Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Information Warfare Theory of Information Warfare
Computer Forensics BACS 371
INFORMATION WARFARE Written by: Larry Druffel Presented by: Frank Dang TCOM 614 Introduction to Telecommunication University of Redlands.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
CYBER CRIME AND SECURITY TRENDS
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Information Warfare Playgrounds to Battlegrounds.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
October 28, 2015 Cyber Security Awareness Update.
Cyber crime and security issues
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
IT Security  .
A Project on CYBER SECURITY
Cybersecurity Awareness
Malware, Phishing and Network Policies
Prepared By : Binay Tiwari
Forensic and Investigative Accounting
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat

There is no way to get rid of the cyber crime, but it is possible to limit it by making society aware of existing threats and methods used by hackers to deceive potential victims.

Cyber Crime Definition  What the cyber crime really means???????  The U.S. Department of Justice - expanded definition of cybercrime

Who are the cyber game players?  Governmental and non-governmental parties 1. Hacktivist groups 2. Big military superpowers - cyberspace as the fifth domain in warfare 3. Big software companies 4. Security companies 5. Traditional cyber-criminals and cyber-criminal gangs

History and Trends  60’s - physical damage to computer`s systems and long distance telephone networks subversion  80`s – malicious software (viruses, worms and Trojan horses)  1995 – Internet commercialized, cyber crime definition really born  End of 90`s - credit card fraud as border category of identity theft  Mid 2000s - hardware Trojans designed

Cyber Game Players: Hacktivists  The Saudi and Israeli hacktivists  Attacks on official websites of Saudi  publishing the passwords of nearly a hundred Saudi university students (Anonymous 972 )  Release of credit card numbers and other sensitive information that affected about 14,000 (xOmar)  Anonymous group

Cyber Game Players: Big military superpowers  China's cyber warfare skills - penetration the U.S. electric grid, - gained access to U.S. government and corporate networks  Japan engaged recently in cyber activity

Cyber Crime Game Players: Big software companies  Apple, Adobe and Microsoft  Create the software which runs on all computers  New zero-day exploits  “Operation Aurora” - Google, Adobe, Juniper Networks, Rackspace, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical

Cyber Crime Game Players: Security Companies  Security companies might be susceptible to attacks – RSA attacks  Counter – espionage - The Mykonos software

Cyber Crime Game Players: Cyber-criminals and cyber- criminal gangs  Most originate from US, China, and Eastern Europe and focus on: 1. Stealing financial information - Eastern Europe 2. Intellectual property - China 3. Cooperation of cyber gangs and street gangs for extortion or industrial espionage - US

Accounting for Cyber Security  SEC guidance issued in 2011 requires disclosure of material cybersecurity risks and cyber events.  Possible effect on F/S: 1. Remediation costs 2. Increased protection costs 3. Litigation 4. Reputational damage 5. Loss of revenues