cyb e r crime
play

Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n - PowerPoint PPT Presentation

Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n we pre ve nt it? Wha t if it ha ppe ns? Cyb e r Crime : T ho ug ht Pro vo king Sta tistic s I n the Ye a r 2020: 5 Billio n Pe o ple will b e Online 50


  1. Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n we pre ve nt it? Wha t if it ha ppe ns?

  2. Cyb e r Crime : T ho ug ht Pro vo king Sta tistic s  I n the Ye a r 2020:  5 Billio n Pe o ple will b e “Online ”  50 Billio n De vic e s will b e Co nne c te d  75% o f the o nline infra struc ture will b e c o ntro lle d b y 3 rd Pa rty Clo ud o r I nte rne t Se rvic e Pro vide rs.  92% o f wo rklo a ds will b e pro c e sse d b y c lo ud da ta c e nte rs. www.dig ita ltre nds.c o m

  3. Cyb e r Crime – Wha t is it?  Crime tha t invo lve s a c o mpute r a nd a ne two rk.  T he c o mpute r ma y ha ve b e e n use d in the c o mmissio n o f a c rime , o r it ma y b e the ta rg e t.  …..c rimina l mo tive to inte ntio na lly ha rm the vic tim…..

  4. Cyb e r Crime – Wha t is it?  Co mpute r F ra ud  Disho ne st misre pre se nta tio n o f fa c t inte nde d to c a use lo ss

  5. Cyb e r Crime – Wha t is it?  Co mpute r F ra ud  T he ft o f Pe rso na lly I de ntifia b le I nfo rma tio n  Na me  So c ia l Se c urity Numb e r  Addre ss  Drive r’ s L ic e nse Numb e r  F ing e rprints  Da te o f Birth o r Birthpla c e  T e le pho ne Numb e r o r E ma il Addre ss  I nfo rma tio n tha t c a n b e use d o n its o wn o r with o the r info rma tio n to ide ntify, c o nta c t, o r lo c a te a sing le pe rso n, o r to ide ntify a n individua l in c o nte xt. (I de ntify T he ft)

  6. Cyb e r Crime – Wha t is it?  T he ft o f Cre dit Ca rd Ac c o unt I nfo rma tio n  Cre dit Ca rd Numb e r  E xpira tio n Da te  T hre e Dig it Se c urity Co de (CSS)  T he ft o f Ba nk Ac c o unt I nfo rma tio n  Ac c o unt Numb e r : Ro uting Numb e r  Online Ba nking Ac c e ss Cre de ntia ls

  7. Cyb e r Crime – Wha t is it?  E xto rtio n  T he ft o f Cla ssifie d I nfo rma tio n  Cyb e r T e rro rism  Cyb e rwa rfa re  Da rkNe t Ma rke ts  Co mpute r Viruse s, De nia l o f Se rvic e , Ma lwa re

  8. Cyb e r Crime – Ho w Do e s it Oc c ur?  Phishing & Spe a r Phishing : L inks  Spa mming : Atta c hme nts, L inks  Skimming : Physic a l a nd Wire le ss  Ma lwa re & Viruse s: K e y L o g g e rs, Ra nso mwa re  SQL I nje c to rs: We b site s  De nia l o f Distrib ute d Se rvic e Atta c ks: We b site s  Se c urity F la ws: Upda te s a nd Pa tc he s  Pa sswo rd Ha c king : Stro ng , Cha ng e , No Sha ring  Huma ns: E duc a tio n & Awa re ne ss

  9. Cyb e r Crime – Ho w Ca n we Pre ve nt T his?  E ma il F ilte rs  We b F ilte rs  Upda te a nd Pa tc hing Po lic y  Pa sswo rd Po lic y – 2 F a c to r Authe ntic a tio n, No De fa ults  Ba c kups  E nc ryptio n  Use r L o g in Privile g e s  L a ye re d Se c urity  Awa re ne ss T ra ining

  10. Cyb e r Crime – Ho w Do e s T his Affe c t Me ?  Pa rishio ne r I de ntity  Sta ff I de ntity  Pa rish F unds ($’ s)  Pa rish – Dio c e se – Ca tho lic Re puta tio n  I ndire c t Co sts  Do wntime  L o st Pro duc tivity  L o st Da ta  Stre ss!

  11. Cyb e r Crime – Wha t I f T his Oc c urs to Me ?  I nc ide nt Re spo nse Pla n  Purpo se & Sc o pe  Prima ry & Se c o nda ry Re spo nse T e a m Me mb e rs  Co nta c t I nfo rma tio n: I SP, We b ho st, L e g a l, Ba nk, I nsura nc e  Ste p b y Ste p Re spo nse :  Ale rt & Ac tiva te  Re c o rd De ta ils  Se c ure the Are a  Sto p Additio na l Da ta L o ss

  12. Cyb e r Crime – Wha t I f T his Oc c urs to Me ?  Ste p b y Ste p Re spo nse (Co ntinue d)  Asse ss Prio ritie s & Risks  I de ntify L e g a l Ob lig a tio ns  Co nta c t F o re nsic I nve stig a to rs  Re po rt to E xe c utive T e a m  No tific a tio n Pro c e ss  Ope ra tio na l Cha lle ng e s  Re vie w & Wra p Up

  13. Cyb e r L ia b ility I nsura nc e :

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend