Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.

Slides:



Advertisements
Similar presentations
Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.
Advertisements

Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Viruses & Destructive Programs
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Our Digital World Second Edition
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Securing Information Systems
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
CHAPTER 6 Information Security
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Cyber Crimes.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Wireless Security: Protect yourself when you’re mobile.
Viruses & Destructive Programs
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
7 Information Security.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Topic 5: Basic Security.
Get Safe Online Expert advice for everyone In association with.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Mission Computers Inc.  In 2013 ◦ 1,000,000,000 phones were hacked  because of ◦ lack of a secure password or ◦ no password at all Source:
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Traveling Securely. Unsecured Networks and browsing  Using Unsecured Networks –Hotels, airports, coffee shops, libraries, etc Anywhere you do not know.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Network and Internet Security and Privacy
Instructor Materials Chapter 7 Network Security
Lecture 14: Business Information Systems - ICT Security
Protecting Devices The Future Citizen.
CHAPTER 4 Information Security.
Securing Information Systems
Information Technology Services Education and Awareness Team
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Protecting Your Company’s Most Valuable Asset
How to keep the bad guys out and your data safe
Information Technology Services Education and Awareness Team
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School

Context Federal Law Enforcement is interested in business computers (interstate commerce) Title 18 Section 1030 ($5,000 damage) Personal Computer hacks, call the State or Local Police Identity Theft, call the Federal Trade Commission

Hacking the Business Targets –Business Computers –Cell phones (especially Camera Phones) –Conference Call/Phone Systems –Laptops –PDAs –Wireless Connections –Business Partners w/ trusted connections –Web Sites

The Suspects Organized Crime Motivated Insiders Economic Espionage Individual Hacker Teenage Punks State Sponsored Actors: China for Example

Tools of the Trade Any network connected computer Vulnerabilities in software or operating system Social Engineering Classic Trojan Horse delivered through , web site, infected CD, etc. Unsecured wireless connection Mobile computing in an unsecure environment

Tools of the Trade cont… Loss of physical security over computing device (keystroke loggers, theft, etc) Outsourced partner Lack of passwords and encryption Letting someone use your cell phone

Bottom Line Wetware (humans) are the most vulnerable link in the computer security chain Technology advances at a speed that outpaces security Hacking is a growth business