Tackling Cyber threats together

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Network security policy: best practices
Bank Crime Investigation Techniques by means of Forensic IT
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1.1 System Performance Security Module 1 Version 5.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Internet Safety Internet Safety LPM
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Garda Bureau of Fraud Investigation Computer Crime Investigation Unit Sgt Paul Johnstone LLB MLitt An Garda Síochána Cybercrime and Cyber Risks Credit.
Regional Cyber Crime Unit
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Safe Computing Practices. What is behind a cyber attack? 1.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Computer Security Keeping you and your computer safe in the digital world.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Protecting Data, Sharing Information Graham Wakerley: Director
Tackling Cyber threats together
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Firmware threat Dhaval Chauhan MIS 534.
Cybersecurity - What’s Next? June 2017
Cyber enabled crime The challenge for national and local police.
Level 2 Diploma Unit 11 IT Security
Cyber Crime What’s all the fuss about?
Responding to Intrusions
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Lecture 14: Business Information Systems - ICT Security
Tackling Cyber threats together
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
The Insurance Sector & Beyond – Managing The Threat Within
Year 10 ICT ECDL/ICDL IT Security.
Cybersecurity – Three Perspectives
Cybersecurity Awareness
Little work is accurate
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Cybercrime and YOU.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Tackling Cyber threats together
Protecting Yourself from Fraud including Identity Theft
Neil Kirton and Zoë Newman
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Tackling Cyber threats together
DSC Contract Management Committee Meeting
Security in mobile technologies
Protecting Yourself from Fraud including Identity Theft
Introduction to Digital Forensics
West Midlands Police response to Cybercrime:
Thames Valley Chamber / Claire Logic
Presentation transcript:

Tackling Cyber threats together Sean O’Neil

Areas of discussion (in brief) What is Cyber Crime? Possible threats Police response Recent intelligence and events Advice on how to protect yourselves with CE, ISO, basic steps.

The adopted definition of Cyber Crime is: What is Cyber Crime? The adopted definition of Cyber Crime is: Cyber Dependent Crimes, where a digital system is the target as well as the means of attack.  These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime). Cyber Enabled Crimes. ‘Existing’ crimes that have been transformed in scale or form by their use of the Internet.  The growth of the Internet has allowed these crimes to be carried out on an industrial scale. The use of the Internet to facilitate drug dealing, people smuggling and many other 'traditional' crime types. Recent survey of reported crime had 96% as cyber element – either computers used to facilitate or used in commission. Consdier the number of times, telephones/computers are used to research, facilitate crimes or used as a means of communication.

What is Cyber Crime?

Crimes 42615 crimes recorded 2986 Burglary offences 688 Robbery offences 8900 Cyber/fraud reports (10% of reality). Statistics therefore may suggest Cyber crime/frauds are largest number of crime in society Highest reported incidents Online fraud Mandate Ransomware Romance frauds. Simply not being reported: Phishing emails / data loss/ DDOS / internal loss by theft/fraud

Theft triangle

POTENTIALLY ALL OF THEM! Which of these is a cyber threat? Smart fridge anecdote… Own staff/insider Chip in hand Social engineering. Frying pan USB stick in car park POTENTIALLY ALL OF THEM!

Law enforcement response Obtain relevant evidence & statements from Victim (company) Obtain server event & team viewer logs (which show who logged into server upon which data was deleted/stolen). Obtain 3rd party data, using relevant legislation to locate IP addresses. Execute search warrant at suspects addresses, resulting in the seizure of source devices. Conduct examination of exhibits leading to identification of evidence which supports prosecution. Interview suspect under caution

Typical Scene visit Identification & prioritisation of devices. Preservation & capture of volatile data. Router examination to ID network devices. Forensic triage of devices. Forensic examination of mobile devices. Hard drive imagery.

learning's Need for Business BCP to include ICT/data loss. Need for forensic recovery plan in disaster recovery plan. Do not turn off devices; but remove from network (i.e. disconnect). Do not delay response to LE, IT recovery company. Have more than 1 ICT manager (build ICT team) Back up key corporate and customer data. Instigate Recovery plan & major incident processes. Plan for such an event with Cyber essentials or ISO 270001 Do not fail GDPR

But what are some of the biggest threats? •Insider Threat (theft/fraud/data breach) •Malware by phishing attacks •Data Breach DDoS •Social Engineering leading to scams Theft/fraud by Customers or vendors. Ultimately it depends on the business, how it is set up, the infrastructure and the policies and procedures, and protect mechanisms in place. Does your BCP include no use of IT or loss of data!

Current Scams Invoice emails – i.e. new vendors, changes to current vendors, Apple [little mix] Vouchers - Supermarkets, on line stores Account updates – amazon, Sky, Virgin, Utilities. Advice – any unsolicited emails. Do not press that link; simply delete. Go via normal website. Send to phishing email address for company Microsoft/BT router/system faults – Dunstable case £4500 Advice – Do not engage, go via normal website. Mandate fraud – Bedford company lost £100K put 27 staff at risk. £1M in Luton in September. Bedford company had windows 365 compromised with poor PW. L/Buzzard company 17 fake invoices by post in Jan17. Solicitor companies being targeted – Luton March 2017, Bedford Dec Advice - Slow down, check via second source. Get copy of our advice. Ransomware – Luton Hotel attacked over New year – pay and enter suckers list Advice - Plan with 2x back ups, have details of local IT repair company

And now for some good news!! GCHQ reported in 2014 that in terms of Cyber Crime… 80% is easily preventable 23 in a Million phishing emails are successful 5.5 Billion in 2011 attacks world wide 42% increase in a year to £7.8 Billion in 2012 People don’t rob banks with shotguns, they now hire a hacker – lower risk and jail time if caught Peelian Principle – First duty of any Constable is to Prevent Crime

Cyber essentials (plus)

ISO27001

Thank you! CBR - Free service to all local businesses, organisations, charities, vulnerable people Offering a review of current practices Suggesting improvements to ICT/physical security Leading to greater ability to reach ‘cyber essentials’ accreditation - Minimum standard suggested for government contracts in the future. CiSP POC Sean O’Neil Cyber Security Advisor (2219) Bedfordshire Police Headquarters, Woburn Road, Kempston, Bedfordshire, MK43 9AX (+44) 7720204358 sean.oneil@bedfordshire.pnn.police.uk cyberprotect@bedfordshire.pnn.police.uk http://www.omic.pub/cybercrime (free electronic book giving basic advice)