SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
00
Some considerations
on ICT security
and cyber attacks
Marco R. A. Bozzetti
CEO Malabo Srl
Member of the Board and Comms. Officer of AIPSI, Italian Chapter of ISSA
CCIP, Chamber of Cooperation and Incentive for Partnership
Security, Cybercrime and Fraud
Milan, March 25 th 2014
11
Looking for computer security….
Social networks
Consumerization (BYOD)
personal/home
environment
working
environment
Cloud and
outsourced
services
Cloud and
outsourced
services
Informatics Systems
(Enterprise and PA)
Fixed + mobile
Internet
DCS
VDS, PLC, A/D Conv.
Internet of Things
Domotics
Smart city
The absolute security does not exist and it is increasingly complex to manage
All these aspects impact on the computer systems of banks
22
• ICT security is a key element for ensuring :
- the Business Continuity
» that is a business problem
- compliance with the various standards and
certifications
» very demanding and heavy for banks
• information and ICT resources are an enterprise asset
and as such they should be protected and managed.
The
ICT
security
has
to
be
governed
(ICT
governance)by
the
Board
(top
m
anagers) and
to
be
aligned
with
the
business
needs
Computer security … not only a technical problem
33
Sponsor
Patronage
OAI, Osservatorio Attacchi Informatici in Italia
Publisher
Report 2013 OAI : 4° Edition of the OAI initiative in
collaboration with Italian Postal Police
44
OAI 2013: Main ICT attacks 2012- First half 2013
(multiple answers)
0,0
10,0
20,0
30,0
40,0
50,0
60,0
70,0
M
alware
SocialEngineering
ICT
devices'theft
DoS/DD
oS
Vulnerability
exploitation
Data
theftby
m
obile
System
unauthorized
access
ICT
Froud
Netw
ork
attack
Sw
unauthorized
access
and/orm
odification
Data
unauthorized
access
and/orm
odification
Data
theftby
fixed
device
Physicalsecurity
attack
Targeted
Attack
&
APT
ICT
blackm
ailO
ther
%respondents
2012
First half 2013
© OAI 2013
always the same as the first four
places in all editions of OAI (1998-
2013)
55
69%
5%
20%
6%
65%
7%
21%
8%
1-10 cases with low
impacts
1-10 cases with high
impacts
>10 cases with low impacts
>10 cases with high
impacts
%respondents
2012 First half 2013
OAI 2013: Impacts after an attack
© OAI 2013
66
43%
24%
6% 6%
4% 4% 4% 3% 2% 1% 1%
Manufacture
Industry
Service-
Distribution
Local Public
Administration
Health Central Public
Administration
Telecom-
Media
Trasport-
Logistic-
Tourism
Utility Finance-Bank-
Insurance
Instruction-
R&D
Primary Sector
%respondents
OAI 2013: Industry sectors of the respondents (299)
© OAI 2013
77
Worldwide attacks status in 2013
Source: IBM X-Force Report 1Q2014
88
Data breach cost per capita
Source: Ponemon Institute Research Report 2013
99
Total Online Banking Malware Infections , 2012 and 2013
Source: Trend Micro Labs Report 2013
1010
Malicious and High-Risk Mobile App Growth, 2013
Source: Trend Micro Labs Report 2013
1111
Top Mobile Phishing Targets, 2013
Source: Trend Micro Labs Report 2013
1212
Key Vulnerabilities (non-exhaustive list)
