SlideShare a Scribd company logo
1 of 8
CYBER CRIME
BY: TONI MICHELLE BREWER
INTRODUCTION
• Business alignment-Security should support the business and
not interfere with company objectives.
• Security awareness-The security of humans and the internal
marketing/PR of information security.
• Security spending is estimated to exceed $75 Billion dollars in
2016. There is a broad range of security products to choose
from.
(Sleiman, 2017)
CURRENT CHALLENGES
• Millions of Americans have been victimized with their privacy
violated and their identities stolen.
• Standard antivirus signature engines are losing their
effectiveness against the volumes of new threats.
• Cyber crime is a growing business and the cyber criminal can
even take over an entire country like they did in Estonia in
Spring of 2007.
• Any important information online like social security numbers,
credit cards, addresses, etc.., you will be attacked.
• (Pinedo, 2009).
COMMON AND CURRENT REAL WORLD
EXAMPLES OF SOCIAL ENGINEERING
• Phishing-is the most common type of attack. The characteristics is to
find personal information like names, addresses, and social security
numbers.
• Pretexting-is when attackers focus on creating a good pretext so they
can steal their victims personal information.
• Baiting-this is when the promise of an item or good that the hackers use
to lure their victims.
• Quid Pro Quo-this is when a promise is made to get a benefit in
exchange for information.
• Tailgating (Piggybacking)-This is a type of an attack that involves
someone who lacks the proper authentication following an employee
into a restricted area.
CURRENT SOLUTIONS
• Compliance is needed-Can store data properly to implement good
security practices on their own.
• Need to have the minimum cyber security standards to reduce the
cyber crimes.
• The NCA report has reported that they are working closer with law-
enforcement to arrest the criminals (Warwick, 2016).
• Companies can protect themselves with the three pillars:
• Well established ISMS.
• An examination of the Business costs and impact of the types of breaches
that affects the corporation.
• A well-established business continuity framework to help deal with the
unforeseen events.
IMPLICATIONS OF CHRISTIAN LEADERS
• Romans 12:2 says in NLT, “Don’t copy the behavior and
customs of this world, but let God transform you into a new
person by changing the way you think. Then you will learn how
God’s will for you, which good and pleasing and perfect.”
• Christians that are wise will decide which worldly behavior is
off-limits to them. It’s not just about refusing to conform to
the world, it’s also to be planted in our way of thinking. Only
the Holy Spirit renews, reeducates, and redirects our mind to be
transformed.
REFERENCES
• Bisson, D. (2015). 5 Social Engineering Attacks to Watch For. Retrieved from
https://www.tripwire.com/state-of-security/security-awareness/5-social-
engineering-attacks-to-watch-out-for/
• Holy Bible: New Living Translation. Wheaton, Ill: Tyndale House Publishers,
2004
• Krausz, M., Walker, J., and Ely, C. (2013). The Cost of Information Security
Breaches and Cyber Crime. UK. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=11&sid=64d1fb39-
ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzLWxpdm
U%3d#AN=838705&db=e000xna
• Pinedo, J. (2009). Convention 2009: Protect your Business against Cyber
Crimes. Retrieved from
REFERENCES
• Sleiman, C. (2017). Business Today: Combat Cyber Crime in 2017.
Issue 219. p.1-3. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=10&sid=64d1fb
39-ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL
WxpdmU%3d#AN=121239313&db=bwh
• Warwick, A. (2014). National Cyber Crime Unit Appeals to business to
fight cyber criminals. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=12&sid=64d1fb
39-ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL
WxpdmU%3d#AN=96519716&db=b9h

More Related Content

What's hot

Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 

What's hot (20)

Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ppt
PptPpt
Ppt
 

Similar to Cyber crime

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsKnow Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsSurfWatch Labs
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesDavid Dourgarian
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Justifying Physical Security
Justifying Physical SecurityJustifying Physical Security
Justifying Physical SecurityJames McDonald
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed NewsletterYigal Behar
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT PresentationDaniel McGarvey
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
AssignmentThis is a short paper that requires you to study the p.docx
AssignmentThis is a short paper that requires you to study the p.docxAssignmentThis is a short paper that requires you to study the p.docx
AssignmentThis is a short paper that requires you to study the p.docxlascellesjaimie
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015CBIZ, Inc.
 

