Académique Documents
Professionnel Documents
Culture Documents
Prinya Hom-anek
CISSP, CSSLP, CISA, CISM, SSCP, CFE, CBCI, CGEIT, CRISC,
(ISC)2 Asian Advisory Council Member; ISACA Thailand - Committee,
Thailand Information Security Association (TISA) – VP & Committee ,
ACIS Professional Center Co., Ltd. - President and Founder, Cybertron Co., Ltd.,
CEO
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
About Me, ACIS and Cybertron
การเปลี่ยนแปลงครั้งยิ่งใหญ่ของแนวความคิด
ความมั่นคงปลอดภัยไซเบอร์ในยุค S M C I
(Social, Mobile, Cloud and Information/Big Data)
CISSP, SSCP, CSSLP, CISA, CISM, CRISC, CGEIT, CASP, ITIL Expert
President and Founder, ACIS Professional Center Co., Ltd.
E-mail: prinya@acisonline.net
www.facebook.com/prinyah
www.twitter.com/prinyaACIS (@prinyaacis)
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. www.acisonline.net
Security Intelligence
Security intelligence
แนวโน้มเทคโนโลยีของโลกทีก
่ ำลังเข้ำมำเปลี่ยนแปลง
ชีวิตประจำวันของชำวโลกในศตวรรษที่ 21
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
Security Intelligence
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
Security Intelligence
Internet of Things
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
Security Intelligence
Cybersecurity Environment
Challenges, Threats, Risks, Opportunities
ACIS © ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk Awareness in Digital Economy: Cybersecurity Resilience Framework and Implementation in Action 6
Security Intelligence
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
ISO 22301:2012 (BCMS)
ACIS PROFESSIONAL CENTER We have been certified to ISO/IEC 27001:2013 (ISMS)
standards. ISO/IEC 20000-1:2011 (IT-SMS)
10
S-M-I-C ERA : Risks vs. Oppotunities
Security Intelligence
Cybersecurity Environment
Challenges, Threats, Risks, Opportunities
ACIS © ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk Awareness in Digital Economy: Cybersecurity Resilience Framework and Implementation in Action 12
Security intelligence
Source : http://thehackernews.com/2016/11/tesco-bank-hack.html
Source : http://thehackernews.com/2016/11/ddos-attack-mirai-botnet.html
Source : https://www.hackread.com/danish-payment-processing-data-breach/
Source : https://www.hackread.com/ransomware-attack-on-nhs-system/
Source : https://www.hackread.com/red-cross-blood-donors-data-leak/
Source : http://thehackernews.com/2016/10/google-windows-zero-day.html?m=1
Source : https://www.hackread.com/android-vulnerable-to-drammer-attack/
Source : https://www.hackread.com/mirai-botnet-linked-to-dyn-dns-ddos-attacks/
Source : https://www.hackread.com/dyn-ddos-attack-millions-ip-addresses/
Source: http://www.bbc.com/news/technology-36971832
An ATM hack and a PIN-pad hack show chip
cards aren’t impervious to fraud
Source: http://arstechnica.com/security/2016/08/an-atm-hack-and-a-pin-pad-hack-show-chip-cards-arent-impervious-to-fraud/
Swift Hack Probe Expands to Up to a Dozen
Banks Beyond Bangladesh