• Threats and attacks are all based on technical and / or human-organizational vulnerabilities
• Technical vulnerabilities (software systems and applications, architectures and configurations):
- Operating systems and middleware
- Web sites and collaborative platforms
- Smartphones and mobility tablettes ++ 14,000 malware
- Virtualized systems
- Outsourcing and Cloud (XaaS)
- Between 30 and 40% of software vulnerabilities has no patches from the development companies
Zero Day vulnerability
• Human Vulnerability : the ICT user's behavior
- Social Engineering and Phishing
- Use of social networks, even at the enterprise level
• Organizational vulnerabilities
- Lack or non-use of organizational procedures and informatics support
- Inadequate or non-use of standards and best practices
- Lack of training and awareness from top managers to end users
- Lack of systematic monitoring and controls of the ICT resources
- Limited or missing Risk analysis
- Not effective control of providers
- Limited or missing SoD, Separation of Duties
1313
Application vulnerabilities 2013
Source: IBM X-Force Report 1Q2014
1414
Black market and the cyber criminal ware prices
1515
49% 48%
43%
37%
35%
32%
27%
25%
21%
17% 16% 15% 14%
12%
1%
M
alw
are
IC
T
devices'theft
D
ata
theftby
m
obile
and
fixed
deviceD
oS/D
D
oS
SocialEngineering
Physicalsec.attack
Vulnerability
exploitation
N
etw
ork
attack
D
ata
unauth.access
System
unauth.accessIC
T
FroudTA
&
APT
IC
T
blackm
ail
Sw
unauth.access
O
ther
%respondents
OAI 2013: Most feared attacks in the next future
© OAI 2013
1616
Threats and attacks: main trend worldwide (1)
• A personal synthesis by recent reports of CSA, Enisa, Microsoft, IBM XForce,
McAfee, Sophos, TrendMicro, Websense
• Two main directions:
• ++ Massive attacks: relatively simple, such as social engineering-phishing,
virus, etc.
• ++ Targeted attacks: very sophisticated, such as APT, Watering hole, etc.
• ++ Malware
• + New sophisticated
• + revitalization of old ones and/or based on obsolete middleware still “in
production”
• + lock-screen ransomware
• ++ cryptographic ransomware
• +++ new sophisticated for mobile and apps (tablet and smartphone)
• ++ Social engineering
• +++ Digital identity theft
• + Attacks to big data repositories
• ++ DoS/DDoS, Denial of Service/ Distributed DoS
1717
Threats and attacks: main trend worldwide (2)
• ++ DoS/DDoS, Denial of Service/ Distributed DoS
• + exploitation of basic software vulnerabilities and in particular of HTML5 and Java
• ++ attacks to cloud services (XaaS)
- The Notorious Nine Top Threats: data breaches, data loss, account hijacking,
insecure APIs, malicious insiders, abuse of cloud services, insufficient due
diligence, shared technology issues
• + consolidation of new exploit kits, such as Neutrino and Redkit, which will replace the
well-known and popular Blackhole
• ++ Internet of Things‘ attacks
- Smart cities (Expo 2015)
- Domotics
• ++ TA and APT
• + (?) attacks to Bitcoin and virtual coins
- especially with the use of mobile devices
1818
References
marco.bozzetti@malaboadvisoring.it
www.malaboadvisoring.it

