Professional Documents
Culture Documents
025 CryptoMagazine en 1810
025 CryptoMagazine en 1810
025 CryptoMagazine en 1810
Crypto
goes cyber
Focus
3 | FOCUS
Crypto goes cyber
Crypto goes cyber
As Crypto now focuses exclusively on international operations, it can respond to its customers' needs and
requirements even more effectively than it already did. The company is now strengthening the crypto offering
6 | Threats in cyberspace – and developing a comprehensive cybersecurity portfolio tailored to the increasingly complex cybersecurity
and how to protect against them needs of international customers.
Publication details The topic of cybersecurity is becoming increasingly important, you will endanger the most valuable asset you have as a country
Published twice a year | Print run | 3050 (English, French,
especially in the governmental sector. Effective cybersecurity – your sovereignty, your security and your stability", says
Anders Platoff Spanish, Russian, Arabic) is an absolute must to preserve and protect the sovereignty, Anders Platoff, CEO of the Crypto International Group.
CEO Publisher | Crypto International AG, Zugerstrasse 42, security and stability of a country. There is an increasing aware-
6312 Steinhausen, Switzerland, www.crypto.ch
Crypto International Group ness of that, as well as of the prevalence of attacks and their As an independent supplier of cybersecurity and encryption
Editor-in-chief | Tanja Dahinden, Crypto International AG, likely consequences. "We are seeing rapid growth in the cyber- solutions, Crypto uses its expertise to advise customers and
T +41 41 749 77 22, F +41 41 741 22 72, tanja.dahinden@crypto.ch
security market, and our customers in the governmental sector work with them to develop solutions that are perfectly matched
Reproduction | Free of charge with the consent of the editorial office.
Courtesy copies requested. Copyright Crypto are leading the way. It has become obvious that there is no to their specific requirements in order to preserve and protect
Illustrations / photo credits | Aekkaphob/Shutterstock: p. 17 |
longer any other option, cyber threats and attacks are an in- those assets. This is the company's vision.
Crypto: pp. 2, 5, 19 | Shutterstock: Cover, pp. 3, 4, 6, 9, 10, 12, 14, 15, 17, 18 creasing reality and without sufficient protection against them,
CryptoMagazine 2 / 18 | 3
Focus Focus
Crypto will further strengthen its offering, and develop a Therefore the company is expanding both its product and About Anders Platoff
Crypto can provide comprehensive comprehensive cybersecurity portfolio tailored to the increas- service portfolio to meet customers' cybersecurity require- Anders Platoff is the CEO of the Crypto International
solutions including encryption, ingly complex cybersecurity needs of our international ments more effectively. Dialogue with our customers is vital in Group and a proven manager with extensive experience
customers. The fusion of our unique high assurance expertise the context of developing new solutions. Crypto acts as a across multiple industries. Platoff started out as a fighter
which is a core element in and cybersecurity will be highly valuable for our customers, partner to its customers, advising and assisting them in all pilot in the Swedish Air Force. He left the Air Force in the
effective cybersecurity. who understand the true value of protecting their nation and cybersecurity and encryption matters. The fundamentals of late 1990s to join Ernst & Young Management Consulting
citizens against attacks. the strategy are the excellent relationships and partnerships as a manager. Thereafter leadership positions followed
with its customers all over the world. for several years before Platoff joined the highly success-
ful Gaia leadership as a managing partner. He then left
The uniqueness of Crypto
Crypto acts as a partner to its the management consulting firm in order to take on the
Crypto is the world leader in high-end information security, role as CEO of the Crypto International Group.
and has been leading the way in the related area for more than customers, advising and assisting
half a century. This competence, experience and customer them in all cybersecurity and As a managing partner at Gaia Leadership, he worked
closely with Andreas Linde and his former management
encryption matters.
focus makes Crypto an exceptionally strong brand. Customers
trust Crypto because of their experience with Crypto's pro- team for several years.
