SlideShare a Scribd company logo
1 of 22
The Good,
the Bad and
the Ugly
of cyber security
Data is the new oil
The Good, the Bad and the Ugly of cyber security by
What is cybersecurity about?
The Good, the Bad and the Ugly of cyber security by
Data
Confidentiality
Availability Integrity
The primary objective
of Secure
Information Systems
is to store, transfer
and process data in
accordance with such
principles
The main cybersecurity tradeoff
The Good, the Bad and the Ugly of cyber security by
Security
Functionality Ease of use
You can choose just
two of them
Group work exercise - 10 min
The Good, the Bad and the Ugly of cyber security by
Who is looking for
your data and why?
Malicious actors: academic view
The Good, the Bad and the Ugly of cyber security by
Motivation: academic view
The Good, the Bad and the Ugly of cyber security by
Malicious actors and motivation in details
The Good, the Bad and the Ugly of cyber security by
Corporations Cybercriminals Nation states
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
● Follow Privacy Policy
● Advertising goods for
free service
Monetize data in:
Ethical/legal way Unethical/illegal way
● Abuse Privacy Policy
● Resell data to data
brokers
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
Personally identifiable information
○ Home address
○ Email address
○ Passport number
○ Date of birth
○ Genetic information
○ Telephone number
Digital Profile
○ Habits
○ Attributes
○ Preferences
○ Traits
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
What’s Even Creepier Than Target Guessing That You’re Pregnant?
https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
Corporation motivation
The Good, the Bad and the Ugly of cyber security by
Facebook decided to acquire
WhatsApp for $19 billion; that is,
to pay $31 for each of its 600
million users
$15 $40
Your hidden price
Cybercriminals motivation
The Good, the Bad and the Ugly of cyber security by
● Use your data
○ Steal and resell your data
○ Use financial information to steal money
○ Use your data for blackmail or ransom
● Use your equipment
○ Mine digital currency
○ Organize attacks/DDoS
○ Launder money
#organizedCriminals
#hacktivists
#terrorists
Cybercriminals motivation
Cryptojacking
The Good, the Bad and the Ugly of cyber security by
The Good, the Bad and the Ugly of cyber security by
Cybercriminals motivation
ATM skimming
https://www.welivesecurity.co
m/2017/09/14/cryptocurrency
-web-mining-union-profit/
Cybercrime economy
The Good, the Bad and the Ugly of cyber security by
● A zero-day Adobe exploit can cost $30,000.
● A zero-day iOS exploit can cost up to $250,000.
● Malware exploit kits cost $200-$600 per exploit.
https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/
https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
State Nations motivation
The Good, the Bad and the Ugly of cyber security by
● Internal
○ Propaganda
○ Leverage points
● External
○ Espionage
○ Sabotage
#APT28
#PLA Unit 61398
#Unit 8200
#spyware
State
Nations
Motivation
Stuxnet worm
The Good, the Bad and the Ugly of cyber security by
https://www.wired.com/2014/
11/countdown-to-zero-day-
stuxnet/
State Nations motivation
Petya/NotPetya Ransomware
The Good, the Bad and the Ugly of cyber security byhttps://www.wired.com/story/petya-ransomware-ukraine/
State Nations motivation
Blackout in Ukraine
The Good, the Bad and the Ugly of cyber security by
https://www.wired.com/story/v
ideo-hackers-take-over-
power-grid-computer-mouse/
How to differentiate cybersecurity specialist?
The Good, the Bad and the Ugly of cyber security by
The Good, the Bad and the Ugly of cyber security by

More Related Content

What's hot

Cyber security ln
Cyber security lnCyber security ln
Cyber security lnM S Prasad
 
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestHow to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestRed Gate Software
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
Exhibitor session: Fortinet
Exhibitor session: FortinetExhibitor session: Fortinet
Exhibitor session: FortinetJisc
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)U.S. Chamber of Commerce
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Cyber Liability Insurance
Cyber Liability InsuranceCyber Liability Insurance
Cyber Liability InsuranceGraeme Newman
 
The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?Christian Dawson
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Sensecy cti vs cti
Sensecy cti vs cti Sensecy cti vs cti
Sensecy cti vs cti Dori Fisher
 

What's hot (20)