Weitere ähnliche Inhalte

Was ist angesagt?

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)Wail Hassan
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionmoldovaictsummit2016
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 

Was ist angesagt? (20)

Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Introduction (ethical hacking)
Introduction (ethical hacking)Introduction (ethical hacking)
Introduction (ethical hacking)
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Cyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, preventionCyberthreats: causes, consequences, prevention
Cyberthreats: causes, consequences, prevention
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 

Andere mochten auch

Luke height Esafty pp quiz
Luke height Esafty pp quizLuke height Esafty pp quiz
Luke height Esafty pp quiztonybattista
 
Amy Pooley Esafty Quiz
Amy Pooley Esafty QuizAmy Pooley Esafty Quiz
Amy Pooley Esafty Quiztonybattista
 
Esafty quiz Charlotte Palmer
Esafty quiz Charlotte PalmerEsafty quiz Charlotte Palmer
Esafty quiz Charlotte Palmertonybattista
 
Punctuation Powerpoint
Punctuation PowerpointPunctuation Powerpoint
Punctuation Powerpointconno1ej
 

Andere mochten auch (6)

Luke height Esafty pp quiz
Luke height Esafty pp quizLuke height Esafty pp quiz
Luke height Esafty pp quiz
 
Amy Pooley Esafty Quiz
Amy Pooley Esafty QuizAmy Pooley Esafty Quiz
Amy Pooley Esafty Quiz
 
Esafty quiz Charlotte Palmer
Esafty quiz Charlotte PalmerEsafty quiz Charlotte Palmer
Esafty quiz Charlotte Palmer
 
esafty
esaftyesafty
esafty
 
Punctuation powerpoint presentation
Punctuation powerpoint presentationPunctuation powerpoint presentation
Punctuation powerpoint presentation
 
Punctuation Powerpoint
Punctuation PowerpointPunctuation Powerpoint
Punctuation Powerpoint
 

Ähnlich wie Considerazioni su ITC Security e sui Cyber Attacks

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...Cyber Security Alliance
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxRykaBhatt
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan Miguel Velasco López Urda
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSIAEME Publication
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...MOBIQUANT TECHNOLOGIES
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelSURFnet
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 

Ähnlich wie Considerazioni su ITC Security e sui Cyber Attacks (20)

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
The Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptxThe Future of Cybersecurity courses.pptx
The Future of Cybersecurity courses.pptx
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computingJuan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
Juan miguel-velasco-lopez-urda-seguridad-informatica-cloud-computing
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
188
188188
188
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 

Mehr von seeweb

Web Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskWeb Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskseeweb
 
Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020seeweb
 
Disaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebDisaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebseeweb
 
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoEcommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoseeweb
 
Avviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTAvviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTseeweb
 
Quick security assessment
Quick security assessmentQuick security assessment
Quick security assessmentseeweb
 
Seeweb presentation
Seeweb presentationSeeweb presentation
Seeweb presentationseeweb
 
Seeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoSeeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoseeweb
 
Viral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaViral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaseeweb
 
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...seeweb
 
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...seeweb
 
Software Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsSoftware Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsseeweb
 
50 minutes as a DevOps
50 minutes as a DevOps50 minutes as a DevOps
50 minutes as a DevOpsseeweb
 
Ricerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchRicerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchseeweb
 
Presentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpPresentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpseeweb
 
Perché scegliere il Cloud?
Perché scegliere il Cloud?Perché scegliere il Cloud?
Perché scegliere il Cloud?seeweb
 
Validation ICANN
Validation ICANNValidation ICANN
Validation ICANNseeweb
 
Presentazione Coud Backup
Presentazione Coud BackupPresentazione Coud Backup
Presentazione Coud Backupseeweb
 
Cloudserver faq
Cloudserver faqCloudserver faq
Cloudserver faqseeweb
 
Schema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete SeewebSchema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete Seewebseeweb
 

Mehr von seeweb (20)

Web Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber riskWeb Application Firewall: proteggersi dal cyber risk
Web Application Firewall: proteggersi dal cyber risk
 
Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020Presentazione datacenter seeweb_2020
Presentazione datacenter seeweb_2020
 
Disaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seewebDisaster recovery-vs-business-continuity-seeweb
Disaster recovery-vs-business-continuity-seeweb
 
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfettoEcommerce solutions: Quista e Cloud Seeweb binomio perfetto
Ecommerce solutions: Quista e Cloud Seeweb binomio perfetto
 
Avviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoTAvviare un progetto IoT in modo semplice con Seeweb IoT
Avviare un progetto IoT in modo semplice con Seeweb IoT
 
Quick security assessment
Quick security assessmentQuick security assessment
Quick security assessment
 
Seeweb presentation
Seeweb presentationSeeweb presentation
Seeweb presentation
 
Seeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamoSeeweb: il Cloud che facciamo, i servizi che offriamo
Seeweb: il Cloud che facciamo, i servizi che offriamo
 
Viral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfettaViral Marketing & Cloud: come creare una Customer Experience perfetta
Viral Marketing & Cloud: come creare una Customer Experience perfetta
 
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
Infrastrutture ad alta disponibilità ridondate geograficamente sull'infrastru...
 
