Download presentation
Presentation is loading. Please wait.
Published byAlison Clark Modified over 9 years ago
1
Scott Charney Cybercrime and Risk Management PwC
2
Understanding Risks: Computer As Target Confidentiality –The Cuckoo’s Egg Integrity –Seattle Sentencing –Pac Bell Intrusion Availability –Morris Worm –Infrastructure Protection –Cascading Effects Confidentiality –The Cuckoo’s Egg Integrity –Seattle Sentencing –Pac Bell Intrusion Availability –Morris Worm –Infrastructure Protection –Cascading Effects 2
3
PwC 3 Understanding Risks: Computer As Tool Frauds –Internal: The Airline Scam –External: Phony e-businesses Distribution Offenses –Copyrighted Software –Inappropriate Material Frauds –Internal: The Airline Scam –External: Phony e-businesses Distribution Offenses –Copyrighted Software –Inappropriate Material
4
PwC 4 Understanding Risks: Computer As Storage Device Large Volume of Data Duplicated and Distributed Recoverable Large Volume of Data Duplicated and Distributed Recoverable
5
PwC Future - What’s to come? Start with the Charney Theorem + Add anonymity + Add global connectivity + Add critical infrastructures + Add evidentiary issues = Lifetime Employment for Law Enforcement and Computer Security Professionals Start with the Charney Theorem + Add anonymity + Add global connectivity + Add critical infrastructures + Add evidentiary issues = Lifetime Employment for Law Enforcement and Computer Security Professionals 5
6
PwC And It’s Probably Worse Than We Think... DoD Controlled Study –Machines Attacked: 38,000 –Machine Penetrated: 24,700 (65%) –Attacks Detected: 988 (4%) –Attacks Reported: 267 (27%) DoD Controlled Study –Machines Attacked: 38,000 –Machine Penetrated: 24,700 (65%) –Attacks Detected: 988 (4%) –Attacks Reported: 267 (27%) 6
7
PwC What to Do: Manage Risk -- Implement Comprehensive Security! Be Prepared To Prevent and Respond to Computer Incidents Considering Physical, Personnel and Technical Security Be Prepared To Prevent and Respond to Computer Incidents Considering Physical, Personnel and Technical Security
8
PwC Prevention Identify Assets (Computer Resources and Data) Assess Internal and External Threats to Those Assets –Insider Threats: employees, contractors, JVs –Outsider Threats: hackers, hackivists, thieves, competitors, terrorists, nation-states Develop Core Business Policies to Protect Assets –Access Control Policies (watch remote access!) –Retention and destruction policies –Appropriate computer use –Workplace Monitoring? Educate Users and TEST COMPLIANCE Identify Assets (Computer Resources and Data) Assess Internal and External Threats to Those Assets –Insider Threats: employees, contractors, JVs –Outsider Threats: hackers, hackivists, thieves, competitors, terrorists, nation-states Develop Core Business Policies to Protect Assets –Access Control Policies (watch remote access!) –Retention and destruction policies –Appropriate computer use –Workplace Monitoring? Educate Users and TEST COMPLIANCE
9
PwC Prevention Technical Approaches –Map the Network –Test Existing Security (Attack and Penetration) Application Defaults Bad Configurations - Known Vulnerabilities Password Management –Install Defenses Firewalls IDS and CADS Encryption (VPNS, PKIs) Technical Approaches –Map the Network –Test Existing Security (Attack and Penetration) Application Defaults Bad Configurations - Known Vulnerabilities Password Management –Install Defenses Firewalls IDS and CADS Encryption (VPNS, PKIs)
10
PwC Response Develop response plan –Identify Key Personnel for Response –Identify Response Objectives Remediation vs. Investigation –Institute Response Procedures Audit Trails, Caller-ID Evidence Retention and Preservation Notifications (e.g., internal, downstream, law enforcement, regulatory authorities) Develop response plan –Identify Key Personnel for Response –Identify Response Objectives Remediation vs. Investigation –Institute Response Procedures Audit Trails, Caller-ID Evidence Retention and Preservation Notifications (e.g., internal, downstream, law enforcement, regulatory authorities)
11
Cybercrime and Risk Management Scott Charney (202) 822-4349 scott.charney@us.pwcglobal.com Scott Charney (202) 822-4349 scott.charney@us.pwcglobal.com PwC
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.