Copyright Security-Assessment.com 2005 Internet Security and Fraud Current Online Trends by Nick von Dadelszen.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Copyright Security-Assessment.com 2005 From The Trenches (Australia) What We Are Seeing Within Security Today by Peter Benson.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Copyright Security-Assessment.com 2005 From The Trenches What we are seeing within security today by Nick von Dadelszen.
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Securing Information Systems
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Copyright Security-Assessment.com 2005 Exposing Web Vulnerabilities The State of Web Application Security by Nick von Dadelszen.
Staying Safe Online Keep your Information Secure.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Information Security: Current Threats Marc Scarborough Information Security Officer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Information Systems Design and Development Security Precautions Computing Science.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security By: Pratik Gandhi.
Teaching Computing to GCSE
Presentation transcript:

Copyright Security-Assessment.com 2005 Internet Security and Fraud Current Online Trends by Nick von Dadelszen

Copyright Security-Assessment.com 2005 Security-Assessment.com – Who We Are NZ’s only pure-play security firm Largest team of security professionals in NZ Offices in Auckland, Wellington and Sydney Specialisation in multiple security fields – Security assessment – Security management – Forensics / incident response – Research and development

Copyright Security-Assessment.com 2005 Continuing Security Trends Still seeing opportunity hacks “script-kiddie” style – Windows machine fresh installed will be hacked in approximately 20 minutes Virus levels continuing to increase Time-to-exploit once a vulnerability is known is continuing to go down The number of vulnerability advisories is increasing

Copyright Security-Assessment.com 2005

Zone-H.org Statistics 119.nz sites mirrored in March – Those are only the ones zone-h.org hears about Of those sites: – 98.co.nz, 12 are.org.nz, 7.net.nz, and 1 is.govt.nz Of all hacks on Zone-H.org: – 60% Linux, 30% Windows, 10% Other – (General web server statistics show 70% Linux, 20% Windows, 10% Other)

Copyright Security-Assessment.com 2005 Virus Statistics (from MessageLabs) Virus levels continuing to increase Virus ratio in – 2002 – 0.5% – 2003 – 3% – 2004 – 6% 2004 saw several large viruses including: – MyDoom – Netsky/Bagle war

Copyright Security-Assessment.com virus Levels

Copyright Security-Assessment.com 2005 Decreasing Time-to-exploit People patching sooner – 2003 – every 30 days the number of vulnerable systems reduces by 50% – 2004 – every 21 days the number of vulnerable systems reduces by 50% But time-to-exploit is decreasing as well – 80% of worms and automated exploits are targeting the first two half-life periods of critical vulnerabilities

Copyright Security-Assessment.com 2005 Vulnerability Half-Life

Copyright Security-Assessment.com 2005 Vulnerability Exploitation

Copyright Security-Assessment.com 2005 Secuna Statistics

Copyright Security-Assessment.com 2005 New Security Trends Organised crime on the rise Hacking for profit – CyberExtortion Targeting users as well as sites: – Key loggers – Trojans – Phishing – Browser-based attacks / spam / spyware

Copyright Security-Assessment.com 2005 Fraud Statistics Source: IC Internet Fraud - Crime Report

Copyright Security-Assessment.com 2005 Identity Theft Stealing of a user’s identity Fastest growing area of online fraud Several different mechanisms – Credit Card number capturing – Phishing / Social Engineering – Malicious code Trojans Man-in-the-middle attacks

Copyright Security-Assessment.com 2005 Identity Theft Online vs Offline OfflinePercentage Lost or stolen wallet, check book or credit card28.8% Known acquaintances with access to information11.4% Accessed as part of offline transactions8.69% Corrupt employee with access to information8.7% Stolen paper mail/fraudulent change of address8.0% Taken from garbage2.0% Total68.2% Online Computer spyware5.2% Accessed as part of an online transaction2.51% Computer virus/hacker2.2% Phishing1.7% Total11.6%

Copyright Security-Assessment.com 2005 Credit Card Capturing Many sites still do not protect Credit Card numbers as well as they should Black market for stolen Credit Card numbers Gathered by breaking into sites or capturing traffic

