LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010<br />“Cybercrime 2.0: When the Cloud Tur...
Cybercrimerefers to any crime that involves a computerand a network.<br />
Whatcrimes?<br />     Crimes that primarily target computer networks or devices include:<br />Malware (malicious code)<br ...
   While the first hackers wanted to exhibit their technical superiority...<br />
    …today they are primarily motivated by economic interests.<br />
Cyber-wars<br />
Who will win?<br />
Types of Cybercrime<br />Spam - sending out of junk e-mails for commercial purposes;<br />Malware programs – Virus, worms,...
Types of Cybercrime<br />Cyber Terrorism – hacking official websites;<br />Obscene or Offensive Content – Adults only!!<br />
Security Tips<br /><ul><li> Keep programs Updated:
 Anti-virus;
 Firewall;
 Internet;</li></ul>Programs out-of-date => very insecure<br />
Possible Solutions<br />Automatic updates;<br />User education;<br />More efficient malware detectors;<br />
Social Engineering Attacks<br />Process of manipulating users;<br />Free examples – antivirus test;<br />
WEB ATTACKS<br /><ul><li> Growing complexity </li></ul>-> new vulnerabilities<br /><ul><li> Launching malware throw web br...
 Exploiting = download payloads </li></li></ul><li>Procedure<br />Infecting Web Server<br />->redirecting to infected serv...
Security<br />System identifying malicious content throw GOOGLE search.<br />Browsers (Safari, Firefox…) use information t...
Upcoming SlideShare
Loading in...5
×

CyberCrime - Lse summer school 2010 mg270

1,133

Published on

Published in: Business, Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,133
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
60
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "CyberCrime - Lse summer school 2010 mg270"

  1. 1. LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010<br />“Cybercrime 2.0: When the Cloud Turns Dark”<br />Carlos EstebanLibrero<br />Dario Gatti<br />Roberto Held<br />
  2. 2. Cybercrimerefers to any crime that involves a computerand a network.<br />
  3. 3. Whatcrimes?<br /> Crimes that primarily target computer networks or devices include:<br />Malware (malicious code)<br />Denial-of-service attacks<br />Computer viruses<br /> Crimes that merely use computer networks or devices include:<br />Cyber stalking<br />Fraud and identity theft<br />Phishing scams<br />Information warfare<br />
  4. 4. While the first hackers wanted to exhibit their technical superiority...<br />
  5. 5. …today they are primarily motivated by economic interests.<br />
  6. 6. Cyber-wars<br />
  7. 7. Who will win?<br />
  8. 8.
  9. 9. Types of Cybercrime<br />Spam - sending out of junk e-mails for commercial purposes;<br />Malware programs – Virus, worms, trojan horse;<br />Drug Trafficking <br />
  10. 10. Types of Cybercrime<br />Cyber Terrorism – hacking official websites;<br />Obscene or Offensive Content – Adults only!!<br />
  11. 11. Security Tips<br /><ul><li> Keep programs Updated:
  12. 12. Anti-virus;
  13. 13. Firewall;
  14. 14. Internet;</li></ul>Programs out-of-date => very insecure<br />
  15. 15. Possible Solutions<br />Automatic updates;<br />User education;<br />More efficient malware detectors;<br />
  16. 16. Social Engineering Attacks<br />Process of manipulating users;<br />Free examples – antivirus test;<br />
  17. 17. WEB ATTACKS<br /><ul><li> Growing complexity </li></ul>-> new vulnerabilities<br /><ul><li> Launching malware throw web browsers / web servers
  18. 18. Exploiting = download payloads </li></li></ul><li>Procedure<br />Infecting Web Server<br />->redirecting to infected servers (SQL and Redirecting via .htaccess)<br />Exploit web user (download payloads)<br />-> drive-by downloads<br />-> social engineering attacks (continuous growth)<br />
  19. 19. Security<br />System identifying malicious content throw GOOGLE search.<br />Browsers (Safari, Firefox…) use information to prevent users’ visits. <br />
  20. 20. Pirate Bay Attack<br />4 million accounts exposed<br />Break into vulnerable database <br />History and personal information (passwords, e-mails…)<br />
  21. 21. Cybercrimeis a criticalissuenotonlyforpages and applications on the Web.<br />Itsimplications can begreater and can affectalso the real world. <br />Blackout that may have been caused by hackers in 2009, Brazil.<br />
  22. 22. And, if you have enjoyed our presentation, you can find it at: <br /> http://www.slideshare.net/class2010mg270<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×