cyber security the current threat
play

Cyber Security: The Current Threat T/Detective Chief Inspector Paul - PowerPoint PPT Presentation

Cyber Security: The Current Threat T/Detective Chief Inspector Paul Peters Regional Cyber Crime Unit RCCU-Tarian@south-wales.pnn.police.uk The criminal landscape is changing OFFICIAL Why worry about Cybercrime? Reduce Threat


  1. Cyber Security: The Current Threat T/Detective Chief Inspector Paul Peters Regional Cyber Crime Unit RCCU-Tarian@south-wales.pnn.police.uk §

  2. The criminal landscape is changing……

  3. OFFICIAL Why worry about Cybercrime? Reduce Threat Reduce Vulnerability OFFICIAL

  4. Threats Social engineering • • Phishing • Data Breach Ransomware • • DDOS GDPR •

  5. Social engineering

  6. Interview with a Hacker

  7. Phishing

  8. Phishing

  9. Data Breach Data Breaches are becoming more commonplace and cost is measured in financial terms and loss of reputation.

  10. Ransomware

  11. www.nomoreransom.org

  12. Denial of Service Attacks For Sale

  13. OFFICIAL General Data Protection Regulations OFFICIAL

  14. OFFICIAL GDPR • All organisations holding or processing personal information will be affected (personal information can be as granular as an IP address) • The Regulation will come into existence on 25 th May 2018 • If there is a data breach (yet to be fully classified) the data handler/processor MUST inform the ICO • If there is a data breach (yet to be fully classified) the data handler/processor MUST inform ALL customers affected URL = https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/ OFFICIAL

  15. OFFICIAL General data Protection Regulations The maximum fine to be imposed will increase from £500,000 to 4% of global annual turnover for the preceding financial year or € 20m whichever is the greater. As an example Talk Talk were fined £400,000 by the ICO. When the new regulation is in place that could increase to: £70,000,000 !! OFFICIAL

  16. OFFICIAL Case Study: Operation Purple Obsidian OFFICIAL

  17. OFFICIAL Operation Purple Obsidian • DDoS attacks against Coleg Sir Gar between September 2013 – August 2014. • Part of the Public Sector Broadband Aggregation Network (PSBA). • DDoS attacks were impacting other public sector organisations E.g: transfer of patient data between hospitals. • PSBA part of Joint Academic Network (JANET) who were required to purchase / install a Corero SmartWall - £400k. OFFICIAL

  18. OFFICIAL Daniel Kelly Pleaded guilty to 11 counts including hacking, blackmail, fraud and money laundering. OFFICIAL

  19. OFFICIAL The Law Enforcement Response. OFFICIAL

  20. OFFICIAL National Cyber Security Strategy OFFICIAL

  21. OFFICIAL National Cyber Security Strategy DEFEND To respond effectively to incidents, and to ensure UK networks, data and systems are protected and resilient. Citizens, businesses and the public sector have the knowledge and ability to defend themselves. DETER We detect, understand, investigate and disrupt hostile action taken against us, pursuing and prosecuting offenders. DEVELOP We have an innovative, growing cyber security industry, underpinned by world leading scientific research and development. We have a self-sustaining pipeline of talent providing the skills to meet our national needs across the public and private sectors. OFFICIAL

  22. OFFICIAL The CONTEST Strategy Pursue: Prosecute and disrupt those engaged in Cyber Crime Reduce Threat Prevent: Prevent people from engaging in Cyber Reduce Crime & people becoming victims Level of Cyber Crime Protect: Protect vulnerable groups, working in partnership to reduce risk Reduce Vulnerability Prepare: Reduce the impact of Cyber Crime OFFICIAL

  23. National Cyber Security Strategy 2016-2021 Cyber-security Information Sharing Partnership • National CiSP launched March 2013. • CiSP is an online social networking tool to exchange information on threats and vulnerabilities. • Engagement with industry and government counterparts in a secure environment - Ability to learn from experiences, mistakes and successes of others and seek advice • Early warning of cyber threats

  24. OFFICIAL CiSP OFFICIAL

  25. Cyber Essentials

  26. Cyber Essentials Cyber Essentials concentrates on five key controls: 1. Boundary firewalls and internet gateways - these are devices designed to prevent unauthorised access to or from private networks, but good setup of these devices either in hardware or software form is important for them to be fully effective. 2. Secure configuration – ensuring that systems are configured in the most secure way for the needs of the organisation. 3. Access control – Ensuring only those who should have access to systems to have access and at the appropriate level. 4. Malware protection – ensuring that virus and malware protection is installed and is up to date. 5. Patch management – ensuring the latest supported version of applications is used and all the necessary patches supplied by the vendor been applied.

  27. 10 Steps to Cyber Security

  28. OFFICIAL Report Cybercrime OFFICIAL

  29. OFFICIAL Question: Do you have an incident response plan? • RCCU can provide Cybercrime templates ✴ Website defacement ✴ Ransomware ✴ Hacking ✴ DDoS ✴ Banking malware • Guide on evidential standards OFFICIAL

  30. OFFICIAL Questions? OFFICIAL

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend