+ All Categories
Home > Technology > Gov 2.0 public 2.0 bad guys 2.0 v3

Gov 2.0 public 2.0 bad guys 2.0 v3

Date post: 29-Nov-2014
Category:
Upload: frocomm-australia
View: 409 times
Download: 2 times
Share this document with a friend
Description:
Dr Rodger Manning, Qinetiq at Frocomm 3rd Annual Gov 2.0 Conference 2011
Popular Tags:
18
www.QinetiQ.com. au © Copyright QinetiQ Pty. Ltd.2011 QinetiQ Proprietary Gov 2.0, People 2.0 and Bad Guys 2.0 A Presentation to : Gov 2.0 Conference 14 th June 2010 Dr. Rodger Manning, QinetiQ
Transcript
Page 1: Gov 2.0 public 2.0 bad guys 2.0 v3

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd.2011

QinetiQ Proprietary

Gov 2.0, People 2.0 and Bad Guys 2.0

A Presentation to : Gov 2.0 Conference14th June 2010Dr. Rodger Manning, QinetiQ

Page 2: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Overview

• Gov 2.0

• National Broadband Network

• Public 2.0

• Bad Guys 2.0

• Concluding Remarks

2

Page 3: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

ListeningAllows me to

Talk to Government

Efficiency

Education & Empowerment

Reacting

InnovationOpening up GovernmentMaking Tougher

Choices

Engaging with YouthsNew Ways of

Working

Allows Government to

Talk to Each Other

Gov 2.0

3

….is a good thing

Democracy

Page 4: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

National Broadband Network

Overwhelming public support

Some implications…

• Downloads are faster

• Mass hardware upgrades will likely follow

• Upload speeds are faster

• It’s always on

• Prices fall, open/public access grows rapidly

• Home and SMB use of WiFi explodes

4

….is a good thing

77% of Internet Users agree that the NBN is a good thing1

1Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology

Page 5: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Public 2.0

• 80.1% Internet penetration by capita

• 3rd largest Tweater by capita

5

….are ready

….are frustrated?

44%53 %

2007 2009

Respondents disagreeing with:

By using the Internet will people like you have more say about what the government does?

Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology

Page 6: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Public 2.0

• Capped access

• Expensive Internet access

• 25th out of 34 (OECD Survey, 2010)

• ~Double the United Kingdom

6

….are restrained

Source – OECD

Page 7: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Bad Guys 2.0 are…

• Empowered

• Diverse and unseen

• Pranksters

• Hackivists

• Criminals

• Individual and organised

• Terrorists

• Stated sponsored

• Innovative

• Successful

Page 8: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

What do we see?

8

Gov 2.0

Public 2.0NBN

OpenAccountableResponsive

Efficient Government

FasterBetter

Cheaper

EmbracingReady

Innovative

OPPORTUNITY

Page 9: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

What do Bad Guys 2.0 see?

9

Gov 2.0

Public 2.0NBN

InformationBrand

Access

Business FacilitatorInformation

AccessVictim

OPPORTUNITY

Page 10: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

The Web2.0 Landscape

10

Page 11: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Implications

• Nearly every common aspect of online evildoing is accelerated by on always on Web 2.0 environment

• Phishing and identity theft

• Data theft

• Infection/compromise of servers and PCs, for:

• Spamming

• Criminal Hosting: Malware, fast flux, illegal content, Phishing, etc.

• DDOS attacks and Cyber Extortion

• Libel, defamation, character assassination, disinformation

11

Page 12: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Implications

• Social engineering will become a primary attack vector

• Public 2.0 make it easy

• Profile 21 year old female

• 2000 random people

• 94% in 7 days

• 31% of users who took less than 2 lines of convincing where IT security workers

12

Page 13: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Robin Sage Case Study

13

Page 14: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Generic Case Study

14

Page 15: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

Generic Case Study

15

Page 16: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

I’m Not Making This Stuff Up

16

Page 17: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

What Can We do?

• Know your vulnerabilities

• DSD strategies

17

Page 18: Gov 2.0 public 2.0 bad guys 2.0 v3

QinetiQ Proprietary

www.QinetiQ.com.au© Copyright QinetiQ Pty. Ltd. 2011

What Can We do?

• Know your vulnerabilities

• DSD strategies

• Awareness and Training

• Teach your staff about risks to data, privacy, systems and customers

• Public awareness

• Policy & Governance

• Prepare guidance for networked employees

• Victorian State Government risk assessment

• Stop and Think

• How might the bad guys exploit this?

• Monitor

• Understand “Internet Footprint” and monitor yours to minimise risk

18


Recommended