SlideShare une entreprise Scribd logo
1  sur  44
Why vigilance is
our best Protection
against Cyber
Crime
The ability to download hacking tools
means that a determined 12-year old with
some basic computer skills can become not
only a successful hacker but can actually
make money from stealing on the internet.
For the more advanced wannabe, there are
cyber crime black markets that sell
personal data, credit card information,
tools, passwords, and successful exploits.
In addition to that, criminals can rent “bot-nets”
(a list of compromised and infected computers
all over the Internet) from the cyber-criminal
underworld.
They can even purchase complete online stores
to collect personal information or to sell bogus
products.
Wannabe Cyber Criminals can post
resumes and apply for cracking or
hacking jobs, or apply to join Cyber
Criminal Gangs
This is the world we live in
A little History of Technology in Crime
Crime is exponential.
In the old days it was Mano au Mano - one person
stealing from one person.
We then added stage coaches, trains and banks one
person stealing from a number of people.
The Sony hack in 2011 was one person or a small
group of people stealing from 70 million people.
Mobile phones and pagers
The normal criminals were using
these long before normal business
people, Doctors and senior
Management.
In the 1990’s one Mexican cartel and
its drug lord were so annoyed at
being targeted by law enforcement
that they created their own complete
mobile phone system
Phone towers in all 31 States,
Mobile phones and
their own SIM cards
The Mumbai terrorist attack (Raj hotel 2008)
Why did it take so long to catch the
terrorists?
They had help!
They had the normal things, Guns
and Bombs,
They also had GPS, Encrypted mobile
phones and night vision goggles
They also had an Operations centre in Pakistan,
telling where the good guys were and feeding
critical information to them in real time
Meanwhile in Cyber
Space
Androids
In its endeavour to beat the Apple IPhone,
Google released the android operating system
September 2008 it was released to the world on
HTC’s Dream
The android market went live at the same time
selling everything from games to Apps for the
android device
Android
People started using the Android market and
downloading apps and games for their devices
In the first month 50,000 banking apps were
downloaded.
All were fake!
Even Today
Download a flashlight app from either android
and IOS
75% have a malware component
Seems to be the easiest app to get through the
vetting process
If it asks you if it can access your location
service then there is a good chance that it is
bad for your phone
Why do you need a location service for a
light?
A criminal organisation in the Ukraine set itself
up as a marketing company:
Selling software and websites – Russian Brides,
the FBI virus, all were malware infected
The Bad guys are so sophisticated - in
2012
Had all of the correct staffing in the office
including a call centre which could talk you
through the process of sending them money
to purchase their “Software” or sign up for a
Bride.
They had Legitimate offices and payed
taxes
Only about 5% of the people knew they were
doing something illegal and most of them
were not Management.
They generated 500 Million Euros in revenue
in the first 12 months of operations
Actually the bad guys are
here, right now!!!
The bad guys are smart, persistent,
well educated in computer systems
and know what they are doing
They are developing more and more
sophisticated ways of gaining access
to your systems and information
What do they want
• They want your Money
• They want everyone's information.
• They want your Ideas and Intellectual Property
The cost to everyone
• 2 trillion dollar industry – world wide
• There are unaccountable number of lives
destroyed
• The actual loss of intellectual property cannot
be measured
How do they do it!
They use Viruses, malware, spyware, ransom
ware, RATs (remote access Trojans) and
focused hacking attacks
They have sophisticated command and
control systems
Use and create Bot nets
They use sophisticated encrypted
communications systems
They rent cloud space, super computer
cycles and bot nets – with a stolen credit
cards of course
Paid in Bit coins (a supposedly
untraceable finite internet based money)
Everyone is a target
If that doesn’t work they use social
engineering and industrial espionage:
They put infected USB drives in car parks,
They swap out DVD’s and CD’s from
Magazines
They use targeted Spear phishing attacks
I consider the internet the most
dangerous place in the world
Its like walking down a dark alley in
the worst part of your town or city,
with your hands and feet shackled,
you wallet full of money, credit
cards and personal information
and a big sign saying “ROB ME”
Why are we so vulnerable on
the internet?
For some reason normal human checks
and balances go out the window
They get round your defences in
unpredictable ways
We all want to trust someone so they
use our trusting nature against us
That’s what it all comes down to:
Trust
Normally we use all of our senses when you
meet someone
– Sight
– Sound
– Touch
– Taste
– Smell
You often hear I didn’t like him, or I had a funny feeling
about her.
The internet is all about trust
On the internet – sight is the only sense that we
rely on
That can be skewed in so many ways.
How do you know that the person you are talking to
on the internet is who they say they are
Was it her or is it this guy?
On the internet we rely on reputation,
information from others to build that trust.
If you are purchasing something from Amazon?
Do you check the sellers reputation.
• How many things they have sold,
• is there any outstanding complaints,
• are the goods guaranteed!
When purchasing on the internet do you check
the address, phone number?
Cybersecurity is MY problem.
Cybersecurity is MY problem. I have to
look at it in that context.
Cybersecurity is MY problem, I am the
Master of my own destiny.
Cybersecurity is MY problem and If I want
protection, I have to be the one protecting.
Cybersecurity is MY problem and I have to
protect myself and not rely on others to do
that for me.
What are the basics to protect
yourself
Use Strong passwords – do not use a word, use a
phrase with spaces in it
Use Unique passwords – do not use the same
password on more than one account
Use the newest operating system and applications
you can afford and keep them updated
Use a good Anti Virus – Buy one if you cannot afford
to buy one use a reputable free one.
Be paranoid – on the internet paranoia is not a state
of mind everyone is out to get you
Use Common sense – if its too good to be true then
it is a trap. If its free then its not.
Awareness is the key to protecting
yourself
Build up your cyber security awareness
Need Help?
Go to www.securitypolicytraining.com.au and
sign up for the basic cyber security awareness
course.
This code Slideshare1 will allow the first 10
people to do the course for free
If all of the free ones are gone use Slideshare2
for a 40% discount
The only constant we
have is change

