ciber conflictos y ciber defensa - · pdf filerespuesta y manejo de incidentes x x stride ......

20
JCM-14 All rights reserved Vista Ciber conflictos y Ciber defensa 1 Ciber conflictos y Ciber defensa Conceptos y retos Jeimy J. Cano M., Ph.D, CFE JCM-14 All rights reserved 1 Agenda Introducción Algunos apuntes sobre ciber seguridad Teoría básica de los conflictos Teoría básica de los ciber conflictos Analizando el territorio de los ciber conflictos Retos para la ciber defensa Conclusiones Referencias JCM-14 All rights reserved 2 JC JC JC JC M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig M-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rights reserved JCM-14 * All rig

Upload: vuthien

Post on 06-Feb-2018

222 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 1

Ciber conflictos y Ciber defensa Conceptos y retos

Jeimy J. Cano M., Ph.D, CFE

JCM-14 All rights reserved 1

Agenda

• Introducción

• Algunos apuntes sobre ciber seguridad

• Teoría básica de los conflictos

• Teoría básica de los ciber conflictos

• Analizando el territorio de los ciber

conflictos

• Retos para la ciber defensa

• Conclusiones

• Referencias

JCM-14 All rights reserved 2

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 2: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 2

Introducción

JCM-14 All rights reserved 3

Introducción

JCM-14 All rights reserved 4

http://paulsparrows.files.wordpress.com/2014/07/techniques-june-2014.png Tomado de: http://blog.thomsonreuters.com/index.php/tag/cyber-attacks/

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 3: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 3

Algunos apuntes sobre ciberseguridad

JCM-14 All rights reserved 5

Algunos apuntes sobre ciber seguridad

JCM-14 All rights reserved 6

Tomado de: ISO 27032 – Information Technology- Security

Techniques – Guidelines for cybersecurity.

Security Safety Security+Safety

“Evitar que el

mundo exterior

afecte al sistema”

“Evitar que el

sistema afecte al

mundo exterior”

“Asegurar que el

sistema siga

operando, sin

afectar el mundo

exterior, a pesar

de los ataques”

Sistema

Mundo

Exterior

Ataques

Impactos

y daños

Impactos

y daños

Ataques

Mundo

Exterior

Tomado de: ALXELROD, W.C (2013) Engineering Safe and Secure Software

Systems. Artech House

Ciberseguridad

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 4: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 4

Algunos apuntes sobre ciber seguridad

JCM-14 All rights reserved 7

Amenaza Definición Principio y/o

servicio de

seguridad

Spoofing Suplantar algo o alguien. Autenticación

Tampering Modificar o alterar algo en

disco, en la red o en la

memoria Integridad

Repudiation Negarse a aceptar que ha

efectuado una acción. No repudio

Information Disclosure Revelar información a una

persona no autorizada Confidencialidad

Denial of Service Consumir los recursos que

son requeridos para

prestar el servicio Disponibilidad

Elevation of Privilege Permitir a otra persona o

proceso hacer algo que no

tiene autorizado hacer Autorización

Modelo de Amenazas STRIDE. (Adaptado de SHOSTACK 2014, pág. 63)

Controles Críticos del SANS Institute

Versión 5 TI OT STRIDE

Inventario de dispositivos autorizados y

no autorizados X ST

Inventario de software autorizados y no

autorizados X ST

Configuraciones seguras para hardware

y software en dispositivos móviles,

ordenadores portátiles, estaciones de

trabajo y servidores

X TE

Remediación y Evaluación continua de

vulnerabilidades X STRIDE

Defensas frente al malware X T Seguridad en las aplicaciones X STRIDE Control de acceso inalámbrico X S Capacidad de recuperación de datos X X D Evaluación de Habilidades y formación

adecuadas en seguridad X STRIDE

Configuraciones seguras para los

dispositivos de red, tales como firewalls,

routers y switches X ST

Limitación y control de los puertos de

red, protocolos y servicios X X ST

Uso controlado de privilegios

administrativos X X STR

Validación de flujos de información entre

componentes X STRIDE

Mantenimiento, Monitoreo y Análisis de

Registros de auditoría X E

Acceso controlado con base en la

necesidad de conocer X S

Supervisión y control de cuentas de

acceso X X SIE

Protección de datos X I Respuesta y Manejo de Incidentes X X STRIDE Diseño de redes confiables X STRIDE Pruebas de Penetración y simulaciones

de ataques X STRIDE

Tabla - Vista de Controles SANS, TI, OT y STRIDE

Algunos apuntes sobre ciber seguridad

JCM-14 All rights reserved 8

Tomado de: Hathaway, Melissa. "Cyber Readiness Index 1.0." Paper, Science, Technology, and Public Policy Program, Belfer

