Introduction to Cyber Technology by Dr. Mark Hawksworth & Cyber Crime Trends

slide1 n.w
1 / 14
Embed
Share

Explore the world of cyber technology through insights from Dr. Mark Hawksworth. Understand the reasons behind the rise of cyber incidents and learn about social engineering, recent case studies, cyber criminal profiles, and the evolution of cyber risks.

  • Cyber
  • Technology
  • Crime Trends
  • Social Engineering
  • Cyber Risks

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader

  2. Who carries out Cyber Crime Why have Cyber incidents become so prevalent Social Engineering Case Studies for some common Cyber incidents Recent high profile Cyber incidents

  3. Who carries out Cyber Crime? Skilled individuals Organised Crime Corporate Espionage Insider threats Hacktivists State sponsored attacks

  4. The individuals seeking notoriety / kudos to criminals presenting a targeted advanced persistent threat nature of the risk has changed from Network infrastructures can contain thousands of applications, delivering including interaction with external systems different functions,

  5. Why is Cyber profiling now? The Onion Ring TOR Digital currency Web pages selling illegal goods / data

  6. The Onion Ring Gives anonymity on-line Actual address is masked using relays Can be used to set up anonymous accounts No source if unsecured domestic WiFi is used

  7. Wardriving Wardriving is the act of searching for open Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant (PDA).

  8. Digital Currency Decentralised Transactions held in a public register Interchangeable with tangible currency Bitcoin value $1 in 2010 to $100 in 2013

  9. Social Engineering Hacking the Human Hackers toolkits use different methods Applications, Adverts and Malware Passwords

  10. Case Studies Crypto Viruses Virtualisation Denial of Service Attack Network Breach

  11. Denial of Access Botnets can be hired out There is no physical damage to the target Substantial BI impact for on-line traders 100 Gb per second

  12. Keylogger Breach USB Amazon 40 No administration rights required Key strokes saved in flash memory User name and password can be read

  13. Questions Questions

Related


More Related Content