Why vigilance is
our best Protection
against Cyber
Crime
The ability to download hacking tools
means that a determined 12-year old with
some basic computer skills can become not
o...
For the more advanced wannabe, there are
cyber crime black markets that sell
personal data, credit card information,
tools...
In addition to that, criminals can rent “bot-nets”
(a list of compromised and infected computers
all over the Internet) fr...
Wannabe Cyber Criminals can post
resumes and apply for cracking or
hacking jobs, or apply to join Cyber
Criminal Gangs
Thi...
A little History of Technology in Crime
Crime is exponential.
In the old days it was Mano au Mano - one person
stealing from one person.
We then added stage coach...
Mobile phones and pagers
The normal criminals were using
these long before normal business
people, Doctors and senior
Mana...
In the 1990’s one Mexican cartel and
its drug lord were so annoyed at
being targeted by law enforcement
that they created ...
The Mumbai terrorist attack (Raj hotel 2008)
Why did it take so long to catch the
terrorists?
They had help!
They had the normal things, Guns
and Bombs,
They also had GPS, Encrypted mobile
phones and night vision gog...
They also had an Operations centre in Pakistan,
telling where the good guys were and feeding
critical information to them ...
Meanwhile in Cyber
Space
Androids
In its endeavour to beat the Apple IPhone,
Google released the android operating system
September 2008 it was rel...
Android
People started using the Android market and
downloading apps and games for their devices
In the first month 50,000...
All were fake!
Even Today
Download a flashlight app from either android
and IOS
75% have a malware component
Seems to be the easiest app ...
A criminal organisation in the Ukraine set itself
up as a marketing company:
Selling software and websites – Russian Bride...
Had all of the correct staffing in the office
including a call centre which could talk you
through the process of sending ...
Only about 5% of the people knew they were
doing something illegal and most of them
were not Management.
They generated 50...
Actually the bad guys are
here, right now!!!
The bad guys are smart, persistent,
well educated in computer systems
and know what they are doing
They are developing more and more
sophisticated ways of gaining access
to your systems and information
What do they want
• They want your Money
• They want everyone's information.
• They want your Ideas and Intellectual Prope...
The cost to everyone
• 2 trillion dollar industry – world wide
• There are unaccountable number of lives
destroyed
• The a...
How do they do it!
They use Viruses, malware, spyware, ransom
ware, RATs (remote access Trojans) and
focused hacking attac...
They use sophisticated encrypted
communications systems
They rent cloud space, super computer
cycles and bot nets – with a...
Everyone is a target
If that doesn’t work they use social
engineering and industrial espionage:
They put infected USB driv...
I consider the internet the most
dangerous place in the world
Its like walking down a dark alley in
the worst part of your...
Why are we so vulnerable on
the internet?
For some reason normal human checks
and balances go out the window
They get round your defences in
unpredictable ways
We a...
That’s what it all comes down to:
Trust
Normally we use all of our senses when you
meet someone
– Sight
– Sound
– Touch
– ...
The internet is all about trust
On the internet – sight is the only sense that we
rely on
That can be skewed in so many wa...
How do you know that the person you are talking to
on the internet is who they say they are
Was it her or is it this guy?
On the internet we rely on reputation,
information from others to build that trust.
If you are purchasing something from A...
Cybersecurity is MY problem.
Cybersecurity is MY problem. I have to
look at it in that context.
Cybersecurity is MY problem, I am the
Master of my own ...
Cybersecurity is MY problem and If I want
protection, I have to be the one protecting.
Cybersecurity is MY problem and I h...
What are the basics to protect
yourself
Use Strong passwords – do not use a word, use a
phrase with spaces in it
Use Uniqu...
Use a good Anti Virus – Buy one if you cannot afford
to buy one use a reputable free one.
Be paranoid – on the internet pa...
Awareness is the key to protecting
yourself
Build up your cyber security awareness
Need Help?
Go to www.securitypolicytraining.com.au and
sign up for the basic cyber security awareness
course.
This code Sl...
The only constant we
have is change
Upcoming SlideShare
Loading in …5
×

Vigilance is our best protection against cyber crime

467 views
397 views

Published on

Cyber security is MY problem, this should be the attitude of all users on the internet. Sadly its not. Cyber Crime and Cyber Security rely on all users of the internet to be paranoid and to use common sense. Awareness is the cheapest and safest way to increase your business and individual protection.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
467
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  • In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  • 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  • 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  • 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  • 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  • 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  • 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  • risk
  • risk
  • training
  • training
  • training
  • Vigilance is our best protection against cyber crime

