Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

The Internet.
Breaking Trust On The Internet
Studying Malicious Websites and the Underground Economy on the Chinese Web Presented to Prof. Dr. Eduard Heindl Presented by Ramesh Babu Vadde Manjula.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Internet Security Awareness Presenter: Royce Wilkerson.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
How It Applies In A Virtual World
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Online Game Trojan SecurityLabs.websense.com Hermes Li.
Viruses & Destructive Programs
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Cyber Security Nevada Businesses Overview June, 2014.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
A threat to global security and economy Koushik Mannepalli CMPE 294.
INTRODUCTION & QUESTIONS.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
Technical Implementation: Security Risks
November 14, 2016 bit.ly/nercomp_defendingyourdata16
BASIC CONCEPTS ON INTERNET &
The Disadvantages of ICT
how to prevent them from being successful
Hotspot Shield Protect Your Online Identity
IT Security  .
Chapter 2 Information Systems in Organizations
A Project on CYBER SECURITY
Challenges We Face On the Internet
Network Attacks Dylan Small.
Securing Information Systems
Online Banking Security
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Risk of the Internet At Home
Week 7 Securing Information Systems
Internet Worm propagation
Chapter 9 E-Commerce Security and Fraud Protection
Forensic and Investigative Accounting
The Crime and Deviance Channel
Cyber security and Computer Misuse
The Internet: Encryption & Public Keys
Electronic Communication and the Internet
Marcial Quinones-Cardona
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

Matt Jennings

 Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion

 513 million Chinese Internet users  Over 300 million online applications  More than 160 million subscribers  45% have experience theft of instant messaging accounts  32% have had their game accounts hacked

 Caused 832 million USD worth of damage  Over 90,000 participants  Easy money  Complex organization  Use legal web-based communication

1. Person/business receives raw materials as input 2. Add value to the raw materials through different processes 3. Sell finished product to customers

1. Real Assets Theft 2. Network Virtual Assets Theft 3. Internet Resources and Services abuse 4. Blackhat techniques, tools and training

 Primary motivation of cybercrime  Banking accounts, credit limits, balances of payment accounts, stock/fund accounts  The target  Techniques: Trojan Horses Phishing

 Large user base in online games  Virtual currency and equipment translates to real world money  No rigid law on “virtual property”

 Computing power, storage, bandwidth, IP addresses, network traffic, sensitive data  More resources = More Power  Botnets /messaging Drive by downloads “hanging-on” software  Click fraud/spam bots  DDoS extortion

 Engine of the underground economy  Hackers provide Products and Services to the economy  Products Malware, trojans, vulnerabilites Zero-day exploits  Services Attack a target Train new criminals

 Most is done through public channels  QQ chatting  Baidu Post Bar 100,000 illicit threads

 Most visible market is for advertisement and communication  Higher-tiered aspects are hidden  Cooperation between law enforcement and network security professionals  Legal countermeasures

 Chinese Internet  Value chains in illegal market  Means of Communication  New laws

 Muncaster, Phil. "Exposing China's Vast Underground Economy â ¢ The Register." Exposing China's Vast Underground Economy â ¢ The Register. The Register, 18 Aug Web. 23 Sept  Jianwei, Zhuge, Gu Liang, and Duan Haixin. Institute on Global Conflict and Cooperation. Rep. University of California, July Web. 27 Sept