ict security 2011 - cyberwarfare: intelligence penetration_response
DESCRIPTION
TRANSCRIPT
![Page 1: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/1.jpg)
CYBERWARFAREintelligence, penetration and response
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
1
martedì 3 luglio 12
![Page 2: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/2.jpg)
EMANUELE GENTILI
Amministratore unico di Tiger Security S.r.l.
Offensive Security Certified Professional Trainer
Security and Cyber Intelligence Advisor
European Project Leader BackTrack Linux
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
2
martedì 3 luglio 12
![Page 3: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/3.jpg)
OBBIETTIVI DEL WORKSHOP
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
3
I) Dimostrare che la guerra digitale esiste ed e’ praticata quotidianamente.
II) Dimostrare che il governo cinese applica politiche offensive nel cyberspace.
III) Dimostrare che esiste la necessità di proteggere infrastrutture informatiche in modo proattivo.
martedì 3 luglio 12
![Page 4: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/4.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
4
LA CYBERWARFARE
martedì 3 luglio 12
![Page 5: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/5.jpg)
LA CYBERWARFARE
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
5Ethical Hackers Black Hat HackerHacktivisti
Collaborazione
Aziende, Banche e PrivatiGoverno BGoverno A
Attacchi inform
aticiProfilazione e contrasto
Atta
cchi
info
rmat
ici
Collaborazione
Profilazione e contrasto
Attacchi informatici
?
martedì 3 luglio 12
![Page 6: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/6.jpg)
HACKTIVISTI VS GOVERNI
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
6
martedì 3 luglio 12
![Page 7: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/7.jpg)
HACKTIVISTI VS AZIENDE
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
7
martedì 3 luglio 12
![Page 8: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/8.jpg)
BLACKHAT VS AZIENDE, BANCHE E PRIVATI
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
8
martedì 3 luglio 12
![Page 9: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/9.jpg)
GOVERNI VS HACKTIVISTI
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
9
martedì 3 luglio 12
![Page 10: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/10.jpg)
GOVERNI VS BLACKHAT
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
10
martedì 3 luglio 12
![Page 11: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/11.jpg)
GOVERNI VS GOVERNI
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
11
2 giugno 2011
Dalla Cina vengono attaccati alcuni account gmail di alti funzionari e politici del governo americano.Pentagono: “Agli attacchi hacker potremmo rispondere con le bombe.”
martedì 3 luglio 12
![Page 12: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/12.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
12
I PROCESSI OPERATIVI
martedì 3 luglio 12
![Page 13: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/13.jpg)
CYBERWARFARE: IL PROCESSO OPERATIVO DI OFFESA
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
13
Cyber Intelligence AttivitàPenetration
TARGET
martedì 3 luglio 12
![Page 14: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/14.jpg)
CYBERWARFARE: IL PROCESSO OPERATIVO DI RESPONSE
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
14
Attività di verificaSpegnimento ed
acquisizione dei server in produzione
Individuazione di un problema/anomalia
Analisi ed Investigazione
martedì 3 luglio 12
![Page 15: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/15.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
15
L’APPROCCIO CYBER MILITARE CINESE
martedì 3 luglio 12
![Page 16: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/16.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
16
L’ORGANIZZAZIONE CYBER MILITARE CINESE
23 Agosto 2011
martedì 3 luglio 12
![Page 17: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/17.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
17
L’ORGANIZZAZIONE CYBER MILITARE CINESE
martedì 3 luglio 12
![Page 18: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/18.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
18
L’ORGANIZZAZIONE CYBER MILITARE CINESE
martedì 3 luglio 12
![Page 19: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/19.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
19
DOMANDE ?
martedì 3 luglio 12
![Page 20: ICT Security 2011 - Cyberwarfare: intelligence penetration_response](https://reader033.vdocuments.us/reader033/viewer/2022051609/547d6d4bb47959a2508b4910/html5/thumbnails/20.jpg)
ICT Security 2011 - 8 Novembre 2011 RomaCyberwarfare: intelligence, penetration and response - Emanuele Gentili [email protected]
20
GRAZIE PER L’ATTENZIONE.
Emanuele Gentili
http://twitter.com/emgent
martedì 3 luglio 12