DefCamp 2013 - A few cybercrime cases that could make us think...

DefCamp
Dec. 18, 2013
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp 2013 - A few cybercrime cases that could make us think...
1 of 23

More Related Content

What's hot

Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms daymoldovaictsummit2016
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaAmbrose Ruyooka,PMP,CGEIT, CRISC
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz

Viewers also liked

DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp 2013 - DRM To Pown NSA in Few Easy StepsDefCamp
DefCamp 2013 - Are we there yet?DefCamp 2013 - Are we there yet?
DefCamp 2013 - Are we there yet?DefCamp
2 × 3 = 62 × 3 = 6
2 × 3 = 6Tzu-ping Chung
DefCamp 2013 - In vehicle CAN network securityDefCamp 2013 - In vehicle CAN network security
DefCamp 2013 - In vehicle CAN network securityDefCamp
Mobile networks: exploiting HTTP headers and data traffic - DefCamp 2012Mobile networks: exploiting HTTP headers and data traffic - DefCamp 2012
Mobile networks: exploiting HTTP headers and data traffic - DefCamp 2012DefCamp
DefCamp 2013 - Android hacking techniquesDefCamp 2013 - Android hacking techniques
DefCamp 2013 - Android hacking techniquesDefCamp

Similar to DefCamp 2013 - A few cybercrime cases that could make us think...

It security & crimesIt security & crimes
It security & crimesleodgard erasmus
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3SOMASUNDARAM T
Computer and Cyber forensics, a case study of GhanaComputer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of GhanaMohammed Mahfouz Alhassan
2627 8105-1-pb2627 8105-1-pb
2627 8105-1-pbMohammed Mahfouz Alhassan
Computer misuse Computer misuse
Computer misuse Shatakshi Goswami

More from DefCamp

Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp

Recently uploaded

web test repair.pptxweb test repair.pptx
web test repair.pptxYuanzhangLin
Understanding Wireguard, TLS and Workload IdentityUnderstanding Wireguard, TLS and Workload Identity
Understanding Wireguard, TLS and Workload IdentityChristian Posta
The Ultimate Administrator’s Guide to HCL Nomad WebThe Ultimate Administrator’s Guide to HCL Nomad Web
The Ultimate Administrator’s Guide to HCL Nomad Webpanagenda
Google Cloud Study Jams Info SessionGoogle Cloud Study Jams Info Session
Google Cloud Study Jams Info SessionGDSCPCCE
Accelerating Data Science through Feature Platform, Transformers, and GenAIAccelerating Data Science through Feature Platform, Transformers, and GenAI
Accelerating Data Science through Feature Platform, Transformers, and GenAIFeatureByte
Die ultimative Anleitung für HCL Nomad Web AdministratorenDie ultimative Anleitung für HCL Nomad Web Administratoren
Die ultimative Anleitung für HCL Nomad Web Administratorenpanagenda

Recently uploaded(20)

DefCamp 2013 - A few cybercrime cases that could make us think...

Editor's Notes

  1. Este infractiunea de access
  2. Bresa de securitate O bresa in sistemele de securitate ale serverelor Ministerului Finatelor Publice permite oricarui utilizator al unui calculator conectat la Internet sa acceseze baza de date administrata de Agentia Nationala de Administrare Fiscala. In acest fel, se pot obtine informatii complete despre persoane fizice. Ne referim aici la nume, prenume, adresa completa, cod numeric personal si obligatiile financiare pe care o persoana fizica le are in raport cu Ministerul Finantelor Publice. In mod normal, o astfel de baza de date trebuie protejata atat prin folosirea unor softuri specializate de protectie si limitare a accesarii neautorizate cat si prin montarea unor dispozitive hardware, tip firewall. Se pare ca acest lucru nu exista in sistemul informatic de la Finante sau daca a fost instalat nu e administrat corect. Ca urmare, serverele pe care se gasesc informatii cu caracter secret sunt foarte usor de accesat. Acest lucru permite celor interesati sa afle date confidentiale despre o anumita persoana si, folosind aceste date, sa influneteze anumite decizii sau sa supuna santajului persoana respectiva. Ne referim aici la datele de identificare ale oricarui contribuabil, adresa de domiciliu, codul numeric personal si informatii despre obligatiile platii unor impozite si taxe catre bugetul de stat.