Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Its a new digital world with new digital dangers….
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 Telstra in Confidence Managing Security for our Mobile Technology.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
Cyber Security Nevada Businesses Overview June, 2014.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
A Project on CYBER SECURITY
Chapter 5 Electronic Commerce | Security
Lecture 14: Business Information Systems - ICT Security
Chapter 11 crime and security in the networked economy
Threat Landscape for Data Security
Chapter 5 Electronic Commerce | Security
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Forensic and Investigative Accounting
Presentation transcript:

Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology

Conduct in Cyberspace Transactions E-Commerce, E-Government Actions (Interaction) , Social Networks, Hacking Content (Publishing) Text, Videos, Music Rights Intellectual Property, Consumer Protection Security and Privacy Infrastructure, Data, Assets – Cross Cutting with the Above. 2The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Cyber Threats ThreatsTargets Against information Against ICT infrastructures Governments Private sector Citizens 3The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Threats Against Information Espionage. Within this category all varieties of espionage are included, from state espionage to industrial espionage. Theft and publication of classified or sensitive information. Theft and publication of personal data. Digital identity theft. Fraud. Advanced Persistent Threats (APT). 4The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Threats against ICT infrastructure Attacks against critical infrastructures. Attacks against networks and systems. Attacks against internet services. Attacks against industrial networks and control systems. Malware infection. Attacks against networks, systems or services through third parties. 5The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Major Threats of Digital Security Online Identity Theft Industrial & State Espionage Critical Infrastructure Attack Botnets (Fishing & Spam) Unauthorized access Theft or breach of confidential information Denial-of-service attack 6The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Attack Top Ports, 3rd Quarter Akamai The State of the Internet Report, 3rd Quarter The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Cyber Threats Impact Loss (Information, Financial) Miss-handling, Misuse (Information, Infrastructure) Disclosure (Information) Temporary, partial or total interruption of certain services or systems 8The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Authorship State sponsored attacks: Real world or physical conflict has extended to the virtual world of cyber space. Cyber attacks have been detected against the critical infrastructures of countries and specific strategic objectives. Attacks by private organizations: The objective of many private organizations is to obtain industrial secrets from other organizations or governments. 9The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Authorship Terrorism, political, ideological extremism: Terrorists and extremist groups use cyber space to plan and publish their actions and acquire recruits to carry them out. Attacks by groups of organized crime: gangs obtaining sensitive information for fraudulent use and for significant economic gains. Hacktivism: Attack the cyber space that violate any of their principles or interests making it susceptible to denial of service attacks (DDoS) or stealing sensitive information for free distribution on the Internet. 10The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Authorship Low profile attacks: Cyber attacks of a highly heterogeneous nature executed by people with certain ICT knowledge for fundamentally personal reasons. Personal privileged access attacks (insiders): This group poses one of the greatest threats to the cyber space security of nations and companies as they are often an integral part of all the attacks outlined above. 11The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Cyber Statistics Poll Conducted By EastWest Institute (Global Companies CEOs): 93% think that the cyber security risk is higher than one year ago. 33% feel protected online. 41% think their online privacy is not sufficiently protected. 50% think that corporate boards grossly underestimate the cyber security problem. 17% think that they are too confused. 55% doubt their countries can defend itself against sophisticated cyber attacks. 62% think their country at an early stage of understanding cyber security problems. 12The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Financial Loss It is estimated that the cost of Cybercrimes reached $110 billion in Cost of resolving Cyber Attacks $4 billion. It is estimated that the cost of valued time of users lost to Cybercrime is $274 billion in Total Cost $388 billion. (2012 NORTON CYBERCRIME REPORT ) 13The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Threats in Terms of Users 556 Million victim of cybercrime in 2012 An average of 1.5 Million user per day and 18 Victim per second. The Internet users in 2012 crossed 2 billions users. Almost 25% of Internet experienced a cyber threat. 14The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Economic Impact Examples UK: Cost of Cybecrimes £18-27 billion in 2011 compared to the UK Internet based economy estimated at £121 billion in 2010 which represent 8 % of its GDP. Estimated that the UK encountered 44 million Cyber Threats in (The UK cyber security strategy: Landscape review, Cross-Government, National Audit Office, Feb 2013.) China: Damage to Chinese economy estimated in 2011 to reach $852 Million affecting Million users (22%) and 1.1 Million site (20%). (China and Cybersecurity: Political, Economic, and Strategic Dimensions, Report from Workshops held at the University of California, San Diego April 2012) 15The Economical and Social Impact of Digital Security - GCC Digital Security Forum

SPAM (Botnet) Threats In 2010 the “King of Spam” was arrested in the United States, a 23 years old individual who sends daily 10 billion s from a network of over 500,000 computers (Zombies) controlled by a botnet “Mega-D”. 16The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Social Impact of Digital Security Children disclosure of private information to strangers. 87% of Parents who their children had a negative experience online became victims of cybercrimes. 82% of Children who broke Internet House rules suffered negative experience online. 17The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Underground Economy Real asset theft: stealing money from the stolen bank accounts or credit cards; Network virtual asset theft: stealing virtual currency, equipment from stolen online game accounts, and selling them for real money; Internet resources and services abuse: taking advantage of the snatched Internet resources including compromised hosts, hacked servers, and infected smart phones, to abuse the Internet services for profit; Black hat techniques, tools, and training: selling Trojan horses and attack tools employed to provide technical support for the cybercriminals, and providing training services to newbies. 18The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Organizations Not Reporting Digital Security Incidents Negative publicity would the organization. Unaware competent authorities were interested. The perpetrators would not be caught. Organization didn’t believe competent authorities had the capability to effectively investigate the incident. Did not think incidents was serious enough. Civil remedy seemed the best option. 19The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Remedies Information Sharing and Encourage Reporting (CERTs) Social Contract Make information security everyone’s responsibility including Senior management Make education and training an ongoing exercise Hold Security Audit Keeping abreast of changes in security technology and best practices - a priority Regulation (Accountability) Underpin a robust security culture with frequent and rigorous testing 20The Economical and Social Impact of Digital Security - GCC Digital Security Forum

Thank You 21The Economical and Social Impact of Digital Security - GCC Digital Security Forum