that are undetectable are separated.] Access Infected PC’s IP list ・ ・ ・ ・ 5 Security alert e-mail 6 Download removal tool 7 Total Downloads of Removal Tools : 385,046
Conventional ways against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権侵害を理由とする刑事事件・特定電子メール法・ 25 番ポートブロック
Examples against phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Episodes3 Repair or Despair エピソード3    希望か絶望か
Paradigm shift to  Mass Internet society ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],  大衆インターネット社会へのパラダイムシフト ・ジェファーンデモクラシー 自己実現 自己統治 ・「永遠のビギナー」「匿名の卑怯者」
“ Weapon” of Cyber Attack  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Is this WAR? ,[object Object],[object Object],[object Object],[object Object]
How to “repair” the Internet ,[object Object],[object Object],[object Object],[object Object]
Rediscover of  Communication sovereign -role of sovereign- ,[object Object],[object Object],[object Object]
concept of proactive defense ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISP’s issue ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],フィッシングの遮断 ウイルス感染 PC のお知らせ  P2P トラフィックの制限?
ISP against dogma (JP)  “secrecy of communication “ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],通信の秘密のドグマとの闘い ・電気通信事業法4条 ・違法性阻却事由のなかでの活動
Development of Dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマの肥大化 ・通信データへの適用  法執行への制限 匿名性強化 発信者情報開示-無用さ ・ISPへの萎縮効果
Beyond the dogma ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ドグマを超えるために ・米国における提出命令制度・d命令 ・ISPの行為規範
US network and privacy (civil  org.) subpoena (LE) subpoena/ (d)order (civil org.)? (LE) Pen register/Trace Trap Order  ? Aggressive acquisition Communication data (LE) search warrant/subpoena with notice compulsory (LE) Title 3(Interception) 、 FISA (civil org.) Prohibited/ exception (LE) ditto. Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception Network Neutrality Provider exception content disclosure use acquisition Stored communication real time
ISP’s role ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],ISPの後見人としての役割 ・攻撃トラフィックの遮断 ・フィッシングメールの遮断 ・名誉毀損文言の削除 ・著作権侵害のコントロール LEとの協力
Copyright Guardian? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],著作権制度の擁護者?
ISP’s grief  ,[object Object],[object Object],[object Object],[object Object],[object Object],ISPの悲しみ ・言論の自由の制限のつもりはない ・どのように・何を・コストは誰が
CU @Episode 4  May the Force be with U! どのようなエピソード4を描けるのか

Weitere ähnliche Inhalte

Was ist angesagt?

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime InvestigationHarshita Ved
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...Yar Chaikovsky
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And TerrorismKislaychd
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 

Was ist angesagt? (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
File000146
File000146File000146
File000146
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And TerrorismCe Hv6 Module 43 Cyber Warfare  Hacking Al Qaida And Terrorism
Ce Hv6 Module 43 Cyber Warfare Hacking Al Qaida And Terrorism
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 

Andere mochten auch

Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idagHans Leijström
 
Respuesta a necesidades
Respuesta a necesidadesRespuesta a necesidades
Respuesta a necesidadesiejcg
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1iejcg
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarrerasiejcg
 
La Amistad
La AmistadLa Amistad
La Amistadiejcg
 
A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2iejcg
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community KlassificeringHans Leijström
 

Andere mochten auch (9)

Seminare Fridays
Seminare FridaysSeminare Fridays
Seminare Fridays
 
Sociala medier är framtiden idag
Sociala medier är framtiden idagSociala medier är framtiden idag
Sociala medier är framtiden idag
 
Respuesta a necesidades
Respuesta a necesidadesRespuesta a necesidades
Respuesta a necesidades
 
A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1A2 fr11 selección-y_control_de_proveedores v1
A2 fr11 selección-y_control_de_proveedores v1
 
Placidodomingoycarreras
PlacidodomingoycarrerasPlacidodomingoycarreras
Placidodomingoycarreras
 
La Amistad
La AmistadLa Amistad
La Amistad
 
A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2A2 doc hoja-de_vida_version_2
A2 doc hoja-de_vida_version_2
 
Hans Leijström
Hans LeijströmHans Leijström
Hans Leijström
 
Community Klassificering
Community KlassificeringCommunity Klassificering
Community Klassificering
 

Ähnlich wie Security Wars

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentationwremes
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingVi Tính Hoàng Nam
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Peter Timusk
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

Ähnlich wie Security Wars (20)

Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Brucon presentation
Brucon presentationBrucon presentation
Brucon presentation
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Mehr von Ikuo Takahashi

Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Ikuo Takahashi
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Ikuo Takahashi
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?Ikuo Takahashi
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseIkuo Takahashi
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal IssuesIkuo Takahashi
 

Mehr von Ikuo Takahashi (12)

