1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 Top 5 Modern Malware Trends Data Connectors – September 12, 2013 Frank Salvatore,
Cyber Security and the Global Business Environment Jeremy Schaar:)
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
 e-Access is about understanding the privilege of using electronic information as well as the right to having equal, secure and reliable access.  The.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
PRODUCT FOCUS 4/14/14 – 4/25/14 INTRODUCTION Our Product Focus for the next two weeks is Microsoft Office 365. Office 365 is Microsoft’s most successful.
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Trade Across the Americas: Bolstering Security and Efficiency Supply Chain Risk Analytics May 2015.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Unit 4 – Impact of the use of IT on Business Systems.
Protecting People and Information: Threats and Safeguards
Study Results Advanced Persistent Threat Awareness.
© Copyright 2011 (ISC)², Inc. All Rights Reserved. 1.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Class 8 The State of Cybercrime Today- Threads & Solutions.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Digital Citizenship Multimedia II Ann Darling. Digital Citizenship What is Digital citizenship? – “Digital citizenship can be defined as the norms of.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Hurdles in implementation of cyber security in India.
PowerPoint presentation title Presenter’s name and date Put a visual here.
Computer crimes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
[Insert your logo here.] For Marketing Professionals [Insert brief description of guide.]
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Safe Computing Protect your electronic profile means protecting You and Case Information Security Office, ITS Case Western Reserve University 2015 Information.
Information Security Program
Office 365 Security Assessment Workshop
Deployment Planning Services
Improving Security By Embracing The Cloud
The utility belt for managing security and compliance in Office 365
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
CIS 500Competitive Success/tutorialrank.com
CIS 500 Education for Service-- tutorialrank.com.
CIS 500 STUDY Lessons in Excellence-- cis500study.com.
SAM Financial Services Cybersecurity Assessment
Playing Safely in the Cloud
Navigating Security Seas in a Small Ship with a Limited Crew
Prepared By : Binay Tiwari
Playing Safely in the Cloud
David J. Carter, CISO Commonwealth Office of Technology
Introduction to Computers
CRITICAL INFRASTRUCTURE CYBERSECURITY
The Global Challenges of Cybersecurity and Digital Terrorism
Information and Communications Technology, Knowledge Management & Enterprise Data and Records Management.
Protecting Your Company’s Most Valuable Asset
Information Security – Sep 18
Information Protection
5/30/ :10 PM Turn to for the expertise you need to help you safeguard your business data. We know IT security and we know.
Role of US Security and Intelligence Agencies
Information Protection
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies Identify Protection | RSA, the security division of EMC Feb 2012 PLEASE NOTE: The following slides contain censored Cybercrime Intelligence visuals Contact me if you need any of the original visuals for internal use.

2© Copyright 2011 EMC Corporation. All rights reserved. Join the Dark Cloud

3© Copyright 2011 EMC Corporation. All rights reserved. Fraud Forums: Build your Identity Dozens of active forums; Thousands of members per forum; English, Russian – leading languages Dozens of active forums; Thousands of members per forum; English, Russian – leading languages

4© Copyright 2011 EMC Corporation. All rights reserved. Gain Credibility

5© Copyright 2011 EMC Corporation. All rights reserved. Don’t Show Your Face to Web Camera!

6© Copyright 2011 EMC Corporation. All rights reserved. Crimeware you can Afford

7© Copyright 2011 EMC Corporation. All rights reserved. Seeing is Believing

8© Copyright 2011 EMC Corporation. All rights reserved.

9 Online Dating

10© Copyright 2011 EMC Corporation. All rights reserved. The Executive Assistant

11© Copyright 2011 EMC Corporation. All rights reserved. Humans can’t be Patched

12© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threats See anything in common? AttackTargetsEntry Vector Going After GhostnetMinistries, Embassies, Office of Dalai Lama Spear Phishing Sensitive documents Aurora34 companies: Google, Adobe, defense, internet, financial, critical infrastructure Spear Phishing Intellectual property Night DragonCritical infrastructureSpear Phishing Intellectual property

13© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threats What’s New here?

14© Copyright 2011 EMC Corporation. All rights reserved.