SlideShare a Scribd company logo
Investigating and Proving 
Computer Fraud 
Jenny Reid 
Director
WAS 
• Hacking 
• Phishing 
• Data Espionage 
• Data Interference 
MOVING TO 
• Intellectual property theft 
• Identity theft 
• Social Engineering 
Fin24 – April 2014
HACKING 
A technical effort to manipulate 
the normal behaviour of networks, 
connections and information
PHISHING / SMISHING 
Fraudulent practice of sending 
messages purporting to be from 
reputable companies in order 
to induce individuals to reveal 
personal information, such as 
passwords and credit card numbers, 
online.
DATA ESPIONAGE 
Data espionage describes the 
stealing of secrets stored in digital 
formats or on computers and 
IT networks
DATA INTERFERENCE 
Data corruption refers to errors in 
computer data resulting in unintended 
changes to the original data.
INTELLECTUAL PROPERTY THEFT 
The theft of any innovation any method or formula 
with economic value; or any unique name, symbol, or 
logo that is used commercially. It can also be the 
theft of company data.
IDENTITY THEFT 
Identity theft is a form of stealing an identity for 
personal or corporate gain. 
• True Name 
• Account Takeover
SOCIAL ENGINEERING 
The manipulation of people to divulge confidential 
information
70% of African companies 
have been subjected to 
computer fraud
• Global incidents increased by 48% 
• 117 339 incidents per day 
• Increased 66% year on year since 2009 
• Budgets have remained steady since 
2009
• Financial costs 
• Reputation damage 
• Social damage 
• Personnel infiltration 
• Theft of resources
Common Denominator
The problem with human resources 
Is that they are human, with all that entails. 
Truthfully, the human condition is by and large good. 
Most people are honest, sincere, responsible 
And prepared to work hard for a fair shake. 
But there are others that give people a bad name. 
These are the ones that lie, cheat and steal. 
They are the businessman’s worst nightmare 
For the damage they can cause. 
These are the people you don’t want working for you.
• Incidents by insiders increased by 10% 
• Incidents by contractors / suppliers rose 
by 17% 
• Incidents by competitors increased by 
64%
The problem with human resources 
• Communication via social networks is one of the 
most popular activites on the internet 
• Social networking – 3rd most popular activity 
• 75% of people pay no attention to possible 
hackers 
• 13% discuss private information with strangers 
• 20% share information on social networks that 
they would never share in person 
• 18% share online account data from public wi-fi
Computer Forensics 
Imaging hard 
drives 
Analysis of data 
Data verification 
Legal Advice 
Transgressions 
of internal 
policies
Where are you right now?
Insurance against Cybercrime 
People 
Risk 
Risk 
Assessment 
Training 
Ongoing 
vulnerability 
assessments People Risk 
Established 
relationship 
with fraud 
investigations 
expert 
Management 
Programme
People Risk 
Pre 
Employment 
Screening 
Lifestyle 
Audits 
Suppliers Contractors 
Exit 
Interviews 
People Risk 
Management 
Programme
Risk Assessment 
Physical Risk 
Systems & 
Procedures 
Ongoing 
vulnerability 
assessments Cybercrime 
Risk 
Assessment 
Manpower Technology
Training 
Policies 
Social Media 
Regular 
Updates 
Ongoing 
vulnerability 
assessments 
People Risk 
Management 
Programme
Company Value System
Jenny Reid 
+27 82 600 8225 
jenny@ifacts.co.za 
www.ifacts.co.za

More Related Content

What's hot

Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
aymancoo
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
Goutama Bachtiar
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
Kartik Chhabra
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
tomo006
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensics
btr-security
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
Digital law
Digital lawDigital law
Digital law
BrunsUSD15
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
Jordan Amerson
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
Carlos Gonsalves
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
Mark Cook
 
Cyber security
Cyber security Cyber security
Cyber security
REVA UNIVERSITY
 
digital law
digital lawdigital law
digital law
11tsk
 

What's hot (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Data data every where!! Thomas O'Grady
Data data every where!! Thomas O'GradyData data every where!! Thomas O'Grady
Data data every where!! Thomas O'Grady
 
Cyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security ForensicsCyber ID Sleuth Data Security Forensics
Cyber ID Sleuth Data Security Forensics
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
APT 510 Assignment 1
APT 510 Assignment 1APT 510 Assignment 1
APT 510 Assignment 1
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Cyber Security Protection
Cyber Security ProtectionCyber Security Protection
Cyber Security Protection
 
Cyber security
Cyber security Cyber security
Cyber security
 
digital law
digital lawdigital law
digital law
 

Similar to Investigating & proving cybercrime

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
Zev Aidikoff
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
Management Insights LLC
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
Tzar Umang
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
asimoly1141
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 
Cyber security
Cyber securityCyber security
Cyber security
Satbharai Sethar
 
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Cyber Security Experts
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
Lawley Insurance
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
Shashwata Sahu
 
cyber crime
cyber crimecyber crime
cyber crime
priya sehgal
 

Similar to Investigating & proving cybercrime (20)

Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023Digital Investigation | Digital Forensics | Cyber Crime - 2023
Digital Investigation | Digital Forensics | Cyber Crime - 2023
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
cyber crime
cyber crimecyber crime
cyber crime
 

Recently uploaded

Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
Waleed Kamal
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
TulsiDhidhi1
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
iampriyanshujaiswal
 

Recently uploaded (20)

Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
 

Investigating & proving cybercrime

  • 1.
  • 2. Investigating and Proving Computer Fraud Jenny Reid Director
  • 3. WAS • Hacking • Phishing • Data Espionage • Data Interference MOVING TO • Intellectual property theft • Identity theft • Social Engineering Fin24 – April 2014
  • 4. HACKING A technical effort to manipulate the normal behaviour of networks, connections and information
  • 5. PHISHING / SMISHING Fraudulent practice of sending messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
  • 6. DATA ESPIONAGE Data espionage describes the stealing of secrets stored in digital formats or on computers and IT networks
  • 7. DATA INTERFERENCE Data corruption refers to errors in computer data resulting in unintended changes to the original data.
  • 8. INTELLECTUAL PROPERTY THEFT The theft of any innovation any method or formula with economic value; or any unique name, symbol, or logo that is used commercially. It can also be the theft of company data.
  • 9. IDENTITY THEFT Identity theft is a form of stealing an identity for personal or corporate gain. • True Name • Account Takeover
  • 10. SOCIAL ENGINEERING The manipulation of people to divulge confidential information
  • 11.
  • 12. 70% of African companies have been subjected to computer fraud
  • 13. • Global incidents increased by 48% • 117 339 incidents per day • Increased 66% year on year since 2009 • Budgets have remained steady since 2009
  • 14. • Financial costs • Reputation damage • Social damage • Personnel infiltration • Theft of resources
  • 16. The problem with human resources Is that they are human, with all that entails. Truthfully, the human condition is by and large good. Most people are honest, sincere, responsible And prepared to work hard for a fair shake. But there are others that give people a bad name. These are the ones that lie, cheat and steal. They are the businessman’s worst nightmare For the damage they can cause. These are the people you don’t want working for you.
  • 17. • Incidents by insiders increased by 10% • Incidents by contractors / suppliers rose by 17% • Incidents by competitors increased by 64%
  • 18. The problem with human resources • Communication via social networks is one of the most popular activites on the internet • Social networking – 3rd most popular activity • 75% of people pay no attention to possible hackers • 13% discuss private information with strangers • 20% share information on social networks that they would never share in person • 18% share online account data from public wi-fi
  • 19. Computer Forensics Imaging hard drives Analysis of data Data verification Legal Advice Transgressions of internal policies
  • 20. Where are you right now?
  • 21. Insurance against Cybercrime People Risk Risk Assessment Training Ongoing vulnerability assessments People Risk Established relationship with fraud investigations expert Management Programme
  • 22. People Risk Pre Employment Screening Lifestyle Audits Suppliers Contractors Exit Interviews People Risk Management Programme
  • 23. Risk Assessment Physical Risk Systems & Procedures Ongoing vulnerability assessments Cybercrime Risk Assessment Manpower Technology
  • 24. Training Policies Social Media Regular Updates Ongoing vulnerability assessments People Risk Management Programme
  • 26. Jenny Reid +27 82 600 8225 jenny@ifacts.co.za www.ifacts.co.za