The Security Circus.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Part I: Making Good Online Choices
Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Cyber Crime The current threat to the UK Security Marking.
Topic areas What are the wider social issues relating to media regulation?
Public Relations in Fairfax County and the Hunter Mill District.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Vs The Illusion of Security. Aaron Barr : “Security Expert” CEO of security company HBGary Federal Provide Security Training Create Malicious Software.
1 쉽게 접근하자 DoS! Sookmyung Women’s Univ. 최서윤. 2 The DoS?! Sockstress DoS using LOIC Link Local DoS.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Promoting Your Business Online Chris Wellings
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
How to make it easy for you customers to find and research you and your services!
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Special Anatomy of an Attack Or Layered Security Failure.
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Staying Safe Online Keep your Information Secure.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
Viruses Articles Article 1 - Computer virus hits second energy firm Article 2 - Online bank robbers face.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
 Anonymous is a loosely knit internet activist group mainly focusing on standing up against internet censorship.  The group is completely democratic,
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
WIKILEAKS ‘’WE OPEN GOVERNMENTS” By Imani Henry A2 Media.
Anonymous ACG 6415 Conley, Justin Glenn, Cassady Zhang, Fan.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Amanda Reyes Chris Connell Lindsey McQuiston Amanda Reyes Chris Connell Lindsey McQuiston.
What is Spam? d min.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Helping your family to stay in control Living with technology.
NDACo’s Messaging Communications & Publications Tools.
How To, When To and What To Do in Conducting an Investigation July 10, 2013 Chris M. Wright.
Premise What if AI hacked social media? What if AI spread hateful messages? What if AI drove humanity apart? This is the Antisocial AI.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
The Security Circus MPICT Summer Conference, June, 2011.
Last revised A.A. Degree CNIT 120: Network Security Fundamentals of Network Security Preparation for Security+ Certification Essential for.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
The Security Circus CNIT 120 Jan 14, Linus Thorvalds.
The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
BEACHLINK WEBINAR. WELCOME TO BEACHLINK BeachLink is the exciting new social network designed for members of the Redondo Beach Chamber of Commerce & Visitors.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
E- SAFETY INFORMATION EVENING 13 July T EACHING E - SAFETY T HINK UK NOW A recommended website for children to look.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Hands-On Ethical Hacking and Network Defense
Live Oak Communications
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Anonymous: Cyber Terrorists or Internet Saviors?
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Wikileaks, Anonymous, and The Jester
Unit 2, Lesson 5 Social Media Marketing for Events
Presentation transcript:

The Security Circus

Wikileaks Published <1000 US Gov't diplomatic cables from a leak of 250,000 Distributed an encrypted "Insurance" file by BitTorrent Widely assumed to contain the complete, uncensored leaked data Encrypted with AES-256--no one is ever getting in there without the key Key to be released if Assange is jailed or killed, but he is in UK now resisting extradition to Sweden and the key has not been released

Anonymous http://www.indybay.org/newsitems/2011/08/16/18687809.php

Operation Payback 4chan's Anonymous group Attacked Scientology websites in 2008 Attacked the RIAA and other copyright defenders Using the Low Orbit Ion Cannon with HiveMind (DDoS) "Opt-in Botnet"

HB Gary Federal Aaron Barr Developed a questionable way to track people down online By correlating Twitter, Facebook, and other postings Announced in Financial Times that he had located the “leaders” of Anonymous and would reveal them in a few days

Social Engineering & SQLi http://tinyurl.com/4gesrcj

Leaked HB Gary Emails For Bank of America For the Chamber of Commerce Discredit Wikileaks Intimidate Journalist Glenn Greenwald For the Chamber of Commerce Discredit the watchdog group US Chamber Watch Using fake social media accounts For the US Air Force Spread propaganda with fake accounts http://tinyurl.com/4anofw8

Drupal Exploit

OpBART Dumped thousands of commuter's emails and passwords on the Web http://www.djmash.at/release/users.html Defaced MyBart.org http://www.dailytech.com/Anonymous%20Targets%20Californias%20Infamous%20BART%20Hurts%20Citizens%20in%20the%20Process/article22444.htm

Booz Allen Hamilton "LulzSec" hacked it in July 2011 Dumped 150,000 US Military email addresses & passwords http://www.forbes.com/sites/andygreenberg/2011/07/11/anonymous-hackers-breach-booz-allen-hamilton-dump-90000-military-email-addresses/

Missouri Sheriff's Association Hacked by AntiSec, another part of Anonymous Published credit cards, informant personal info, police passwords, and more https://vv7pabmmyr2vnflf.tor2web.org/

Th3j35t3r "Hacktivist for Good" Claims to be ex-military Originally performed DoS attacks on Jihadist sites Bringing them down for brief periods, such as 30 minutes Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net

Jester's Tweets from Dec 2010

Th3j35t3r v. Wikileaks He brought down Wikileaks single-handed for more than a day I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack

Wikileaks Outage One attacker, no botnet

Th3j35t3r After his Wikileaks attack He battled Anonymous He claims to have trojaned a tool the Anons downloaded He claims to pwn Anon insiders now

Jester's Tweets

Westboro Baptist Outage 4 sites held down for 8 weeks From a single 3G cell phone http://tinyurl.com/4vggluu

LulzSec The "skilled" group of Anons who hacked US Senate AZ Police Pron.com Booz Hamilton Sony NATO Infragard The Sun PBS Fox News H B Gary Federal Game websites

Ryan Cleary Arrested June 21, 2011 Accused of DDoSing the UK’s Serious Organised Crime Agency http://www.dailymail.co.uk/news/article-2007345/Ryan-Cleary-Hacker-accused-bringing-British-FBI-site.html

T-Flow Arrested July 19, 2011 http://www.foxnews.com/scitech/2011/07/19/leading-member-lulzsec-hacker-squad-arrested-in-london/

Topiary Arrested On 7-27-11 http://www.dailymail.co.uk/news/article-2021332/Free-Radicals-The-Secret-Anarchy-Science-sales-rocket-Jake-Davis-seen-clutching-copy.html

http://mpictcenter. blogspot http://mpictcenter.blogspot.com/2011/08/how-i-out-hacked-lulzsec-member.html

Stay Out of Anonymous http://mpictcenter.blogspot.com/2011/08/stay-out-of-anonymous.html

Case Studies

Dan Kaminsky Link Ch0a

Jacob Applebaum Link Ch 0b

Boris Sverdkik

Security Curmudgeon Link Ch 0e

Byron Sonne Link Ch 0g

Gregory D. Evans

Sam Bowne