Jingjing Gao Department of Computer Science and Engineering April 16 th,2014 1.

Slides:



Advertisements
Similar presentations
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Advertisements

Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Separate Domains of IT Infrastructure
Ethical Hacking by Shivam.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Securing Information Systems
Introduction Our Topic: Mobile Security Why is mobile security important?
1 Accessing the Global Database The World Wide Web.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Office Management A Look from the Inside-Out Mohammad Najjar, PhD Management Science 1.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Network Installation. Internet & Intranets Topics to be discussed Internet. Intranet. .
Marketing Management Online marketing
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
Privacy and Educators Developed by Rurik Rory-Nakerud Graduate School of Education Portland State University Updated July, 2014.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Hurdles in implementation of cyber security in India.
Internet & for Learning The ICT in Schools Initiative of the Department of Education and Science 1 Internet & For Learning Objectives - Modules.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Wel come –Prepared by: BHAVIN TANK MILAN VEGAD. What is the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
The Internet What is the Internet? The Internet is a lot of computers over the whole world connected together so that they can share information. It.
Issues for Computer Users, Electronic Devices, Computer and Safety.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Information Management System Ali Saeed Khan 29 th April, 2016.
Since 2000, Broadband Technology Corporation (BTC) has specialized in the installation of voice and data network cabling services for commercial and government.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Online Social Network: Threats &
Done by… Hanoof Al-Khaldi Information Assurance
Server Machines By Brett Gunder COSC 101.
IT Security  .
Automated ad placement
Hot Topics:Mobility in the Cloud
Electronic Resources and the WWW
Cybersecurity Awareness
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
IT Security awareness Training.
ISMS Information Security Management System
Home Internet Vulnerabilities
The University of Adelaide, School of Computer Science
Introduction to Systems Security
Module 7 Questions Prepared by Mr O Seguna next.
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Internet Vocabulary Terms
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Cloud Computing for Wireless Networks
Presentation transcript:

Jingjing Gao Department of Computer Science and Engineering April 16 th,2014 1

 Introduction of Maltego®  Maltego® in Information Warfare  Threats caused by Maltego®  Accountability 2

Maltego® is a kind of software which gathers open sources information online and analyzes them intellectually with an outcome of a graphical way. 3

Gathering a bunch of data with regard to: People Groups of people (social networks) Companies Organizations Web sites Internet infrastructure such as: Domains, DNS names, Netblocks and IP address. Affiliations Documents and files 4

 Introduction of Maltego®  Maltego® in Information Warfare  Threats caused by Maltego®  Accountability 5

 National Security Defensive Operation  Commercial Competitive Application  Social Engineering and Forensic Application toward Individuals 6

National Security Defensive Operation “Who is tweeting from NSA’s parking lot?” [1] 7

Commercial Competitive Application 8

Social Engineering and Forensic Application toward Individuals  Provide context for social Engineering e.g. the language the target person use.  Forensic application Show internal relations between different persons and different organizaitons. 9

 Introduction of Maltego®  Maltego® in Information Warfare  Threats caused by Maltego®  Accountability 10

 Violation of Privacy  Reliability of Maltego® as a Forensic Application 11

Violation of Privacy 12

Violation of Privacy 13

Violation of Privacy  Easy and convenient for malicious social engineering attack, e.g. Phishing s, account guessing  Open type Mailing lists are vulnerable target’s interests, concerns 14

Reliability of Maltego® as a Forensic Application  Unreliable Twitter Geo-location  Mislead 15

Reliability of Maltego® as a Forensic Application  Unreliable Twitter Geo-location Various of app especially for Android system Not authorized officially 16

Reliability of Maltego® as a Forensic Application  Mislead 17

 Introduction of Maltego®  Maltego® in Information Warfare  Threats caused by Maltego®  Accountability 18

 Government and Organization Accountability Need new regulations for collections of integrated personal information Specify the usage of different part of personal information Appeal to whole society to protect privacy  Individual Accountability Be aware of innocuous information may lead to privacy disclosure Pay attention to privacy settings of the app in your smart phone and PC Form good use habit e.g. When leave the local wifi connection, click “forget this network” 19

[1] Jeremy Kirk, (2014, March 11), “Who is tweeting from NSA’s parking lot?” Computer World, [Online], Available: NSA_39_s_parking_lot NSA_39_s_parking_lot [2] video-gillen-twitter-articleLarge.jpg, =isch&sa=X&ei=mLlOU_2zHYq- sQS7poLgCQ&ved=0CAkQ_AUoAg&biw=1366&bih=600#facrc=_&imgdii=_&imgr c=pZeQN_7zq2lhOM%253A%3BUIvMeomJTRpZYM%3Bhttp%253A%252F%252Fg raphics8.nytimes.com%252Fimages%252F2013%252F10%252F28%252Fbusiness%25 2Fvideo-gillen-twitter%252Fvideo-gillen-twitter- articleLarge.jpg%3Bhttp%253A%252F%252Fwww.nytimes.com%252F2013%252F11 %252F07%252Ftechnology%252Ftwitter-prices-ipo-at-26-a- share.html%3B600%3B338 video-gillen-twitter-articleLarge.jpg [3] Csitech, (2014, March 8), “Mapping Corporate infrastructure with open source data”, CSITECH, [Online], Available: corporate-infrastructure-with-open-source-data/ corporate-infrastructure-with-open-source-data/ 20

21