humberside police
play

HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION - PowerPoint PPT Presentation

HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER Ok what is Hacking? Simply it is the unauthorized access to a computer system or causing damage to that system. Fraud vs Hacking Fraud is


  1. HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER

  2. Ok what is Hacking? Simply it is the unauthorized access to a computer system or causing damage to that system.

  3. Fraud v’s Hacking Fraud is deceiving somebody for gain. This does not need to involve a computer. Hacker will use computers as a tool to commit fraud/theft or cause damage.

  4. Types of Hackers Black hat Hackers :- Criminal Hacker. White hat Hacker :- Ethical Hackers, Normally Pen Testers doing lawful hacking. Grey hat Hackers : - Hacker involved in political/or other causes. Not normally for personal gain. Often can illegally test systems.

  5. How a hacker works. • The Kill Chain…… Lockheed Martin’s cyber kill chain breaks down a cyberattack into 7 distinct steps: Reconnaissance : - Intruder picks a target, researches it, and looks for vulnerabilities. Weaponization :- Intruder develops malware designed to exploit the vulnerability. Delivery :- Intruder transmits the malware via a phishing email or another medium.

  6. 7 Steps continued Exploitation :- The malware begins executing on the target system. Installation:- The malware installs a backdoor or other ingress accessible to the attacker Command and Control:- The intruder gains persistent access to the victim’s systems/network Actions on Objective:- Intruder initiates end goal actions, such as data theft, data corruption, or data destruction

  7. Reconnaissance Intruder picks a target, researches it, and looks for vulnerabilities.

  8. Weaponization :- Intruder develops malware designed to exploit the vulnerability.

  9. Delivery :- • Intruder transmits the malware via a phishing email or another medium.

  10. Exploitation :- • The malware begins executing on the target system.

  11. Installation:- The malware installs a backdoor or other ingress accessible to the attacker

  12. Command and Control:- • The intruder gains persistent access to the victim’s systems/network. Actions on Objective:- Intruder initiates end goal actions, such as data theft, data corruption, or data destruction

  13. How to Spot a Hacker? NO

  14. A Computer hacker can look like anybody

  15. How do you protect against? Well Simple Cyber security knowledge can help. • Target Harden yourself. • Lock down social Media to private. • Install good internet security software. • Have good internet habits with strong passwords. • Be Phishing, Smishing and Vishing aware.

  16. What Is the Dark Web? • The Dark Web is a term that refers specifically to a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers . The Dark Web is a place where criminals work.. DO WE NEED TO GO THERE?.......... NO! There are lawful uses of the darkweb but will never be required in this Country

  17. Phishing This is normally a Email from a known or unknown contact asking you to :-  Open an attachment (contains Malware or Spyware)  Click a link (to a malicious or fake website) • The malicious website may download malware/spyware or may prompt you to enter your credentials which are then ‘harvested’.

  18. Smishing & Vishing Smishing Scam Have a nice day! Data & Remote £££ Credentials Access

  19. Anyone trust this?

  20. NCSC successfully launched its suspicious email reporting service (SERS) report@phishing.gov.uk Send Suspicious Texts to ‘SPAM’ 7726

  21. Anti Virus software Anti virus tools are great but they need to be up to date. Most Operating systems have a level of security but this relies upon updates being installed..

  22. Free WIFI? Use a VPN

  23. Digital footprints

  24. Already compromised?

  25. Already compromised?

  26. www.actionfraud.police.uk

  27. www.cyberaware.gov.uk

  28. www.takefive-stopfraud.org.uk

  29. https://www.thinkuknow.co.uk/

  30. Thank you PC Alistair Kennedy CYBERCRIME INVESTIGATION TEAM HUMBERSIDE POLICE @HP_Cyber Humberbeat Cyber Crime SPOCCyberCrimeUnit@humberside.pnn.police.uk

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend