Académique Documents
Professionnel Documents
Culture Documents
Ammar Jaffri
Former Additional DG, FIA
&
Currently Chairman Cyber Security
Task Force of Senate Defense
Committee
Scheme of Presentation
Cyber Space Opportunities and Challenges for Pakistan.
2
Introduction.. About My Self
• Former Additional Director General FIA and Pioneering
Head of National Response Center for Cyber Crimes.
5
World around us is Changing Fast
(Cont’d.)
• Our increasing Dependence on of Social
Networks & VOIP Communication
8
Use of Technology by Terrorists &
Criminals
• Historical linkages between advancements
& latest trends in crimes.
11
From Cyber Crimes to Cyber
Terrorism / Warfare
• Initial success of cyber criminals
encouraged terrorists to use cyber space.
• Anonymity, low cost & scaling up
immediately are other support factors.
• Terrorists are using the cyber space for the
same purposes for which we are using it.
• Attacks on Financial Institutions are
increasing . ( Renent example of
BanglaDesh)
12
From Cyber Crimes to Cyber
Terrorism / Warfare (Cont’d.)
• Anonymous in action.
• Interdependence of Systems is a
requirement but Threat also. Weak Link
• Technology based Local & Global co-
operation is Needed for tracking Criminals17
Need for global cooperation to
combat Cyber Warfare
• Internet by default is Global. We cannot
survive in isolation.
20
Attacks on Pakistan Cyber Space
• Among the detected malwares that are
most active in Pakistan cyberspace, 98.29%
activity has been observed for
NetWorm.Win32.Kido.ih
• An infamous worm that hogs network
resources and is spread by exploiting
Microsoft OS specific Vulnerabilities
• Information Collected by Sensors
21
Attacks on Cyber Space of
Pakistan
• The correlated information from different
sensors reveals that there were more than
606729 number of connection attempts to
Pakistan cyberspace from all over the
world.
• More than 63163 unique IP addresses
tried to establish a connection with
deployed sensors through-out Pakistan for
at-least one time.
22
Attacks of Cyber Space of
Pakistan
• After thorough automated analysis and
correlation, most of these connection
attempts were classified as malicious
and were doing intense scanning for
figuring out running services (particularly
the vulnerable ones) over Pakistan
cyberspace.
23
Cyber Attacks Continued …
• One of the Top IP address that established
most number of connections was found to
be 92.42.107.186 with more than 59579
connections. The origin of this IP address
was found to be Switzerland.
• One of the top IP addresses that initiated
most Malware attacks was found to be
37.115.209.228 with more than 21277
successful attacks. Origin - Ukraine
24
Preparing for Cyber Pearl Harbor
• Information Warfare is an Evolving Battlefield
25
Preparing for Cyber Pearl Harbor
(Cont’d.)
• Like what we saw in Pearl Harbor on December 7, 1941,
some candidates for a cyber "Battleship Row," may be
- core routers;
- undersea cables;
- strategic communications;
- Air defense;
- Electricity nets;
- Classified nets/financial nets;
- DNS Servers / IoTs
- Operating system....Many more
26
Preparing for Cyber Pearl Harbor
(Cont’d.)
• A successful attack on any of these targets could
have tangible Military value.
32
Way Forward (Cont’d.)
• Coordination between technology leaders
& Public sector organizations.
36
Way Forward (Cont’d.)
• Working with ISOC and other
International fora of Internet like ICANN,
WSIS and Internet Governance.
• People-Process-Products (PPP).
42