21
CYBER WARFARE HALDEBIQUE Geoffroy ROYER Johan

HALDEBIQUE Geoffroy ROYER Johan Crime motivated attacks Hacktivism Cyber Warfare

Embed Size (px)

Citation preview

  • Slide 1
  • Slide 2
  • HALDEBIQUE Geoffroy ROYER Johan
  • Slide 3
  • Crime motivated attacks Hacktivism Cyber Warfare
  • Slide 4
  • Way of protesting for people by doing politically-motivated cyber attacks October 1989: first ever act of Hacktivism
  • Slide 5
  • Created on 4Chan in 2003 Some of their actions are really famous: 2008. DDoS against Church of scientology 2011. Support the protests in Tunisia Hacked a Child Pornography server Hacked Paypal to support Wikileaks 2012. Hacked Universal Music homepage after the closure of megaupload
  • Slide 6
  • Notorious for having hacked: -Sony the 23rd of May 2011 -Nintendo the 6th of June 2011 -The CIA the 15th of June 2011 Dissolved in 2011
  • Slide 7
  • Politicaly motivated hacking done by a nation in order to spy and affect another nations computers or networks
  • Slide 8
  • Guy-Philippe Goldstein: How cyberattacks threaten real-world peace (TED talk)
  • Slide 9
  • DDoS & Botnet
  • Slide 10
  • Worms
  • Slide 11
  • Trojanhorse
  • Slide 12
  • Spying Stealing informations Confuse Give false informations Attack and destroy computers or facilities
  • Slide 13
  • 2007. DDoS attack against Estonia by Russia 2008. Georgias networks are targeted during the Russia-Georgia war 2010. China launches a lot of cyber attacks 2010. The virus Stuxnet is discovered in Iran
  • Slide 14
  • China is the first country that recognized the potential of Cyber warfare Mainly spying and data theft, which is not aggressive enough to trigger an official reaction Problem of Cyber warfare : we cant know the origin of the attack for sure
  • Slide 15
  • (2010)(2011)(2012)(2012) Stuxnet can manipulate engines in facilities such as water pumps in nuclear plants The Stuxnet project started in 2007, but was only noticed in 2010, and we only knew in 2012 that the attack originated from the USA
  • Slide 16
  • Stuxnet and the others source code is available online and can be used again We still dont know for what purpose the other programs were created, and what they do exactly
  • Slide 17
  • Video of an engine under a cyber attack But all devices with a wireless function can be hacked and used for malevolent ends
  • Slide 18
  • Most of the softwares are made by private companies (Microsoft), which are paying more attention to profit than security Zero-day vulnerability windows can last up to seven years, if its not forever ! People need to be more sensibilized
  • Slide 19
  • Debate Time :
  • Slide 20
  • Slide 21
  • What is the difference between Hacktivism and Cyber warfare ? What is a (computer) worm ? What is a (trojan) horse ?
  • Slide 22
  • Name three important events linked to Cyber warfare What was the purpose of Stuxnet ? What is a zero-day vulnerability ?