ducts over time. They are also aware of the unique knowledge
of its longstanding staff and the effectiveness of its systems and Anders Platoff is 50 years old, married and a father of
products. Platoff is positive: "We can – in contrast to our Dialogue is key one daughter and two sons, 20, 18 and 11 years old.
competitors – provide comprehensive solutions including Crypto is intensifying its dialogue with existing and potential
encryption, which is a core element in effective cybersecurity. customers to respond to their cybersecurity requirements more
We understand the technical requirements that need to be met effectively and with greater agility, developing and delivering
in the governmental sector." These factors have rendered out- tailor-made solutions. It is essential to anticipate cybersecurity
standing relationships with customers all over the world. With trends at an early stage and to offer our customers state-of-
a clear and experienced management structure, in addition to a the-art solutions at all times.
clear focus on the international market, Crypto is now deliver-
ing even better products and services.
Cyberspace is the virtual space made up of every IT-networked In the World Economic Forum's Global Risks Report 2018,
system in the world and therefore incorporates practically all cyberattacks are cited alongside natural disasters as one of the
modern information and communications technology. The greatest dangers of the future: they have a high likelihood of
constant stream of new applications for information technolo- occurring, and the potential for damage is huge. According to
gy means that cyberspace is getting bigger by the day and is the study, companies reported four billion incidents of data
becoming increasingly interconnected with the non-virtual theft in 2016 – more than in the two previous years put
world. Organisations operating in cyberspace edit and store together. However, the most frequent and fiercest cyberattacks
their data digitally and delegate control of their processes to are directed at governments and armed forces. These organisa-
software applications. tions are under almost constant attack because they hold highly
sensitive data, which potentially relates not only to the security
This digitalisation and networking brings enormous benefits and sovereignty of the country but also to the private lives of
to organisations – in terms of efficiency, for example – but it its citizens. Public infrastructure is also becoming increasingly
also exacerbates the very real threats they face. Although all vulnerable as a result of advancing digitalisation.
organisations have access to comprehensive cybersecurity
measures, cyber attackers are also constantly professionalising The arsenal of cyber criminals
their operations. Whereas attackers often used to work alone, Although cyber criminals focus on organisations as a whole,
today they operate systematically as groups with military, attacks are often directed at employees' devices, which can
political or economic motives – or a combination thereof. serve as a "springboard" for penetrating deeper levels of the
IT infrastructure. These attacks aim to exploit carelessness on
the part of staff. If cyber attackers send 100 emails a year to
10,000 employees of an organisation, this corresponds to a
million infiltration attempts. For the attackers, an operation
Cyberattacks are one of the greatest of this kind requires relatively little effort. However, a single
dangers of the future. successful attempt is enough to penetrate an organisation's
IT system.
in order to be successful: speed and ease of use. To this end, Organisations working with sensitive data at different classifi- absolute certainty if they wish to
programmers incorporate shortcuts into their command cation levels must protect this with absolute certainty if they safeguard the integrity, authen-
protocols. These are often accompanied by compromises in wish to safeguard the integrity, authenticity, confidentiality
terms of security as they expand the range of potential target and availability of their data. Hardware components therefore ticity, confidentiality and availa-
spaces and provide gateways for cyber attackers to exploit. represent an indispensable element of cybersecurity. In bility of their data.
