SlideShare a Scribd company logo
1 of 28
Download to read offline
Cyber Crime 101: The
Impact of Cyber Crime
on Higher Education in
South Africa
Higher Education Conference 2011
5 September 2011
Adv Jacqueline Fick
www.pwc.com
PwC
Agenda
Meet Jack le Hack
Cyber crime defined
The online entrepreneur
How to protect data
Implementing a pro-active strategy in your organisation
Practical guidelines and tips
Closing remarks
2
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Meet Jack le Hack
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
3
September 2011
PwC
Meet Jack le Hack
Third year student : University of Cyberfucious
Putting knowledge into practice
It is Monday afternoon after a rough weekend for Jack. He is sure he
failed the test he wrote that morning as the beers he consumed made
him suffer from memory loss and he forgot to study. His finances are
also shot as he had to sponsor some of his friends for their social
activities. To boot his professor also made some comments about the
quality of his work which Jack felt was not appropriate. Jack also
assists with some classes for first year students and realises that he still
has to prepare for a lecture for the next day.
He goes to the office that was assigned to him. He shares the office with
one of the admin clerks of the faculty. When he walks past her desk, he
notices that she did not log of her computer. Jack decides that it is time
to put his master plan into action...
4
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Meet Jack le Hack
Third year student : University of Cyberfucious
Putting knowledge into practice ...
Jack has a fair knowledge of computers and has long since been toying
with the idea of putting this knowledge to good use.
He firstly uses the admin clerks’ mailbox to send the offending
professor a message, stating that his day will come and that he knows
where he lives and has intimate knowledge of the professor’s family. He
also stated that a bomb will go off within the next week in the
professor’s classroom.
Secondly, he logs into the shared folders of the faculty where he knows
the results of the test he wrote are kept. Jack decides that he certainly
deserves a better mark than he received that morning.
5
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Meet Jack le Hack
Third year student : University of Cyberfucious
Putting knowledge into practice ...
When studying the test results, he sees that he was not the only one that
failed. Jack realises that this could present an opportunity to deal with
his financial difficulties. He phones some of the other students and
offers a deal to them to change their marks for a small donation.
A few days pass and Jack’s business kicks off beyond his own
expectations. He is also approached by students that have financial
difficulties and cannot pay their class fees. With a little research and
questions posed in chat rooms, he acquires the necessary information to
hack into the financial system of the university. He installs a key logger
on one of the financial clerk’s computer and so gains access to his
password. He once again accesses the system from the admin clerk’s
computer.
6
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Meet Jack le Hack
Third year student : University of Cyberfucious
Putting knowledge into practice ...
Jack is so impressed with his own efforts that he posts this information
on Facebook and Twitter and also uses Skype to tell his friends in the
UK about his endeavours. Because his data bundle expired, he posts
this information from a computer connected to the university network
and also installed Skype on the computer. He did, however, remove
Skype from the computer later.
Life is good for our Jack le Hack.
7
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Cyber crime defined
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
8
September 2011
PwC
Cyber crime defined
• Move in South African law to the use of the term cyber crime which
is wide enough to encompass all illegal activities in respect of
computers, information networks and cyberspace.
• Most important legislation is the Electronic Communications and
Transactions Act 25 of 2002.
• 'access' includes the actions of a person who, after taking note of
any data, becomes aware of the fact that he or she is not authorised to
access that data and still continues to access that data.
• 'data message' means data generated, sent, received or stored by
electronic means and includes-
(a) voice, where the voice is used in an automated transaction; and
(b) a stored record;
9
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Cyber crime defined
Common types of cyber crime
• Unauthorised access (s86(1))
• Unauthorised modification of data and various forms of malicious
code (s86(2))
• Denial of Service Attacks (S86(5))
• Devices used to gain unauthorised access to data (s86(4))
• Child pornography, cyber obscenity and cyber stalking
• Computer-related fraud
• Copyright infringement
• Industrial espionage
• Piracy
• Online gambling
10
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Cyber crime defined
Common types of cyber crime (cont.)
• For 15 consecutive months South Africa has been amongst the top
three target countries in the world for mass phishing attacks.
• Identity theft remains the most common type of cyber crime in South
Africa.
• “ Identity theft is a serious crime. It occurs when your personal
information (name, social security number, date of birth, credit card
number, or bank account number) is stolen and used without your
knowledge to commit fraud or other crimes. Identity theft can cost
you time and money. It can destroy your credit and ruin your good
name.” USA Federal Trade Commission
11
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
The online entrepreneur
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
12
September 2011
PwC
The online entrepreneur
Possible cyber crimes identified from Jack le Hack
• Unauthorised access to data
• Unauthorised modification of data
• Computer-related fraud
• False bomb threat, intimidation
• Using a device to gain unauthorised access to data
• Furthermore:
- Exposing network to vulnerabilities – chat rooms, Skype.
- Reputational risk to university and publicity about what Jack had
done.
- Possible loss of investors.
13
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
How to protect your data
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
14
September 2011
PwC
How to protect your data
• Protecting data starts with each user of a computer on your campus
and is not only related to the functions and responsibilities of the IT
department.
• Your responsibilities include:
- Protecting the university property stored on your computer,
including information about staff, faculty, students, and alumni.
- Accessing only that information which you are authorised to access
in the course of your duties. Your ability to access other
information does not imply any right to view, change, or share
