cyber security

29
FBI Albany

Upload: cianna

Post on 20-Jan-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Cyber Security. FBI Albany. FBI Priorities. Protect the United States from terrorist attack Protect the United States against foreign intelligence operations and espionage Protect the United States against cyber-based attacks and high-technology crimes. A few of our partners. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cyber Security

FBI Albany

Page 2: Cyber Security

Protect the United States from terrorist attack

Protect the United States against foreign intelligence operations and espionage

Protect the United States against cyber-based attacks and high-technology crimes

Page 3: Cyber Security

New York State PoliceMulti-State ISACNY State Office of Cyber SecurityNY State Department of Homeland

Security

Page 4: Cyber Security

The “old school” hackerCharacteristics

Notoriety Break technological barriers Unorganized Not typically motivated by money

Page 5: Cyber Security

The “neo” hackerCharacteristics

Professionals Organized Eastern Europe and Asia

GOAL – Money

Page 6: Cyber Security

Common Scams Lottery Over payment for products “I’m stranded overseas, send cash” Trolling large call centers

Page 7: Cyber Security
Page 8: Cyber Security

Phishing Same look and feel as a website or e-

mail you may be accustomed to seeing Attempt to gain usernames, passwords,

CC information, etc

Page 9: Cyber Security

Example of Phishing(website)

http://citibusinessonline.da.us.citibank.com.citionline.ru

Page 10: Cyber Security

Example of Phishing(e-mail)

Page 11: Cyber Security

Orphaned / Counterfeit Hardware USB flash drives containing malware DVD/CD containing malware▪ Utilizing AutoPlay

“Free” Computers Bargain priced equipment which has

been altered▪ Routers▪ Desktop/Laptop systems

Page 12: Cyber Security

Also referred to as Viruses, Trojans, Spyware

Key LoggingRemote accessScreen capturing processes

Page 13: Cyber Security

Most common malware SpyEye Zeus (aka Zbot) Qakbot

All have ability to log keystrokes and provide

remote access to malicious actors. Qakbot can

propagate itself across a local network.

Page 14: Cyber Security

Sources of Malware Phishing e-mails Phishing websites Children’s games Hacking, torrent, piracy websites Pornographic websites

Page 15: Cyber Security

Intrusive advertising for fraudulent Anti-Virus and Anti-Malware products

Usually prompts for payment and/or personal information

Almost always a sign of an “infected” system

Persistent even after closing web browser

Page 16: Cyber Security

Victims involved two academic institutions and one sole proprietorship.

Losses ranged from $70,000 to $500,000 – and in every case the losses were never recovered.

All involved malware on a windows system, with at least one instance involving Zeus and another involving Qakbot.

All matters involved actors overseas, and in one case, the investigation contributed to the arrest of bad actors residing in these countries.

In each case, employees were doing something they were not supposed to be doing, or did not have sufficient real-time malware protection in place.

Page 17: Cyber Security

You may acquire malware just by viewing a website or opening an e-mail (without even opening attachment)

There is no patch available for the vulnerability

Times Union website, advertising images

Page 18: Cyber Security

FACEBOOK, LINKEDIN, MYSPACE, TWITTER, ETC

May supply potential crooks with personal information used to exploit or extort

Very few laws to protect personal content

Limit access to personal information and photographs

Page 19: Cyber Security

Local School Student created 120 duplicate facebook accounts of other

students Created an intricate network of pictures, updates, statuses,

chats Most profiles were not well protected, or were completely

public Damaging to students reputations, fear to parents

Local businessman Extorted by actors overseas, based on information provided

on social network sites Involved co-workers and family in order to become more

convincing

Page 20: Cyber Security

Prevention

Internet

Page 21: Cyber Security

Golden Rule: “if it sounds too good to be

true…”

Page 22: Cyber Security

Monitor your children’s activities on the computer

Try to keep one system “pure” for online banking, and personal business – have another for recreational activities

Page 23: Cyber Security

Update your Malware/Virus definitions on your network

Educate end users on Social Networking tactics and other common exploits

Wireless security – Avoid open networks and WEP encryption

Physical security – Protect physical resources and information

Page 24: Cyber Security

Never trust a “free” public wi-fi network Consider a 3G/4G wi-fi solution for true

protected access

Never access your financial institution from a public computer at a hotel, library or public wireless access point

Page 25: Cyber Security

Standalone system Not attached to local network Used for one purpose ONLY Possibly non-standard Operating System

Bootable / Flash drive browsers and Operating Systems Contained on a CD/DVD or flash drive Impervious to most malware

Web traffic monitoring/blocking Block keywords (Websense) Filter traffic and e-mail attachments (based on type, size,

hash)

Page 26: Cyber Security

Shred your documents Don’t leave your trash out Don’t leave your mail out, or consider a

PO Box Opt for electronic statements Get regular credit reports, check

statements Watch for skimming devices at the

pump and ATM machine Talk to your bank about EFT

transactions

Page 27: Cyber Security

Microsoft Windows 88% desktop market share Primary target for hackers; most “bang for the buck” Although vulnerable, very robust security features

Mac OS X 7% desktop market share Less secure overall than windows May appear more secure due to low market share

Linux 1% desktop market share Secure, but may not practical for mainstream users

Mobile Devices (iPhone, Android, etc) Not ideal for hackers due to small population of devices iPhone 2%, Android .64%

Page 28: Cyber Security

Partnership between the FBI, National White Collar Crime Center, and Bureau of Justice Assistance

Receive, Develop, Refer complaints for internet related crimes

Tips, current schemes

Page 29: Cyber Security

Partnership between the FBI and the private sector

Businesses, Academic Institutions, State/Local Authorities, Critical Infrastructure, and other participants

www.infragardalbany.com