Attacks are carried out in a targeted manner, for example by hardware-based encryption and decryption units, the cryp-
implanting malware into the system. This is often done using tographic calculations are performed in a protected environ-
"drive-by exploits": when a user visits a specially prepared ment inside the hardware. Neither the encryption method nor
(counterfeit) website, malware is downloaded automatically in the keys can be tampered with by software applications, The combination is crucial defensive measures but also preventive and offensive capabili-
the background – and the attack goes unnoticed. malware or people. There are various ways to implement hardware into an IT ties. It spots attacks at an early stage, tracks and destroys
system: on add-on cards for a PC, on single-chip processors, malware within the system, and entices attackers with so-called
The software industry is conscious of these dangers, and a Only hardware modules are able to generate secure keys, which or in stand-alone devices with a single IT-related application, "honeypots": as seemingly easy prey, these simulated IT infra-
number of software-based applications promise protection must be totally random and changed on a regular basis. Even if such as network encryption. A further advantage of hardware structures lure in cyber attackers and then collect information
against cyberattacks. However, these applications themselves an attacker can break into the operating system or the software components is their speed. In addition, hardware modules can about them while the actual IT infrastructure remains protect-
suffer from numerous vulnerabilities and can be infiltrated by applications, the keys and cryptographic parameters and be used for decades – even as the software applications they ed. Software forms an essential part of these capabilities. For
cyber attackers. This often involves exploiting human weak- calculations remain fully protected inside the hardware. This protect continue to evolve. effective protection against cyberattacks, therefore, the com-
nesses – including, for example, the careless use of passwords, can also be "hardened" using hardware modules that regularly bination is crucial – but hardware remains indispensable.
which are sometimes stored in unencrypted documents. In check whether software has been infiltrated. If this is the case, Hardware modules ultimately represent a static security
many cases, access codes are also changed infrequently – a big countermeasures are initiated immediately, such as by sending measure as part of an overall cybersecurity strategy. However,
mistake! Moreover, there is also a risk of cyber espionage using an alert or even forcing a system stoppage. an intelligent IT security system can call upon not only
Security (ENISA) assists member states of the European Union The OSCE framework also considers the use of cryptography to
with developing and implementing strategies of this kind and be one of the good practices for improving cybersecurity and
also with sharing expertise. for protecting higher security zones. The use of hardware-based
encryption and a proprietary algorithm can thwart especially
Ultimately, governmental and military organisations as well as perfidious cyberattacks involving activities such as infiltrating
private businesses are called upon at organisational level to and spying on computer networks by means of masquerading,
tackle the issue of protecting their infrastructure from cyber- manipulating and eavesdropping on classified data and plant-
space attacks. To analyse a given threat situation, technical ing malware. The confidentiality, authenticity and integrity of
experts employ what they call honeypots, i. e. systems inten- the data warranting protection are always ensured in this
tionally configured to be insecure. They give the impression of approach. The OSCE plays a major role in this topic and is
being real control systems in order to lure potential attackers, working on implementing UN guidance with groups of
whose attacks are then recorded and evaluated. governmental experts.
The task of making the world a more peaceful place is anything peacekeeping forces have attended to over 70 missions in total.
but straightforward, and negotiations between parties involved The UN's missions can incorporate a variety of tasks, such as
in a conflict often drag on for many months or years. The UN delivering humanitarian aid, monitoring ceasefire agreements,
frequently plays a central role as a mediator in such talks. As a and disarming rival factions in civil wars. Furthermore, the UN
neutral party, it is tasked with listening to the parties to a is able to set up Commissions of Inquiry in conflict areas,
conflict, communicating proposals and offers, and conveying mediate in the field, establish buffer zones, and supervise
counteroffers until both sides come to the table and, ideally, conditions and sanctions.
reach an agreement.
Deployment is not without risks
In the early stages of negotiations, UN mediators are often A UN peacekeeping mission requires the approval not only of
required to engage in open discussions with the various parties the countries in which it will take place but also of all parties to
– either in person or by telephone. This is only possible if the the conflict. The aim is to prevent UN troops from getting
parties can be certain that the UN will ensure the security, caught in the crossfire. Nevertheless, Blue Helmets carry
confidentiality and integrity of information entrusted to it at weapons and are permitted to use them in certain circumstanc-
all times. A breach of information security would lead to an es – in particular for self-defence. It is clear from these safety At present, over 110,000 representatives of peacekeeping
almost irreparable loss of trust. Peace talks would be discon- precautions that peacekeeping missions are often risky and missions are deployed on behalf of the UN in around a dozen
tinued if either party suspected that the opposite side was dangerous. Especially in the field, it is therefore essential to conflict areas.
