SlideShare una empresa de Scribd logo
1 de 33
Top 10 RISKS 2013Top 10 RISKS 2013
2
Cyber crime is the fastest growingCyber crime is the fastest growing
crime on the planetcrime on the planet
ACCORDING TO …ACCORDING TO …
WHY?WHY?
1. Hard to detect1. Hard to detect
2. Hard to prevent2. Hard to prevent
WHY?WHY?
““That’s where the money is”.That’s where the money is”.
Why?Why?
The average bank robbery yields around…
£1,000£1,000
While…While…
The average cyber crime yields around…
£500,000£500,000
CHATUPLINE#103CHATUPLINE#103
As of December 2012, there were over 5 million web
pages offering some sort of free down-loadable hacking
software
AULDLANG SYNEAULDLANG SYNE
• 42% increase in targeted attacks in 2012.
• 31% of all targeted attacks aimed at businesses with less than 250 employees.
• 1 waterhole attack infected 500 organizations in a single day.
• 14 zero-day vulnerabilities.
• 32% of all mobile threats steal information.
• 1 threat infected 600,000 Macs in 2012.
• Spam volume continued to decrease, with 69% of all email being spam.
• The number of phishing sites spoofing social networking sites increased 125%.
• Web-based attacks increased 30%.
• 5,291 new vulnerabilities discovered in 2012, 415 on mobile O/S.
Symantec Global Intelligence Report 2012
““To a man with a hammer, everything looks like a nail”.To a man with a hammer, everything looks like a nail”.
WHATIS YOURWHATIS YOUR
DEFINITION OFADEFINITION OFA
THREAT?THREAT?
TOP10 RISKS 2013TOP10 RISKS 2013
1.1.
2.2.
3.3.
4.4.
5.5.
6.6.
7.7.
8.8.
9.9.
10.10.
10 DATA RANSOMATTACKS10 DATA RANSOMATTACKS
• Originated with Russian Organised Crime
• Now popular with Asian, Latin American & African
hackers
• Starts with a DDoS, drop database servers to default, take
admin access rights, encrypt data, send email ransom , 48
hours to Paypal
• Medical and financial records popular targets
• Malware version rapidly on the rise
9 IPADDRESSEDEQUIPMENT9 IPADDRESSEDEQUIPMENT
• Copiers
• Faxes
• Scanners
• Telephones
• UPS
• Air Conditioning
• Fire alarms
• PABX
• Coffee machines
8 MODEMATTACKS8 MODEMATTACKS
• “Phreaking” still works!
• Every server has a modem port!
• 23% of all external attacks are
traced back to previously
unidentified modems
• For every 1000 lines = average of
50 undetected/unprotected
modems/ports
© 2009 Orthus Ltd 15
MODEMS…MODEMS…
1. Bandwidth Manager
2. Exterior Router
3. Bastion Host (Firewall)
4. Interior Router
5. Network Switch
6. Application Servers
7. Network Storage
8. PBX
9. Voicemail
10.Modem Bank
11.RAS Server
12.Authentication Server
13.UPS
14.Air Conditioning
15.Building Access Control
System
7 SOCIALENGINEERING7 SOCIALENGINEERING
Accessing a system through a user
1. Identify the target
2. Conduct your research
3. Develop a rapport & trust
4. Exploit the trust for information
5. Use information to access the system.
6 MALWAREATTACKS6 MALWAREATTACKS
• Can retrieve whatever they are
programmed to find such as:
files, folders, address books, log
on IDs, passwords…
• Can execute whatever functions
it’s programmed to execute:
connections, downloads, off/on,
find folder: encrypt, copy, delete,
save as….
• Only limited to the creativity of
the writer
.exe.exe
DELIVEREDAS:DELIVEREDAS:
.exe.exe.exe.exe.exe.exe
SPYWARESPYWARE
• Key stroke loggers
• Browser trackers
• Mouse trackers
• eMail address book grabbers
• Password grabbers
• Session hijackers
• OS/application scouts
• Stealth installs
• Desktop hijacks
5 WEBAPPLICATION ATTACKS5 WEBAPPLICATION ATTACKS
Attacks that enable
access to the LAN:
– SQL injection
– Cross site scripting
– Session hi-jacking
• Malware
• Stealth installs
• Data interception
• Direct attack
• Call hi-jacking
• VPN hi-jacking
• Session hi-jacking
• Device hi-jacking
4 MOBILEDEVICEATTACKS4 MOBILEDEVICEATTACKS
3 IPTHEFTATTACKS3 IPTHEFTATTACKS
• Government attacks
– China
– France
– Israel
– Singapore
• Commercial attacks
• Insider attacks
CRITICAL INFRASTRUCTURECRITICAL INFRASTRUCTURE
IPTHEFTIPTHEFT
2 DATA BASEATTACKS2 DATA BASEATTACKS
•AKA: “The Mother Load”
•One stop shopping for your
all your identity theft needs
•These are the big money
hacks…
CHATUPLINE#18CHATUPLINE#18
In one week, the average person living in Britain has
3,254 pieces of personal information stored about him
or her in databases.*
*Evening Standard Survey August 2008
CHATUPLINE#27CHATUPLINE#27
The average UK citizen is in over 750 databases.*
*UK Information Commissioner's' Report: “What Price Privacy?” 2009
HOWMUCH?HOWMUCH?
• Name, address, DOB = £.50
• 16 digit credit card number = £.50
• + Expiry date + £1.00
• + Security code £1.00
NUMBER1: YOUNUMBER1: YOU
The overwhelming majority of security
incidents are originated by “insiders”
• IP Theft, Financial Fraud, Procurement
Fraud, Insider Trading, Misuse….
• Unauthorised applications
• Unauthorised output devices
• Unauthorised connections
• Unauthorised behaviour
• Removable media
CHATUPLINE#24CHATUPLINE#24
“7 out of 10 persons arrested for cyber crime are
employees of the company prosecuting them”
Federal Bureau of Investigation 2008Federal Bureau of Investigation 2008
TOP5 TARGETSTOP5 TARGETS
1. Sales
2. Finance
3. R&D
4. IT
5. C Level
TOP 10 RISKS 2013TOP 10 RISKS 2013
1.1. YouYou
2.2. Database TheftDatabase Theft
3.3. IP TheftIP Theft
4.4. Mobile DevicesMobile Devices
5.5. Web ApplicationsWeb Applications
6.6. MalwareMalware
7.7. Social EngineeringSocial Engineering
8.8. ModemsModems
9.9. IP Addressed EquipmentIP Addressed Equipment
10.10. Data RansomData Ransom
26 DoverStreet26 DoverStreet
LondonLondon
United KingdomUnited Kingdom
W1S 4LYW1S 4LY
+44 (0)20 3586 1025+44 (0)20 3586 1025
www.riskfactory.comwww.riskfactory.com
A DIFFERENTPERSPECTIVEA DIFFERENTPERSPECTIVE

