SlideShare una empresa de Scribd logo
1 de 67
Descargar para leer sin conexión
Who am I?
Who am I?
• Well over 30 years in telecom
• 26 years in the Naval Air Reserve
        • Top Secret clearance
        • Responsible for proper operation of all in‐flight
           Responsible for proper operation of all in flight 
        communication and navigation equipment
• Former Central Region Adtran, AFC Territory Sales Manager
• L
  Long time member of the  MNTA and NDTA organizations
        ti         b    f th MNTA d NDTA              i ti
• Project manager – County oif Sacramento telecom project
• Visiting faculty at DePaul University in Chicago
• Founder of SimpleTel, Inc. – manufacturer’s representative
The ABC’s
         of
          f
   Identity Th ft
   Id tit Theft
Part One in a multi part series of  overviews on Disaster 
Part One in a multi‐part series of overviews on Disaster
 Avoidance, Business Continuity and Disaster Recovery
Objectives
• Security Overview

• Define “identity theft”

• Evaluate criminal methodologies
  Evaluate criminal methodologies

• Consider “protective” solutions
  Consider protective solutions
During the 2nd half of 2008, 
      g                     ,
70 of the top 100 websites 
 were found to have been 
 were found to have been
compromised or contained 
  links to malicious sites.
  links to malicious sites
Interesting information…
         • 25 million new strains of malware are 
         presented in just one year
         • 23 new malware samples per minute
         • Banker trojans make up 66% of all malware
         • 95% of the bits and bytes sent across the
           95% of the bits and bytes sent across the 
         internet consists of “unstructured” data
                         • PDF
                         • JPG/GIF
                         • MPEG

SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
Interesting information (cont)…
         The most alarming sources of malware 
         attacks come from:

                           • Social Networking @ 31%

                           • Web sites @ 29%

                           • Email @ 17%


SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
Interesting information (cont)…
         • Facebook receives 15 million requests for 
         service PER SECOND

         • 49 % of companies polled allow their staff 
         to access Facebook
         to access Facebook


          What happens when Facebook
          What happens hen Facebook
          becomes a tool of evil people
SOURCE:  Infoweek TechWeb Webcast of 2/17/2010
Potential Threat Vectors…
• Web site attacks on browsers

• Social networks
  Social networks
• Email accounts

• Wireless access points
“Vectors” of choice…
“       ” f h i
A new site to watch (or not)…
 • Reported in Sunday’s New York Times


       CHATROULETTE

Only three months old and has grown to 
Only three months old and has grown to
       tens of thousands of users
A recent Oracle survey…
• Security threats are poorly understood

• 33% of those polled stated identity theft 
was a potential barrier to online purchasing

• 42% were worried that personal details 
might be intercepted
might be intercepted

• 30% stated they didn’t trust web site 
security measures
Fringe sites…

 The problems only 
     p              y
 occur after the user 
 decides to click the 
         link!
Identity Th ft
Id tit Theft
Identity theft in its simplest 
       y                 p
form is the compromise and 
 use of your personal data 
 use of your personal data
    for the purpose of 
  committing a fraudulent 
  committing a fraudulent
             act.
• It isn’t about credit card receipts

• It doesn’t always come from those 
unsolicited credit card company invitations
      li i d di       d         i i i

• It doesn’t happen from people looking
  It doesn t happen from people looking 
over your shoulder at the ATM
What they want…
•   DOB
•   SSN/National ID number
        /
•   Online banking information
•   Email address and passwords
•   Mailing address
•   Telephone number
Why they do it…
• Access to your bank accounts
  Access to your bank accounts

• Access to your credit card accounts
            y

• Use of your personal data to secure 
credit

• Use of your personal data to obtain
   Use of your personal data to obtain 
fraudulent  identification papers
Criminal
Methodologies
         g
Cybercrime today has solid roots in 
  Romania, Bulgaria and Russia.  
Their “take” amounts to hundreds 
 of thousands of dollars per day.  
• IP Address
• Email Address
  Email Address
• Facebook
How they do it…
• Overt “hacking”

• Malware

• Key loggers
  Key loggers

• Phishing/scam emails
         g/
Hacking
• Remote access of private areas of the company 
  Remote access of private areas of the company
server environment
       Primarily access over the web
        1) access into the company home page
        2) access into sensitive files areas

