Académique Documents
Professionnel Documents
Culture Documents
Sam Kamanga
Cyber Security and Computer Forensics Consultant
Contents
Cyberspace Internet Cyber Security and Cybercrime Types of Cyber threats Social Media Cyber-bullying Preventing Cybercrime Conclusion
Copyright Sam Kamanga 2012
Cyberspace
What is a Cyberspace
Cyberspace is a world wide network of computers and the equipment that connect, which by its very design is free and open to the public (the internet) Weve become increasingly reliant on the net and its being used right now to transfer everything from friendly emails to hypersensitive data. The Problem has gotten more prevalent with always on, high speed internet access. Attackers are always out there looking for that computer As long as your computer is connected to the internet, that connection can go both ways.
The Internet
Every business is connected to the Internet. Every businesss network is part of the internet. The capacity to interact with each other is a key part of their risk environment. Telco's, businesses, universities, and households are all connected in different ways. Cyber crime and cyber espionage pose increasing risk to various Nations.
Global Internet
Cybercrime
Computer networks have done for criminals the same thing theyve done for legitimate computers users.
What are cybercriminals after?
Money Confidential information
Cybercrime
Cyber attacks generally refer to criminal activity conducted via the internet The attacks can include stealing an organizations intellectual property, confiscating online bank accounts, creating and distributing viruses on the other computers, posting confidential business information on the internet and disrupting a countrys critical national infrastructure Fact:
Cybercrimes are costly if not quickly resolved : Cybercrimes can do serious damage to an organizations bottom line. All industries can fall victim to cybercrime
Motivation
Military or political dominance
Target
Critical infrastructure, political and military assets Governments, companies, individuals Individuals, companies, governments Individuals, companies, governments Governments, Companies Innocent victims, recruiting
Method
Attack, corrupt, exploit, deny, conjoint with physical attack Advanced Persistent Threats Fraud, ID theft, extortion, Attack, Exploit Attack, Exploit
Cyber Espionage
Cyber Crime
Cracking
Virus Bots
Cyber Risks Are An Increasing Threat To Sources Of Enterprise Capability And Brand Competitiveness
Extortion
Phishing and pharming driving increased customer costs, especially for financial services sector DDOS extortion attacks National security information/export controlled information Sensitive competitive data Sensitive personal/customer data E-Business and internal administration Connections with partners Ability to operate and deliver core services
Now
Now Emerging
Potential for disruption As part of cyber conflict (i.e. Estonia) As target of cyber protest (i.e. anti-globalization) Potential accountability for misuse (i.e. botnets) Potential for data corruption
Now Future
Terrorism
DDOS and poisoning attacks Focused attacks coordinated with physical attacks
Emerging
It is estimated that approximately 80% of computers in the African continent are already infected with viruses and other malicious software
The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.
There are more Cyber-criminals than law enforcers Information has become a big asset Money transactions are moving through the internet (Mobile money)
Social Media
As computer technology increases, social media becomes more and more of a widely used source of communication. It has become so popular that it is completely changing the way people view and respond to society, and opening up new ways for people to interact with each other. This is both a good and bad thing. Advantages being that it has given people the convenience of being able to connect with others all over the world without having to step a foot out of their homes and also the rare cases that crimes are sometimes solved through the help of a social media site. However, the problems created by these sites are much more prevalent than advantages because it gives malicious people the ability to create more danger among the millions of internet users. Information that is posted on the internet by people who believe it to only to be viewable among their friends often find that they have unintentionally shared personal facts with hundreds of people, some whom plan to use it against them.
Social Media
It is amazing how technology has sped up every process of life, from social interaction to your local public getting its news. The social media also has a way of molding the minds of people, especially the youth, to opinions presented on television and the internet. These stories are usually based on entertainment and political values. People begin to see what is popular and what the majority of people think about certain events. This can alter the way they may think of something that happens even if it wasnt their initial opinion in the first place.
Facebook's Impact
A Driver for Democracy
With roughly 80% of Facebook's monthly users located outside the U.S. and Canada, it is no huge surprise that Facebook is responsible for sparking the uprisings in the Middle East at the beginning of 2011, which started in Tunisia after a man selling fruits and vegetables set himself on fire in a market. He felt humiliated when police demanded him to hand over his cart for not having a permit. His personal revolt ignited protests in Tunisia which spread to Egypt, Libya, Syria and Yemen.
Facebook's Impact
Facebook was gigantic in the Arab Spring and in every other political uprising that we have heard of in Spain and the Occupy Movement because people do not think of it as a political act. Facebook users can just update their status on Facebook and their friends see it and they are broadcasting without even knowing it. In 2009, a video showing the death of a young female Iranian protester, named Neda, shot by a government gunman gripped the world. The video went viral with the help of Facebook and other social media networks.
Study showed inappropriate photographs on social media networks or information, content about drinking or using drugs were the major causes of not employing certain people.
Are We Safe ?
It Is Happening
Preventing Cybercrime
Conclusion
The threat on Cyber Security is real. Cyber security management requires a combined effort and collaboration between all stakeholders. As a country we need to develop relevant Policies, Legal and Regulatory. We need to build capacity in ;
Technical Legal and Policy.
Copyright Sam Kamanga 2012
Questions