Más contenido relacionado

La actualidad más candente

Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationCharles Mok
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Black Friday Kicks Off Holiday Cyber-Crime Season
Black Friday Kicks Off Holiday Cyber-Crime SeasonBlack Friday Kicks Off Holiday Cyber-Crime Season
Black Friday Kicks Off Holiday Cyber-Crime SeasonTenable Network Security
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industryFilippo Ferri
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsJay Nagar
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security PatternsMark Benson
 
WCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 FocusWCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 Focusprofluther
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimemuhammad awais
 
Homeland Security workshop
Homeland Security workshopHomeland Security workshop
Homeland Security workshopCandice Martinez
 
Digital forensics intro 20151123
Digital forensics intro 20151123Digital forensics intro 20151123
Digital forensics intro 20151123Kevin Schlottmann
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 

La actualidad más candente (20)

Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
The Target Scandal
The Target ScandalThe Target Scandal
The Target Scandal
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Black Friday Kicks Off Holiday Cyber-Crime Season
Black Friday Kicks Off Holiday Cyber-Crime SeasonBlack Friday Kicks Off Holiday Cyber-Crime Season
Black Friday Kicks Off Holiday Cyber-Crime Season
 
Cyber war
Cyber warCyber war
Cyber war
 
Cybersecurity in the gambling industry
Cybersecurity in the gambling industryCybersecurity in the gambling industry
Cybersecurity in the gambling industry
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
IoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security ControlsIoT Vulnerability Analysis and IOT In security Controls
IoT Vulnerability Analysis and IOT In security Controls
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
 
WCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 FocusWCC COMM 101-Chapter #10 Focus
WCC COMM 101-Chapter #10 Focus
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Homeland Security workshop
Homeland Security workshopHomeland Security workshop
Homeland Security workshop
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Digital forensics intro 20151123
Digital forensics intro 20151123Digital forensics intro 20151123
Digital forensics intro 20151123
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 

Destacado

Herramientas web 2.0
Herramientas web 2.0Herramientas web 2.0
Herramientas web 2.0bryanchalan
 
Investigación cualitativa y fenomenología en salud
Investigación cualitativa y fenomenología en saludInvestigación cualitativa y fenomenología en salud
Investigación cualitativa y fenomenología en saludLuis Fernando Urvina
 
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)RTM
 
Contaminación Bahía Quintero Puchuncaví
Contaminación Bahía Quintero PuchuncavíContaminación Bahía Quintero Puchuncaví
Contaminación Bahía Quintero Puchuncavíguest0dbffb
 
Client List Global TravelReps
Client List Global TravelRepsClient List Global TravelReps
Client List Global TravelRepsAlfonso Barquin
 
Manual para crear cuenta en vk.com
Manual para crear cuenta en vk.comManual para crear cuenta en vk.com
Manual para crear cuenta en vk.comJuan Da Castañeda
 
Presentación Impress
Presentación ImpressPresentación Impress
Presentación Impresspablohn
 

Destacado (20)

Las sardanas
Las sardanasLas sardanas
Las sardanas
 
Herramientas web 2.0
Herramientas web 2.0Herramientas web 2.0
Herramientas web 2.0
 
Clipping yuzz mayo 2012
Clipping yuzz mayo 2012Clipping yuzz mayo 2012
Clipping yuzz mayo 2012
 
Los 10 post mas leidos en 2014
Los 10 post mas leidos en 2014Los 10 post mas leidos en 2014
Los 10 post mas leidos en 2014
 
Cloud for ISP's
Cloud for ISP'sCloud for ISP's
Cloud for ISP's
 
Alexandru Ivan Resume
Alexandru Ivan ResumeAlexandru Ivan Resume
Alexandru Ivan Resume
 
Cartoné 2013
Cartoné 2013Cartoné 2013
Cartoné 2013
 
M Ghamry CV
M  Ghamry  CVM  Ghamry  CV
M Ghamry CV
 
BiBLIOGRAFIA DARIO SILVA
BiBLIOGRAFIA DARIO SILVA BiBLIOGRAFIA DARIO SILVA
BiBLIOGRAFIA DARIO SILVA
 
Dossier Delineación de Estructuras
Dossier Delineación de EstructurasDossier Delineación de Estructuras
Dossier Delineación de Estructuras
 
Investigación cualitativa y fenomenología en salud
Investigación cualitativa y fenomenología en saludInvestigación cualitativa y fenomenología en salud
Investigación cualitativa y fenomenología en salud
 
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)
Gestión de la Formación Continua ante la Fundación Tripartita (FTFE)
 
Contaminación Bahía Quintero Puchuncaví
Contaminación Bahía Quintero PuchuncavíContaminación Bahía Quintero Puchuncaví
Contaminación Bahía Quintero Puchuncaví
 
Client List Global TravelReps
Client List Global TravelRepsClient List Global TravelReps
Client List Global TravelReps
 
Manual para crear cuenta en vk.com
Manual para crear cuenta en vk.comManual para crear cuenta en vk.com
Manual para crear cuenta en vk.com
 
Nutricion en equinos
Nutricion  en equinosNutricion  en equinos
Nutricion en equinos
 
Proyecto Final
Proyecto FinalProyecto Final
Proyecto Final
 
Ministerio de alabanza
Ministerio de alabanza Ministerio de alabanza
Ministerio de alabanza
 
Thermopolymer HD
Thermopolymer HDThermopolymer HD
Thermopolymer HD
 
Presentación Impress
Presentación ImpressPresentación Impress
Presentación Impress
 

Similar a Risk Factory: Top 10 Risks 2013

Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks PresentationNeville Cartwright
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 

Similar a Risk Factory: Top 10 Risks 2013 (20)

Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks Presentation
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Presentation1 1.pptx
Presentation1 1.pptxPresentation1 1.pptx
Presentation1 1.pptx
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 