information.
- Not establishing access privileges for yourself or others outside of
formal approval processes.
15
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
How to protect your data
- Adhering to procedures and business rules governing access and
changes to the data for which you are a custodian.
- Expect all stewards and custodians of administrative data to
manage, access, and utilise this data in a manner that is consistent
with the need for security and confidentiality.
• Correlation between physical and network security.
(Computer Security at Cornell: Secure your Computer on and off
Campus 2009 (http://www.cit.cornell.edu))
16
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Implementing a pro-active strategy in your
organisation
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
17
September 2011
PwC
Implementing a pro-active strategy in your
organisation
• Cyber security is just as important as physical security.
• Relationship between physical and network security.
• Know and understand your organisation:
• This includes an understanding of the external environment and
the threats facing the organisation. It also refers to a thorough
understanding of the internal environment and the way the
organisation operates – its employees, levels of staff morale,
business partners of the organisation, service providers, etc.
18
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Implementing a pro-active strategy in your
organisation
• Define security roles and responsibilities:
• Although security should be everyone within an organisation’s
concern, ownership of information security should be assigned to
specific individuals, coupled with the necessary levels of authority
and accountability. To assist with the process it is recommended
that security roles and responsibilities be incorporated into job
descriptions and that performance in terms of these areas be
measured accordingly.
• Ensure that you have proper policies and procedures in place for the
use of IT.
• Establish clear processes to enable end-users to report suspected
cyber crimes.
19
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Implementing a pro-active strategy in your
organisation
• Effective public private partnerships.
• Value of intelligence: Exchange information with law enforcement
agencies and other organisations. Know your opponent and use the
information to develop and update security policies. Think like a
hacker.
20
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Implementing a pro-active strategy in your
organisation
• Stay up to date:
• Maintain awareness of new developments in both technology and
services. Use a risk-based approach to determine when it would
be necessary to upgrade or adapt current systems and processes to
accommodate new developments.
• Continuous auditing and assessment of process:
• It is recommended that a process of continuous auditing be
implemented to ensure that the strategy remains aligned to
business objectives, adapts to changes in technology or identified
threats, and to allow for the analysis of information that is
gathered from the different implemented controls.
21
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Practical guidelines and tips
“The vast majority of computer breaches that we have investigated
over the past few years have been the result of poor personal choices,
weak computer practices, and less-than-satisfactory data-handling
procedures.”
Steve Shuster, director of IT Security at Cornell
Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
22
September 2011
PwC
Practical guidelines and tips
• Email is more than messages. It contains personal information,
contact lists, sensitive company information, etc. Email policies:
• Do not open suspicious emails.
• Use spam filters.
• Encrypt important files or records.
• Choose complex passwords and change your password regularly.
The Post-it problem.
• Back up regularly.
• Install powerful anti-virus and firewall software and keep it up to
date. Regularly update security patches.
23
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Practical guidelines and tips
• Create good habits such as deleting your temporary internet files
and cookies. This protects against hackers who can access your
accounts from where you have been on the internet.
• Turn off your computer and modem/disconnect from the internet
when not in use.
• Know what information you have, where it is stored and who has
access thereto.
• Be wary to provide personal information via a website you are not
familiar with.
• Never allow strange or unfamiliar individuals to use your computer,
not even if they say they are from the IT department!
24
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Practical guidelines and tips
• Where practicable, do not grant administrative or root/super user
privileges to end-users.
• Educate users:
• Teach IT users how to identify cyber threats and how to respond.
• Share security information with all users of IT in the organisation.
• Read up on the latest ways hackers create phishing scams to gain
access to your personal information.
25
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Practical guidelines and tips
• Campus executives and data stewards should know:
- What/where is my data?
- How sensitive is it?
- Who is responsible for it?
- Who has access to it?
- Do I need to keep it?
- What if it gets into the wrong hands?
26
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
PwC
Closing remarks
• Need to realise the true value of information.
• Cyber criminals steal INFORMATION.
• We can only effectively combat cyber crime if we share information
and collaborate.
• Know your opponent.
• Be pro-active and not re-active.
• Implement good information governance principles in your
organisation.
• Educate all IT users.
• Protect your information with the same vigour as you protect
physical property, brand names, money, etc!
27
September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
“It takes more than anti-virus software to
safeguard your computing resources and data. It
takes you. Taking steps to secure your computer
not only helps keep your data safe, it
demonstrates your commitment to protecting the
university network and all data created, stored,
and shared over the network by the campus
community.”
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act
upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is
given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PwC, its members,
employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or
refraining to act, in reliance on the information contained in this publication or for any decision based on it.
© 2011 PricewaterhouseCoopers (“PwC”), the South African firm. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers in
South Africa, which is a member firm of PricewaterhouseCoopers International Limited (PwCIL), each member firm of which is a separate legal entity
and does not act as an agent of PwCIL.

