Download presentation
Presentation is loading. Please wait.
Published byAbigayle Hall Modified over 8 years ago
1
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group
2
FBI Phoenix Computer Crime Squad Cyber Front Status Report
3
FBI Phoenix – Computer Crime Squad
4
social engineering
5
FBI Phoenix – Computer Crime Squad vulnerabilities tech
9
FBI strategy Computer Crime Squad Network Security Issues
10
FBI Phoenix – Computer Crime Squad FBI Priorities Post 9/11/2001 counterterrorism counterintelligence computer crime investigations prevention
11
FBI Phoenix – Computer Crime Squad unauthorized access malicious code denial of service Investigation - Computer Intrusion Program
12
FBI Phoenix – Computer Crime Squad Active investigations Developing intelligence Sharing intelligence Investigation - Computer Intrusion Program
13
FBI Phoenix – Computer Crime Squad InfraGard Chapters Outreach Presentations Information Sharing Prevention - InfraGard Program
14
FBI Phoenix – Computer Crime Squad CSI/FBI 1996 – 2003 COMPUTER CRIME AND SECURITY SURVEY
15
Unauthorized use of computer systems within the last 12 months? CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute 2001: 532 Respondents/99.6% 2000: 585 Respondents/91% 1999: 512 Respondents/98% 1998: 515 Respondents/99% 1997: 391 Respondents/69% 1996: 410 Respondents/96% YESNODON’T KNOW Percentage of Respondents
16
FBI Phoenix – Computer Crime Squad 2002 www.gocsi.org
17
FBI Phoenix – Computer Crime Squad 56 FBI offices 79 chapters 9400+ members information sharing
18
FBI Phoenix – Computer Crime Squad SA Tom Liffiton 602.279.5511 x3105 602.650.3105 tliffiton@fbi.gov contact www.infragard.net
19
FBI Phoenix – Computer Crime Squad www.nipc.gov
20
ISO 17799 STANDARDS Security Policy Security Organization Asset classification and control Personnel Security Physical and environmental security Communications and operations management Access Control Systems Development and maintenance Business Continuity Management Compliance (HIPAA) (Gramm-Leach-Bliley)
21
www.csrc.gov/publications
22
Implementing the National Strategy Congress and Conference InfraGard 2003 Washington, DC June 23-25, 2003
23
www.ciddac.org
24
FBI Phoenix – Computer Crime Squad wireless vulnerabilities pbx vulnerabilities incident response intrusion detection computer forensics encrypted storage disaster recovery local presentations
25
FBI Phoenix – Computer Crime Squad have a relationship with law enforcement adopt info assurance best practices develop incident response plan educate users on security participate in InfraGArd maintain audit logs think evidence practice due diligence to do to do to do to do to do
26
FBI Phoenix – Computer Crime Squad SA Tom Liffiton 602.279.5511 x3105 602.650.3105 tliffiton@fbi.gov contact www.infragard.net
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.