Cyber security ln
Cyber security lnCyber security ln
Cyber security ln
 
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestHow to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
Exhibitor session: Fortinet
Exhibitor session: FortinetExhibitor session: Fortinet
Exhibitor session: Fortinet
 
Cogniware 2019
Cogniware 2019Cogniware 2019
Cogniware 2019
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Cyber Liability Insurance
Cyber Liability InsuranceCyber Liability Insurance
Cyber Liability Insurance
 
LAW
LAWLAW
LAW
 
The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?The Post Snowden World One Year Later: What Has Changed?
The Post Snowden World One Year Later: What Has Changed?
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Sensecy cti vs cti
Sensecy cti vs cti Sensecy cti vs cti
Sensecy cti vs cti
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 

Similar to Ethics and technologies - Cybersecurity landscape

Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Ikhtiar Khan Sohan
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxTejasSingh70
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetTechugo
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 

Similar to Ethics and technologies - Cybersecurity landscape (20)

cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Presentation(Cyber crime & security)
Presentation(Cyber crime & security)Presentation(Cyber crime & security)
Presentation(Cyber crime & security)
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 

More from Roman Trukhin

Culture map - Book Review
Culture map - Book Review Culture map - Book Review
Culture map - Book Review Roman Trukhin
 
Security awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic UniversitySecurity awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic UniversityRoman Trukhin
 
Web design crash course
Web design crash courseWeb design crash course
Web design crash courseRoman Trukhin
 
Three-Way-Ballot system
Three-Way-Ballot systemThree-Way-Ballot system
Three-Way-Ballot systemRoman Trukhin
 
Great Pacific Garbage
Great Pacific GarbageGreat Pacific Garbage
Great Pacific GarbageRoman Trukhin
 
Future of images in the web
Future of images in the webFuture of images in the web
Future of images in the webRoman Trukhin
 
Fonts: how it's made?
Fonts: how it's made?Fonts: how it's made?
Fonts: how it's made?Roman Trukhin
 

More from Roman Trukhin (15)

Culture map - Book Review
Culture map - Book Review Culture map - Book Review
Culture map - Book Review
 
Security awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic UniversitySecurity awareness for Applied Science Faculty of Ukrainian Catholic University
Security awareness for Applied Science Faculty of Ukrainian Catholic University
 
How people behave
How people behave How people behave
How people behave
 
Estimation
EstimationEstimation
Estimation
 
Web design crash course
Web design crash courseWeb design crash course
Web design crash course
 
Three-Way-Ballot system
Three-Way-Ballot systemThree-Way-Ballot system
Three-Way-Ballot system
 
NodeJS overview
NodeJS overviewNodeJS overview
NodeJS overview
 
Nobel Prize
Nobel PrizeNobel Prize
Nobel Prize
 
MacOS Philosophy
MacOS PhilosophyMacOS Philosophy
MacOS Philosophy
 
Great Pacific Garbage
Great Pacific GarbageGreat Pacific Garbage
Great Pacific Garbage
 
Future of images in the web
Future of images in the webFuture of images in the web
Future of images in the web
 
Fonts: how it's made?
Fonts: how it's made?Fonts: how it's made?
Fonts: how it's made?
 
CSS3.0
CSS3.0CSS3.0
CSS3.0
 
Bitcoin p2p money
Bitcoin p2p moneyBitcoin p2p money
Bitcoin p2p money
 
Scrum in 15 minutes
Scrum in 15 minutesScrum in 15 minutes
Scrum in 15 minutes
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 

