Unifying the Global Response to Cybercrime Measurement of cybercrime Standardisation across Member States CAMINO’s 3rd Experts Workshop 15th-16th June.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
New Delhi, India, 14 March 2013 Innovating Cyber Defense Approaches to Combat Online Financial Fraud in Developing Economies Charles Iheagwara, Director,
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
HALDEBIQUE Geoffroy ROYER Johan  Crime motivated attacks  Hacktivism  Cyber Warfare.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
(Geneva, Switzerland, September 2014)
Frugal Innovations & Standardisation Ajay Ranjan Mishra*, Prof Jaideep Prahbu** *Chairman, FG Innovations, ITU **Head of Marketing, JBS, Cambridge Univ,
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Network Security Overview Ali Shayan Network Security Management’s Perspective Dangers: – Negligence – Dereliction of duty – Liable for damaged.
© 2010 Akamai Headlines You May Have Seen. © 2010 Akamai Headlines You DID NOT See POWERING A BETTER INTERNET President Delays Trip Due to Cyber Attacks.
A Comprehensive Guide to Mobile Targeted Attacks (and What Can You Do About It) Ohad Bobrov, CTO twitter.com/LacoonSecurity.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
The Cyber Defense center and its services portfolio McAfee Professional Services – Foundstone Services.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Dell Connected Security Solutions Simplify & unify.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
New Delhi, India, 14 March 2013 Frugal Innovations to Standardisation Impact on GDP? Ajay Ranjan Mishra*, Prof Jaideep Prahbu** *Chairman, FG Innovations,
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
The added value of the Wind Energy Roadmap Christian Nath – TPWind Executive Committee.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Country case study: The Netherlands The views expressed in this paper are those of the authors and do not necessarily reflect the opinions of the ITU,
The Euro Area Crisis: Origins, Prospects and Implications for the World Economy and Global Governance Domenico Lombardi UNLV, April 3, 2013.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Regional Cyber Crime Unit
Vicki Brown Digital Economy Unit UK Government Information Economy Strategy.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Information Management System Ali Saeed Khan 29 th April, 2016.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Securing Information Systems
Juniper Software-Defined Secure Network
Euro Area Economic Performance Indicators
Securing Information Systems
Exposing System Vulnerabilities Within Financial Services
Today’s Risk. Today’s Solutions. Cyber security and
Risk of the Internet At Home
Cyber-security for railways
Malware CJ
Philip Nichilo Vincent Carestia
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Cyber Security Challenges
Cybersecurity and Cyberhygiene
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
SECURITY IN THE DIGITAL AGE
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Unifying the Global Response to Cybercrime Measurement of cybercrime Standardisation across Member States CAMINO’s 3rd Experts Workshop 15th-16th June 2015 Royal Holloway, University of London, UK Presented: Jart Armin

Unifying the Global Response to Cybercrime Metrics, Economics, & Research Roadmap? The annual cost to the global economy from cybercrime? Direct cost to the EU of cybercrime? Direct cost to Germany ? Direct cost to UK? Cybercrime market globally itself? Market for security products and services? EU Research (H2020) into cybercrime? H2020 based on reduced cost of cybercrime? €300 billion Euros €13 billion ~0.4% GDP – 2014 € 2.6 billion /annum € 2 billion /annum €15 billion / annum €50 billion / annum €50 million / annum? €5 million project = €50 million saving / annum in EU on cybercrime

Unifying the Global Response to Cybercrime Metrics (1) – Observation

Unifying the Global Response to Cybercrime Metrics (2) Cybercrime Observations

Unifying the Global Response to Cybercrime Cyber Threats – Attack Traffic The macro effects of cybercrime Who or what are the intruders & attackers? = probes, botnets, zombies, vulnerability scanners, scrapers, malware, worms, DDoS, reflective traffic via misconfigured open resolvers.

Unifying the Global Response to Cybercrime Cyber Threats – Attack Traffic The macro effects of cybercrime “Attack traffic,” meaning countries and regions where: port probes, worm, malware, viruses, and reflection attacks………. originate.

Unifying the Global Response to Cybercrime Comparing “Intrusion Attempts” with “Peak Traffic Attacks” The macro effects of cybercrime In we observed a 95% correlation between data for intrusion attempts and Traffic attack size We extrapolated the data to make predictions up until 2014

Unifying the Global Response to Cybercrime Comparing “Intrusion Attempts” with “Peak Traffic Attacks” The data we predicted matches very well with the real data today There is now a 99% correlation between the intrusion data and the DDoS / Attack data

Unifying the Global Response to Cybercrime There is now a 99% correlation between the datasets Peak attack traffic: just over 30 GBPs took out Georgia Unlawful intrusion attempts detected: billion 2008 – 0.38 billion

Unifying the Global Response to Cybercrime Renewed predictions show attacks exceeding 1 Tbps by 2017

Unifying the Global Response to Cybercrime The Compromise of millions of mobile devices  Over the last year (2014/15) > 12 million cellular clients accounts have been compromised in Europe alone.  Such major operators as EE, Orange France, Vodaphone, Talk Talk, O2... Pacnet…and others have all been compromised and this involves broadband accounts as well as cellular.  Added to this we see the Gemalto compromise which involves a potential 2 billion SIM cards, for over 400 networks.  Regardless of who is behind these hacks and their purpose, the cellular operators and cyber security community have to re-focus on to safer cellular system client data and improved safeguards for clients accounts.

Unifying the Global Response to Cybercrime Measurement of cybercrime Contact presenter at if you are interested Asking questions Helping with the mobile project: The threats from and to the mobile infrastructure iBots & the Pocket Botnet Mobile Intrusion (micro & macro) Mobile Apps Mobile authentication Encryption for mobiles