• Unlawful or malicious removal of sensitive 
information
      Internal/local access 
      Internal/local access
       1)  USB drives
       2)  CD burners
       3)  Rogue wireless devices 
        )
Three forms of 
“malware”…
“malware”
• Trojans

• Worms

• Viruses
How malware propagates…
“botnet” is a term associated primarily with the 
negative aspects of malware distribution, though 
negative aspects of malware distribution, though
botnets are often used in research as a collection of 
computers all working simultaneously on a given 
problem.
One Support Website
                                                                                                       One Pharmacy
Billions of                                                                                         One Merchant Account
Messages




                                                                                10-15 Unique Site
                                                                                    Designs


                                                                    100’s Web
                                                     1,000’s URLs    Servers
                                  10,000’s Message
              100,000’s Zombies       Variants
Spotting malware activity…
• Malware morphs

• IRC ffi i
  IRC traffic increases across the common ports
                                h

• Increases in antivirus file changes
  Increases in antivirus file changes

• Outbound SMTP traffic increases

• Host file modification
Key Loggers
Beware!

These executables have the ability 
to record ALL your password 
entries and then send them off to a 
entries and then send them off to a
specific address without you 
knowing it.
knowing it.
“Phishing” and scam emails

 Emails that solicit the recipient to 
 divulge key information in order to 
 gain access to specific data.
What looks 
 “innocent” 
 really isn t.  
 really isn’t.
 Would you 
provide this 
provide this
information 
     to a 
  stranger?
So, do you  
think this 
looks 
official and 
legitimate?
The problems only 
 The problems only
occur when the user 
 decides to click the 
        link!
Protection
 Options
  p
10 typical security mistakes…
• Sending sensitive date in an unencrypted e‐mail
• Using “security” questions whose answers are    
easily discovered
easily discovered
• Imposing password restrictions that are too strict
• Letting vendors define “good security”
• Underestimating req ired sec rit e pertise
   Underestimating required security expertise
• Underestimating the importance of review
• Overestimating the importance of secrecy
• Requiring easily forged identification
• Unnecessarily reinventing the wheel
• Giving up the means of your security in exchange
   Giving up the means of your security in exchange 
for a feeling of security
10 Wi‐fi i f R d W i i
10 Wi fi tips for Road Warrioirs …
 • Turn off the wi‐fi clients when not in use
 • Verify that the SSID actually represents the 
 provider’s wi‐fi network
 • Make sure that a software firewall is running on
   Make sure that a software firewall is running on 
 your laptop
 • Disable Window’s file and printer sharing
 • Avoid sensitive online transactions when using
   Avoid sensitive online transactions when using 
 open wi‐fi networks
 • Keep you laptop’s OS up to date
 • Secure any personal, banking, or credit card details
 • Use secure and anonymous web surfing techniques
 • Use VPN technology when necessary
   Use VPN technology when necessary
 • Use remote access applications for security
Anti‐virus update…
• Symantec (Norton) will leave the business

• McAfee is strengthening its position

• Kaspersky Labs could be the next best

• EMC/RSA i i i h
  EMC/RSA is winning huge projects
                             j

• Sendio Barracuda Red Condor AVG etc
  Sendio, Barracuda, Red Condor, AVG, etc…
Protection methods…
• Firewall

• Resident Antivirus app   Individual

• Spyware/Malware app

• Endpoint sec rit
  Endpoint security
                           Corporate
• Forensics
Firewalls…




     Whitelisting and Blacklisting
Firewalls…
Resident antivirus protection…
• SPAM filtering/elimination
• BOT/Malware detection
  BOT/Malware detection
• Cookies, Adware, etc…


      Filtering by Contact DB
      Filtering by content
Spybot . . .   “bot” detection & elimination
Secunia . . . One method is not enough
Endpoint 
 security  is 
   used to 
   control, 
      t l
 secure and 
 monitor all 
 monitor all
 methods of 
data transfer
Using the “cloud”…
The solution can be on 
premise or in the “cloud”…
     i     i th “ l d”
• Premise‐based solutions
  Premise based solutions

• Cloud‐based solutions
Your individual solution requires a 
“blended” approach…
 blended approach…
• Your firewall
• Some sort of hardware or software “monitor”

