battling yber rimes · 2017. 10. 29. · copyright responsible cyber i reproduction not allowed...
TRANSCRIPT
![Page 1: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/1.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
BATTLING CYBER CRIMES
ADVISORY, TRAINING AND STAFFING
BY MAGDA CHELLY, MANAGING DIRECTOR / ACTING CISO
RESPONSIBLE CYBER PTE. LTD.
1
![Page 2: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/2.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
ENTREPRENEUR | CISO ADVISOR | CYBERFEMINIST | PEERLYST BRAND
AMBASSADOR | WOMAN IN CYBER | CISSP CERTIFIED
DOCTOR IN TELECOMMUNICATION ENGINEERING
NOMINATED GLOBAL LEADER, WOMAN IN IT 2017, LONDON, UK
STEVIE AWARDS IN TOKYO JAPAN, 2017 – COMPUTER INNOVATION2
![Page 3: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/3.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
INTRODUCTION
Steve Jobs (1997)
It's faster in every case to talk to the server than it is
my local hard disk... Carrying around these non-
connected computers -- with tons of data and state in
them -- is byzantine by comparison.
https://www.theguardian.com/technology/2009/jun/04/bruce-schneier-cloud-computing 3
![Page 4: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/4.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
INTRODUCTION
MORE ATTACK OPPORTUNITIES
Source: https://www.slideshare.net/jbloomberg1/the-cyber-house-of-horrors-securing-the-expanding-attack-surface4
![Page 5: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/5.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
INTRODUCTION
President Barack Obama (May 29, 2009)
America's economic prosperity in the 21st century
will depend on cyber security…
https://www.theguardian.com/technology/2009/jun/04/bruce-schneier-cloud-computing 5
![Page 6: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/6.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
AGENDA
WHAT IS CYBERCRIME
CYBERCRIME
PREVENTION
CYBERCRIME FUTURE
CYBERCRIME TYPES
6
![Page 7: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/7.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
INTRODUCTION
A cybercrime is an abuse or misuse where a computer or
device containing a computer is the object, subject, tool, or
symbol, and the perpetrator intentionally made or could have
made gain.
7
![Page 8: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/8.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
INTRODUCTION
8
![Page 9: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/9.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIMINALS
▪ People violate trust
▪ People commit crimes
▪ Cybercriminals deceive
▪ Cybercriminals think they are too smart to be caught
▪ Security professionals can be potentially dangerous
▪ Cybercriminals copy other cybercriminals
▪ Cybercriminals find computers are attractive targets; it’s from behind a screen
9
![Page 10: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/10.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIMINALS
Source: https://www.numbeo.com
Singapore Crime Index 16.58
▪ Fraud
▪ Robbery
▪ Theft.
10
![Page 11: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/11.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
▪ Hacktivism
▪ Cyber Crime
▪ Cyber Espionage
▪ Cyberterrorism
▪ Cyber Warfare
11
![Page 12: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/12.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
In Internet activism, hacktivism or hactivism is the subversive use of computers
and computer networks to promote a political agenda or a social change. With
roots in hacker culture and hacker ethics, its ends are often related to the free
speech, human rights, or freedom of information movements.
-Wikipedia
▪ Hacktivism
12
![Page 13: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/13.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
Cyber Crime is an unlawful act
wherein the computer is either
a tool or a target or both.
▪ Cyber Crime
13
![Page 14: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/14.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
▪ Cyber Crime
14
![Page 15: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/15.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
We are in the golden age of
cybercrime between disaster
and destruction.
▪ Cyber Crime
15
![Page 16: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/16.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
Employee
Network
Social Engineer / Hacker
Internet
Firewall
Social Engineering
Traditional Hacking
▪ Cyber Crime
16
![Page 17: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/17.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
The term "white hat" in Internet slang refers to an
ethical computer hacker, or a computer security
expert, to ensure the security of an organization's
information systems.
A black-hat hacker is a hacker who "violates
computer security for little reason beyond
maliciousness or for personal gain".
▪ Cyber Crime
17
![Page 18: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/18.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
Script Kiddie – Script Kiddies normally don’t care
about hacking. They copy code and use it for a virus.
18
![Page 19: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/19.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
19
![Page 20: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/20.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
Cyber espionage is the act or practice of obtaining secrets without the permission
of the holder of the information (personal, sensitive, proprietary, or of classified
nature), from individuals, competitors, rivals, groups, governments and enemies for
personal, economic, political or military advantage using methods on the Internet,
networks, or individual computers through the use of cracking techniques and
malicious software including Trojan horses and spyware.
