SlideShare una empresa de Scribd logo
1 de 44
Why vigilance is
our best Protection
against Cyber
Crime
The ability to download hacking tools
means that a determined 12-year old with
some basic computer skills can become not
only a successful hacker but can actually
make money from stealing on the internet.
For the more advanced wannabe, there are
cyber crime black markets that sell
personal data, credit card information,
tools, passwords, and successful exploits.
In addition to that, criminals can rent “bot-nets”
(a list of compromised and infected computers
all over the Internet) from the cyber-criminal
underworld.
They can even purchase complete online stores
to collect personal information or to sell bogus
products.
Wannabe Cyber Criminals can post
resumes and apply for cracking or
hacking jobs, or apply to join Cyber
Criminal Gangs
This is the world we live in
A little History of Technology in Crime
Crime is exponential.
In the old days it was Mano au Mano - one person
stealing from one person.
We then added stage coaches, trains and banks one
person stealing from a number of people.
The Sony hack in 2011 was one person or a small
group of people stealing from 70 million people.
Mobile phones and pagers
The normal criminals were using
these long before normal business
people, Doctors and senior
Management.
In the 1990’s one Mexican cartel and
its drug lord were so annoyed at
being targeted by law enforcement
that they created their own complete
mobile phone system
Phone towers in all 31 States,
Mobile phones and
their own SIM cards
The Mumbai terrorist attack (Raj hotel 2008)
Why did it take so long to catch the
terrorists?
They had help!
They had the normal things, Guns
and Bombs,
They also had GPS, Encrypted mobile
phones and night vision goggles
They also had an Operations centre in Pakistan,
telling where the good guys were and feeding
critical information to them in real time
Meanwhile in Cyber
Space
Androids
In its endeavour to beat the Apple IPhone,
Google released the android operating system
September 2008 it was released to the world on
HTC’s Dream
The android market went live at the same time
selling everything from games to Apps for the
android device
Android
People started using the Android market and
downloading apps and games for their devices
In the first month 50,000 banking apps were
downloaded.
All were fake!
Even Today
Download a flashlight app from either android
and IOS
75% have a malware component
Seems to be the easiest app to get through the
vetting process
If it asks you if it can access your location
service then there is a good chance that it is
bad for your phone
Why do you need a location service for a
light?
A criminal organisation in the Ukraine set itself
up as a marketing company:
Selling software and websites – Russian Brides,
the FBI virus, all were malware infected
The Bad guys are so sophisticated - in
2012
Had all of the correct staffing in the office
including a call centre which could talk you
through the process of sending them money
to purchase their “Software” or sign up for a
Bride.
They had Legitimate offices and payed
taxes
Only about 5% of the people knew they were
doing something illegal and most of them
were not Management.
They generated 500 Million Euros in revenue
in the first 12 months of operations
Actually the bad guys are
here, right now!!!
The bad guys are smart, persistent,
well educated in computer systems
and know what they are doing
They are developing more and more
sophisticated ways of gaining access
to your systems and information
What do they want
• They want your Money
• They want everyone's information.
• They want your Ideas and Intellectual Property
The cost to everyone
• 2 trillion dollar industry – world wide
• There are unaccountable number of lives
destroyed
• The actual loss of intellectual property cannot
be measured
How do they do it!
They use Viruses, malware, spyware, ransom
ware, RATs (remote access Trojans) and
focused hacking attacks
They have sophisticated command and
control systems
Use and create Bot nets
They use sophisticated encrypted
communications systems
They rent cloud space, super computer
cycles and bot nets – with a stolen credit
cards of course
Paid in Bit coins (a supposedly
untraceable finite internet based money)
Everyone is a target
If that doesn’t work they use social
engineering and industrial espionage:
They put infected USB drives in car parks,
They swap out DVD’s and CD’s from
Magazines
They use targeted Spear phishing attacks
I consider the internet the most
dangerous place in the world
Its like walking down a dark alley in
the worst part of your town or city,
with your hands and feet shackled,
you wallet full of money, credit
cards and personal information
and a big sign saying “ROB ME”
Why are we so vulnerable on
the internet?
For some reason normal human checks
and balances go out the window
They get round your defences in
unpredictable ways
We all want to trust someone so they
use our trusting nature against us
That’s what it all comes down to:
Trust
Normally we use all of our senses when you
meet someone
– Sight
– Sound
– Touch
– Taste
– Smell
You often hear I didn’t like him, or I had a funny feeling
about her.
The internet is all about trust
On the internet – sight is the only sense that we
rely on
That can be skewed in so many ways.
How do you know that the person you are talking to
on the internet is who they say they are
Was it her or is it this guy?
On the internet we rely on reputation,
information from others to build that trust.
If you are purchasing something from Amazon?
Do you check the sellers reputation.
• How many things they have sold,
• is there any outstanding complaints,
• are the goods guaranteed!
When purchasing on the internet do you check
the address, phone number?
Cybersecurity is MY problem.
Cybersecurity is MY problem. I have to
look at it in that context.
Cybersecurity is MY problem, I am the
Master of my own destiny.
Cybersecurity is MY problem and If I want
protection, I have to be the one protecting.
Cybersecurity is MY problem and I have to
protect myself and not rely on others to do
that for me.
What are the basics to protect
yourself
Use Strong passwords – do not use a word, use a
phrase with spaces in it
Use Unique passwords – do not use the same
password on more than one account
Use the newest operating system and applications
you can afford and keep them updated
Use a good Anti Virus – Buy one if you cannot afford
to buy one use a reputable free one.
Be paranoid – on the internet paranoia is not a state
of mind everyone is out to get you
Use Common sense – if its too good to be true then
it is a trap. If its free then its not.
Awareness is the key to protecting
yourself
Build up your cyber security awareness
Need Help?
Go to www.securitypolicytraining.com.au and
sign up for the basic cyber security awareness
course.
This code Slideshare1 will allow the first 10
people to do the course for free
If all of the free ones are gone use Slideshare2
for a 40% discount
The only constant we
have is change