More Related Content

What's hot

Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber Security for Babies
Cyber Security for BabiesCyber Security for Babies
Cyber Security for BabiesVISHNUVNAIR13
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)AashishTanania
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliAhtasham Ali
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 

What's hot (20)

Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cyber Security for Babies
Cyber Security for BabiesCyber Security for Babies
Cyber Security for Babies
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Unit 2
Unit 2Unit 2
Unit 2
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Viewers also liked

FRAMING OF CHARGES AND CONTENT OF A CHARGE
FRAMING OF CHARGES AND CONTENT OF A CHARGEFRAMING OF CHARGES AND CONTENT OF A CHARGE
FRAMING OF CHARGES AND CONTENT OF A CHARGEShreya Chaurasia
 
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtSection 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtJudicial Intellects Academy
 
Civil procedure code 1908
Civil procedure code 1908Civil procedure code 1908
Civil procedure code 1908Mayank Sharma
 
Civil procedure code, 1908
Civil procedure code, 1908Civil procedure code, 1908
Civil procedure code, 1908ShahMuhammad55
 
Introductory of Code of Civil Procedure, 1908
Introductory of Code of Civil Procedure, 1908Introductory of Code of Civil Procedure, 1908
Introductory of Code of Civil Procedure, 1908Mahamud Wazed (Wazii)
 
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAMCIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAMawasalam
 
Section 32 of the Indian Evidence Act
Section 32 of the Indian Evidence ActSection 32 of the Indian Evidence Act
Section 32 of the Indian Evidence ActAbhinandan Ray
 
Notes on criminal procedure code
Notes on criminal procedure codeNotes on criminal procedure code
Notes on criminal procedure codeAnish AN
 

Viewers also liked (20)

FRAMING OF CHARGES AND CONTENT OF A CHARGE
FRAMING OF CHARGES AND CONTENT OF A CHARGEFRAMING OF CHARGES AND CONTENT OF A CHARGE
FRAMING OF CHARGES AND CONTENT OF A CHARGE
 
Confession an overview
Confession an overviewConfession an overview
Confession an overview
 
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil CourtSection 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
Section 9 of Code of Civil procedure,1908-jurisdiction of Civil Court
 
Civil procedure code 1908
Civil procedure code 1908Civil procedure code 1908
Civil procedure code 1908
 
Civil procedure code, 1908
Civil procedure code, 1908Civil procedure code, 1908
Civil procedure code, 1908
 
Introductory of Code of Civil Procedure, 1908
Introductory of Code of Civil Procedure, 1908Introductory of Code of Civil Procedure, 1908
Introductory of Code of Civil Procedure, 1908
 
Code of civil procedure 1908.bose
Code of civil procedure 1908.boseCode of civil procedure 1908.bose
Code of civil procedure 1908.bose
 
Indian evidence act 1872.bose
Indian evidence act 1872.boseIndian evidence act 1872.bose
Indian evidence act 1872.bose
 
