Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
CYBER & Product Liability & Professional Indemnity
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
7 Effective Habits when using the Internet Philip O’Kane 1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Marketing of Information Security Products. The business case for Information Security Management.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
Hacker Zombie Computer Reflectors Target.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer crimes.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Safe’n’Sec IT security solutions for enterprises of any size.
Cybersecurity Test Review Introduction to Digital Technology.
MIS323 – Business Telecommunications Chapter 10 Security.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
By: Micah Stevens Identity Theft in the World Today.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cybersecurity - What’s Next? June 2017
CYBER SECURITY...
A Project on CYBER SECURITY
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Risk of the Internet At Home
Chapter 9 E-Commerce Security and Fraud Protection
Cybercrime and Canadian Businesses
Strategic threat assessment
IoT: Privacy and Security
Presentation transcript:

Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012

© 2009 IBM Corporation Building a smarter planet About InternetNZ  Not for profit, open membership body  Our goal is to protect and promote the Internet for New Zealand  Combination of policy, advocacy with support for community groups  Recognised delegated manager for.nz domain name space .nz is run by 2 subsidiaries. Gives us income independent of government and commercial interests  Result: independent organisation with a drive to benefit the wider community 2

© 2009 IBM Corporation Building a smarter planet A Personal Story  Advanced Persistent Threats  No one is too small or unimportant  New Zealand’s geographic isolation and low level of physical threats tends to be reflected in our relaxed thinking about Internet threats 3

© 2009 IBM Corporation Building a smarter planet Do You Have Special Risks?  Identify any special threats. In that case, conventional “signature-based” anti- virus approach is no longer sufficient.  Run critical national infrastructure? –Family of malware (Stuxnet and Flame), likely State-sponsored, sophisticated, made by strong teams –Now expanded to commercial targets: Gauss, from the same family, targets commercial banking –Not known to target NZ specifically but could be collateral damage –Work closely with government (National Cyber Security Centre) 4

© 2009 IBM Corporation Building a smarter planet Special Risks continued  Trade, or plan to do so, with certain countries? –Some countries and businesses routinely use malware for stealing business secrets –Could be your supplier, lawyer or key staff  Commercially significant online operations? –Denial of Service attacks is a real threat 5

© 2009 IBM Corporation Building a smarter planet “Consumer” threats  Computer viruses and malware  Credit card fraud  Online scams  Phishing  Identity theft securitycentral.org.nz “In the last couple of years, more than 70% of New Zealanders have been the victims of some form of cyber crime” NetSafe 6

© 2009 IBM Corporation Building a smarter planet Attack Kits Are Changing the Economics  “Commoditisation” of Internet-based attacks  One estimate is that 2/3 rd of all online attacks can be traced to botnets and tool kits  Most popular: MPack, NeoSploit, and ZeuS  Typically priced from $40 to $8,000, depending on competition  For example, basic ZeuS tool kit costs $2,000 in a range of colours and optional modules (e.g. $2,000 more to hack Windows 7 computers; $2,000 for a Firefox form grabber; $1,000 for after-sales support; subscription to updates; etc.)  Used to steal financial and social networks credentials. A $4,000 investment in the ZeuS tool kit can easily return $50,000 to $100,000 with very little risk 7

© 2009 IBM Corporation Building a smarter planet How Big is the Problem?  Lack of neutral, credible statistics  A security vendor’s 2011 report put cost to New Zealand from cyber crime at $625 million/year; more than 2,000 Kiwis affected every day.  Another security vendor says cyber crime could cost NZ $4.7 billion every year  Unbelievable numbers undermines seriousness of the issue  Undermines ability to do a ‘cost/benefit analysis’ which should be at the heart of your risk management and security strategy “There has been no breach, that we are aware of, of New Zealand's banking system” TSB Bank 8

© 2009 IBM Corporation Building a smarter planet 2 Local Initiatives Backed by Credible Numbers  New Zealand Internet Task Force (NZITF) is a group of cybersecurity professionals across government, industry, vendors, researchers, etc.  A number of working groups across certification, exercising, surveys, etc.  I chair the Botnet Working Group  Initiative 1: Removal of drive-by malware –Drive-by malware infects users who simply visit an infected web page –Website owner mostly unaware as source of malware is 3 rd party advertising –Honeypot project carried out by the Victoria University of Wellington with funding from InternetNZ –Identified 241 malicious URLs in.nz domain over a 12 month period –Pilot will work with NZ Police to send notices to website owners 9

© 2009 IBM Corporation Building a smarter planet 2 Local Initiatives continued  Initiative 2: Infected customers’ devices –Statistics NZ survey indicates about 50,000 customer devices infected (zombies) –ISPs take a variety of steps when notified or detect an infected customer –May become a bigger problem once fibre brings ultra-fast broadband and bigger monthly data caps –Initiative is to share best practices; improved information about infections; and consistent approach by participating ISPs 10

© 2009 IBM Corporation Building a smarter planet Summary  Overall, New Zealand cybersecurity threats are in line with international trends  New Zealand’s geographic isolation and low level of physical threats tends to be reflected in our relaxed thinking about Internet threats  No one is too small or unimportant  Identify any special threats. In that case, conventional “signature-based” anti-virus approach is no longer sufficient.  Off-the-shelf attack kits are commoditising cyber attacks  Lack of neutral, credible statistics makes cost/benefit analysis difficult  Several initiatives under way from a number of organisations, including InternetNZ, under the umbrella of NZ Internet Task Force 11

© 2009 IBM Corporation Building a smarter planet Questions? © Internet New Zealand Inc Vikram Kumar Chief Executive, InternetNZ 12