SlideShare a Scribd company logo
1 of 19
LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010 “Cybercrime 2.0: When the Cloud Turns Dark” Carlos EstebanLibrero Dario Gatti Roberto Held
Cybercrimerefers to any crime that involves a computerand a network.
Whatcrimes?      Crimes that primarily target computer networks or devices include: Malware (malicious code) Denial-of-service attacks Computer viruses      Crimes that merely use computer networks or devices include: Cyber stalking Fraud and identity theft Phishing scams Information warfare
   While the first hackers wanted to exhibit their technical superiority...
    …today they are primarily motivated by economic interests.
Cyber-wars
Who will win?
Types of Cybercrime Spam - sending out of junk e-mails for commercial purposes; Malware programs – Virus, worms, trojan horse; Drug Trafficking
Types of Cybercrime Cyber Terrorism – hacking official websites; Obscene or Offensive Content – Adults only!!
Security Tips ,[object Object]
 Anti-virus;
 Firewall;
 Internet;Programs out-of-date => very insecure
Possible Solutions Automatic updates; User education; More efficient malware detectors;
Social Engineering Attacks Process of manipulating users; Free examples – antivirus test;
WEB ATTACKS ,[object Object],-> new vulnerabilities ,[object Object]
 Exploiting = download payloads ,[object Object]
Security System identifying malicious content throw GOOGLE search. Browsers (Safari, Firefox…) use information to prevent users’ visits.

More Related Content

What's hot

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet security
Internet securityInternet security
Internet security
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Cyber security
Cyber securityCyber security
Cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 

Viewers also liked

C:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers BureauC:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers Bureau
Wendy
 
Trabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORDTrabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORD
maryjcardenasc
 
Speakers bureau current
Speakers bureau currentSpeakers bureau current
Speakers bureau current
Wendy
 

Viewers also liked (19)

CTR YOOO!!!!!
CTR YOOO!!!!!CTR YOOO!!!!!
CTR YOOO!!!!!
 
Bail in ou bail-out; o mesmo baile, outra música
Bail in  ou bail-out;  o mesmo baile, outra músicaBail in  ou bail-out;  o mesmo baile, outra música
Bail in ou bail-out; o mesmo baile, outra música
 
C:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers BureauC:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers Bureau
 
Acc hayro b.
Acc hayro b.Acc hayro b.
Acc hayro b.
 
Prefixes -teens talk latin-greek (Book 1)
Prefixes -teens talk latin-greek (Book 1)Prefixes -teens talk latin-greek (Book 1)
Prefixes -teens talk latin-greek (Book 1)
 
Trabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORDTrabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORD
 
CTR YO!!!
CTR YO!!!CTR YO!!!
CTR YO!!!
 
Speakers bureau current
Speakers bureau currentSpeakers bureau current
Speakers bureau current
 
MUSIC SLIDESHOW
MUSIC SLIDESHOWMUSIC SLIDESHOW
MUSIC SLIDESHOW
 
Gems for rails
Gems for railsGems for rails
Gems for rails
 
Segurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectualSegurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectual
 
Reestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vidaReestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vida
 
Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1
 
Mais um perdâo fiscal. Peres é a sua graça
Mais um perdâo fiscal.  Peres é a sua graçaMais um perdâo fiscal.  Peres é a sua graça
Mais um perdâo fiscal. Peres é a sua graça
 
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jourA propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
 
União dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à soltaUnião dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à solta
 
O projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos ViriatosO projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos Viriatos
 
O Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vidaO Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vida
 
NFV Interoperability Evaluation Results
NFV Interoperability Evaluation ResultsNFV Interoperability Evaluation Results
NFV Interoperability Evaluation Results
 

Similar to CyberCrime - Lse summer school 2010 mg270

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 

Similar to CyberCrime - Lse summer school 2010 mg270 (20)

A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Hamza
HamzaHamza
Hamza
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Recently uploaded (20)

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 

CyberCrime - Lse summer school 2010 mg270

  • 1. LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010 “Cybercrime 2.0: When the Cloud Turns Dark” Carlos EstebanLibrero Dario Gatti Roberto Held
  • 2. Cybercrimerefers to any crime that involves a computerand a network.
  • 3. Whatcrimes? Crimes that primarily target computer networks or devices include: Malware (malicious code) Denial-of-service attacks Computer viruses Crimes that merely use computer networks or devices include: Cyber stalking Fraud and identity theft Phishing scams Information warfare
  • 4. While the first hackers wanted to exhibit their technical superiority...
  • 5. …today they are primarily motivated by economic interests.
  • 8.
  • 9. Types of Cybercrime Spam - sending out of junk e-mails for commercial purposes; Malware programs – Virus, worms, trojan horse; Drug Trafficking
  • 10. Types of Cybercrime Cyber Terrorism – hacking official websites; Obscene or Offensive Content – Adults only!!
  • 11.
  • 15. Possible Solutions Automatic updates; User education; More efficient malware detectors;
  • 16. Social Engineering Attacks Process of manipulating users; Free examples – antivirus test;
  • 17.
  • 18.
  • 19. Security System identifying malicious content throw GOOGLE search. Browsers (Safari, Firefox…) use information to prevent users’ visits.
  • 20. Pirate Bay Attack 4 million accounts exposed Break into vulnerable database History and personal information (passwords, e-mails…)
  • 21. Cybercrimeis a criticalissuenotonlyforpages and applications on the Web. Itsimplications can begreater and can affectalso the real world. Blackout that may have been caused by hackers in 2009, Brazil.
  • 22. And, if you have enjoyed our presentation, you can find it at: http://www.slideshare.net/class2010mg270