Más contenido relacionado

Último

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Vigilance is our best protection against cyber crime

  • 1. Why vigilance is our best Protection against Cyber Crime
  • 2. The ability to download hacking tools means that a determined 12-year old with some basic computer skills can become not only a successful hacker but can actually make money from stealing on the internet.
  • 3. For the more advanced wannabe, there are cyber crime black markets that sell personal data, credit card information, tools, passwords, and successful exploits.
  • 4. In addition to that, criminals can rent “bot-nets” (a list of compromised and infected computers all over the Internet) from the cyber-criminal underworld. They can even purchase complete online stores to collect personal information or to sell bogus products.
  • 5. Wannabe Cyber Criminals can post resumes and apply for cracking or hacking jobs, or apply to join Cyber Criminal Gangs This is the world we live in
  • 6. A little History of Technology in Crime
  • 7. Crime is exponential. In the old days it was Mano au Mano - one person stealing from one person. We then added stage coaches, trains and banks one person stealing from a number of people. The Sony hack in 2011 was one person or a small group of people stealing from 70 million people.
  • 8. Mobile phones and pagers The normal criminals were using these long before normal business people, Doctors and senior Management.
  • 9. In the 1990’s one Mexican cartel and its drug lord were so annoyed at being targeted by law enforcement that they created their own complete mobile phone system Phone towers in all 31 States, Mobile phones and their own SIM cards
  • 10. The Mumbai terrorist attack (Raj hotel 2008) Why did it take so long to catch the terrorists?
  • 11. They had help! They had the normal things, Guns and Bombs, They also had GPS, Encrypted mobile phones and night vision goggles
  • 12. They also had an Operations centre in Pakistan, telling where the good guys were and feeding critical information to them in real time
  • 14. Androids In its endeavour to beat the Apple IPhone, Google released the android operating system September 2008 it was released to the world on HTC’s Dream The android market went live at the same time selling everything from games to Apps for the android device
  • 15. Android People started using the Android market and downloading apps and games for their devices In the first month 50,000 banking apps were downloaded.
  • 17. Even Today Download a flashlight app from either android and IOS 75% have a malware component Seems to be the easiest app to get through the vetting process If it asks you if it can access your location service then there is a good chance that it is bad for your phone Why do you need a location service for a light?
  • 18. A criminal organisation in the Ukraine set itself up as a marketing company: Selling software and websites – Russian Brides, the FBI virus, all were malware infected The Bad guys are so sophisticated - in 2012
  • 19. Had all of the correct staffing in the office including a call centre which could talk you through the process of sending them money to purchase their “Software” or sign up for a Bride. They had Legitimate offices and payed taxes
  • 20. Only about 5% of the people knew they were doing something illegal and most of them were not Management. They generated 500 Million Euros in revenue in the first 12 months of operations
  • 21. Actually the bad guys are here, right now!!!
  • 22. The bad guys are smart, persistent, well educated in computer systems and know what they are doing
  • 23. They are developing more and more sophisticated ways of gaining access to your systems and information
  • 24. What do they want • They want your Money • They want everyone's information. • They want your Ideas and Intellectual Property