Contenu connexe

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Vigilance is our best protection against cyber crime

  • 1. Why vigilance is our best Protection against Cyber Crime
  • 2. The ability to download hacking tools means that a determined 12-year old with some basic computer skills can become not only a successful hacker but can actually make money from stealing on the internet.
  • 3. For the more advanced wannabe, there are cyber crime black markets that sell personal data, credit card information, tools, passwords, and successful exploits.
  • 4. In addition to that, criminals can rent “bot-nets” (a list of compromised and infected computers all over the Internet) from the cyber-criminal underworld. They can even purchase complete online stores to collect personal information or to sell bogus products.
  • 5. Wannabe Cyber Criminals can post resumes and apply for cracking or hacking jobs, or apply to join Cyber Criminal Gangs This is the world we live in
  • 6. A little History of Technology in Crime
  • 7. Crime is exponential. In the old days it was Mano au Mano - one person stealing from one person. We then added stage coaches, trains and banks one person stealing from a number of people. The Sony hack in 2011 was one person or a small group of people stealing from 70 million people.
  • 8. Mobile phones and pagers The normal criminals were using these long before normal business people, Doctors and senior Management.
  • 9. In the 1990’s one Mexican cartel and its drug lord were so annoyed at being targeted by law enforcement that they created their own complete mobile phone system Phone towers in all 31 States, Mobile phones and their own SIM cards
  • 10. The Mumbai terrorist attack (Raj hotel 2008) Why did it take so long to catch the terrorists?
  • 11. They had help! They had the normal things, Guns and Bombs, They also had GPS, Encrypted mobile phones and night vision goggles
  • 12. They also had an Operations centre in Pakistan, telling where the good guys were and feeding critical information to them in real time
  • 14. Androids In its endeavour to beat the Apple IPhone, Google released the android operating system September 2008 it was released to the world on HTC’s Dream The android market went live at the same time selling everything from games to Apps for the android device
  • 15. Android People started using the Android market and downloading apps and games for their devices In the first month 50,000 banking apps were downloaded.
  • 17. Even Today Download a flashlight app from either android and IOS 75% have a malware component Seems to be the easiest app to get through the vetting process If it asks you if it can access your location service then there is a good chance that it is bad for your phone Why do you need a location service for a light?
  • 18. A criminal organisation in the Ukraine set itself up as a marketing company: Selling software and websites – Russian Brides, the FBI virus, all were malware infected The Bad guys are so sophisticated - in 2012
  • 19. Had all of the correct staffing in the office including a call centre which could talk you through the process of sending them money to purchase their “Software” or sign up for a Bride. They had Legitimate offices and payed taxes
  • 20. Only about 5% of the people knew they were doing something illegal and most of them were not Management. They generated 500 Million Euros in revenue in the first 12 months of operations
  • 21. Actually the bad guys are here, right now!!!
  • 22. The bad guys are smart, persistent, well educated in computer systems and know what they are doing
  • 23. They are developing more and more sophisticated ways of gaining access to your systems and information
  • 24. What do they want • They want your Money • They want everyone's information. • They want your Ideas and Intellectual Property