Your corporate solution requires a 
Your corporate solution requires a
“blended” approach as well…
• Your firewall
• Some sort of hardware or software “monitor”
• Endpoint security with forensics
The problems only 
 The problems only
occur when the user 
occur when the user
 decides to click the 
        link!
Business Continuity
        and
 Disaster Recovery
Part Two in a multi part series of  overviews on Disaster 
Part Two in a multi‐part series of overviews on Disaster
 Avoidance, Business Continuity and Disaster Recovery
Compliance: HIPAA,
  HITECH, PCI,
 Sarbanes-Oxley
 Sarbanes Oxley
Part Three in a multi part series of  overviews on Disaster 
Part Three in a multi‐part series of overviews on Disaster
 Avoidance, Business Continuity and Disaster Recovery
Larry Pyrz
  SimpleTel, Inc.
  SimpleTel, Inc.

www.simpletel.biz

larry@simpletel.biz

  773‐728‐3315
       Larry Pyrz
      @larrypyrz
       Larry Pyrz

Más contenido relacionado

La actualidad más candente

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackMark Mair
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrimepronab Kurmi
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 

La actualidad más candente (20)

E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing
PhishingPhishing
Phishing
 
Data security
Data securityData security
Data security
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Phishing
PhishingPhishing
Phishing
 
Anatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing AttackAnatomy of a Spear Phishing Attack
Anatomy of a Spear Phishing Attack
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Impact of cybercrime
Impact of cybercrimeImpact of cybercrime
Impact of cybercrime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 

Destacado

You Are A Brand, Blog Indiana 2009
You Are A Brand, Blog Indiana 2009You Are A Brand, Blog Indiana 2009
You Are A Brand, Blog Indiana 2009Chuck Lasker
 
Asset Management,A Maintenance Perspective
Asset Management,A Maintenance PerspectiveAsset Management,A Maintenance Perspective
Asset Management,A Maintenance PerspectiveSunil Rao
 
Brentwood/Cool Springs Chamber Of Commerce 12-9-08
Brentwood/Cool Springs Chamber Of Commerce 12-9-08Brentwood/Cool Springs Chamber Of Commerce 12-9-08
Brentwood/Cool Springs Chamber Of Commerce 12-9-08Barack20
 
[Era] the financial-director_cost_control_checklist
[Era]   the financial-director_cost_control_checklist[Era]   the financial-director_cost_control_checklist
[Era] the financial-director_cost_control_checklistManuel A. Velazquez
 

Destacado (7)

You Are A Brand, Blog Indiana 2009
You Are A Brand, Blog Indiana 2009You Are A Brand, Blog Indiana 2009
You Are A Brand, Blog Indiana 2009
 
Asset Management,A Maintenance Perspective
Asset Management,A Maintenance PerspectiveAsset Management,A Maintenance Perspective
Asset Management,A Maintenance Perspective
 
Suite Ofimatica
Suite   OfimaticaSuite   Ofimatica
Suite Ofimatica
 
Brentwood/Cool Springs Chamber Of Commerce 12-9-08
Brentwood/Cool Springs Chamber Of Commerce 12-9-08Brentwood/Cool Springs Chamber Of Commerce 12-9-08
Brentwood/Cool Springs Chamber Of Commerce 12-9-08
 
Segunda sesion ciencia-investigacion-metodo
Segunda sesion ciencia-investigacion-metodoSegunda sesion ciencia-investigacion-metodo
Segunda sesion ciencia-investigacion-metodo
 
Heramientas Educativas
Heramientas EducativasHeramientas Educativas
Heramientas Educativas
 
[Era] the financial-director_cost_control_checklist
[Era]   the financial-director_cost_control_checklist[Era]   the financial-director_cost_control_checklist
[Era] the financial-director_cost_control_checklist
 

Similar a Identity Theft

OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationOWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationuisgslide
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Wen-Pai Lu
 

Similar a Identity Theft (20)

Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentationOWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
ICT Security is Everyone's Business
ICT Security is Everyone's BusinessICT Security is Everyone's Business
ICT Security is Everyone's Business
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Phishing
PhishingPhishing
Phishing
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2Browser isolation (isc)2 may presentation v2
Browser isolation (isc)2 may presentation v2
 

Identity Theft