    1. 1. Why vigilance is our best Protection against Cyber Crime
    2. 2. The ability to download hacking tools means that a determined 12-year old with some basic computer skills can become not only a successful hacker but can actually make money from stealing on the internet.
    3. 3. For the more advanced wannabe, there are cyber crime black markets that sell personal data, credit card information, tools, passwords, and successful exploits.
    4. 4. In addition to that, criminals can rent “bot-nets” (a list of compromised and infected computers all over the Internet) from the cyber-criminal underworld. They can even purchase complete online stores to collect personal information or to sell bogus products.
    5. 5. Wannabe Cyber Criminals can post resumes and apply for cracking or hacking jobs, or apply to join Cyber Criminal Gangs This is the world we live in
    6. 6. A little History of Technology in Crime
    7. 7. Crime is exponential. In the old days it was Mano au Mano - one person stealing from one person. We then added stage coaches, trains and banks one person stealing from a number of people. The Sony hack in 2011 was one person or a small group of people stealing from 70 million people.
    8. 8. Mobile phones and pagers The normal criminals were using these long before normal business people, Doctors and senior Management.
    9. 9. In the 1990’s one Mexican cartel and its drug lord were so annoyed at being targeted by law enforcement that they created their own complete mobile phone system Phone towers in all 31 States, Mobile phones and their own SIM cards
    10. 10. The Mumbai terrorist attack (Raj hotel 2008) Why did it take so long to catch the terrorists?
    11. 11. They had help! They had the normal things, Guns and Bombs, They also had GPS, Encrypted mobile phones and night vision goggles
    12. 12. They also had an Operations centre in Pakistan, telling where the good guys were and feeding critical information to them in real time
    13. 13. Meanwhile in Cyber Space
    14. 14. Androids In its endeavour to beat the Apple IPhone, Google released the android operating system September 2008 it was released to the world on HTC’s Dream The android market went live at the same time selling everything from games to Apps for the android device
    15. 15. Android People started using the Android market and downloading apps and games for their devices In the first month 50,000 banking apps were downloaded.
    16. 16. All were fake!
    17. 17. Even Today Download a flashlight app from either android and IOS 75% have a malware component Seems to be the easiest app to get through the vetting process If it asks you if it can access your location service then there is a good chance that it is bad for your phone Why do you need a location service for a light?
    18. 18. A criminal organisation in the Ukraine set itself up as a marketing company: Selling software and websites – Russian Brides, the FBI virus, all were malware infected The Bad guys are so sophisticated - in 2012
    19. 19. Had all of the correct staffing in the office including a call centre which could talk you through the process of sending them money to purchase their “Software” or sign up for a Bride. They had Legitimate offices and payed taxes
    20. 20. Only about 5% of the people knew they were doing something illegal and most of them were not Management. They generated 500 Million Euros in revenue in the first 12 months of operations
    21. 21. Actually the bad guys are here, right now!!!
    22. 22. The bad guys are smart, persistent, well educated in computer systems and know what they are doing
    23. 23. They are developing more and more sophisticated ways of gaining access to your systems and information
    24. 24. What do they want • They want your Money • They want everyone's information. • They want your Ideas and Intellectual Property
    25. 25. The cost to everyone • 2 trillion dollar industry – world wide • There are unaccountable number of lives destroyed • The actual loss of intellectual property cannot be measured
    26. 26. How do they do it! They use Viruses, malware, spyware, ransom ware, RATs (remote access Trojans) and focused hacking attacks They have sophisticated command and control systems Use and create Bot nets
    27. 27. They use sophisticated encrypted communications systems They rent cloud space, super computer cycles and bot nets – with a stolen credit cards of course Paid in Bit coins (a supposedly untraceable finite internet based money)
    28. 28. Everyone is a target If that doesn’t work they use social engineering and industrial espionage: They put infected USB drives in car parks, They swap out DVD’s and CD’s from Magazines They use targeted Spear phishing attacks
    29. 29. I consider the internet the most dangerous place in the world Its like walking down a dark alley in the worst part of your town or city, with your hands and feet shackled, you wallet full of money, credit cards and personal information and a big sign saying “ROB ME”
    30. 30. Why are we so vulnerable on the internet?
    31. 31. For some reason normal human checks and balances go out the window They get round your defences in unpredictable ways We all want to trust someone so they use our trusting nature against us
    32. 32. That’s what it all comes down to: Trust Normally we use all of our senses when you meet someone – Sight – Sound – Touch – Taste – Smell You often hear I didn’t like him, or I had a funny feeling about her.
    33. 33. The internet is all about trust On the internet – sight is the only sense that we rely on That can be skewed in so many ways.
    34. 34. How do you know that the person you are talking to on the internet is who they say they are
    35. 35. Was it her or is it this guy?
    36. 36. On the internet we rely on reputation, information from others to build that trust. If you are purchasing something from Amazon? Do you check the sellers reputation. • How many things they have sold, • is there any outstanding complaints, • are the goods guaranteed! When purchasing on the internet do you check the address, phone number?
    37. 37. Cybersecurity is MY problem.
    38. 38. Cybersecurity is MY problem. I have to look at it in that context. Cybersecurity is MY problem, I am the Master of my own destiny.
    39. 39. Cybersecurity is MY problem and If I want protection, I have to be the one protecting. Cybersecurity is MY problem and I have to protect myself and not rely on others to do that for me.
    40. 40. What are the basics to protect yourself Use Strong passwords – do not use a word, use a phrase with spaces in it Use Unique passwords – do not use the same password on more than one account Use the newest operating system and applications you can afford and keep them updated
    41. 41. Use a good Anti Virus – Buy one if you cannot afford to buy one use a reputable free one. Be paranoid – on the internet paranoia is not a state of mind everyone is out to get you Use Common sense – if its too good to be true then it is a trap. If its free then its not.
    42. 42. Awareness is the key to protecting yourself Build up your cyber security awareness
    43. 43. Need Help? Go to www.securitypolicytraining.com.au and sign up for the basic cyber security awareness course. This code Slideshare1 will allow the first 10 people to do the course for free If all of the free ones are gone use Slideshare2 for a 40% discount
    44. 44. The only constant we have is change

    ×