An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

CYBER & Product Liability & Professional Indemnity
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Mr C Johnston ICT Teacher
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Chapter 9: Privacy, Crime, and Security
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
E-Commerce Security and Fraud Issues and Protections
Cyber-Warfare: The Future is Now!
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Computer Crime and Information Technology Security
Cyber Crimes.
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Cyber Security Nevada Businesses Overview June, 2014.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Hurdles in implementation of cyber security in India.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Security Mindset Lesson Introduction Why is cyber security important?
Information Systems Week 7 Securing Information Systems.
MIS323 – Business Telecommunications Chapter 10 Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Digital devices and Impact on organisations. Computers What do they use it for  Storing data  Design tasks  Products tasks (controlling machine) 
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Cybersecurity - What’s Next? June 2017
Liberty International Underwriters
Level 2 Diploma Unit 11 IT Security
NYBA 2017 Technology, Compliance &
Securing Information Systems
Forensics Week 11.
Information Security CIS 9002 Kannan Mohan Department of CIS
Network Intrusion Responder Program
E-Commerce Security and Fraud Issues and Protections
Protecting Your Company’s Most Valuable Asset
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
LO1 - Know about aspects of cyber security
Security Trends and Threats Affecting Innovations in Technology
Presentation transcript:

An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader

Who carries out “Cyber Crime” Why have Cyber incidents become so prevalent Social Engineering Case Studies for some common Cyber incidents Recent high profile Cyber incidents

Who carries out Cyber Crime?  Skilled individuals  Organised Crime  Corporate Espionage  Insider threats  Hacktivists  State sponsored attacks

The nature of the risk has changed from individuals seeking notoriety / kudos to criminals presenting a targeted advanced persistent threat Network infrastructures can contain thousands of applications, delivering different functions, including interaction with external systems

Why is Cyber profiling now?  The Onion Ring “TOR”  Digital currency  Web pages selling illegal goods / data

The Onion Ring  Gives anonymity on-line  Actual address is masked using relays  Can be used to set up anonymous accounts  No source if unsecured domestic WiFi is used

Wardriving Wardriving is the act of searching for open Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).

Digital Currency  Decentralised  Transactions held in a public register  Interchangeable with tangible currency  Bitcoin value $1 in 2010 to $100 in 2013

Social Engineering – “Hacking the Human”  Hackers toolkits use different methods  Applications, Adverts and Malware  Passwords

Case Studies  Crypto Viruses  Virtualisation  Denial of Service Attack  Network Breach

Denial of Access  Botnets can be hired out  There is no physical damage to the target  Substantial BI impact for on-line traders  100 Gb per second

Keylogger Breach  USB Amazon £40  No administration rights required  Key strokes saved in flash memory  User name and password can be read

Questions