Center for Science and International Affairs, Harvard Kennedy School, November 8, 2013.

Índice de preparación frente a la ciberseguridad

Establecer la

autoridad en el tema

a nivel nacional

Establecer el equipo

que dará respuesta a

los incidentes de

alcance nacional e

internacional

Contar con la

articulación jurídica y

los protocolos

internacionales para

la persecución de los

delitos informáticos

Establecer protocolos y

estrategias para compartir

información sensible para

incrementar la capacidad

de respuesta y

preparación de las

empresas y país.

Establecer los niveles

de inversión y las

capacidades requeridas

para producir

estándares y prácticas

relevantes en el

contexto actual y en el

futuro

Estrategia Nacional de Ciberseguridad

Equipo de atención de respuesta a incidentes

Compromiso en la lucha contra el cibercrimen

Mecanismos para compartir información

Investigación y desarrollo en ciberseguridad

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 5: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 5

Teoría básica de los conflictos

JCM-14 All rights reserved 9

Teoría básica de los conflictos

JCM-14 All rights reserved 10

Territorio

Activos

Estratégicos

Población

civil

Bando A

Bando B

Considerando las reflexiones de diferentes

analistas internacionales, podríamos definir

que un conflicto es:

“Es un enfrentamiento de dos o más posiciones

(generalmente estados) por poder, dinero y

control de activos o recursos estratégicos

ubicados en un territorio (con una población

civil), donde los adversarios son conocidos, así

como sus capacidades e intenciones para

debilitar o dominar a su contraparte.”

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 6: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 6

Teoría básica de los conflictos

JCM-14 All rights reserved 11

Bando A

Bando B

Territorio

Actividades, Operaciones, Ataques

Activos

Estratégicos

Población

civil

Armas

Tropas

Doctrina

Estrategias

Capacidades

Armas

Tropas

Doctrina

Estrategias

Capacidades

Teoría básica de los conflictos

JCM-14 All rights reserved 12

Bando A

Bando B

Territorio

Actividades, Operaciones, Ataques

Activos

Estratégicos

Población

civil

¿Qué busca?

Defender

Proteger

Debilitar

Dominar

¿Qué busca?

Defender

Proteger

Debilitar

Dominar

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 7: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 7

Teoría básica de los conflictos

JCM-14 All rights reserved 13

Territorio

Activos

Estratégicos

Población

civil

Bando A

Bando B

Capacidades

Generales Definición

Defensivas Proteger e incrementar su posición estratégica

en el dominio de operación.

Ofensivas Debilitar, comprometer, dañar o dominar su

contraparte.

Disuasivas Desanimar a su contraparte para efectuar

ataques en su contra.

Diplomáticas Negociar a través de reglas y protocolos para

cesar las hostilidades entre las partes.

Inteligencia

Recolectar y analizar información clave para

generar ventajas estratégicas, tácticas y

operativas frente a la contraparte.

Para lograr sus objetivos cada Bando desarrolla

y usa sus capacidades.

Teoría básica de los ciber conflictos

JCM-14 All rights reserved 14

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 8: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 8

Ciber conflictos

JCM-14 All rights reserved 15

Ciber espacio

Activos

Estratégicos

Actores

Bando A

Bando B

Considerando las reflexiones previamente

planteadas, podríamos definir que un

ciberconflicto es:

“Es un enfrentamiento de dos o más posiciones

(no necesariamente estatales) por poder, dinero

y control de activos o recursos estratégicos

ubicados en el ciberespacio (con unos actores),

donde los adversarios son desconocidos e

inciertos, así como sus capacidades e

intenciones para debilitar o dominar a su

contraparte.”

