Download - Stu r33 a
![Page 1: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/1.jpg)
Session ID:
Session Classification:
Richard M. George Johns Hopkins University Applied Physics
Laboratory
STU-R33A
General Interest
Life as a Target
![Page 2: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/2.jpg)
► Emerging Threats Emerging Targets
► Threat/Adversary Model
► Resources/capabilities
► Intent/motivation
► Access
► Risk aversion
![Page 3: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/3.jpg)
► Espionage and Nuclear weapons
► After strategic information – nothing personal
► Attribution is easy
► Symmetric world
Soviet Union
![Page 4: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/4.jpg)
► Walker
► Great Seal
► Gunman
► State Department chair rail
Examples – One a Decade
![Page 5: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/5.jpg)
► Money Plastic
► Value of GM versus Value of Google
► Threat/Adversary Model is similar, but the game is
asymmetric
The World has Changed
![Page 6: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/6.jpg)
► Many adversaries – Intent and Motivation?
► Want information worth money
► Gov’t – 41,000 attacks
► 60,000 unique malware a day
► RSA, Lockheed-Martin; NASDAQ; MITSUBISHI,
DIGINOTAR
Today’s World
![Page 7: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/7.jpg)
► Attribution is hard
► Asymmetric – offense is cheap, defense is hard and
expensive
► Access? Person in bar person in his own house
► Risk aversion? Sent home already home
Issues We Face
![Page 8: Stu r33 a](https://reader035.vdocuments.fr/reader035/viewer/2022081216/58855bdb1a28ab47268b64f3/html5/thumbnails/8.jpg)
► Today we are all targets – not a fair game
► Technology is an enabler – for user and attacker
► It all comes down to people – taking risks, making
mistakes, sharing risks
► We need technology to protect the user, in addition to
user training
Lessons Learned - Summary