Download presentation
Presentation is loading. Please wait.
Published byDylan Lawson Modified over 9 years ago
2
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader
3
Who carries out “Cyber Crime” Why have Cyber incidents become so prevalent Social Engineering Case Studies for some common Cyber incidents Recent high profile Cyber incidents
4
Who carries out Cyber Crime? Skilled individuals Organised Crime Corporate Espionage Insider threats Hacktivists State sponsored attacks
5
The nature of the risk has changed from individuals seeking notoriety / kudos to criminals presenting a targeted advanced persistent threat Network infrastructures can contain thousands of applications, delivering different functions, including interaction with external systems
6
Why is Cyber profiling now? The Onion Ring “TOR” Digital currency Web pages selling illegal goods / data
7
The Onion Ring Gives anonymity on-line Actual address is masked using relays Can be used to set up anonymous accounts No source if unsecured domestic WiFi is used
8
Wardriving Wardriving is the act of searching for open Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).
9
Digital Currency Decentralised Transactions held in a public register Interchangeable with tangible currency Bitcoin value $1 in 2010 to $100 in 2013
10
Social Engineering – “Hacking the Human” Hackers toolkits use different methods Applications, Adverts and Malware Passwords
11
Case Studies Crypto Viruses Virtualisation Denial of Service Attack Network Breach
12
Denial of Access Botnets can be hired out There is no physical damage to the target Substantial BI impact for on-line traders 100 Gb per second
13
Keylogger Breach USB Amazon £40 No administration rights required Key strokes saved in flash memory User name and password can be read
14
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.