Más de Risk Crew

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Crew
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Crew
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Crew
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Crew
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Crew
 

Más de Risk Crew (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best Practices
 

Último

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Risk Factory: Top 10 Risks 2013

  • 1. Top 10 RISKS 2013Top 10 RISKS 2013
  • 2. 2 Cyber crime is the fastest growingCyber crime is the fastest growing crime on the planetcrime on the planet ACCORDING TO …ACCORDING TO …
  • 3. WHY?WHY? 1. Hard to detect1. Hard to detect 2. Hard to prevent2. Hard to prevent
  • 4. WHY?WHY? ““That’s where the money is”.That’s where the money is”.
  • 5. Why?Why? The average bank robbery yields around… £1,000£1,000
  • 6. While…While… The average cyber crime yields around… £500,000£500,000
  • 7. CHATUPLINE#103CHATUPLINE#103 As of December 2012, there were over 5 million web pages offering some sort of free down-loadable hacking software
  • 8. AULDLANG SYNEAULDLANG SYNE • 42% increase in targeted attacks in 2012. • 31% of all targeted attacks aimed at businesses with less than 250 employees. • 1 waterhole attack infected 500 organizations in a single day. • 14 zero-day vulnerabilities. • 32% of all mobile threats steal information. • 1 threat infected 600,000 Macs in 2012. • Spam volume continued to decrease, with 69% of all email being spam. • The number of phishing sites spoofing social networking sites increased 125%. • Web-based attacks increased 30%. • 5,291 new vulnerabilities discovered in 2012, 415 on mobile O/S. Symantec Global Intelligence Report 2012
  • 9. ““To a man with a hammer, everything looks like a nail”.To a man with a hammer, everything looks like a nail”.
  • 10. WHATIS YOURWHATIS YOUR DEFINITION OFADEFINITION OFA THREAT?THREAT?
  • 11. TOP10 RISKS 2013TOP10 RISKS 2013 1.1. 2.2. 3.3. 4.4. 5.5. 6.6. 7.7. 8.8. 9.9. 10.10.
  • 12. 10 DATA RANSOMATTACKS10 DATA RANSOMATTACKS • Originated with Russian Organised Crime • Now popular with Asian, Latin American & African hackers • Starts with a DDoS, drop database servers to default, take admin access rights, encrypt data, send email ransom , 48 hours to Paypal • Medical and financial records popular targets • Malware version rapidly on the rise
  • 13. 9 IPADDRESSEDEQUIPMENT9 IPADDRESSEDEQUIPMENT • Copiers • Faxes • Scanners • Telephones • UPS • Air Conditioning • Fire alarms • PABX • Coffee machines
  • 14. 8 MODEMATTACKS8 MODEMATTACKS • “Phreaking” still works! • Every server has a modem port! • 23% of all external attacks are traced back to previously unidentified modems • For every 1000 lines = average of 50 undetected/unprotected modems/ports
  • 15. © 2009 Orthus Ltd 15 MODEMS…MODEMS… 1. Bandwidth Manager 2. Exterior Router 3. Bastion Host (Firewall) 4. Interior Router 5. Network Switch 6. Application Servers 7. Network Storage 8. PBX 9. Voicemail 10.Modem Bank 11.RAS Server 12.Authentication Server 13.UPS 14.Air Conditioning 15.Building Access Control System
  • 16. 7 SOCIALENGINEERING7 SOCIALENGINEERING Accessing a system through a user 1. Identify the target 2. Conduct your research 3. Develop a rapport & trust 4. Exploit the trust for information 5. Use information to access the system.
  • 17. 6 MALWAREATTACKS6 MALWAREATTACKS • Can retrieve whatever they are programmed to find such as: files, folders, address books, log on IDs, passwords… • Can execute whatever functions it’s programmed to execute: connections, downloads, off/on, find folder: encrypt, copy, delete, save as…. • Only limited to the creativity of the writer
  • 19. SPYWARESPYWARE • Key stroke loggers • Browser trackers • Mouse trackers • eMail address book grabbers • Password grabbers • Session hijackers • OS/application scouts • Stealth installs • Desktop hijacks
  • 20. 5 WEBAPPLICATION ATTACKS5 WEBAPPLICATION ATTACKS Attacks that enable access to the LAN: – SQL injection – Cross site scripting – Session hi-jacking
  • 21. • Malware • Stealth installs • Data interception • Direct attack • Call hi-jacking • VPN hi-jacking • Session hi-jacking • Device hi-jacking 4 MOBILEDEVICEATTACKS4 MOBILEDEVICEATTACKS
  • 22. 3 IPTHEFTATTACKS3 IPTHEFTATTACKS • Government attacks – China – France – Israel – Singapore • Commercial attacks • Insider attacks
  • 25. 2 DATA BASEATTACKS2 DATA BASEATTACKS •AKA: “The Mother Load” •One stop shopping for your all your identity theft needs •These are the big money hacks…
  • 26. CHATUPLINE#18CHATUPLINE#18 In one week, the average person living in Britain has 3,254 pieces of personal information stored about him or her in databases.* *Evening Standard Survey August 2008
  • 27. CHATUPLINE#27CHATUPLINE#27 The average UK citizen is in over 750 databases.* *UK Information Commissioner's' Report: “What Price Privacy?” 2009
  • 28. HOWMUCH?HOWMUCH? • Name, address, DOB = £.50 • 16 digit credit card number = £.50 • + Expiry date + £1.00 • + Security code £1.00
  • 29. NUMBER1: YOUNUMBER1: YOU The overwhelming majority of security incidents are originated by “insiders” • IP Theft, Financial Fraud, Procurement Fraud, Insider Trading, Misuse…. • Unauthorised applications • Unauthorised output devices • Unauthorised connections • Unauthorised behaviour • Removable media
  • 30. CHATUPLINE#24CHATUPLINE#24 “7 out of 10 persons arrested for cyber crime are employees of the company prosecuting them” Federal Bureau of Investigation 2008Federal Bureau of Investigation 2008
  • 31. TOP5 TARGETSTOP5 TARGETS 1. Sales 2. Finance 3. R&D 4. IT 5. C Level
  • 32. TOP 10 RISKS 2013TOP 10 RISKS 2013 1.1. YouYou 2.2. Database TheftDatabase Theft 3.3. IP TheftIP Theft 4.4. Mobile DevicesMobile Devices 5.5. Web ApplicationsWeb Applications 6.6. MalwareMalware 7.7. Social EngineeringSocial Engineering 8.8. ModemsModems 9.9. IP Addressed EquipmentIP Addressed Equipment 10.10. Data RansomData Ransom
  • 33. 26 DoverStreet26 DoverStreet LondonLondon United KingdomUnited Kingdom W1S 4LYW1S 4LY +44 (0)20 3586 1025+44 (0)20 3586 1025 www.riskfactory.comwww.riskfactory.com A DIFFERENTPERSPECTIVEA DIFFERENTPERSPECTIVE

