HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION - - PowerPoint PPT Presentation

humberside police
SMART_READER_LITE
LIVE PREVIEW

HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION - - PowerPoint PPT Presentation

HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER Ok what is Hacking? Simply it is the unauthorized access to a computer system or causing damage to that system. Fraud vs Hacking Fraud is


slide-1
SLIDE 1

HUMBERSIDE POLICE

PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER

slide-2
SLIDE 2

Ok what is Hacking? Simply it is the unauthorized access to a computer system or causing damage to that system.

slide-3
SLIDE 3

Fraud v’s Hacking

Fraud is deceiving somebody for gain. This does not need to involve a computer. Hacker will use computers as a tool to commit fraud/theft or cause damage.

slide-4
SLIDE 4

Types of Hackers

Black hat Hackers :- Criminal Hacker. White hat Hacker :- Ethical Hackers, Normally Pen Testers doing lawful hacking. Grey hat Hackers : - Hacker involved in political/or other causes. Not normally for personal gain. Often can illegally test systems.

slide-5
SLIDE 5
slide-6
SLIDE 6

How a hacker works.

  • The Kill Chain……

Lockheed Martin’s cyber kill chain breaks down a cyberattack into 7 distinct steps: Reconnaissance :- Intruder picks a target, researches it, and looks for vulnerabilities. Weaponization :- Intruder develops malware designed to exploit the vulnerability. Delivery :- Intruder transmits the malware via a phishing email or another medium.

slide-7
SLIDE 7

7 Steps continued

Exploitation :- The malware begins executing on the target system. Installation:- The malware installs a backdoor or other ingress accessible to the attacker Command and Control:- The intruder gains persistent access to the victim’s systems/network Actions on Objective:- Intruder initiates end goal actions, such as data theft, data corruption, or data destruction

slide-8
SLIDE 8

Reconnaissance

Intruder picks a target, researches it, and looks for vulnerabilities.

slide-9
SLIDE 9
slide-10
SLIDE 10

Weaponization :-

Intruder develops malware designed to exploit the vulnerability.

slide-11
SLIDE 11

Delivery :-

  • Intruder transmits the malware via a phishing email or

another medium.

slide-12
SLIDE 12

Exploitation :-

  • The malware begins executing on the target system.
slide-13
SLIDE 13
slide-14
SLIDE 14

Installation:- The malware installs a backdoor or other ingress accessible to the attacker

slide-15
SLIDE 15

Command and Control:-

  • The intruder gains persistent access to the

victim’s systems/network.

Actions on Objective:-

Intruder initiates end goal actions, such as data theft, data corruption, or data destruction

slide-16
SLIDE 16

How to Spot a Hacker?

NO

slide-17
SLIDE 17

A Computer hacker can look like anybody

slide-18
SLIDE 18

How do you protect against?

Well Simple Cyber security knowledge can help.

  • Target Harden yourself.
  • Lock down social Media to private.
  • Install good internet security software.
  • Have good internet habits with strong passwords.
  • Be Phishing, Smishing and Vishing aware.
slide-19
SLIDE 19

What Is the Dark Web?

  • The Dark Web is a term that refers specifically to a collection of

websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. The Dark Web is a place where criminals work.. DO WE NEED TO GO THERE?.......... NO! There are lawful uses of the darkweb but will never be required in this Country

slide-20
SLIDE 20
slide-21
SLIDE 21

Phishing

This is normally a Email from a known or unknown contact asking you to :- Open an attachment (contains Malware or Spyware) Click a link (to a malicious or fake website)

  • The malicious website may download malware/spyware or may

prompt you to enter your credentials which are then ‘harvested’.

slide-22
SLIDE 22

£££

Remote Access Data & Credentials

Have a nice day!

Smishing Scam

Smishing & Vishing

slide-23
SLIDE 23

Anyone trust this?

slide-24
SLIDE 24

NCSC successfully launched its suspicious email reporting service (SERS)

report@phishing.gov.uk

Send Suspicious Texts to ‘SPAM’ 7726

slide-25
SLIDE 25

Anti Virus software

Anti virus tools are great but they need to be up to date. Most Operating systems have a level of security but this relies upon updates being installed..

slide-26
SLIDE 26

Free WIFI? Use a VPN

slide-27
SLIDE 27

Digital footprints

slide-28
SLIDE 28

Already compromised?

slide-29
SLIDE 29

Already compromised?

slide-30
SLIDE 30

www.actionfraud.police.uk

slide-31
SLIDE 31

www.cyberaware.gov.uk

slide-32
SLIDE 32

www.takefive-stopfraud.org.uk

slide-33
SLIDE 33

https://www.thinkuknow.co.uk/

slide-34
SLIDE 34

PC Alistair Kennedy

CYBERCRIME INVESTIGATION TEAM HUMBERSIDE POLICE

Thank you

@HP_Cyber

SPOCCyberCrimeUnit@humberside.pnn.police.uk

Humberbeat Cyber Crime