Source: http://www.bloomberg.com/news/articles/2016-05-26/swift-hack-probe-expands-to-up-to-dozen-banks-beyond-
bangladesh
Swift hackers steal $10 millions from
Ukrainian bank
Source: http://thehackernews.com/2016/06/ukrainian-bank-swift-hack.html
US warns of hacking threat to interbank
payment network
Source: http://www.bbc.co.uk/news/business-36473912
Four Lessons to Learn From the SWIFT Hacks
Source: http://www.infosecurity-magazine.com/opinions/four-lessons-to-learn-from-the/
The Inside Story of Mt. Gox,
Bitcoin’s $460 Million Disaster
Source: https://www.wired.com/2014/03/bitcoin-exchange/
Hackers Steal $72 Million in Bitcoin
From Hong Kong Exchange
Source: http://gizmodo.com/hackers-steal-72-million-in-bitcoin-from-honk-kong-exc-1784757592
Bitcoin tumbles after HK exchange ‘hacked’
Source : http://www.thestar.com.my/business/business-news/2016/08/03/bitcoin-tanks-after-hong-kong-exchange-hacked/
Source : http://thehackernews.com/2016/08/bitcoin-exchange-price.html
Source : http://www.cbc.ca/news/technology/ethereum-hack-blockchain-fork-bitcoin-1.3719009
Source: https://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/
Hacked BitcoinTalk.org User Data Goes Up
For Sale On Dark Web
Source : https://www.cryptocoinsnews.com/hacked-bitcointalk-org-user-data-goes-up-for-sale-on-dark-web/
Source : http://thehackernews.com/2016/10/blockchain-bitcoin-website.html
Acknowledgements
Prinya Hom-anek
CISSP, SSCP, CSSLP, CISA, CISM, CRISC, CGEIT, CASP, ITIL Expert,
ISACA Cybersecurity Nexus, COBIT 5 implementation, IAPP Foundation
President and Founder, ACIS Professional Center Co., Ltd.
CEO, Cybertron Co., Ltd.
ผู้อำนวยกำรศูนย์กำรรักษำควำมมันคงปลอดภั
่ ยทำงไซเบอร์ มหำวิ ทยำลัยรังิิ ต
Security Intelligence
© ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk-Awareness: Transforming Cybersecurity of Things and Literacy in Digital Economy 47
“พบมัลแวร์และเครือข่ำยบอทเน็ ตยังคงทำงำนอยู่ตงั ้ แต่ปี พ.ศ. 2557
ในเครื่องคอมพิวเตอร์ของประเทศไทยกว่ำหนึ่ งแินเครื่อง
Top 10 Asia under Cyber Attack
Malware Infection Index* for ASEAN for the first quarter of 2015
49
Copyright © 2016, ACIS Professional Center Co., Ltd.
Worldwide Threat Assessment
Microsoft Security Intelligence Report
Figure A:
F: Average
E:
C:
B:
D: Malware
Drive-by
Encounter
Infection number
Phishing distribution
download
rates
sites
rates
per
byby
ofcountry/region
1,000
pages
country/region
Simda-infected
sitesInternet
per
indexed
1,000
in
hosts
in
by
devices
2Q15
Internet
2Q15
Bing
for locations
atconnecting
hosts
the end
foraround
of
locations
to2Q15
thethe
sinkhold
per
around
world
1,000
ineach
the
1H15
URLs
world
month,
in in
each
1H15
April-July,
country/region
2015
Source: [https://www.microsoft.com/security/sir/default.aspx]
50
Copyright © 2016, ACIS Professional Center Co., Ltd.
Security Incidents in 2015
Source: [https://www.microsoft.com/security/sir/default.aspx]
51
Copyright © 2016, ACIS Professional Center Co., Ltd.