-Wikipedia
CYBERCRIME TYPES
20
▪ Cyber Espionage
![Page 21: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/21.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
HOW DO THEY DO IT?
▪ E-mails
▪ Trusted web site
▪ Trusted code
▪ Trusted protocols
▪ Trusted internal corporate network
▪ Trusted external client server
CYBERCRIME TYPES
21
![Page 22: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/22.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
WHY DO THEY DO IT?
▪ Information collection Intelligence
▪ ‘’Knowledge is power’’
– Military
– Economic
– Political
▪ Key individuals
▪ Future opportunities
CYBERCRIME TYPES
22
![Page 23: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/23.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
Terrorist Use of the Internet vs. Cyberterrorism
CYBERCRIME TYPES
23
▪ Cyberterrorism
![Page 24: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/24.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
Cyberterrorism is disruptive or destructive acts perpetrated against non-combatant
targets at the direction, on behalf, or in support of a terrorist group or their ideology,
through the use of computer network attack or exploitation. Such intrusions or
attacks are intended to intimidate or coerce a government or population in
furtherance of a social, political, ideological, or religious agenda by causing
disruption, inducing fear, or undermining confidence.
- FBI Definition
CYBERCRIME TYPES
24
![Page 25: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/25.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
▪ Spear-phishing
▪ Brute Force (Password crackers)
▪ Vulnerability Attacks
▪ Distributed Denial of Service
CYBERCRIME TYPES
25
![Page 26: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/26.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
▪ Propaganda or terror rise (website defacements)
▪ Fundraising
▪ Facilitation (Research for new soldiers)
▪ Acts to cause harm to life or damage to property
CYBERCRIME TYPES
26
![Page 27: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/27.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
27
![Page 28: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/28.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
▪ The 06th of January 2015, the CyberCaliphate took over the Twitter
accounts of:
– Albuquerque News Journal (Albuquerque, NM)
– Mountain View Telegraph (Moriarty, NM)
– WBOC News (Baltimore, Maryland).
▪ CyberCaliphate hacked the websites of WBOC TV
28
![Page 29: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/29.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
29
▪ 2005: International Convention for the Suppression of Acts of
Nuclear Terrorism
▪ 2010: Protocol Supplementary to the Convention for the
Suppression of Unlawful Seizure of Aircraft
▪ 2010: Convention on the Suppression of Unlawful Acts Relating
to International Civil Aviation
![Page 30: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/30.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
▪ Attacks are plentiful and easy
▪ Defences are limited and sometimes costly
▪ Cybercrime happens
▪ Phishing (social engineering) can be easily successful
▪ One mistakes = Jail time
30
![Page 31: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/31.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME FUTURE
31
![Page 32: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/32.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
CYBERCRIME TYPES
Cybercrimes = Formal business ventures
32
▪ Augmented reality and highly personalised content
▪ Physical threats (IoT, Medical devices, etc.)
▪ Virtual property markets
▪ Personal data brokerage
▪ New patterns of employment
https://www.europol.europa.eu/publications-documents/project-2020-scenarios-for-future-of-cybercrime
![Page 33: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/33.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
PREVENTION
▪ Establish Security Posture…
▪ Monitor and Analyse
▪ Assess Vulnerabilities, Don’t ignore
▪ Spend for Security (may mean $$)
▪ Support Training
33
![Page 34: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/34.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
PREVENTION
Singapore Landscape for
cyber crime:
▪ Love scam on the rise
▪ Ransomware on the rise
34
![Page 35: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/35.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
PREVENTION
35
![Page 36: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/36.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
THANK YOU !
QUESTIONS ?
36
![Page 37: BATTLING YBER RIMES · 2017. 10. 29. · Copyright Responsible Cyber I Reproduction Not Allowed MAGDA LILIA CHELLY Managing Director | Cyber-Security Evangelist Doctor in Telecommunication](https://reader036.vdocuments.us/reader036/viewer/2022071116/5fffb5cba723fa42f409db00/html5/thumbnails/37.jpg)
Copyright Responsible Cyber I Reproduction Not Allowed
MAGDA LILIA CHELLY
Managing Director | Cyber-Security Evangelist
Doctor in Telecommunication Engineering, CISSP
Responsible Cyber Pte. Ltd. | Co. Reg No: 201616321C
Industry Specific Cyber-Security Advisory, Training, Awareness & Recruitment
25A Smith Street, Singapore 058939 | +65 8822 8219
www.responsible-cyber.com
CONTACT
37