Miguel E. Andrés. What is information leakage? An incident where the confidentiality of information has been compromised. Examples [2010] Gmail accounts.

Slides:



Advertisements
Similar presentations
What is identity theft? How does identity theft occur? How do you protect yourself? What do you do if you are a victim? Jane Doe Certified Consumer Credit.
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
Cyber Security and the Global Business Environment Jeremy Schaar:)
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
Heartbleed Bug. When all the net security people are freaking out, it’s probably an okay time to worry.
Emerging Internet Threats Graham Connolly Websense Territory Manager Australia & New Zealand.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Cyber X-Force-SMS alert system for threats.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
How It Applies In A Virtual World
 Simplify Your Life. Use Google Docs. ELIB 570 Final Presentation: Web 2.0 Tool.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
APA of Isfahan University of Technology In the name of God.
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
Staying Safe Online Keep your Information Secure.
Anderson School of Management University of New Mexico.
CIS Computer Security Kasturi Pore Ravi Vyas.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
 Introduction to Computing  Computer Programming  Terrorisom.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
The Internet The Cloud Gmail in the Cloud.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
Stop cybercrime, protect privacy, save world. Chris Monteiro Cybercrime, dark web and internet security researcher Systems administrator Pirate / Digital.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
Information Security: Current Threats Marc Scarborough Information Security Officer
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Safe Computing Practices. What is behind a cyber attack? 1.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Wikileaks. WikiLeaks is an international non-profit organization that publishes submissions of private, secret, and classified media from anonymous news.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Mrs. Esman Computer Special
An Introduction to Phishing and Viruses
Cyberwar Becomes a Reality
Understanding The Computer Login Account
A Project on CYBER SECURITY
Overview 1. Phishing Scams
WikiLeaks loses PayPal revenue service
Cyber Security Awareness Workshop
Jason C. Belford Information Security Briefing Staff Senate
Online Banking Security
Introduction to Computers
Philip Nichilo Vincent Carestia
Figure 1. Number of Records Breached
Forensic and Investigative Accounting
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Miguel E. Andrés

What is information leakage? An incident where the confidentiality of information has been compromised. Examples [2010] Gmail accounts of Chinese dissidents and human rights activists were hacked. [2011] Passwords of U.S. White House officials, Chinese political activists, officials in several Asian countries, and others were hacked. Result: After cross acusation with the Chinese goverment because the source of the cyber attacks, Google moved all its servers out of China.

International non-profit organization that publishes submissions of private secret and classified media from anonymous news sources Released US confidential documents about war in Afghanistan Released US diplomatic cables Released US confidential documents about the war in Irak Result: one of the biggest diplomatic crisis in the history of the U.S. What is information leakage? An incident where the confidentiality of information has been compromised. Examples

Online multiplayer gaming and media service for use with the PS 3 [April 2011] The service was hacked and led to information leakage of 100 million users. The information leaked includes users’ name, home address, , birthday, passwords, credit card information and more confidential data Result: Reputation damage + millionaire economic losses (due to the shut down of the service and multiple sues for negligence) What is information leakage? An incident where the confidentiality of information has been compromised. Examples

What is information leakage? An incident where the confidentiality of information has been compromised. What kind of incident? Human ``negligence’’ (phishing scams, infected computer, etc) Acts of sabotage (for example from an insider) Bugs in the system (either intended or unintended)

> Mr Burns sucks! Internet Crowds | Tor | Anonymizer > Mr Burns sucks! > Mr burns sucks

Internet Crowds | Tor | Anonymizer

? Internet Crowds | Tor | Anonymizer Tor Crowds

Internet Crowds | Tor | Anonymizer

Chapter II [TACAS 08] Conditional Probabilities over probabilistic and nondeterministic systems Chapter II [TACAS 08] Conditional Probabilities over probabilistic and nondeterministic systems Chapter III [TACAS 10] Computing the Leakage of Information Hiding Systems Chapter III [TACAS 10] Computing the Leakage of Information Hiding Systems Chapter IV [QEST 10 & Journal TCS] Information hiding in concurrent systems Chapter IV [QEST 10 & Journal TCS] Information hiding in concurrent systems Chapter V [HVC 08] Significant diagnostic counterexample generation Chapter V [HVC 08] Significant diagnostic counterexample generation Chapter VI [CONCUR 10 & LICS 10 & TCS 10 & Journal Computer Security] Extensions (overview) Chapter VI [CONCUR 10 & LICS 10 & TCS 10 & Journal Computer Security] Extensions (overview)