Security Intelligence
Cybersecurity Environment
Challenges, Threats, Risks, Opportunities
“Shadow IT” : The New IT Problem that comes with “Cloud Computing”
ACIS © ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk Awareness in Digital Economy: Cybersecurity Resilience Framework and Implementation in Action 52
ITG-COBIT5-introduction v1.1 Security Intelligence
SECURITY
INTERNET
OF TRUST
THINGS
PRIVACY
Source: [“ACIS Top Ten Cybersecurity Threats and Trends”, ACIS-Research, www.acisonline.net]
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
Security Intelligence
Source: [“ACIS Top Ten Cybersecurity Threats and Trends”, ACIS-Research, www.acisonline.net]
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
1. Emerging Hacking Industry
4. Security-driven Architecture
5. Vulnerable Third-party
Source: “ACIS/Cybertron Top Ten Cybersecurity Trends for 2016”, ACIS Research; www.acisonline.net 56
10. Integrated Risk-Based Approaches and Standards
4. Security-driven architecture
1. Emerging
Hacking Industry
2. Undefined
Unknown Threats at Risk
7. C-Generation: 5. Vulnerable
Gen-C Lifestyle in 3. Security of Thing, Suppliers,
Digital Economy Internet of Trust Service Provider
Source: “ACIS Top IT & Cybersecurity Threats and Trends for 2016”, ACIS Research; www.acisonline.net 57
Security Intelligence
“CONNECTED”
1. Connection
2. Convenience
3. Creation
4. Curation
5. Community
ACIS
Source: http://www.zocialinc.com/blog/genc-behavior/ ; http://www.positioningmag.com/content/61576
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. 58
Security Intelligence
ACIS
Source: http://www.zocialinc.com/blog/genc-behavior/ ; http://www.positioningmag.com/content/61576
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. 59
4 Types of Hackers
1. Hacktivism
Emerging
2. Cyber Crime (make $$$) Hacking
3. Cyber Espionage (need IP) Industry
4. Cyber Warfare
State-Sponsored Attack
State-Act Attack
Source: “Top Cybersecurity Threats and Trends for 2016”, ACIS Research; www.acisonline.net 60
360o Cybersecurity : Fraud and Cyber Risks in e-Payment Services Security intelligence
74
Shodan – Search for Vulnerable CCTV
75
Security Intelligence
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. Paradigm Shift in Cybersecurity 76
Research from ACIS/Cybertron Cyber LAB
Internet of Things - Internet of Threats - Internet of Trust
Cybersecurity Resilience Framework
in Actions
Stage 2 : Cybersecurity
www.cdicconference.com 77
Security Intelligence
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 78
Hidden Security and Privacy
Threats on Mobile Applications
Research from ACIS/Cybertron Cyber LAB
Hidden Behaviors and Processes on Mobile Applications
source : Pradeo, France
ITG-COBIT5-introduction v1.1 Security Intelligence
Understand
Dark Web, Deep Web vs. Surface Web
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
ITG-COBIT5-introduction v1.1 Security Intelligence
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
ITG-COBIT5-introduction v1.1 Security Intelligence
ACIS © Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved.
ITG-COBIT5-introduction v1.1 Security Intelligence
Case Study :
“MalWare in the Darknet”
Source: “Cyber Security strategies achieving cyber resilience”, Information Security Forum (ISF), www.securityforum.org
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 93
Security Intelligence
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. Paradigm Shift in Cybersecurity 94
From The World Real-time
Cyber Attack Map
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. www.acisonline.net
Security Intelligence
© Copyright 2015 ACIS Professional Center Company Limited. All Right Reserved. Paradigm Shift in Cybersecurity 98
Manage and Mitigate
“REPUTATION RISK”
Security Intelligence
Detective Control
Time
ACIS © ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk Awareness in Digital Economy: Cybersecurity Resilience Framework and Implementation in Action 103
Security Intelligence
Cybersecurity Framework
for Critical Infrastructure
ACIS © ACIS Professional Center Company Limited Strategic IT-GRC and Cybersecurity Risk Awareness in Digital Economy: Cybersecurity Resilience Framework and Implementation in Action 104
Vulnerability Assessment
Penetration Testing
Identify
Incident Response
Respond
Digital Forensics
ID.AM
Identify RC.CO5 ID.BE
5 RC.IM 4 ID.GV
4 Oil and Gas RC.RP 3 ID.RA Oil and Gas
3 2
Recover 2 Protect RS.IM ID.RM
1 Financial 1 Financial
0 RS.MI 0 PR.AC
Regulator Regulator
RS.AN PR.AT
Respons Target RS.CO PR.DS Target
Detect
e DE.DP PR.IP
DE.CM PR.PT
DE.AE
CYBERSECURITY RESILIENCE FRAMEWORK
CsP-MICS (NexusFour) Model and Cybersecurity Resilience Framework
Holistic Conceptual Thinking View
SUSTAINABILITY SUSTAINABILITY
RESILIENCE RESILIENCE
Organizational Business
Resilience Resilience
Cybersecurity Resilience
TIME
TRUST
EXCELLENCE Cybersecurity
Centric
SECURITY PRIVACY
Balancing
Integrated GRC
Current
Cybersecurity Environments
[NexusFour: Mobile, Big Data (Information), Cloud, Social]
SUSTAINABILITY
RESILIENCE
TRUST
SECURITY PRIVACY
Stage 1 : Information Security Balancing
Cybersecurity Environments
[NexusFour: Mobile, Big Data (Information), Cloud, Social]
Stage 2 : Cybersecurity
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 114
Security Intelligence
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 115
Security Intelligence
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 116
Security Intelligence
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 117
Security Intelligence
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 118
ACIS Internal Cyber Drill Result
Are we ready for Digital Economy ?
