CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE (3097169) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

ETHICAL HACKING.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Network Security of The United States of America By: Jeffery T. Pelletier.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
Computer Crime and CyberCrime Why we need Computer Forensics.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Study Results Advanced Persistent Threat Awareness.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
+ Police Investigations. + Arriving at the Crime Scene When they arrive, there are 3 tasks to perform: 1. Call and ambulance and assist injured people.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Topic 5: Basic Security.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Computer crimes.
Computer Security By Duncan Hall.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Security Mindset Lesson Introduction Why is cyber security important?
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Issues for Computer Users, Electronic Devices, Computer and Safety.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Proactive Incident Response
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Law Firm Data Security: What In-house Counsel Need to Know
SECURITY STANDARDS AND CYBER LAWS
A lustrum of malware network communication: Evolution & insights
高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学
Computer Crime CJ 520 / CJ October 27, 2010.
Panel Discussion: C4I Solutions for Combating
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Securing Information Systems
Securing Information for a Shared Services Infrastructure
U.S. Department of Justice
Network Intrusion Responder Program
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Home Internet Vulnerabilities
Ethical Hacking.
IS4680 Security Auditing for Compliance
The Crime and Deviance Channel
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Chapter # 3 COMPUTER AND INTERNET CRIME
Ethical Hacker Pro IT Fundamentals Pro
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607) TERRY TAYLOR DECEMBER 11, 2015

INTRODUCTION The Royal Mounted Canadian Police defies Cybercrime as “any crime where cyber, the Internet and information technologies, such as computers, tablets, personal digital assistants or mobile devices, has a substantial role in the commission of a criminal offence. Advanced persistent threats (APTs) on the other hand is defined by Symantec as “a form of attack that uses multiple phases to break into a network, avoid detection, and harvest valuable information over the long term How do advanced persistent threats work? Specific cases of advanced persistent threats. Legal and social implications of advanced persistent threats Future implications of advanced persistent threats Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Phases of an Advanced Persistent Threat The final stage involves capturing valuable data and sending it from an organization’s system to that of the attackers. It should be noted that this must also be done while avoiding detection Exfiltration After access is gained into an organization’s internal system. Attackers then explore the systems to see what valuable data can be captured. Exploration The next phase involves attackers gaining unauthorized access to an organization’s internal network and systems by hacking into them Intrusion The first stage is usually where attackers gather information on the intended target. Information gathered at this stage is in some cases are relatively harmless and in most cases not confidential Reconnaissance Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Cases of Advanced Persistent threats Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Cases of Advanced Persistent threats Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Cases of Advanced Persistent threats Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Legal & Social Implications of Advanced Persistent Threats One of major legal issues posed by advanced persistent threat is no evidence. Without evidence, sanctions cannot be levied against individuals, organizations or countries that sponsor or engage in advanced persistent threat attacks. Is retaliation ethical in the absence of evidence? Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)

Legal & Social Implications of Advanced Persistent Threats Other implications of advanced persistent threats include: Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607) Use of Strong EncryptionAdvancing of IT SecurityPublic Awareness

Future Implications of Advanced Persistent Threats Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607) Growth in IT Security IndustryGround-breaking Tech in IT SecurityCyber Warfare

Conclusion Advanced persistent threats would lead to the development of new security techniques and infrastructure to help combat attacks. Although these advanced security techniques might also provide a cover for criminal activities, advanced persistent threats pose a far greater risk if left unmitigated. Questions ? Questions and comments are welcomed and would be addressed on Athabasca Landing. Temitayo Oloyede - Ethical, Legal and Social Issues (Comp 607)