Paul A. Strassmann New Canaan Mens Club – January 9, 2015.

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
7 Effective Habits when using the Internet Philip O’Kane 1.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
OWASP Principles for GIS Data Security Keeping your GIS data secure.
Cyber X-Force-SMS alert system for threats.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
CYBER CRIME AND SECURITY TRENDS
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
C8- Securing Information Systems
CYBER CRIME.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Security Mindset Lesson Introduction Why is cyber security important?
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Top Tips for Online Safety Speaker Name Speaker Organization.
Securing Information Systems
Securing Information Systems
Information Security – Current Challenges
Cybersecurity - What’s Next? June 2017
IT Security  .
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
CHAPTER 4 Information Security.
Securing Information Systems
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Risks & Reality Cyber Security Risks & Reality
Risk of the Internet At Home
Prepared By : Binay Tiwari
MIMOSA Open Meeting Standards-based Critical Infrastructure Risk Management Alan Johnston.
Protect Your Ecommerce Site From Hacking and Fraud
Cyber security and Computer Misuse
Module 4 System and Application Security
SECURITY IN THE DIGITAL AGE
Adding security to your ICS environment? Fine! But how?!
Presentation transcript:

Paul A. Strassmann New Canaan Mens Club – January 9, 2015

From individuals to organized groups. Drug cartels, mafias, terrorist cells and nation-states. RAND Corporation.

Defenders protect 100.0%, all times. Espionage succeeds in 0.01% of time.

Typical large firm receives 50,000 intrusion/day Pentagon reports 10 million attempts/day Nuclear Security Admin: 10 million hacks/day SOURCE (March 8, 2013):

New Malicious Web Domains/day 74,000 Web Attacks Blocked/day247,350 Bot Infections/day 3.4 millions Avg. number of stolen identities 604, * 69 million sensors, 2013http://

U.S. Critical Infrastructure Chemicals Communications Critical Manufacturing Dams Defense Industrial Base Emergency Services Energy Financial Services Food and Agriculture Government Services Pharmaceuticals Public Safety Public Health Information Technology Nuclear Reactors Transportation

Source of Losses Cyber espionage Cybertheft Cybercrime Loss of sensitive business information Service and employment disruption Insurance, and recovery costs Competitive damage Reputational damage Loss of intellectual property Loss of intangible assets

Sources of Cyber Attacks Hactivists Theft by Criminals Organized Crime Insider Compromises Economic Espionage Information Warfare Government Government proxies

U.S. Costs of Cyber Crime Estimated Cost: $100 billion to $500 billion Loss of 500,000 jobs Loss to national security SOURCE:

Pixel Tracker Bug Advertised (November 15, 2014) Available for private database of 140,000. Delivers s, passwords, usernames and private messages of all the members. Price: $90 via BitCoin. Countermeasures: Disable Browser Feature

I NFORMATION W ARFARE

Major Information Warfare Programs

Example of a Simple Attack

Commercial Attack Tools Available for $10 to $50,000 Zeus: Cybercrime Suppliers in Russia SpyEye: From Malaysia Bugat v2: Origin unknown Gozi Prinimalka Blitzkrieg: Russian Carberp: Priced up to $40,000 for kit

C YBER D EFENSES

Costs of Security Exceed the Costs of Risks

Distribution of Malware

Malware Certified Definitions* 23,847,280 Additions During August , * * - 8/17/2013 ** IDC #242346

U.S. Computer Emergency Readiness Team

National Vulnerability Database 62,829 Vulnerabilities, June 2014

How to Defend a Point-of-Sale System

P ERSONAL P ROTECTION

Strassmann to Hollstein and Messert

Sent to Hollstein and Messert

What to Do for Partial Protection

What to Do Never click on unknown attachment Never download application from uncertified source Never accept offers from unverified senders Always back up your systems Optional: – Switch to G-mail for two factor authentication – Switch to Apple

Gmail Two Factor Authentication

Advice INTERNET is vulnerable You may be “hacked” Self-protection: set up backup computer Security services available