Notas del editor

  1. © 2005 Orthus Ltd
  2. © 2005 Orthus Ltd
  3. © 2005 Orthus Ltd
  4. $2,000 USD © 2005 Orthus Ltd
  5. © 2005 Orthus Ltd $5000,000 USD Low risk – High reward
  6. © 2005 Orthus Ltd
  7. © 2005 Orthus Ltd Read Threat Reports published by vendors with skepticism as they look at the world through the eyes of their products spec sheet. Or as my Grandfather use to say: “To a man with a hammer – everything looks like a nail”.
  8. © 2005 Orthus Ltd You have to decide the definition of a threat to your business – not a security vendor
  9. © 2005 Orthus Ltd So the following may or may not be applicable to your specific business
  10. © 2005 Orthus Ltd
  11. © 2005 Orthus Ltd Don’t smile. I’m serious.
  12. © 2005 Orthus Ltd
  13. © 2005 Orthus Ltd
  14. © 2005 Orthus Ltd
  15. © 2005 Orthus Ltd
  16. © 2005 Orthus Ltd
  17. © 2005 Orthus Ltd
  18. © 2005 Orthus Ltd
  19. © 2005 Orthus Ltd New York, London & Tokyo stock exchanges GPS satellites Air traffic control systems Nuclear power plants
  20. © 2005 Orthus Ltd
  21. © 2005 Orthus Ltd CA SB1386 Public losses posted
  22. © 2005 Orthus Ltd
  23. © 2005 Orthus Ltd
  24. Go forth and multiply