Ciber conflictos

JCM-14 All rights reserved 16

Bando A

Bando B

Ciberespacio

Ciber actividades, Ciber operaciones, Ciber ataques

Plataformas

tecnológicas y de

telecomunicaciones

Actores

¿Qué busca?

Defender

Proteger

Debilitar

Dominar

¿Qué busca?

Defender

Proteger

Debilitar

Dominar

Servicios,

Aplicaciones y

contenidos

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 9: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 9

Ciber conflictos

JCM-14 All rights reserved 17

Se puede considerar como una campaña que se basa exclusivamente o

principalmente en las operaciones en el ciberespacio (ciber operaciones).

Tomado de Martin Libicki, Ph.D – Rand Corporation

Ciber actividades

Ciber operaciones

Ciber ataques

Ciber guerra

Empleo de ciber capacidades cuyo principal propósito es alcanzar un

objetivo en o por el uso del ciber espacio. Tallin Manual – Pág.15

Es una ciber operación, bien sea ofensiva o defensiva, que espera

razonablemente causar lesiones o la muerte a personas o daño o

destrucción de objetos. Tallin Manual – Regla No. 30

Acciones o actividades que ocurren debajo del nivel del “uso de la fuerza”,

como puede ser la cibercriminalidad, modificación de páginas web, difusión

de propaganda terrorista por internet, entre otras. Tallin Manual – Pág.4

Ciber conflictos

JCM-14 All rights reserved 18

ciberespacio

Activos

Estratégicos

Población

civil

Bando A

Bando B

Ciber capacidades Definición

Defensivas Representadas por tecnologías de seguridad y

contramedidas técnicas en operación

Ofensivas Códigos maliciosos a la medida, ciber armas, engaños

técnicos activos o encubiertos, DDoS, entre otros.

Disuasivas

* Acciones ofensivas actuales que responden

inmediatamente a los ataques.

* Acciones ofensivas alternas que son más poderosas

que las actuales.

* Capacidades redundantes para continuar atacando,

aún se haya debilitado o comprometido sus defensas.

* Desarrollo de ciber armamento con capacidades no

conocidas.

Diplomáticas Negociar a través de reglas y protocolos para cesar las

hostilidades entre las partes. (Tallin Manual)

Inteligencia Recolectar y analizar información clave para generar

ventajas estratégicas, tácticas y operativas frente a la

contraparte. (Honeynets abiertas y encubiertas)

Para lograr sus objetivos cada Bando desarrolla

y usa sus ciber capacidades.

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 10: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 10

Analizando el territorio de los ciber conflictos

JCM-14 All rights reserved 19

Ciber espacio

JCM-14 All rights reserved 20

Contexto físico

Plataforma tecnológica

Plataforma de telecomunicaciones

Fundamentos lógicos

Software base y especializado

Servicios disponibles

Contenidos

Almacenados Transmitidos Transformados

Actores Entidades y usuarios con diferentes intereses y roles que participan

Adaptado de: CLARK, R. y KNAKE, R. (2010) Cyber war: The next threat to National Security and what to do about it. HarperCollins.

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 11: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 11

Ciber espacio

JCM-14 All rights reserved 21

Atemporal e instantáneo

Ubicuo

Permeable

Fluido Participativo

Múltiples identidades

Autoregulado

Características

Del

Ciber espacio

Adaptado de: CHOUCRI, N. (2012) Cyberpolitics in international relations. MIT Press. Pág.4

En todas

partes

Transnacional

Revolución

permanente

Universal y

popular

Anonimato

Neutralidad

Uso de actores no-estatales

JCM-14 All rights reserved 22

Uso de actores

no-estatales para

desarrollar ciber

conflictos

Tomado de: Cyber warfare. Jukko Vankka. National Defence University. Irlanda. 2014

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 12: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 12

Ciber ataques

JCM-14 All rights reserved 23

“Acciones no autorizadas realizadas de un

sistema informático a otro, en el cual se

comprometen la confidencialidad, la

integridad y la disponibilidad del objetivo o

la información allí residente.

Adaptado de: Institute for Security Technologies Studies

y Ponemon Institute.

