LO1 - Know about aspects of cyber security

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

UNIT 20 The ex-hacker.
Introduction and Overview of Digital Crime and Digital Terrorism
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Cyber X-Force-SMS alert system for threats.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Edexcel GCSE Cyber security threats Computer Science 1CP1
Scams & Schemes Common Sense Media.
CYBER SECURITY...
IT Security  .
Chapter 11 crime and security in the networked economy
Phishing is a form of social engineering that attempts to steal sensitive information.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Five Unethical Uses of Computers
Malware, Phishing and Network Policies
UNIT 18 Data Security 1.
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
Unit 1 Fundamentals of IT
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Presentation transcript:

LO1 - Know about aspects of cyber security Level 2 Technical IT Unit 2: Essentials of Cyber Security

Types of Attacker and their motivations Lesson 3

Objectives Be able to explain the different types attackers in relation to cyber attacks Be able to identify what the motivations each type of attacker may have.

Types of attacker Cyber Criminals Cyber Terrorists Hackers Phishers Scammers

Cyber Criminals A cybercriminal is an individual who commits cybercrimes, where they make use of the computer either as a tool, a target or both. They use computers in 3 broad ways: Select a computer as their target – These criminals attack other people’s computers to perform malicious activities (eg. Spreading viruses, data theft, identify theft etc.) Use a computer as their weapon – They use the computer to carry out “convential crime” (eg. Span, fraud, illegal gambling) User a computer as their accessory – Use a computer to save stolen or illiegal data

Cyber Criminals – organised Groups Cyber criminals can often work in organised groups. If working within an organised group they will no doubt have a specific role: Programmer – Write code or programs used in cyber attacks Distributors – Distribute and sell stolen data/goods from cyber attacks and other cyber criminals IT Experts – Maintain the cyber criminal organisation’s IT infrastructure (eg servers, encryption technologies and databases) Hackers – Exploit systems, applications and network vulnerabilities Fraudsters – Create and deploy schemes like spam and phishing System hosts and providers – Host sites and server that possess illegal contents. Cashiers – Provide account names to cybercriminals and control drop accounts. Money Mules – Manage bank account wire transfers Tellers – Transfer and launder illegal money via digital and foreign exchange methods Leaders – Often connected to big bosses of large criminal organisations. Assemble and direct cybercriminal teams and usual lack technical knowledge.

Cyber Terrorists These are people who use the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm. Normally to achieve political gains through intimidation. Can also be referred to as the act of Internet terrorism where the aim is to disrupt computer networks on a large scale. Cyber terrorism is normally premeditated attacks on computer systems, computer data, programs and other information. Their sole aim is violence, harm and destruction. With the development of the internet, individuals or groups are misusing the anonymity to threaten individuals, certain groups, religions, ethnicities or beliefs. Cyber terrorism can be placed into 3 categories: Simple – Basic attacks (eg. Hacking an individual system) Advanced – More sophisticated attacks and can involve hacking multiple systems and/or networks. Complex – These are coordinated attacks that can have a large-scale impact and make use of sophisticated tools.

Hackers A hacker is a person who breaks codes or passwords in order to gain unauthorised entry to computer systems. Hackers can do an enormous amount of damage if they break into a computer system. Some hackers look to cause harm or intent to destroy, change or edit data, but other don’t. Some hackers break into systems because they enjoy the challenge. Hacker types include: Black Hat – Break into computer systems illegally and cause harm by stealing or destroying data (eg. Banking system to seal money) White Hat – Use their skills to help enterprises create strong computer systems Grey Hat – Perform illegal hacking activities to show off their skills, rather than to achieve personal gain.

Phishers These are people who try and acquire private and sensitive information (eg. Credit card numbers, personal identification and account usernames/passwords) They use social engineering techniques and computer programming expertise in order to lure email recipients and web user into believing that a spoof website is legitimate and genuine. Actually what they are doing is using this spoof to then actually steal or expose personal identity and/or other vital information. They use link manipulation, image filter evasion and website forgery to fool people.

Scammers Scammers are those who try and lure people with often “too good to be true” styles offers. (eg. Lottery wins, surprise inheritance, unsolicited job offers). This is normally a way of tricking you into giving them money and encourage you to reply to their communication, normally via e-mail. They will use a unknown email and will ask for payment of a purchase. These are now becoming more common with the idea of new products for good value and purchasing using an unsecured website.

Motivations behind attacks Financial Gain Attackers may make money directly from the attack they arrange or may receive payment indirectly by selling the malware etc.) In some cases organisations, terrorists or other criminals may pay money to those who perform the act. Publicity In some cases attackers complete their act by giving themselves publicity. The more dangerous the attack or more coverage their attack gets in the news gives people a sense of achievement. In some cases the publicity could strike fear and in others the fun of it might show their skills. Fraud This could be to commit fraud on individuals or organisations/companies/corporations. Be able to pretend to be that company or individual in order to steal identity for future acts or to be able to use information by posing as the company to change monetary exchanges or to manipulate other areas. Espionage Some attackers will use their cyber attacks in order to spy on governments, companies or individuals in order to gather intel or information. This means that this information could be used in a variety of ways. For example, they could use the information to blackmail organisations, be able to reveal secrets into the public domain or even give the information for use by other individuals.

hacktivism Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist.  In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial- of-service attacks (DoS), redirects, website parodies, information theft, virtual sabotage and virtual sit-ins. Hacktivism addresses a variety of acts that are active and passive - as well as violent and non-violent - and may be falsely interpreted as cyberterrorism.  Anonymous

Task Create a document or make notes in your books on: Each of the different types of attackers mentioned. What motivations each type of attacker might have Examples of attackers and what their motivations are from the news. You may wish to do this as a table like so: Any work done electronically will need to be printed and stuck into your book. Type of Attacker Motive Examples