eavesdropping on their discussions with the mediator. ensure effective and tap-proof communication channels – just
as for regular armed forces. This is the only way to protect
The technological capabilities now exist to listen in on confi- UN soldiers and to ensure the credibility and neutrality of
dential discussions, and the use of such technology cannot peace brokers.
be ruled out even in conflicts between parties with limited
financial resources. For example, this may be facilitated by core tasks. "After all, cyberattacks that threaten international with other states. For example, specific proposals included that
friendly relations between one party and a great power that stability and peace represent a serious and steadily growing states exchange information on instances of cyberattacks.
is sympathetic to its cause. The topic of cybersecurity is not threat," she says. According to Crespo, the UN is primarily
only of concern to the UN in the concerned with attacks that could have grave consequences in Crespo emphasises that, so far, member states remain solely
Frigate
Drone
Embassy Commando truck
Whether in strategic or operational / tactical applications, secure satellite links allow reliable and highly secure
communication at all times, even in environments without adequate terrestrial communication infrastructure,
Ministry of Defence
meeting the needs of armed forces for total autonomy, mobility and security as well as ensuring global com-
mand support.
Branch office
In principle, satellite links involve disseminating information strategic, operational and tactical level. Ultimately, the IP VPN Vessel
over areas spanning entire regions of the world. Secure en- encryption solution from Crypto was integrated into the Traveller
Manpack VIP helicopter
cryption is the only reliable way to protect sensitive informa- current satellite network infrastructure, incorporating the
tion against eavesdropping or even tampering. existing Network Operation Centre (NOC) and Security
Fast patrol boat
Operation Centre (SOC) for monitoring and operational
Accordingly, governmental organisations such as a foreign purposes. IP VPN encryption solutions from Crypto ensure
ministry or ministry of defence, for example, have comprehen- that the confidentiality, authenticity and integrity of informa- VIP limousine
sive and extremely stringent requirements for a global satellite tion are protected at all times on a global basis.
VIP jet
network. For example, highly secure connectivity must be
ensured for stationary participants at all times. It is also Maritime patrol aircraft
essential to use universal technology for transmitting different
services such as voice, video or data. Moreover, centralised Successful command support
security management is needed in order to ensure the effective
administration of communication relations and user groups.
thanks to maximum autonomy
and total information security.
Flexible scalability and universal networking
In order to meet the catalogue of requirements and provide
the customer with a comprehensive and highly secure solution,
an IP-based satellite network was implemented with a view to The installed solution allows the customer to scale both the A satellite network with highly secure
delivering command support to armed forces leadership at the network and the bandwidths and therefore to adapt these encryption extends across all strategically
flexibly to the different deployment scenarios in the field. important parts of the world. IP VPN Voice Video Data
Furthermore, the customer enjoys access to tailor-made user
and authorisation management, including the definition of
communication groups. Cryptographic parameters are created
and administered – both offline and online – using the cen-
tralised Security Management Centre SMC-1100. The customer
therefore has an encrypted satellite network extending across
all strategically important parts of the world. Highly secure, constant connectivity
With its IP VPN encryption solutions, Crypto provides highly Independent operation
effective protection for all common technologies in the infor- The entire satellite network, which covers almost every part sensitive information – the information cannot be utilised
mation networks of today. Crypto's experts ensure comprehen- of the world, can be operated autonomously by the local sys- by third parties, and any tampering is detected, logged and
sive knowledge transfer to the local system administrators tem administrators, who act as service providers to the users. eliminated immediately.
and offer a wide range of testing and training services at the
Crypto Academy. Total security Constant availability
Crypto's unique security architecture safeguards the confi- The secure satellite network ensures constant availability
dentiality, integrity and availability of and fail-safeness.
Crypto International AG
Zugerstrasse 42
6312 Steinhausen
Switzerland
T +41 41 749 77 22
F +41 41 741 22 72
crypto@crypto.ch
www.crypto.ch