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAMCIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
CIVIL PROCEDURE - A POWER POINT PRESENTATION- BY A W A SALAM
 
Code of criminal procedure (2)
Code of criminal procedure (2)Code of criminal procedure (2)
Code of criminal procedure (2)
 
Section 32 of the Indian Evidence Act
Section 32 of the Indian Evidence ActSection 32 of the Indian Evidence Act
Section 32 of the Indian Evidence Act
 
Evidence act1872
Evidence act1872Evidence act1872
Evidence act1872
 
Indian Evidence Act
Indian Evidence ActIndian Evidence Act
Indian Evidence Act
 
INDIAN CIVIL PROCEDURE CODE
INDIAN CIVIL PROCEDURE CODEINDIAN CIVIL PROCEDURE CODE
INDIAN CIVIL PROCEDURE CODE
 
(1) evidence (overview)
(1) evidence (overview)(1) evidence (overview)
(1) evidence (overview)
 
EVIDENCE 2
EVIDENCE 2EVIDENCE 2
EVIDENCE 2
 
Crpc 2
Crpc 2Crpc 2
Crpc 2
 
Cr.P.C framing of Charges
Cr.P.C framing of Charges Cr.P.C framing of Charges
Cr.P.C framing of Charges
 
Court procedure & preparation of statement of facts
Court  procedure & preparation of statement of  factsCourt  procedure & preparation of statement of  facts
Court procedure & preparation of statement of facts
 
Notes on criminal procedure code
Notes on criminal procedure codeNotes on criminal procedure code
Notes on criminal procedure code
 

Similar to Cyber crime 101

Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 

Similar to Cyber crime 101 (20)

Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
LTU Cybersecurity
LTU CybersecurityLTU Cybersecurity
LTU Cybersecurity
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
E safety training
E safety trainingE safety training
E safety training
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 

More from Jacqueline Fick

Expanding your horizons how traditional crime can turn hi tech adv j fick
Expanding your horizons  how traditional crime can turn hi tech adv j fickExpanding your horizons  how traditional crime can turn hi tech adv j fick
Expanding your horizons how traditional crime can turn hi tech adv j fickJacqueline Fick
 
A day in the life of a cyber syndicate
A day in the life of a cyber syndicateA day in the life of a cyber syndicate
A day in the life of a cyber syndicateJacqueline Fick
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile lawJacqueline Fick
 
A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010Jacqueline Fick
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014Jacqueline Fick
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingJacqueline Fick
 

More from Jacqueline Fick (11)

Expanding your horizons how traditional crime can turn hi tech adv j fick
Expanding your horizons  how traditional crime can turn hi tech adv j fickExpanding your horizons  how traditional crime can turn hi tech adv j fick
Expanding your horizons how traditional crime can turn hi tech adv j fick
 
A day in the life of a cyber syndicate
A day in the life of a cyber syndicateA day in the life of a cyber syndicate
A day in the life of a cyber syndicate
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 

Recently uploaded

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书Fir L
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 

Recently uploaded (20)

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书如何办理美国波士顿大学(BU)毕业证学位证书
如何办理美国波士顿大学(BU)毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 

