HUMBERSIDE POLICE
PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER
HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION - - PowerPoint PPT Presentation
HUMBERSIDE POLICE PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER Ok what is Hacking? Simply it is the unauthorized access to a computer system or causing damage to that system. Fraud vs Hacking Fraud is
PC ALISTAIR KENNEDY CYBERCRIME INVESTIGATION TEAM PREVENT/PROTECT OFFICER
Black hat Hackers :- Criminal Hacker. White hat Hacker :- Ethical Hackers, Normally Pen Testers doing lawful hacking. Grey hat Hackers : - Hacker involved in political/or other causes. Not normally for personal gain. Often can illegally test systems.
Lockheed Martin’s cyber kill chain breaks down a cyberattack into 7 distinct steps: Reconnaissance :- Intruder picks a target, researches it, and looks for vulnerabilities. Weaponization :- Intruder develops malware designed to exploit the vulnerability. Delivery :- Intruder transmits the malware via a phishing email or another medium.
Exploitation :- The malware begins executing on the target system. Installation:- The malware installs a backdoor or other ingress accessible to the attacker Command and Control:- The intruder gains persistent access to the victim’s systems/network Actions on Objective:- Intruder initiates end goal actions, such as data theft, data corruption, or data destruction
Intruder picks a target, researches it, and looks for vulnerabilities.
Intruder develops malware designed to exploit the vulnerability.
another medium.
A Computer hacker can look like anybody
Well Simple Cyber security knowledge can help.
What Is the Dark Web?
websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. The Dark Web is a place where criminals work.. DO WE NEED TO GO THERE?.......... NO! There are lawful uses of the darkweb but will never be required in this Country
prompt you to enter your credentials which are then ‘harvested’.
Remote Access Data & Credentials
Have a nice day!
Smishing Scam
Anti virus tools are great but they need to be up to date. Most Operating systems have a level of security but this relies upon updates being installed..
Digital footprints
CYBERCRIME INVESTIGATION TEAM HUMBERSIDE POLICE
@HP_Cyber
SPOCCyberCrimeUnit@humberside.pnn.police.uk
Humberbeat Cyber Crime