Gráfica tomada de: http://www.time.com/time/business/article/0,8599,2079423,00.html

Empleo de ciber capacidades cuyo principal propósito es

alcanzar un objetivo en o por el uso del ciber espacio.

Tallin Manual – Pág.15

Ciber ataques

JCM-14 All rights reserved 24

Profundidad

Am

pli

tud

Superficial Profundo

Amplia

• Lista amplia de objetivos

• Efectos limitados no-destructivos de la

infraestructura digital

• Daños colaterales limitados

• Lista amplia de objetivos, asociados

con infraestructura crítica

• Efectos ilimitados destructivos tanto

de la infraestructura digital como de

la física y pérdidas humanas

• Daños colaterales impredecibles

Cerrada

• Limitada cantidad de objetivos

• Efectos limitados no-destructivos de la

infraestructura digital

• Daños colaterales limitados

• Objetivos seleccionados

• Efectos ilimitados destructivos tanto

de la infraestructura digital como de

la física y pérdidas humanas

• Daños colaterales pero predecibles

Tomado de: Naval Postgraduate School (2014) Deterrence and cyber-weapons. Pág.26

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 13: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 13

Ciber armas

JCM-14 All rights reserved 25 Gráfica y texto tomado de: http://hackmageddon.com/2012/04/22/what-is-a-cyber-weapon/

Precisión - Capacidad de

atacar sólo el objetivo

específico y reducir los daños

colaterales.

Intrusión - Nivel de

penetración en el interior del

objetivo.

Visibilidad - Capacidad de ser

detectados.

Facilidad de implementar -

Recursos necesarios para

desarrollar el arma informática

específica.

Ciber armas

JCM-14 All rights reserved 26

Características de

las ciber armas

Invisibilidad

Componentes no detectables

Remoción de rastros

Desactivación/Autodestrucción

Mutación, Expansión y ocultamiento

Operación

Dragonfly

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 14: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 14

Retos para la ciber defensa

JCM-14 All rights reserved 27

Riesgo sistémico

Generación C

JCM-14 All rights reserved 28 http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 15: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 15

Riesgos Globales

Generación C

JCM-14 All rights reserved 29 http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2014.pdf

Contexto actual del ciber espacio

JCM-14 All rights reserved 30

Grandes datos y analítica

Redes sociales

Computación móvil

Computación en la nube

Internet de las cosas

Generación C

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 16: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 16

Nueva carrera ciber armamentista

JCM-14 All rights reserved 31

Tomado de: http://www.impomag.com/articles/2007/03/protecting-your-plant-attack-how-keep-facilities-safe-physical-or-cyber-aggression

Ciber amenazas

JCM-14 All rights reserved 32

To

ma

do

de

: http

://ww

w.a

lme

nd

ron

.co

m/trib

un

a/la

s-c

ibe

rce

lula

s-u

na

-

ca

pa

cid

ad-p

ara

-la-c

ibe

rse

gu

rida

d-y

-la-c

ibe

rde

fen

sa-n

acio

na

les/

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 17: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 17

Ciber riesgos

JCM-14 All rights reserved 33

Lo que conoce

la NACIÓN

Lo que desconoce

la NACIÓN

Lo que conoce

el entorno

Lo que

desconoce

el entorno

Conocidos Latentes

Focalizados Emergentes

Ciber terrorismo, Ciber

espionaje, ciber armas,

Amenazas persistentes

avanzadas, iframes

Ciber crimen, ciber

acoso, ciber fraudes,

ramsonware, fuga de

información

Ciber ataques, ciber

sabotaje, Hacktivismo,

vulnerabilidades

SCADA

Ciber conflictos, Técnicas

de evasión avanzadas,

forensia ofensiva

Ventana de AREM- Instrumento Creado y desarrollado por: Jeimy J. Cano M., Ph.D

Desarrollo y aplicación de ciber capacidades

JCM-14 All rights reserved 34

Postura Defensiva. Tomado de: http://www.linkedin.com/today/post/article/20140321192402-

1699356-defensible-security-posture-part-1 Tomado de: http://www.itu.int/osg/csd/cybersecurity/gca/new-gca-brochure.pdf

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 18: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 18