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
Il mercato Cloud oggi: trend e occasioni di business, una grande opportunità ...
 
Software Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environmentsSoftware Defined Storage: The open-source platforms for modern environments
Software Defined Storage: The open-source platforms for modern environments
 
50 minutes as a DevOps
50 minutes as a DevOps50 minutes as a DevOps
50 minutes as a DevOps
 
Ricerche performanti con ElasticSearch
Ricerche performanti con ElasticSearchRicerche performanti con ElasticSearch
Ricerche performanti con ElasticSearch
 
Presentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUpPresentazione servizio Cloud BackUp
Presentazione servizio Cloud BackUp
 
Perché scegliere il Cloud?
Perché scegliere il Cloud?Perché scegliere il Cloud?
Perché scegliere il Cloud?
 
Validation ICANN
Validation ICANNValidation ICANN
Validation ICANN
 
Presentazione Coud Backup
Presentazione Coud BackupPresentazione Coud Backup
Presentazione Coud Backup
 
Cloudserver faq
Cloudserver faqCloudserver faq
Cloudserver faq
 
Schema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete SeewebSchema Infrastrutture Rete Seeweb
Schema Infrastrutture Rete Seeweb
 

Kürzlich hochgeladen

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 

Kürzlich hochgeladen (20)

Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 

Considerazioni su ITC Security e sui Cyber Attacks

  • 1. 00 Some considerations on ICT security and cyber attacks Marco R. A. Bozzetti CEO Malabo Srl Member of the Board and Comms. Officer of AIPSI, Italian Chapter of ISSA CCIP, Chamber of Cooperation and Incentive for Partnership Security, Cybercrime and Fraud Milan, March 25 th 2014
  • 2. 11 Looking for computer security…. Social networks Consumerization (BYOD) personal/home environment working environment Cloud and outsourced services Cloud and outsourced services Informatics Systems (Enterprise and PA) Fixed + mobile Internet DCS VDS, PLC, A/D Conv. Internet of Things Domotics Smart city The absolute security does not exist and it is increasingly complex to manage All these aspects impact on the computer systems of banks
  • 3. 22 • ICT security is a key element for ensuring : - the Business Continuity » that is a business problem - compliance with the various standards and certifications » very demanding and heavy for banks • information and ICT resources are an enterprise asset and as such they should be protected and managed. The ICT security has to be governed (ICT governance)by the Board (top m anagers) and to be aligned with the business needs Computer security … not only a technical problem
  • 4. 33 Sponsor Patronage OAI, Osservatorio Attacchi Informatici in Italia Publisher Report 2013 OAI : 4° Edition of the OAI initiative in collaboration with Italian Postal Police
  • 5. 44 OAI 2013: Main ICT attacks 2012- First half 2013 (multiple answers) 0,0 10,0 20,0 30,0 40,0 50,0 60,0 70,0 M alware SocialEngineering ICT devices'theft DoS/DD oS Vulnerability exploitation Data theftby m obile System unauthorized access ICT Froud Netw ork attack Sw unauthorized access and/orm odification Data unauthorized access and/orm odification Data theftby fixed device Physicalsecurity attack Targeted Attack & APT ICT blackm ailO ther %respondents 2012 First half 2013 © OAI 2013 always the same as the first four places in all editions of OAI (1998- 2013)
  • 6. 55 69% 5% 20% 6% 65% 7% 21% 8% 1-10 cases with low impacts 1-10 cases with high impacts >10 cases with low impacts >10 cases with high impacts %respondents 2012 First half 2013 OAI 2013: Impacts after an attack © OAI 2013
