HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
A sophisticated Malware Arpit Singh CPSC 420
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Free Trade in the Cyber Underground Malware Outsourcing Marita Fowler Farrah Patterson CAP 6135 – Term Project Proposal.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
What is a virus??????? A virus is an of some sort sent to you that will usually shut down or corrupt your computer. It will then send the virus.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Information Warfare Playgrounds to Battlegrounds.
Cyber Warfare Case Study: Estonia
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
Computer Security By Richa Patel. Viruses A Virus is something that you can get on you on your computer which can damage documents on your computer. What.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Hurdles in implementation of cyber security in India.
Information Warfare Playgrounds to Battlegrounds.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Security Mindset Lesson Introduction Why is cyber security important?
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Computer and Network Security Brendan Duncombe Bahein Maung.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.
October 28, 2015 Cyber Security Awareness Update.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Ted Allen Rotary May 17, 2017 WannaCry Ransomware Ted Allen Rotary May 17, 2017.
International Conflict & Cyber Security
Stuxnet By Shane Serafin.
CYBER SECURITY...
Computer Network Security
Introduction to Computer Security
Chapter 11 crime and security in the networked economy
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Object Oriented Programming and Software Engineering CIS016-2
Prepared By : Binay Tiwari
Presentation transcript:

HALDEBIQUE Geoffroy ROYER Johan

 Crime motivated attacks  Hacktivism  Cyber Warfare

 Way of protesting for people by doing politically-motivated cyber attacks  October 1989: first ever act of Hacktivism

 Created on 4Chan in 2003  Some of their actions are really famous:  DDoS against Church of scientology  Support the protests in Tunisia Hacked a Child Pornography server Hacked Paypal to support Wikileaks  Hacked Universal Music homepage after the closure of megaupload

 Notorious for having hacked: -Sony the 23rd of May Nintendo the 6th of June The CIA the 15th of June 2011  Dissolved in 2011

 Politicaly motivated hacking done by a nation in order to spy and affect another nation’s computers or networks

 Guy-Philippe Goldstein: How cyberattacks threaten real-world peace (TED talk)

 DDoS & Botnet

 Worms

 Trojanhorse

 Spying  Stealing informations  Confuse  Give false informations  Attack and destroy computers or facilities

 DDoS attack against Estonia by Russia  Georgia’s networks are targeted during the Russia-Georgia war  China launches a lot of cyber attacks  The virus Stuxnet is discovered in Iran

 China is the first country that recognized the potential of Cyber warfare  Mainly spying and data theft, which is not aggressive enough to trigger an official reaction  Problem of Cyber warfare : we can’t know the origin of the attack for sure

(2010)(2011)(2012)(2012)  Stuxnet can manipulate engines in facilities such as water pumps in nuclear plants  The Stuxnet project started in 2007, but was only noticed in 2010, and we only knew in 2012 that the attack originated from the USA

 Stuxnet and the other’s source code is available online and can be used again  We still don’t know for what purpose the other programs were created, and what they do exactly

 Video of an engine under a cyber attack  But all devices with a wireless function can be hacked and used for malevolent ends

 Most of the softwares are made by private companies (Microsoft), which are paying more attention to profit than security  Zero-day vulnerability windows can last up to seven years, if it’s not forever !  People need to be more sensibilized

Debate Time :

 What is the difference between Hacktivism and Cyber warfare ?  What is a (computer) worm ?  What is a (trojan) horse ?

 Name three important events linked to Cyber warfare  What was the purpose of Stuxnet ?  What is a zero-day vulnerability ?