Resiliencia Empresarial y Nacional

JCM-14 All rights reserved 35

http://www.weforum.org/reports/risk-and-responsibility-hyperconnected-world-pathways-global-cyber-resilience

Conclusiones

JCM-14 All rights reserved 36

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 19: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 19

Ciber seguridad y Ciber defensa

JCM-14 All rights reserved 37

Ciber seguridad

Estándares y aseguramiento

de su cumplimiento

Regulaciones y normas

Marco de entrenamiento

y formación

Proveedores de Hardware y

software

Responsabilidad ejecutiva

Ciber defensa

Capacidades Ofensivas

Capacidades defensiva

Capacidades disuasivas

Capacidades de Inteligencia

Capacidades diplomáticas

INVESTIGACIÓN, DESARROLLO E

INNOVACIÓN

(I+D+i)

Diferencia entre los conflictos tradicionales y los

ciber conflictos

JCM-14 All rights reserved 38

Conflicto tradicional Ciber conflictos

El espacio del conflicto esta separado de los civiles. El espacio del conflicto es donde los civiles viven y

trabajan.

Las tecnologías ofensivas y defensivas generalmente están

balanceadas.

Las tecnologías ofensivas, con el tiempo, superan a las

tecnologías defensivas.

Se presume y advierte la presencia del adversario. La presencia del adversario es inestable, imperceptible y

generalmente incierta.

Las capacidades de los actores no-estatales es mínima. La capacidad de los actores no-estatales es relativamente

grande.

Las fronteras nacionales son importantes Las fronteras nacionales son irrelevantes

Se entienden con claridad los ataques y el espionaje como

amenazas de seguridad.

No se diferencia con claridad entre un ataque y las

acciones de espionaje.

Los efectos de los conflictos son razonablemente

predecibles.

Los efectos de los conflictos son difíciles de predecir o

controlar.

En consecuencia: Lo que sabemos sobre los conflictos tradicionales no se puede aplicar a los ciber conflictos

Adaptado de: LIN, H. (2014) Thoughts on cyber conflict and cyber warfare. Presentación Curso. Cybersecurity: The

intersection of policy and technology. Harvard Kennedy School. Jul 27-Ago 1.

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

Page 20: Ciber conflictos y Ciber defensa - · PDF fileRespuesta y Manejo de Incidentes X X STRIDE ... articulación futurojurídica y los protocolos internacionales para ... Ciber conflictos

JCM-14 All rights reserved Vista

Ciber conflictos y Ciber defensa 20

Referencias • CHOUCRI, N. (2012) Cyberpolitics in international relations. MIT Press.

• CLARK, R. y KNAKE, R. (2010) Cyber war: The next threat to National Security and what to do

about it. HarperCollins.

• MIRO LIINARES, F. (2012) El cibercrimen. Fenomenología y criminología de la delincuencia en el

ciberespacio. Ed. Macial Pons.

• CANO, J. (2013) La ventana de AREM. Una herramienta estratégica y táctica para visualizar la

incertidumbre. Blog IT-Insecurity. Disponible en: http://insecurityit.blogspot.com/2013/06/la-

ventana-de-arem-una-herramienta.html

• SEGURA SERRANO, A. y GORDO GARCÍA, F. (Coords) (2013) Ciberseguridad global.

Oportunidades y compromisos en el uso del ciberespacio. Universidad de Granada.

• STRAND, J. y ASADOORIAN, P. (2013) Offensive countermeasures: The art of active defense.

<sin editorial>

• NAVAL POSTGRADUATE SCHOOL (2014) Deterrence and cyber-weapons. Master Thesis.

• ALXELROD, W.C (2013) Engineering Safe and Secure Software Systems. Artech House.

• SHOSTACK, A. (2014) Threat modeling. Designing for security. John Wiley & Sons. Boulevard,

Indianapolis.

• MOWBRAY, T. (2014) Cybersecurity. Managing systems, conducting testing, and investigating

intrusions. John Wiley & Sons. Indianapolis.

JCM-14 All rights reserved 39

Jeimy J. Cano M., Ph.D, CFE

Blog:

http://insecurityit.blogspot.com

JCM-14 All rights reserved 40

Ciber conflictos y Ciber defensa Conceptos y retos

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved

JCM-14 * All rights reserved