IPW 2017 Managing Data Risks in the Digital Age

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Computer Crime and Information Technology Security
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Securing Information Systems
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
GCSE ICT SECURITY THREATS.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Network Security Fundamentals
CYBER SECURITY...
IT Security  .
Social Engineering Charniece Craven COSC 316.
Instructor Materials Chapter 7 Network Security
Unit 32 – Networked Systems Security
Cyber Security & IT: What’s Next?
Year 10 ICT ECDL/ICDL IT Security.
Assalamualaikum Today, I am going to give a presentation on
Securing Information Systems
Teaching Computing to GCSE
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Risk of the Internet At Home
– Communication Technology in a Changing World
Internet Safety for Everyone
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Malware CJ
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Internet Safety for Everyone
Chapter # 3 COMPUTER AND INTERNET CRIME
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

IPW 2017 Managing Data Risks in the Digital Age Cyber Crime- Vulnerabilities, Risks and Impact Lecture 2 Dr Tony O’Brien

Aims of today’s session The globalisation of the digital world and the ‘real’ threat of Cybercrime for everyone The increasing risks relating to the protection of personal data both around social media and within organisational information systems

Why are we not surprised? https://www.theguardian.com/society/2017/may/12/hospitals-across-england-hit-by-large-scale-cyber-attack?CMP=Share_AndroidApp_Email NHS cyber-attack: Experts strive to restore NHS computers - http://www.bbc.co.uk/news/health-39906019 Massive ransomware infection hits computers in 99 countries - http://www.bbc.co.uk/news/technology-39901382 The ransomware causing chaos globally - http://www.bbc.co.uk/news/technology-39896393 Global cyber-attack: How roots can be traced to the US - http://www.bbc.co.uk/news/technology-39905509 http://www.bbc.co.uk/news/health-39906019

Cybercrime What is cybercrime? How does it effect All of us? What can be the impact? What is the greatest source of Risk? What can we do about it? Or Can we do anything about it?

Electronic Crime, Cybercrime, Computer Crime “We could be facing cyber warfare….a Cybergeddon" ITV Tonight Programme 'Electronic Crime' 2011 “This will be the number one criminal activity in the world….A more serious threat than a nuclear attack" Keith Vaz- Chairman of The House of Commons, Home Affairs Select Committee http://www.bbc.co.uk/news/uk-politics-23495121

Cybercrime “Any illegal act for which knowledge of computer technology is essential for its perpetration, investigation or prosecution” US Department of Justice “Criminal actions accomplished through the use of computer systems, especially with intent to defraud, destroy or make unauthorised use of computer systems resources" National Hi-Tech Crime Unit UK;

Cost of Cybercrime Security Affairs 2016 Global cost of cybercrime will grow from $3 trillion in 2015 to $6 trillion annually by 2021

Cybercrime Recent Examples Yahoo http://www.bbc.co.uk/news/world-us-canada-38324527 Google Docs http://www.bbc.co.uk/news/business-39798022 Identity fraud gang tried to sell man's home - http://www.bbc.co.uk/news/uk-38083601 Identity fraud reached record levels in 2016 - http://www.bbc.co.uk/news/uk-39268542 FBI and CIA launch criminal investigation into 'malware leaks' - http://www.bbc.co.uk/news/world-us-canada-39210628

An example of rogue security software that's disguised as a Microsoft alert but that doesn't come from Microsoft Dear user, You have reached the storage limit for your Mailbox. Please visit the following link to your e-mail access restore. Click Restore System Administrator. Windows Live Team

  Dear customer, Customers are strongly advised to lookout for a new phishing scam. If you get an email with the subject, “Your 2016 Tax Report”, with an attachment, do not open it. Please forward it to phishing@hmrc.gsi.gov.uk and then delete it. For more advice, please visit GOV.‌UK and search “phishing”. Alison Walsh Head of Digital Support for Business and Agents

Vulnerabilities, Threats and Risks A weakness in the organization, IT Systems, or network that can be exploited by a threat (a window) Threats Something that can potentially cause damage to the organisation, IT Systems or network Risk A possibility that a threat exploits a vulnerability in an asset and causes damage or loss to the asset

Management Information Systems Why Systems Are Vulnerable Contemporary Security Challenges and Vulnerabilities

Origin of the Intrusion or Threat External - malware, hackers, script kiddies, former employees, espionage, adversaries, terrorists. Internal - management, employees, consultants, contract workers, maintenance crew, temporary staff.

Types of Cybercrime External and Internal Attacks Malware, Spam and Phishing (inc. Spear & Whale) Viruses, worms, trojans, spyware, ransomware Identity theft Denial of service- DDoS & Botnets Social engineering Cyber terrorism Hacking Personal attacks- bullying, stalking, abuse etc. Theft of digital assets Theft of loss of personal data- intentional or accidental

Intent or Motive of the Attacker Political or military objectives- cyber terrorism Retaliation or vengeance Ideological objectives Financial gain, extortion, or blackmail Curiosity or the thrill of vandalism Competitive advantage Focused attack against security companies for trophy hunting

What is Hacking? Hacking is a way of thinking Breaking through a computer or a network’s security defences to view or alter information that the intruder does not have access to. Increasingly, hacking is used to perpetrate many crimes – theft, blackmail, terrorism, etc. https://www.youtube.com/watch?v=nnKh6SFEaLg

Types of Hackers Black Hats- Bad Guys White Hats- Good Guys Grey Hats Subverts computer/electronic equipment behaviour without authorisation- Bad Guys White Hats- Good Guys Work with or in organisations: to identify or to get rid of weaknesses to design more secure systems Grey Hats The ‘in-betweeners’, ambiguous motives?

Social Engineering Psychological manipulation of people into performing actions or divulging confidential information A tactic used by cyber criminals that uses lies and manipulation to trick people into revealing their personal information. Social engineering attacks frequently involve very convincing fake stories to lure victims into their trap. Can be in the digital or physical world https://www.youtube.com/watch?v=HIwqcYwNWh4

Malware Malware is short for "malicious software." Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy https://www.youtube.com/watch?v=PgR3WxSo3ho

Types of Malware Viruses Trojans Worms Rogue software or Scareware Ransomware Phishing scams Adware Spyware Key loggers And Botnets & DDOS

Growth of Malware AV Test

DoS & DDoS Denial of Service attack (DoS) A single computer flooding a website with useless traffic to inundate and overwhelm the network Distributed Denial of Service (DDoS) Using numerous computers to attack the target network from numerous launch points Laudon and Travor 2014 What is a DDoS attack? http://www.digitalattackmap.com/understanding-ddos/

Botnets roBOTic NETworks Hackers create these botnets by infecting other people’s computers with bot malware Hundreds, thousands, hundreds of thousands The infected computers become slaves or zombies serving a master computer belonging to someone else Botnets deliver: 90% of the world’s spam 80% of the world’s malware

Botnet = roBOT NETwork a Zombie Army

Ransomware 2016- The Year of Extortion Encrypts your device or claims to Claim you have done something illegal with your device, and that you are being fined by a police force or government agency. Demand you pay money. Many of these claims may be false, a scare tactic designed to make you pay the money without telling anyone who might be able to restore your PC. There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your device or files again.

500 times larger than the (Surface) web we know A Final thought https://www.youtube.com/watch?v=Lhe0PbDfaCM David Emm from Kaspersky Don’t forget the Deep Web 500 times larger than the (Surface) web we know AND Dark Web!!!!

Implications? Finnish Red Cross Kontti