Similar to Cyber crime (20)

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber ThreatsKnow Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
Know Your Adversary: Analyzing the Human Element in Evolving Cyber Threats
 
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Justifying Physical Security
Justifying Physical SecurityJustifying Physical Security
Justifying Physical Security
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
AssignmentThis is a short paper that requires you to study the p.docx
AssignmentThis is a short paper that requires you to study the p.docxAssignmentThis is a short paper that requires you to study the p.docx
AssignmentThis is a short paper that requires you to study the p.docx
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
IDT Webinar Flyer Anthony (1)
IDT Webinar Flyer Anthony (1)IDT Webinar Flyer Anthony (1)
IDT Webinar Flyer Anthony (1)
 
BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015BIZGrowth Strategies Summer 2015
BIZGrowth Strategies Summer 2015
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Cyber crime

  • 1. CYBER CRIME BY: TONI MICHELLE BREWER
  • 2. INTRODUCTION • Business alignment-Security should support the business and not interfere with company objectives. • Security awareness-The security of humans and the internal marketing/PR of information security. • Security spending is estimated to exceed $75 Billion dollars in 2016. There is a broad range of security products to choose from. (Sleiman, 2017)
  • 3. CURRENT CHALLENGES • Millions of Americans have been victimized with their privacy violated and their identities stolen. • Standard antivirus signature engines are losing their effectiveness against the volumes of new threats. • Cyber crime is a growing business and the cyber criminal can even take over an entire country like they did in Estonia in Spring of 2007. • Any important information online like social security numbers, credit cards, addresses, etc.., you will be attacked. • (Pinedo, 2009).
  • 4. COMMON AND CURRENT REAL WORLD EXAMPLES OF SOCIAL ENGINEERING • Phishing-is the most common type of attack. The characteristics is to find personal information like names, addresses, and social security numbers. • Pretexting-is when attackers focus on creating a good pretext so they can steal their victims personal information. • Baiting-this is when the promise of an item or good that the hackers use to lure their victims. • Quid Pro Quo-this is when a promise is made to get a benefit in exchange for information. • Tailgating (Piggybacking)-This is a type of an attack that involves someone who lacks the proper authentication following an employee into a restricted area.
  • 5. CURRENT SOLUTIONS • Compliance is needed-Can store data properly to implement good security practices on their own. • Need to have the minimum cyber security standards to reduce the cyber crimes. • The NCA report has reported that they are working closer with law- enforcement to arrest the criminals (Warwick, 2016). • Companies can protect themselves with the three pillars: • Well established ISMS. • An examination of the Business costs and impact of the types of breaches that affects the corporation. • A well-established business continuity framework to help deal with the unforeseen events.
  • 6. IMPLICATIONS OF CHRISTIAN LEADERS • Romans 12:2 says in NLT, “Don’t copy the behavior and customs of this world, but let God transform you into a new person by changing the way you think. Then you will learn how God’s will for you, which good and pleasing and perfect.” • Christians that are wise will decide which worldly behavior is off-limits to them. It’s not just about refusing to conform to the world, it’s also to be planted in our way of thinking. Only the Holy Spirit renews, reeducates, and redirects our mind to be transformed.
  • 7. REFERENCES • Bisson, D. (2015). 5 Social Engineering Attacks to Watch For. Retrieved from https://www.tripwire.com/state-of-security/security-awareness/5-social- engineering-attacks-to-watch-out-for/ • Holy Bible: New Living Translation. Wheaton, Ill: Tyndale House Publishers, 2004 • Krausz, M., Walker, J., and Ely, C. (2013). The Cost of Information Security Breaches and Cyber Crime. UK. Retrieved from http://ezproxy.swu.edu:2065/eds/detail/detail?vid=11&sid=64d1fb39- ffe3-4e2e-9a96- d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzLWxpdm U%3d#AN=838705&db=e000xna • Pinedo, J. (2009). Convention 2009: Protect your Business against Cyber Crimes. Retrieved from
  • 8. REFERENCES • Sleiman, C. (2017). Business Today: Combat Cyber Crime in 2017. Issue 219. p.1-3. Retrieved from http://ezproxy.swu.edu:2065/eds/detail/detail?vid=10&sid=64d1fb 39-ffe3-4e2e-9a96- d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL WxpdmU%3d#AN=121239313&db=bwh • Warwick, A. (2014). National Cyber Crime Unit Appeals to business to fight cyber criminals. Retrieved from http://ezproxy.swu.edu:2065/eds/detail/detail?vid=12&sid=64d1fb 39-ffe3-4e2e-9a96- d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL WxpdmU%3d#AN=96519716&db=b9h