Cyber crime 101

  • 1. Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa Higher Education Conference 2011 5 September 2011 Adv Jacqueline Fick www.pwc.com
  • 2. PwC Agenda Meet Jack le Hack Cyber crime defined The online entrepreneur How to protect data Implementing a pro-active strategy in your organisation Practical guidelines and tips Closing remarks 2 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 3. PwC Meet Jack le Hack Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 3 September 2011
  • 4. PwC Meet Jack le Hack Third year student : University of Cyberfucious Putting knowledge into practice It is Monday afternoon after a rough weekend for Jack. He is sure he failed the test he wrote that morning as the beers he consumed made him suffer from memory loss and he forgot to study. His finances are also shot as he had to sponsor some of his friends for their social activities. To boot his professor also made some comments about the quality of his work which Jack felt was not appropriate. Jack also assists with some classes for first year students and realises that he still has to prepare for a lecture for the next day. He goes to the office that was assigned to him. He shares the office with one of the admin clerks of the faculty. When he walks past her desk, he notices that she did not log of her computer. Jack decides that it is time to put his master plan into action... 4 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 5. PwC Meet Jack le Hack Third year student : University of Cyberfucious Putting knowledge into practice ... Jack has a fair knowledge of computers and has long since been toying with the idea of putting this knowledge to good use. He firstly uses the admin clerks’ mailbox to send the offending professor a message, stating that his day will come and that he knows where he lives and has intimate knowledge of the professor’s family. He also stated that a bomb will go off within the next week in the professor’s classroom. Secondly, he logs into the shared folders of the faculty where he knows the results of the test he wrote are kept. Jack decides that he certainly deserves a better mark than he received that morning. 5 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 6. PwC Meet Jack le Hack Third year student : University of Cyberfucious Putting knowledge into practice ... When studying the test results, he sees that he was not the only one that failed. Jack realises that this could present an opportunity to deal with his financial difficulties. He phones some of the other students and offers a deal to them to change their marks for a small donation. A few days pass and Jack’s business kicks off beyond his own expectations. He is also approached by students that have financial difficulties and cannot pay their class fees. With a little research and questions posed in chat rooms, he acquires the necessary information to hack into the financial system of the university. He installs a key logger on one of the financial clerk’s computer and so gains access to his password. He once again accesses the system from the admin clerk’s computer. 6 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 7. PwC Meet Jack le Hack Third year student : University of Cyberfucious Putting knowledge into practice ... Jack is so impressed with his own efforts that he posts this information on Facebook and Twitter and also uses Skype to tell his friends in the UK about his endeavours. Because his data bundle expired, he posts this information from a computer connected to the university network and also installed Skype on the computer. He did, however, remove Skype from the computer later. Life is good for our Jack le Hack. 7 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 8. PwC Cyber crime defined Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 8 September 2011
  • 9. PwC Cyber crime defined • Move in South African law to the use of the term cyber crime which is wide enough to encompass all illegal activities in respect of computers, information networks and cyberspace. • Most important legislation is the Electronic Communications and Transactions Act 25 of 2002. • 'access' includes the actions of a person who, after taking note of any data, becomes aware of the fact that he or she is not authorised to access that data and still continues to access that data. • 'data message' means data generated, sent, received or stored by electronic means and includes- (a) voice, where the voice is used in an automated transaction; and (b) a stored record; 9 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 10. PwC Cyber crime defined Common types of cyber crime • Unauthorised access (s86(1)) • Unauthorised modification of data and various forms of malicious code (s86(2)) • Denial of Service Attacks (S86(5)) • Devices used to gain unauthorised access to data (s86(4)) • Child pornography, cyber obscenity and cyber stalking • Computer-related fraud • Copyright infringement • Industrial espionage • Piracy • Online gambling 10 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 11. PwC Cyber crime defined Common types of cyber crime (cont.) • For 15 consecutive months South Africa has been amongst the top three target countries in the world for mass phishing attacks. • Identity theft remains the most common type of cyber crime in South Africa. • “ Identity theft is a serious crime. It occurs when your personal information (name, social security number, date of birth, credit card number, or bank account number) is stolen and used without your knowledge to commit fraud or other crimes. Identity theft can cost you time and money. It can destroy your credit and ruin your good name.” USA Federal Trade Commission 11 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 12. PwC The online entrepreneur Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 12 September 2011
  • 13. PwC The online entrepreneur Possible cyber crimes identified from Jack le Hack • Unauthorised access to data • Unauthorised modification of data • Computer-related fraud • False bomb threat, intimidation • Using a device to gain unauthorised access to data • Furthermore: - Exposing network to vulnerabilities – chat rooms, Skype. - Reputational risk to university and publicity about what Jack had done. - Possible loss of investors. 13 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 14. PwC How to protect your data Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 14 September 2011