Copyright Security-Assessment.com 2005 Phishing Attacker send fake to victim pretending to be trusted institution Victim responds to (either directly or by clicking on a link) Victim provides attacker with information required to access services

Copyright Security-Assessment.com 2005 Phishing Increases

Copyright Security-Assessment.com 2005 Phishing Trends Unique Phishing Attempts December 2003 – 113 Unique Phishing Attempts July 2004 – 1974 Unique Phishing Attempts February 2005 – 13,141 Now using different techniques, IM, pharming

Copyright Security-Assessment.com 2005 Organisations Targeted For Phishing Financial Institutions Auction Sites ISPs Online Retailers

Copyright Security-Assessment.com 2005 Malicious Code Keyloggers Trojans Fake sites Man-in-the-middle attacks (MarketScore)

Copyright Security-Assessment.com 2005 Internal Fraud Still major risk Statistics show majority of losses are the result of internal attacks Have seen recent examples of this in New Zealand – MSD – MinHealth

Copyright Security-Assessment.com 2005 How To Stop It Three types of controls – Preventative – Detective – Deterrent Effective strategy requires use of all three – Preventative – technical controls, 2-factor, limiting services, education – Detective – increased monitoring and reporting – Deterrent – New anti-hacking laws

Copyright Security-Assessment.com 2005 What is Two-Factor Authentication Many different types of two-factor – One-time passwords Password-generating token (SecureID, Vasco) SMS tokens Scratch pads – Client-side Certificates Smart cards USB keys – Biometrics

Copyright Security-Assessment.com 2005 The Benefits of Two-Factor Requires more than just a username/password combination Protects against the majority of the attacks currently being performed today Provides an extra level of comfort for security- conscious users

Copyright Security-Assessment.com 2005 The Trouble With Two-Factor Designed for small user base Has a usability cost No clear market leader Potentially large implementation costs Will not stop all attacks – Man-in-the-middle – Intelligent Trojans

Copyright Security-Assessment.com 2005 The Weakness Of SSL Relies on trust Tells you that you have a secure session with A website, not THE website Certificates can be faked Root certificates can be installed – MarketScore Allows for Man-in-the-middle and IDN attacks

Copyright Security-Assessment.com 2005 MITM vs Two-Factor

Copyright Security-Assessment.com 2005 Will Two-Factor Help? Does increase security Makes attacks harder Will require attacks to be more focused Must be a business decision – Amount of security required – Cost vs benefit

Copyright Security-Assessment.com 2005 Defence Against Client Attacks Authentication is the key – Client authentication – Server authentication Users must protect themselves – Don’t use public terminals – Anti-virus – Firewall – Automatic updates – Anti-Spyware

Copyright Security-Assessment.com 2005 State of Security In New Zealand Patch process improving but… Majority of incidents investigated in the last year due to un-patched systems/mis- configurations Web applications still slow to improve security Organisations still leaving security until late in the development cycle

Copyright Security-Assessment.com 2005 State of Security in New Zealand Security awareness increasing Lack of incident response planning – Leads to increased response time Lack of business continuity planning – Leads to increased downtime Anyone can be a target: – Aria Farms

Copyright Security-Assessment.com 2005 Some Recent NZ Stories Online bankers blocked for spyware (12/3/2005) – TAB outage costs $320,000 (17/2/2005) – 002EC454?OpenDocument&pub=Computerworld Paradise tracks hackers (3/2/2005) – Hospital computer failure could be hackers (28/10/2004) – Ministry man cracks computer to steal $2m (30/9/2004) –

Copyright Security-Assessment.com 2005 More Recent NZ Stories Hacker breaks into firms’ phones (28/9/2004) – Aria Farms hacked - spurious recall notices sent (9/9/2004) – D?opendocument Bookies hit with online extortion (21/7/2004) – 5Enbv%5E,00.html Online credit-card fraudster jailed (31/5/2004) – Police called after National party website hacked (15/3/2004) –

Copyright Security-Assessment.com 2005 Questions?