  • 7. 66 43% 24% 6% 6% 4% 4% 4% 3% 2% 1% 1% Manufacture Industry Service- Distribution Local Public Administration Health Central Public Administration Telecom- Media Trasport- Logistic- Tourism Utility Finance-Bank- Insurance Instruction- R&D Primary Sector %respondents OAI 2013: Industry sectors of the respondents (299) © OAI 2013
  • 8. 77 Worldwide attacks status in 2013 Source: IBM X-Force Report 1Q2014
  • 9. 88 Data breach cost per capita Source: Ponemon Institute Research Report 2013
  • 10. 99 Total Online Banking Malware Infections , 2012 and 2013 Source: Trend Micro Labs Report 2013
  • 11. 1010 Malicious and High-Risk Mobile App Growth, 2013 Source: Trend Micro Labs Report 2013
  • 12. 1111 Top Mobile Phishing Targets, 2013 Source: Trend Micro Labs Report 2013
  • 13. 1212 Key Vulnerabilities (non-exhaustive list) • Threats and attacks are all based on technical and / or human-organizational vulnerabilities • Technical vulnerabilities (software systems and applications, architectures and configurations): - Operating systems and middleware - Web sites and collaborative platforms - Smartphones and mobility tablettes ++ 14,000 malware - Virtualized systems - Outsourcing and Cloud (XaaS) - Between 30 and 40% of software vulnerabilities has no patches from the development companies Zero Day vulnerability • Human Vulnerability : the ICT user's behavior - Social Engineering and Phishing - Use of social networks, even at the enterprise level • Organizational vulnerabilities - Lack or non-use of organizational procedures and informatics support - Inadequate or non-use of standards and best practices - Lack of training and awareness from top managers to end users - Lack of systematic monitoring and controls of the ICT resources - Limited or missing Risk analysis - Not effective control of providers - Limited or missing SoD, Separation of Duties
  • 15. 1414 Black market and the cyber criminal ware prices
  • 16. 1515 49% 48% 43% 37% 35% 32% 27% 25% 21% 17% 16% 15% 14% 12% 1% M alw are IC T devices'theft D ata theftby m obile and fixed deviceD oS/D D oS SocialEngineering Physicalsec.attack Vulnerability exploitation N etw ork attack D ata unauth.access System unauth.accessIC T FroudTA & APT IC T blackm ail Sw unauth.access O ther %respondents OAI 2013: Most feared attacks in the next future © OAI 2013
  • 17. 1616 Threats and attacks: main trend worldwide (1) • A personal synthesis by recent reports of CSA, Enisa, Microsoft, IBM XForce, McAfee, Sophos, TrendMicro, Websense • Two main directions: • ++ Massive attacks: relatively simple, such as social engineering-phishing, virus, etc. • ++ Targeted attacks: very sophisticated, such as APT, Watering hole, etc. • ++ Malware • + New sophisticated • + revitalization of old ones and/or based on obsolete middleware still “in production” • + lock-screen ransomware • ++ cryptographic ransomware • +++ new sophisticated for mobile and apps (tablet and smartphone) • ++ Social engineering • +++ Digital identity theft • + Attacks to big data repositories • ++ DoS/DDoS, Denial of Service/ Distributed DoS
  • 18. 1717 Threats and attacks: main trend worldwide (2) • ++ DoS/DDoS, Denial of Service/ Distributed DoS • + exploitation of basic software vulnerabilities and in particular of HTML5 and Java • ++ attacks to cloud services (XaaS) - The Notorious Nine Top Threats: data breaches, data loss, account hijacking, insecure APIs, malicious insiders, abuse of cloud services, insufficient due diligence, shared technology issues • + consolidation of new exploit kits, such as Neutrino and Redkit, which will replace the well-known and popular Blackhole • ++ Internet of Things‘ attacks - Smart cities (Expo 2015) - Domotics • ++ TA and APT • + (?) attacks to Bitcoin and virtual coins - especially with the use of mobile devices