  • 25. The cost to everyone • 2 trillion dollar industry – world wide • There are unaccountable number of lives destroyed • The actual loss of intellectual property cannot be measured
  • 26. How do they do it! They use Viruses, malware, spyware, ransom ware, RATs (remote access Trojans) and focused hacking attacks They have sophisticated command and control systems Use and create Bot nets
  • 27. They use sophisticated encrypted communications systems They rent cloud space, super computer cycles and bot nets – with a stolen credit cards of course Paid in Bit coins (a supposedly untraceable finite internet based money)
  • 28. Everyone is a target If that doesn’t work they use social engineering and industrial espionage: They put infected USB drives in car parks, They swap out DVD’s and CD’s from Magazines They use targeted Spear phishing attacks
  • 29. I consider the internet the most dangerous place in the world Its like walking down a dark alley in the worst part of your town or city, with your hands and feet shackled, you wallet full of money, credit cards and personal information and a big sign saying “ROB ME”
  • 30. Why are we so vulnerable on the internet?
  • 31. For some reason normal human checks and balances go out the window They get round your defences in unpredictable ways We all want to trust someone so they use our trusting nature against us
  • 32. That’s what it all comes down to: Trust Normally we use all of our senses when you meet someone – Sight – Sound – Touch – Taste – Smell You often hear I didn’t like him, or I had a funny feeling about her.
  • 33. The internet is all about trust On the internet – sight is the only sense that we rely on That can be skewed in so many ways.
  • 34. How do you know that the person you are talking to on the internet is who they say they are
  • 35. Was it her or is it this guy?
  • 36. On the internet we rely on reputation, information from others to build that trust. If you are purchasing something from Amazon? Do you check the sellers reputation. • How many things they have sold, • is there any outstanding complaints, • are the goods guaranteed! When purchasing on the internet do you check the address, phone number?
  • 38. Cybersecurity is MY problem. I have to look at it in that context. Cybersecurity is MY problem, I am the Master of my own destiny.
  • 39. Cybersecurity is MY problem and If I want protection, I have to be the one protecting. Cybersecurity is MY problem and I have to protect myself and not rely on others to do that for me.
  • 40. What are the basics to protect yourself Use Strong passwords – do not use a word, use a phrase with spaces in it Use Unique passwords – do not use the same password on more than one account Use the newest operating system and applications you can afford and keep them updated
  • 41. Use a good Anti Virus – Buy one if you cannot afford to buy one use a reputable free one. Be paranoid – on the internet paranoia is not a state of mind everyone is out to get you Use Common sense – if its too good to be true then it is a trap. If its free then its not.
  • 42. Awareness is the key to protecting yourself Build up your cyber security awareness
  • 43. Need Help? Go to www.securitypolicytraining.com.au and sign up for the basic cyber security awareness course. This code Slideshare1 will allow the first 10 people to do the course for free If all of the free ones are gone use Slideshare2 for a 40% discount
  • 44. The only constant we have is change

Notas del editor

  1. In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  2. In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
  3. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  4. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  5. 2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
  6. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  7. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  8. 2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
  9. risk
  10. risk
  11. training
  12. training
  13. training