  • 25. The cost to everyone • 2 trillion dollar industry – world wide • There are unaccountable number of lives destroyed • The actual loss of intellectual property cannot be measured
  • 26. How do they do it! They use Viruses, malware, spyware, ransom ware, RATs (remote access Trojans) and focused hacking attacks They have sophisticated command and control systems Use and create Bot nets
  • 27. They use sophisticated encrypted communications systems They rent cloud space, super computer cycles and bot nets – with a stolen credit cards of course Paid in Bit coins (a supposedly untraceable finite internet based money)
  • 28. Everyone is a target If that doesn’t work they use social engineering and industrial espionage: They put infected USB drives in car parks, They swap out DVD’s and CD’s from Magazines They use targeted Spear phishing attacks
  • 29. I consider the internet the most dangerous place in the world Its like walking down a dark alley in the worst part of your town or city, with your hands and feet shackled, you wallet full of money, credit cards and personal information and a big sign saying “ROB ME”
  • 30. Why are we so vulnerable on the internet?
  • 31. For some reason normal human checks and balances go out the window They get round your defences in unpredictable ways We all want to trust someone so they use our trusting nature against us
  • 32. That’s what it all comes down to: Trust Normally we use all of our senses when you meet someone – Sight – Sound – Touch – Taste – Smell You often hear I didn’t like him, or I had a funny feeling about her.
  • 33. The internet is all about trust On the internet – sight is the only sense that we rely on That can be skewed in so many ways.
  • 34. How do you know that the person you are talking to on the internet is who they say they are
  • 35. Was it her or is it this guy?
  • 36. On the internet we rely on reputation, information from others to build that trust. If you are purchasing something from Amazon? Do you check the sellers reputation. • How many things they have sold, • is there any outstanding complaints, • are the goods guaranteed! When purchasing on the internet do you check the address, phone number?
  • 38. Cybersecurity is MY problem. I have to look at it in that context. Cybersecurity is MY problem, I am the Master of my own destiny.
  • 39. Cybersecurity is MY problem and If I want protection, I have to be the one protecting. Cybersecurity is MY problem and I have to protect myself and not rely on others to do that for me.
  • 40. What are the basics to protect yourself Use Strong passwords – do not use a word, use a phrase with spaces in it Use Unique passwords – do not use the same password on more than one account Use the newest operating system and applications you can afford and keep them updated
  • 41. Use a good Anti Virus – Buy one if you cannot afford to buy one use a reputable free one. Be paranoid – on the internet paranoia is not a state of mind everyone is out to get you Use Common sense – if its too good to be true then it is a trap. If its free then its not.
  • 42. Awareness is the key to protecting yourself Build up your cyber security awareness
  • 43. Need Help? Go to www.securitypolicytraining.com.au and sign up for the basic cyber security awareness course. This code Slideshare1 will allow the first 10 people to do the course for free If all of the free ones are gone use Slideshare2 for a 40% discount
  • 44. The only constant we have is change

Notes de l'éditeur

  1. In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  2. In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  3. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  4. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  5. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  6. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  7. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  8. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  9. risk
  10. risk
  11. training
  12. training
  13. training