The Broader Picture Laws Governing Hacking and Other Computer Crimes

Slides:



Advertisements
Similar presentations
Human Security Act of 2007 Protect life, liberty, and property from acts of terrorism. Condemn terrorism as inimical and dangerous to the national security.
Advertisements

Mark Carey, CPA, CISA President Toll free: x101 International: x101 Enterprise Risk Management:
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
1 The Broader Picture Chapter 12 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
(Geneva, Switzerland, September 2014)
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Understanding and distinguishing among cyber activities Dave Piscitello VP Security and ICT Coordination, ICANN.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
The role of private security in the protection of critical infrastructures Veerle Pashley Free University of Brussels Department of Criminology.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Information Warfare Playgrounds to Battlegrounds.
U.S. Government Coordinated Approach to Intellectual Property Enforcement Third Global Congress on Counterfeiting & Piracy January 30, 2007 Office of the.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Jeopardy: Digital Citizenship Please use presentation mode!
IS Network and Telecommunications Risks Chapter Six.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Cyber security implementation within an organization Ltn Andri Rebane Estonian MoD CIO.
IT in Business Issues in Information Technology Lecture – 13.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Warfare Playgrounds to Battlegrounds.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Surveillance and Security Systems Cyber Security Integration.
Securing Information Systems
Securing Information Systems
Nation State Actors Lex Dunlap.
Information Technology Sector
Module 8: Securing Network Traffic by Using IPSec and Certificates
KELA Targeted Cyber Intelligence
COSC 316: Host Computer Security
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Unit 7 – Organisational Systems Security
E-Commerce Security and Fraud Issues and Protections
Federal Protective Service
Module 8: Securing Network Traffic by Using IPSec and Certificates
Protect Your Ecommerce Site From Hacking and Fraud
Erica Burch Jesse Forrest
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

Figure 12-5: Cyberwar and Cyberterror Threats Attacking the IT infrastructure Using computers to attack the physical infrastructure (electrical power, sewage, etc.) Using the Internet to coordinate attacks

Figure 12-5: Cyberwar and Cyberterror Conducted by governments Direct damage Disrupting command and control Intelligence gathering Propaganda Industrial espionage Integrating cyberwar into war-fighting doctrines

Figure 12-5: Cyberwar and Cyberterror Cyberterrorism By semi-organized or organized groups Psychological focus Indirect economic impacts (for example, losses because of reduced travel after September 11, 2001, terrorist attacks) Goals are publicity and recruitment Indiscriminate damage

Figure 12-5: Cyberwar and Cyberterror Cyberterrorism Hacktivism—politically motivated attacks by unorganized or loosely organized groups Who is a terrorist? Spectrum from activism to full cyberterror

The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

Figure 12-5: Cyberwar and Cyberterror Building a National and International Response Strategy National governments Coordinated responses Intelligence gathering Research and training Economic incentives Private enterprise Importance of hardening individual firms Requiring hardening to meet responsibilities

Figure 12-5: Cyberwar and Cyberterror Hardening the Internet Hardening the telecommunications infrastructure with decentralization and other methods International cooperation is needed because of worldwide attackers Hardening the underlying telecommunications system Adding security to dialogs with VPNs

Figure 12-5: Cyberwar and Cyberterror Hardening the Internet Hardening Internet protocols IETF is making progress by adding confidentiality, authentication, and other protections to core Internet protocols Generally not using digital certificates in a public key infrastructure for strong authentication

Figure 12-5: Cyberwar and Cyberterror Hardening the Internet Making the Internet forensic ISPs might be forced to collect and retain data for long periods of time ISPs might be forced to do egress filtering to stop attacks at the source The cost to ISPs would be high