8
Session ID: Session Classification: Richard M. George Johns Hopkins University Applied Physics Laboratory STU-R33A General Interest Life as a Target

Stu r33 a

Embed Size (px)

Citation preview

Page 1: Stu r33 a

Session ID:

Session Classification:

Richard M. George Johns Hopkins University Applied Physics

Laboratory

STU-R33A

General Interest

Life as a Target

Page 2: Stu r33 a

► Emerging Threats Emerging Targets

► Threat/Adversary Model

► Resources/capabilities

► Intent/motivation

► Access

► Risk aversion

Page 3: Stu r33 a

► Espionage and Nuclear weapons

► After strategic information – nothing personal

► Attribution is easy

► Symmetric world

Soviet Union

Page 4: Stu r33 a

► Walker

► Great Seal

► Gunman

► State Department chair rail

Examples – One a Decade

Page 5: Stu r33 a

► Money Plastic

► Value of GM versus Value of Google

► Threat/Adversary Model is similar, but the game is

asymmetric

The World has Changed

Page 6: Stu r33 a

► Many adversaries – Intent and Motivation?

► Want information worth money

► Gov’t – 41,000 attacks

► 60,000 unique malware a day

► RSA, Lockheed-Martin; NASDAQ; MITSUBISHI,

DIGINOTAR

Today’s World

Page 7: Stu r33 a

► Attribution is hard

► Asymmetric – offense is cheap, defense is hard and

expensive

► Access? Person in bar person in his own house

► Risk aversion? Sent home already home

Issues We Face

Page 8: Stu r33 a

► Today we are all targets – not a fair game

► Technology is an enabler – for user and attacker

► It all comes down to people – taking risks, making

mistakes, sharing risks

► We need technology to protect the user, in addition to

user training

Lessons Learned - Summary