5. Standards, 2. Cyber
Organizations, Culture and
and Society
Technologies CMM
- Awareness Raising
- Legal Frameworks 4. Legal and 3. Cybersecurity - Framework for Education
- Criminal Justice System Regulatory Education, - Framework for Professional
- Formal and Informal Cooperation Frameworks Training and Training
Frameworks to Combat Cybercrime Skills
Dynamic
เป็ นระดับทีม
่ ค
ี วามชด ั เจนในด ้านกลไกนาไปสู่
การเปลีย ่ นแปลงกลยุทธ์ทข ี่ น
ึ้ อยูก
่ ับภัยคุกคาม
Strategic ไซเบอร์ทเี่ กิดขึน
้ จริงในปั จจุบัน
เป็ นระดับทีป
่ ั จจัยต่างๆขึน
้ อยูก
่ ับระด ับชาติหรือ
สภาวะแวดล้อมขององค์กร
Established
่ งค์ประกอบต่างๆถูกนาไปใช ้ มก
เป็ นระดับทีอ ี าร
จัดสรรทรัพยากร และมีคา่ เสย ี โอกาสทีต
่ ้อง
ตัดสน ิ ใจ
Formative
เป็ นระดับทีม ่ บี างองค์ประกอบของแต่ละปั จจัย
ได ้เริม
่ ปฏิบัตกิ ันแล ้ว แต่ยังอยูใ่ นขนตอนการ
ั้
สาธิต
Start-up
เป็ นระดับทีเ่ พิง่ เริม
่ อภิปรายเกีย
่ วกับการสร ้าง
ความมั่นคงปลอดภัยไซเบอร์ แต่ยังไม่มก ี าร
กระทาทีเ่ ป็นรูปธรรม
Gap for
Improvement
Your capacity
Source: “Cybersecurity for Executive” book, Gregory J. Touhill and C.Joseph Touhill
ACIS © ACIS Professional Center Company Limited. All Right Reserved. ACIS-Cybertron Cybersecurity Resilience Framework 127
Security Intelligence
www.acisonline.net
ACIS Professional Center Co., Ltd.
www.youtube.com/thehackertv
www.youtube.com/thecyber911
The Hacker TV Programme 20:55 Monday-Friday
Email : prinya@acisonline.net
Facebook : www.facebook.com/prinyah
Facebook search : prinya hom-anek
Twitter: www.twitter.com/prinyaACIS (@prinyaacis)
131
Copyright © 2016, ACIS Professional Center Co., Ltd.
รุ่ น 2 : มกราคม 2559
วิทยาลัยเทคโนโลยีสารสนเทศและการสื่ อสาร
มหาวิทยาลัยรังสิ ต
21-Nov-16 132
ITG-COBIT5-introduction v1.1 Security Intelligence