Cyber Crime Game Players
Download
Report
Transcript Cyber Crime Game Players
Cyber Crime Game Players
By Marharyta Abreu & Iwona Sornat
There is no way to get rid of the cyber crime,
but it is possible to limit it by making society
aware of existing threats and methods used
by hackers to deceive potential victims.
Cyber Crime Definition
What the cyber crime really means???????
The U.S. Department of Justice - expanded definition of
cybercrime
Who are the cyber game players?
Governmental and non-governmental parties
1.
2.
3.
4.
5.
Hacktivist groups
Big military superpowers
- cyberspace as the fifth domain in warfare
Big software companies
Security companies
Traditional cyber-criminals and cyber-criminal gangs
History and Trends
60’s - physical damage to computer`s systems and long distance
telephone networks subversion
80`s – malicious software (viruses, worms and Trojan horses)
1995 – Internet commercialized, cyber crime definition really born
End of 90`s - credit card fraud as border category of identity theft
Mid 2000s - hardware Trojans designed
Cyber Game Players: Hacktivists
The Saudi and Israeli hacktivists
Attacks on official websites of Saudi
publishing the email passwords of nearly a hundred Saudi university
students (Anonymous 972 )
Release of credit card numbers and other sensitive information that
affected about 14,000 (xOmar)
Anonymous group
Cyber Game Players: Big
military superpowers
China's cyber warfare skills
- penetration the U.S. electric grid,
- gained access to U.S. government and corporate networks
Japan engaged recently in cyber activity
Cyber Crime Game Players: Big
software companies
Apple, Adobe and Microsoft
Create the software which runs on all computers
New zero-day exploits
“Operation Aurora” - Google, Adobe, Juniper Networks,
Rackspace, Symantec, Northrop Grumman, Morgan
Stanley and Dow Chemical
Cyber Crime Game Players:
Security Companies
Security companies might be susceptible to
attacks – RSA attacks
Counter – espionage - The Mykonos software
Cyber Crime Game Players:
Cyber-criminals and cybercriminal gangs
Most originate from US, China, and Eastern
Europe and focus on:
1. Stealing financial information - Eastern
Europe
2. Intellectual property - China
3. Cooperation of cyber gangs and street
gangs for extortion or industrial espionage US
Accounting for Cyber Security
SEC guidance issued in 2011 requires
disclosure of material cybersecurity risks and
cyber events.
Possible effect on F/S:
1. Remediation costs
2. Increased protection costs
3. Litigation
4. Reputational damage
5. Loss of revenues