Ethics and technologies - Cybersecurity landscape

  • 1. The Good, the Bad and the Ugly of cyber security
  • 2. Data is the new oil The Good, the Bad and the Ugly of cyber security by
  • 3. What is cybersecurity about? The Good, the Bad and the Ugly of cyber security by Data Confidentiality Availability Integrity The primary objective of Secure Information Systems is to store, transfer and process data in accordance with such principles
  • 4. The main cybersecurity tradeoff The Good, the Bad and the Ugly of cyber security by Security Functionality Ease of use You can choose just two of them
  • 5. Group work exercise - 10 min The Good, the Bad and the Ugly of cyber security by Who is looking for your data and why?
  • 6. Malicious actors: academic view The Good, the Bad and the Ugly of cyber security by
  • 7. Motivation: academic view The Good, the Bad and the Ugly of cyber security by
  • 8. Malicious actors and motivation in details The Good, the Bad and the Ugly of cyber security by Corporations Cybercriminals Nation states
  • 9. Corporation motivation The Good, the Bad and the Ugly of cyber security by ● Follow Privacy Policy ● Advertising goods for free service Monetize data in: Ethical/legal way Unethical/illegal way ● Abuse Privacy Policy ● Resell data to data brokers
  • 10. Corporation motivation The Good, the Bad and the Ugly of cyber security by Personally identifiable information ○ Home address ○ Email address ○ Passport number ○ Date of birth ○ Genetic information ○ Telephone number Digital Profile ○ Habits ○ Attributes ○ Preferences ○ Traits
  • 11. Corporation motivation The Good, the Bad and the Ugly of cyber security by What’s Even Creepier Than Target Guessing That You’re Pregnant? https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
  • 12. Corporation motivation The Good, the Bad and the Ugly of cyber security by Facebook decided to acquire WhatsApp for $19 billion; that is, to pay $31 for each of its 600 million users $15 $40 Your hidden price
  • 13. Cybercriminals motivation The Good, the Bad and the Ugly of cyber security by ● Use your data ○ Steal and resell your data ○ Use financial information to steal money ○ Use your data for blackmail or ransom ● Use your equipment ○ Mine digital currency ○ Organize attacks/DDoS ○ Launder money #organizedCriminals #hacktivists #terrorists
  • 14. Cybercriminals motivation Cryptojacking The Good, the Bad and the Ugly of cyber security by
  • 15. The Good, the Bad and the Ugly of cyber security by Cybercriminals motivation ATM skimming https://www.welivesecurity.co m/2017/09/14/cryptocurrency -web-mining-union-profit/
  • 16. Cybercrime economy The Good, the Bad and the Ugly of cyber security by ● A zero-day Adobe exploit can cost $30,000. ● A zero-day iOS exploit can cost up to $250,000. ● Malware exploit kits cost $200-$600 per exploit. https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/ https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
  • 17. State Nations motivation The Good, the Bad and the Ugly of cyber security by ● Internal ○ Propaganda ○ Leverage points ● External ○ Espionage ○ Sabotage #APT28 #PLA Unit 61398 #Unit 8200 #spyware
  • 18. State Nations Motivation Stuxnet worm The Good, the Bad and the Ugly of cyber security by https://www.wired.com/2014/ 11/countdown-to-zero-day- stuxnet/
  • 19. State Nations motivation Petya/NotPetya Ransomware The Good, the Bad and the Ugly of cyber security byhttps://www.wired.com/story/petya-ransomware-ukraine/
  • 20. State Nations motivation Blackout in Ukraine The Good, the Bad and the Ugly of cyber security by https://www.wired.com/story/v ideo-hackers-take-over- power-grid-computer-mouse/
  • 21. How to differentiate cybersecurity specialist? The Good, the Bad and the Ugly of cyber security by
  • 22. The Good, the Bad and the Ugly of cyber security by

Editor's Notes

  1. https://timreview.ca/article/838
  2. https://timreview.ca/article/838
  3. https://techcrunch.com/2015/10/13/whats-the-value-of-your-data/ https://www.huffpost.com/entry/why-googles-spying-on-use_b_3530296
  4. https://techcrunch.com/2015/10/13/whats-the-value-of-your-data/ https://www.huffpost.com/entry/why-googles-spying-on-use_b_3530296
  5. https://slate.com/human-interest/2014/06/big-data-whats-even-creepier-than-target-guessing-that-youre-pregnant.html
  6. https://www.welivesecurity.com/2017/09/14/cryptocurrency-web-mining-union-profit/
  7. https://www.welivesecurity.com/2017/09/14/cryptocurrency-web-mining-union-profit/
  8. https://venturebeat.com/2018/04/21/the-web-of-profit-a-look-at-the-cybercrime-economy/ https://www.paloaltonetworks.com/cyberpedia/cybercrime-the-underground-economy
  9. https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
  10. https://www.wired.com/story/petya-ransomware-ukraine/
  11. https://www.wired.com/story/video-hackers-take-over-power-grid-computer-mouse/