“CYBER SPACE” - THE UNDERGROUND ECONOMY

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Unit 19 INTERNET SECURITY
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Information Systems Week 7 Securing Information Systems.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Security Risks Todays Lesson Security Risks Security Precautions
Cyber Security and Computer Safety
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Lesson 10A: The Three D’s of Identify Theft
COMPUTER CRIMES Presented by THABO.
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
RCCU Zephyr South West Regional Cyber Crime Unit.
Protect Your Computer Against Harmful Attacks!
McAfee Technical Support. McAfee.com/Activate McAfee helps to block from malware and malicious downloads, phishing websites, , spyware and it scans.
McAfee.com/Activate
Partnering to Minimize the Impact of Data Compromises
Risk of the Internet At Home
Information Security Session October 24, 2005
Week 7 Securing Information Systems
UNIT 18 Data Security 1.
Staying safe on the internet
Cyber Security and Computer Safety
Chapter 9 E-Commerce Security and Fraud Protection
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Cybercrime and Canadian Businesses
How to keep the bad guys out and your data safe
Information Security – Sep 18
WJEC GCSE Computer Science
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

“CYBER SPACE” - THE UNDERGROUND ECONOMY Policing Challenges - Air - - Land - - Sea - - Cyber Space - Colonel Beaunard Grobler Cyber Crime Support Section South African Police Service 2018/11/06

Presentation overview “Cyber Space” - The Underground Economy Background About Us Why Cyber Crime Support to the SAPS Latest Threats Physical Devices to look out for Current attacks: Web Defacements, Phishing, Botnets, Malware and Spyware Conclusion What is on the Horizon? 2018/11/06

About Us 2018/11/06

Who we are? We focus on Internet related crimes, where: The computer system/ network is the target The network and/or devices are the instrumentality of the crime The network and/or devices are incidental to other crimes The criminal activities are associated with the prevalence of memory resident devices or networks 2018/11/06

The Underground Economy 2018/11/06

Physical Crimes 2018/11/06

Banking and Credit Card Fraud 2018/11/06

Banking and Credit Card Fraud 2018/11/06

Money Making Schemes 2018/11/06

Latest attacks Website Defacements Phishing Malware Spyware Botnets 2018/11/06

Website Defacements Government Website: 2010-08-04 15:35:41 2018/11/06

Website Defacements 2018/11/06

Phishing 2018/11/06

Phishing Countermeasures: Review credit card and bank account statements as soon as you receive them to determine whether there are any unauthorised charges or activity. Use anti-virus software and keep it up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them 2018/11/06

Botnets & Malware: “Koobface” Attack 2018/11/06

Botnets & Malware: “Koobface” Attack Koobface - an anagram of Facebook has been seen hijacking legitimate websites not only limited to host malicious payload files, also to work as proxy command-and-control servers for the botnet. has been delivering a password stealing trojan among the several payloads it brings down to an infected computer 2018/11/06

The “underground trade” 2018/11/06

The “underground trade” 2018/11/06

Moving into the “Grey” Area Cyber Crime Support Units/ SAPS and ISP's Trusted relationships Cooperation: Average to Excellent! Police has other partners as well (Locally and Internationally) Requests to preserve .... 2018/11/06

What is on the Horizon for SA? Social Engineering Organised Cybercrime Customised Trojan's and Commercial Spyware PC's and Information for sale “Ransomware” will replace “Scareware” Mobile Devices new focus 2018/11/06

What is on the Horizon for SA? 2018/11/06

Own Initiatives 2018/11/06

Colonel Beaunard Grobler My other PC is your Mail Server .... Thank you ! Colonel Beaunard Grobler Cyber Crime Support Section South African Police Service My other PC is your Mail Server .... 2018/11/06