Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop
You are sitting in New Zealand s first joint research centre for cyber security Centre of Computational Intelligence for Cyber Security (CICS) 2
Reasons for founding the centre Cyber security is a major risk internationally and locally Many New Zealander s do not take cyber security seriously, and are unaware of major cyber security risks that they might encounter or to which they might expose themselves Cyber security research is an important area in the field of computing New Zealand needs graduates who are experienced in cyber security 3
Cyber Security Risks Amy Adams Communications and Information Technology Minister May 2013 In 2012 New Zealand s National Cyber Security Centre incident summary reported an increase of about 50 per cent in serious cyber intrusions when compared to 2011. By serious, we mean incidents that met a threshold of putting New Zealand government information or critical national infrastructure at risk. There were 134 of these incidents in 2012 and we think this number is likely to be the tip of the iceberg. This year already we have had 149, showing the trend of rapid acceleration continuing. 4
Cyber Security - why should we care? Cyber crime is bigger than the global black market in marijuana, cocaine and heroin combined. Globally over the last 12 months, cybercrime cost 463 billion dollars and was experienced by 431 Source: www.neowin.net million adults. In that same period cybercrime against New Zealanders cost 625 million dollars. (Statistics from NZ s National Cyber Security Centre (http://www.ncsc.govt.nz/) 5
Types of Cyber Threats Broadly - cyber crime is often aimed at getting money or information from individuals, organisations and governments Source: www.infotech4you.com 6
Types of Cyber Threats Cyber espionage often aimed at businesses (industrial espionage), government or critical infrastructure Source: www.siliconangle.com 7
Types of Cyber Threats Hacktivism usually aim at taking over a system to promote a particular cause Source: www.pcadvisor.co.uk 8
Types of Cyber Threats Cyber terrorism could be a combination of all above Source: www.pcadvisor.co.uk 9
Types of Cyber Threats Cyber bullying using information technologies to target individuals in a negative and unwelcome manner Source: www.siliconangle.com 10
Types of Cyber Threats Phishing persuading people to actions that endanger their IT systems by posing as a trusted identity Source: www.allspammedup.com 11
How could you and your students be affected by cyber crime? National infrastructure cyber criminals could take control of the power grid/govt IT systems Cyber theft people convinced by emails to give strangers money, or enter their online banking passwords, or allow cyber criminals access to their computers Cyber bullying through IT devices (including cellphones)and IT tools such as email, facebook, ask.fm, Interfering with electronic devices pacemakers can be externally controlled, which could be fatal 12
Unitec s response to these cyber threats A partnership with the National Institute of Information and Communications Technology in Japan has provided us with both a cyber security monitoring system and an attack alert system. 13
Unitec s response to these cyber threats The monitoring system Darknet Monitor System (nicter) Livenet Monitor System (nivarna) 14
Unitec s response to these cyber threats The alert system Darknet Alert System (daedalus) 15
Cyber security job opportunities There is an international shortage of cyber security professional in 2010 the US government referred to their being a human capital crisis in cyber security USA Today: The U.S. Bureau of Labour Statistics confirmed the need for a larger and more dynamic network security Key part of 2011 New Zealand Cyber Security strategy is to work with educators to meet the demand for CS graduates
Other responses to CS issues CS Research by our students and lecturers Capture the flag CS competition for schools encouraging students to learn cyber security skills with the fun and rewards of a competition Student visits to the Centre or travel to schools to expose students to the importance of this area Public Awareness working with government and industry to enhance this Continuing education courses programme of courses to be initiated in 2014
Formal programmes at Unitec Undergraduate pathway in cyber security Graduate Diploma in Cyber Security Master of Computing cyber security endorsement Doctor of Computing (professional doctorate) - theses Joint badged PhD 18
The Future Vision of the centre as a national centre New teaching programmes needed to address the demand for graduates Creation of a public awareness capability School programs Games Competitions Courses that can be credited Development of curriculum for schools Mock attacks servers 19
20
Questions 21