Cyber security is MY problem, this should be the attitude of all users on the internet. Sadly its not. Cyber Crime and Cyber Security rely on all users of the internet to be paranoid and to use common sense. Awareness is the cheapest and safest way to increase your business and individual protection.
2. The ability to download hacking tools
means that a determined 12-year old with
some basic computer skills can become not
only a successful hacker but can actually
make money from stealing on the internet.
3. For the more advanced wannabe, there are
cyber crime black markets that sell
personal data, credit card information,
tools, passwords, and successful exploits.
4. In addition to that, criminals can rent “bot-nets”
(a list of compromised and infected computers
all over the Internet) from the cyber-criminal
underworld.
They can even purchase complete online stores
to collect personal information or to sell bogus
products.
5. Wannabe Cyber Criminals can post
resumes and apply for cracking or
hacking jobs, or apply to join Cyber
Criminal Gangs
This is the world we live in
7. Crime is exponential.
In the old days it was Mano au Mano - one person
stealing from one person.
We then added stage coaches, trains and banks one
person stealing from a number of people.
The Sony hack in 2011 was one person or a small
group of people stealing from 70 million people.
8. Mobile phones and pagers
The normal criminals were using
these long before normal business
people, Doctors and senior
Management.
9. In the 1990’s one Mexican cartel and
its drug lord were so annoyed at
being targeted by law enforcement
that they created their own complete
mobile phone system
Phone towers in all 31 States,
Mobile phones and
their own SIM cards
10. The Mumbai terrorist attack (Raj hotel 2008)
Why did it take so long to catch the
terrorists?
11. They had help!
They had the normal things, Guns
and Bombs,
They also had GPS, Encrypted mobile
phones and night vision goggles
12. They also had an Operations centre in Pakistan,
telling where the good guys were and feeding
critical information to them in real time
14. Androids
In its endeavour to beat the Apple IPhone,
Google released the android operating system
September 2008 it was released to the world on
HTC’s Dream
The android market went live at the same time
selling everything from games to Apps for the
android device
15. Android
People started using the Android market and
downloading apps and games for their devices
In the first month 50,000 banking apps were
downloaded.
17. Even Today
Download a flashlight app from either android
and IOS
75% have a malware component
Seems to be the easiest app to get through the
vetting process
If it asks you if it can access your location
service then there is a good chance that it is
bad for your phone
Why do you need a location service for a
light?
18. A criminal organisation in the Ukraine set itself
up as a marketing company:
Selling software and websites – Russian Brides,
the FBI virus, all were malware infected
The Bad guys are so sophisticated - in
2012
19. Had all of the correct staffing in the office
including a call centre which could talk you
through the process of sending them money
to purchase their “Software” or sign up for a
Bride.
They had Legitimate offices and payed
taxes
20. Only about 5% of the people knew they were
doing something illegal and most of them
were not Management.
They generated 500 Million Euros in revenue
in the first 12 months of operations
22. The bad guys are smart, persistent,
well educated in computer systems
and know what they are doing
23. They are developing more and more
sophisticated ways of gaining access
to your systems and information
24. What do they want
• They want your Money
• They want everyone's information.
• They want your Ideas and Intellectual Property
25. The cost to everyone
• 2 trillion dollar industry – world wide
• There are unaccountable number of lives
destroyed
• The actual loss of intellectual property cannot
be measured
26. How do they do it!
They use Viruses, malware, spyware, ransom
ware, RATs (remote access Trojans) and
focused hacking attacks
They have sophisticated command and
control systems
Use and create Bot nets
27. They use sophisticated encrypted
communications systems
They rent cloud space, super computer
cycles and bot nets – with a stolen credit
cards of course
Paid in Bit coins (a supposedly
untraceable finite internet based money)
28. Everyone is a target
If that doesn’t work they use social
engineering and industrial espionage:
They put infected USB drives in car parks,
They swap out DVD’s and CD’s from
Magazines
They use targeted Spear phishing attacks
29. I consider the internet the most
dangerous place in the world
Its like walking down a dark alley in
the worst part of your town or city,
with your hands and feet shackled,
you wallet full of money, credit
cards and personal information
and a big sign saying “ROB ME”
31. For some reason normal human checks
and balances go out the window
They get round your defences in
unpredictable ways
We all want to trust someone so they
use our trusting nature against us
32. That’s what it all comes down to:
Trust
Normally we use all of our senses when you
meet someone
– Sight
– Sound
– Touch
– Taste
– Smell
You often hear I didn’t like him, or I had a funny feeling
about her.
33. The internet is all about trust
On the internet – sight is the only sense that we
rely on
That can be skewed in so many ways.
34. How do you know that the person you are talking to
on the internet is who they say they are
36. On the internet we rely on reputation,
information from others to build that trust.
If you are purchasing something from Amazon?
Do you check the sellers reputation.
• How many things they have sold,
• is there any outstanding complaints,
• are the goods guaranteed!
When purchasing on the internet do you check
the address, phone number?
38. Cybersecurity is MY problem. I have to
look at it in that context.
Cybersecurity is MY problem, I am the
Master of my own destiny.
39. Cybersecurity is MY problem and If I want
protection, I have to be the one protecting.
Cybersecurity is MY problem and I have to
protect myself and not rely on others to do
that for me.
40. What are the basics to protect
yourself
Use Strong passwords – do not use a word, use a
phrase with spaces in it
Use Unique passwords – do not use the same
password on more than one account
Use the newest operating system and applications
you can afford and keep them updated
41. Use a good Anti Virus – Buy one if you cannot afford
to buy one use a reputable free one.
Be paranoid – on the internet paranoia is not a state
of mind everyone is out to get you
Use Common sense – if its too good to be true then
it is a trap. If its free then its not.
42. Awareness is the key to protecting
yourself
Build up your cyber security awareness
43. Need Help?
Go to www.securitypolicytraining.com.au and
sign up for the basic cyber security awareness
course.
This code Slideshare1 will allow the first 10
people to do the course for free
If all of the free ones are gone use Slideshare2
for a 40% discount
In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
In the 80” we all had these didn’t we, No, so who had them. Most of the people who had them were doctors and celebrities. Well apart from that the criminals also had themIn the 90’s the drug lords in Mexico got sick of always being busted by the federallies and the DEA that they decided to do something about it. They build their own highly secure mobile phone system. Towers in all 31 Mexican states, sim cards and phones. It wasn’t until a high ranking official was captured with the phone on the network did the authorities start to get intelligence out of them
2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
2008, the Mumbai terrorist attacks, I guarantee that you were all asking the same question, why did it take so long to stop it. The reason is that apart from all of the normal stuff that they had, guns and explosives. They were also using GPS, night vision goggles and mobile phones for communication.The most startling part of the attack was that over the boarder in Pakistan they had an operations centre that was feeding them the information about what was happening. They were listening to police and army frequencies and they were using Google to check their facts. In point of fact when the terrorists got to the top floor and kicked in the door of one of the penthouses they found a man claiming to be a teacher. The operations centre asked a series of question that they verified on google and they found out he was the second richest man in India. They were told to kill him.
2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.
2008 was also the release of Google Android system. Who here has an android phone – the bad guys thank you.In September 2008 the first mobile phone with the android operating system – the HTC dream – was released. Because it relied on apps at the same time the android market place was also open for business.