ACDPub.pptx
ACDPub.pptxACDPub.pptx
ACDPub.pptx
 
Ikuo0823.pdf
Ikuo0823.pdfIkuo0823.pdf
Ikuo0823.pdf
 
Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法Cydef 2021 国際的サイバー防衛法
Cydef 2021 国際的サイバー防衛法
 
Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection Crossover of Data protection and competition law concerning privacy protection
Crossover of Data protection and competition law concerning privacy protection
 
What is contact tracing?
What is contact tracing?What is contact tracing?
What is contact tracing?
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
Ikuo takahashi0509
Ikuo takahashi0509Ikuo takahashi0509
Ikuo takahashi0509
 
20slide0306
20slide030620slide0306
20slide0306
 
APPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi caseAPPI (Japan) and Rikunabi case
APPI (Japan) and Rikunabi case
 
Ikuoedisclosure Uk
Ikuoedisclosure UkIkuoedisclosure Uk
Ikuoedisclosure Uk
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
10 Keio513
10 Keio51310 Keio513
10 Keio513
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Security Wars

  • 1. Security Wars Ikuo Takahashi
  • 2. A long time ago in a network far ,far away The word “hacker”used to be a respectful word for the master of computer.However many hackers fell into the Dark World led by dark side of their power-anger, exhibitionism and temporary joy. Internet has been messed up by the unprecedented attacks from people who covet the Internet by lust, people who impose on others for economic interests, people who juggle with the bot. This "Saga" is about the epic of the battle with the society, Engineers who crossed the line of social activity, and ISP who stand up against the messed up Internet. ……………… .. ハッカーは、選ばれし者。 多数の者が、怒り、自己顕示欲、楽しみのために堕ちていった。 社会は、暗黒の技術者と永遠の初心者からネットワークを 守る決心をした。
  • 3.
  • 4. Episode 1 Dark Side of Hackers エピソートⅠ ハッカーと暗黒面
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Outline of the Partnership Reporting Receiving Organization Discoverer (JPCERT/CC) Coordinating Organizations Notification Users [Web Applications] Reporting Notification [Software Products] Vendors Coordination Website Operation Manager Foreign CERTs System Integrators Coordinate SPREAD Publicity Portal Site (JPN: JP Vendor Status Notes) Publicity* (IPA) (IPA) Analysis Analyzing Organization - Governments - Companies - Individuals *: When personal data has leaked.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Sec Wars Episode2 Attack of anonymous troops エピソード2 匿名軍団の攻撃
  • 26.
  • 27.
  • 28.
  • 29. ISP’s Network Management Honey Pot ② infroamtion sharing A ブロック B ブロック C ブロック ADSL/ 光 ISP-A ISP-B ISP-C ・・ ・・ ISP-D DDoS! ・・ ① detection ・・ ・・ ? ? ? ? ・・
  • 30. Measure Site Honey pots PCs infected by Bot Programs ・・ ・・ Analysis of source attacking ISP !! Making removal tool 【 CCC Cleaner 】 Analysis Isolation Cyber Clean Center ② Number of unique specimens : 215,338 [Since a number of the specimens collected are the same, those that are identical in size and external characteristics are removed to separate unique specimens (binary files).] ④ Number of specimens reflected in removal tools: 7,833 [Unknown specimens are analyzed to create bot removal tools for those that are high-risk and currently infecting many PCs.] ⑤ Bot-removal tools Updated: 61 times [Bot-removal tools are updated every week.] ⑥ Security alerts: 232,487 times [This is the number of security alerts that cooperating ISPs provided to infected users.] Number of recipients: 54,703 ⑦ Ratio of security alert recipients who download bot-removal tools: 29% 1 2 3 4 8 Cyber Clean Center The Cyber Clean Center is a shared initiative of the Ministry of Internal Affairs and Communications and the Ministry of Economy, Trade and Industry. ① Total number of specimens collected: 7,673,279 [Specimens, such as bot programs are collected from among the countless (binary files).] ③ Number of unknown specimens : 10,082 [Unique specimens are examined using commercial anti-virus software, then those that are undetectable are separated.] Access Infected PC’s IP list ・ ・ ・ ・ 5 Security alert e-mail 6 Download removal tool 7 Total Downloads of Removal Tools : 385,046
  • 31.
  • 32.
  • 33. Episodes3 Repair or Despair エピソード3    希望か絶望か
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. US network and privacy (civil org.) subpoena (LE) subpoena/ (d)order (civil org.)? (LE) Pen register/Trace Trap Order ? Aggressive acquisition Communication data (LE) search warrant/subpoena with notice compulsory (LE) Title 3(Interception) 、 FISA (civil org.) Prohibited/ exception (LE) ditto. Voluntary disclosure (civil org.) ? (LE) consent exception, computer intruder exception Network Neutrality Provider exception content disclosure use acquisition Stored communication real time
  • 45.
  • 46.
  • 47.
  • 48. CU @Episode 4 May the Force be with U! どのようなエピソード4を描けるのか