Date post: | 17-Dec-2015 |
Category: |
Documents |
Upload: | doreen-curtis |
View: | 218 times |
Download: | 2 times |
Cyber Threat MatrixVersion 2.4
• James N. Smith, MBA, CISSP• Lead Cyber Security Strategist,
Blue Reef Group• Instructor of Information Systems,
Georgia Southern University• 14 years experience in information
technology and security management
Combat
Infrastructure
Espionage
Financial
Political
Propaganda
Nuisance
Complexity
Intensity
Lone Organized Green Wikileaks / Non-state Developing DevelopedHacker Crime Revolution Anonymous Actors Nations Nations
Cardersmarket DowCares
SIPRNet
AlQueadaInspire
VOA
Iraq/AFDrone hack
AntiglobalizationDefacement
BBM FlashMob
Bradley Manning
Combat
Infrastructure
Espionage
Financial
Political
Propaganda
Nuisance
Complexity
Intensity
Lone Organized Green Wikileaks / Non-state Developing DevelopedHacker Crime Revolution Anonymous Actors Nations Nations
• Crime• War• Activism / Command & Control /
Propaganda
CRIME
• Three catalysts• Lack of law or order• Financially & technologically
connected• Bright, educated & dissatisfied labor• Present: Russia• Future: Egypt maybe, Africa,
definately
Current Internet “backbone”
Under Construction
War, C4I
• 1st world great powers (US, GER, JAP)• Rising powers (China, India)• Middleweight class (Isreal)
Activism, C4I, Propaganda
• Mexico / cartel war• Stateless actors (Al Qaeda, Wikileaks,
Anonymous)• Non-state actors: causes, organization,
revolutionaries, terrorists (amnesty international, civil rights movement, green revolution, ISIS)
• Anyone needing asymmetric force multiplication
www.bluereefgroup.com
105 River Hills Lane, Macon, GA 31211 USA
+1.478.227.8043
Cyber Security Strategies for the Global Business Environment