Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber Crime The current threat to the UK Security Marking.
Staffordshire Police Corporate PowerPoint Template by Carl Uttley Staffordshire Police Cyber Crime ACC Nick Baker.
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Cyber Cops The Challenges Detective Sergeant Cath Elvey NW Regional Cyber Crime Unit.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Cyber Security Nevada Businesses Overview June, 2014.
Get Safe Online Expert advice for everyone In association with.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Information Security: Current Threats Marc Scarborough Information Security Officer
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
MIS323 – Business Telecommunications Chapter 10 Security.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
DDoS Things You Need To Know About DDoS Attacks DDoS.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Broadband Challenges 2017 Christopher Tamarin
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
International Conflict & Cyber Security
To Know what Cyber crime is
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Cyber enabled crime The challenge for national and local police.
Cyber Crime What’s all the fuss about?
Cyber Security: State of the Nation
A Project on CYBER SECURITY
Tackling Cyber threats together
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cybersecurity – Three Perspectives
Unit 1.6 Systems security Lesson 3
Andy Hall – Cyber & Tech INSURANCE Specialist
4 ways to stay safe online 1. Avoid viruses and phishing scams
Cyber Security in the Mortgage Industry
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Philip Nichilo Vincent Carestia
Threats Facing Industry –
Cyber Security - Protecting Information
Protect Your Ecommerce Site From Hacking and Fraud
Business Compromise and Cyber Threat
Tackling Cyber threats together
Information Security – Sep 18
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Internet Safety By: Ayana Shiggs.
Communicating in the IT Industry
A Secret Service Perspective on Credit Card Fraud
Internet Safety By: Ayana Shiggs.
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera) Fecha de ejecución del proyecto: Octubre – Diciembre 2018

ÍNDICE 1. C.A.I.A.C. 2. Evidencias fotográficas de la primera sesión del Proyecto Conexiones 3. Organizador gráfico

1. C.A.I.A.C

Top 10 cyber crime stories of 2016

2. UK second only to US in DDoS attacks The UK is second only to the US in being targeted by distributed denial of service (DDoS) attacks with the aim of vandalism, disrupting businesses or extorting money from businesses, a report revealed in August.

3. 412 million user accounts exposed in Friend Finder Networks hack In the biggest data breach of the year, user details of more than 412 million accounts were exposed in a data breach at FriendFinder Networks, that once again confirmed poor user data protection and poor password practices.

4. Tesco Bank halts online banking after weekend hacker fraud In November, Tesco Bank was forced to halt online banking after thousands of current account customers were hit by fraudulent transactions by hackers, who managed to steal £2.5m.

5. Financial Conduct Authority concerned about cyber security of banks The Tesco Bank heist also led to the UK’s Financial Conduct Authority (FCA) expressing concern about weaknesses in banks’ IT systems, which also emerged as a theme in 2016.

6. Industrialized cyber crime disrupting business, report reveals Despite the evidence that much cyber criminal activity is carried out by professional cyber crime organizations, many businesses are ill- equipped to deal with the threats posed by profit-oriented and highly organized cyber criminal enterprises, a BT-KPMG report revealed in July.

7. UK cyber crime growing exponentially Underlining the trend toward industrialized cyber crime, a Symantec threat report showed that the UK ranks highly in phishing, social media and ransomware attacks as cyber criminals professionalize and take advantage of unpatched websites.

8. NCA dials up UK business engagement on cyber crime As cyber criminal organizations have professionalized, fortunately law enforcement organizations have bee working to improve their ability to fight cyber crime, such as the UK’s National Crime Agency (NCA), which is working to increase its engagement with business, deputy director of the agency’s National Cyber Crime Unit (NCCU) Sarah Goodall told Computer Weekly.

9. European law enforcement seeking smart ways to fight cyber crime Just as the NCA is pursuing new strategies in the UK, European law enforcement is fighting back, using collaboration and industry partnerships to compensate for a lack of resources. Insiders told Computer Weekly, that despite the challenges, law enforcement is far more structured than in the past and there is more collaboration at all levels and even with national cyber incident response teams.

10. UK helps dismantle Avalanche global cyber network The UK was among 30 countries that contributed to the dismantling of a cloud-computing network used by cyber fraudsters to target one million users every week with malware-infected emails.

Because the Internet is not just a set of interconnected computers …is a net of people…