  • 15. PwC How to protect your data • Protecting data starts with each user of a computer on your campus and is not only related to the functions and responsibilities of the IT department. • Your responsibilities include: - Protecting the university property stored on your computer, including information about staff, faculty, students, and alumni. - Accessing only that information which you are authorised to access in the course of your duties. Your ability to access other information does not imply any right to view, change, or share information. - Not establishing access privileges for yourself or others outside of formal approval processes. 15 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 16. PwC How to protect your data - Adhering to procedures and business rules governing access and changes to the data for which you are a custodian. - Expect all stewards and custodians of administrative data to manage, access, and utilise this data in a manner that is consistent with the need for security and confidentiality. • Correlation between physical and network security. (Computer Security at Cornell: Secure your Computer on and off Campus 2009 (http://www.cit.cornell.edu)) 16 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 17. PwC Implementing a pro-active strategy in your organisation Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 17 September 2011
  • 18. PwC Implementing a pro-active strategy in your organisation • Cyber security is just as important as physical security. • Relationship between physical and network security. • Know and understand your organisation: • This includes an understanding of the external environment and the threats facing the organisation. It also refers to a thorough understanding of the internal environment and the way the organisation operates – its employees, levels of staff morale, business partners of the organisation, service providers, etc. 18 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 19. PwC Implementing a pro-active strategy in your organisation • Define security roles and responsibilities: • Although security should be everyone within an organisation’s concern, ownership of information security should be assigned to specific individuals, coupled with the necessary levels of authority and accountability. To assist with the process it is recommended that security roles and responsibilities be incorporated into job descriptions and that performance in terms of these areas be measured accordingly. • Ensure that you have proper policies and procedures in place for the use of IT. • Establish clear processes to enable end-users to report suspected cyber crimes. 19 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 20. PwC Implementing a pro-active strategy in your organisation • Effective public private partnerships. • Value of intelligence: Exchange information with law enforcement agencies and other organisations. Know your opponent and use the information to develop and update security policies. Think like a hacker. 20 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 21. PwC Implementing a pro-active strategy in your organisation • Stay up to date: • Maintain awareness of new developments in both technology and services. Use a risk-based approach to determine when it would be necessary to upgrade or adapt current systems and processes to accommodate new developments. • Continuous auditing and assessment of process: • It is recommended that a process of continuous auditing be implemented to ensure that the strategy remains aligned to business objectives, adapts to changes in technology or identified threats, and to allow for the analysis of information that is gathered from the different implemented controls. 21 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 22. PwC Practical guidelines and tips “The vast majority of computer breaches that we have investigated over the past few years have been the result of poor personal choices, weak computer practices, and less-than-satisfactory data-handling procedures.” Steve Shuster, director of IT Security at Cornell Cyber crime 101: The impact of cyber crime on Higher Education in South Africa 22 September 2011
  • 23. PwC Practical guidelines and tips • Email is more than messages. It contains personal information, contact lists, sensitive company information, etc. Email policies: • Do not open suspicious emails. • Use spam filters. • Encrypt important files or records. • Choose complex passwords and change your password regularly. The Post-it problem. • Back up regularly. • Install powerful anti-virus and firewall software and keep it up to date. Regularly update security patches. 23 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 24. PwC Practical guidelines and tips • Create good habits such as deleting your temporary internet files and cookies. This protects against hackers who can access your accounts from where you have been on the internet. • Turn off your computer and modem/disconnect from the internet when not in use. • Know what information you have, where it is stored and who has access thereto. • Be wary to provide personal information via a website you are not familiar with. • Never allow strange or unfamiliar individuals to use your computer, not even if they say they are from the IT department! 24 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 25. PwC Practical guidelines and tips • Where practicable, do not grant administrative or root/super user privileges to end-users. • Educate users: • Teach IT users how to identify cyber threats and how to respond. • Share security information with all users of IT in the organisation. • Read up on the latest ways hackers create phishing scams to gain access to your personal information. 25 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 26. PwC Practical guidelines and tips • Campus executives and data stewards should know: - What/where is my data? - How sensitive is it? - Who is responsible for it? - Who has access to it? - Do I need to keep it? - What if it gets into the wrong hands? 26 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 27. PwC Closing remarks • Need to realise the true value of information. • Cyber criminals steal INFORMATION. • We can only effectively combat cyber crime if we share information and collaborate. • Know your opponent. • Be pro-active and not re-active. • Implement good information governance principles in your organisation. • Educate all IT users. • Protect your information with the same vigour as you protect physical property, brand names, money, etc! 27 September 2011Cyber crime 101: The impact of cyber crime on Higher Education in South Africa
  • 28. “It takes more than anti-virus software to safeguard your computing resources and data. It takes you. Taking steps to secure your computer not only helps keep your data safe, it demonstrates your commitment to protecting the university network and all data created, stored, and shared over the network by the campus community.” This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PwC, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. © 2011 PricewaterhouseCoopers (“PwC”), the South African firm. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers in South Africa, which is a member firm of PricewaterhouseCoopers International Limited (PwCIL), each member firm of which is a separate legal entity and does not act as an agent of PwCIL.