cyb e r crime
play

Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n - PowerPoint PPT Presentation

Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n we pre ve nt it? Wha t if it ha ppe ns? Cyb e r Crime : T ho ug ht Pro vo king Sta tistic s I n the Ye a r 2020: 5 Billio n Pe o ple will b e Online 50


  1. Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n we pre ve nt it? Wha t if it ha ppe ns?

  2. Cyb e r Crime : T ho ug ht Pro vo king Sta tistic s  I n the Ye a r 2020:  5 Billio n Pe o ple will b e “Online ”  50 Billio n De vic e s will b e Co nne c te d  75% o f the o nline infra struc ture will b e c o ntro lle d b y 3 rd Pa rty Clo ud o r I nte rne t Se rvic e Pro vide rs.  92% o f wo rklo a ds will b e pro c e sse d b y c lo ud da ta c e nte rs. www.dig ita ltre nds.c o m

  3. Cyb e r Crime – Wha t is it?  Crime tha t invo lve s a c o mpute r a nd a ne two rk.  T he c o mpute r ma y ha ve b e e n use d in the c o mmissio n o f a c rime , o r it ma y b e the ta rg e t.  …..c rimina l mo tive to inte ntio na lly ha rm the vic tim…..

  4. Cyb e r Crime – Wha t is it?  Co mpute r F ra ud  Disho ne st misre pre se nta tio n o f fa c t inte nde d to c a use lo ss

  5. Cyb e r Crime – Wha t is it?  Co mpute r F ra ud  T he ft o f Pe rso na lly I de ntifia b le I nfo rma tio n  Na me  So c ia l Se c urity Numb e r  Addre ss  Drive r’ s L ic e nse Numb e r  F ing e rprints  Da te o f Birth o r Birthpla c e  T e le pho ne Numb e r o r E ma il Addre ss  I nfo rma tio n tha t c a n b e use d o n its o wn o r with o the r info rma tio n to ide ntify, c o nta c t, o r lo c a te a sing le pe rso n, o r to ide ntify a n individua l in c o nte xt. (I de ntify T he ft)

  6. Cyb e r Crime – Wha t is it?  T he ft o f Cre dit Ca rd Ac c o unt I nfo rma tio n  Cre dit Ca rd Numb e r  E xpira tio n Da te  T hre e Dig it Se c urity Co de (CSS)  T he ft o f Ba nk Ac c o unt I nfo rma tio n  Ac c o unt Numb e r : Ro uting Numb e r  Online Ba nking Ac c e ss Cre de ntia ls

  7. Cyb e r Crime – Wha t is it?  E xto rtio n  T he ft o f Cla ssifie d I nfo rma tio n  Cyb e r T e rro rism  Cyb e rwa rfa re  Da rkNe t Ma rke ts  Co mpute r Viruse s, De nia l o f Se rvic e , Ma lwa re

  8. Cyb e r Crime – Ho w Do e s it Oc c ur?  Phishing & Spe a r Phishing : L inks  Spa mming : Atta c hme nts, L inks  Skimming : Physic a l a nd Wire le ss  Ma lwa re & Viruse s: K e y L o g g e rs, Ra nso mwa re  SQL I nje c to rs: We b site s  De nia l o f Distrib ute d Se rvic e Atta c ks: We b site s  Se c urity F la ws: Upda te s a nd Pa tc he s  Pa sswo rd Ha c king : Stro ng , Cha ng e , No Sha ring  Huma ns: E duc a tio n & Awa re ne ss

  9. Cyb e r Crime – Ho w Ca n we Pre ve nt T his?  E ma il F ilte rs  We b F ilte rs  Upda te a nd Pa tc hing Po lic y  Pa sswo rd Po lic y – 2 F a c to r Authe ntic a tio n, No De fa ults  Ba c kups  E nc ryptio n  Use r L o g in Privile g e s  L a ye re d Se c urity  Awa re ne ss T ra ining

  10. Cyb e r Crime – Ho w Do e s T his Affe c t Me ?  Pa rishio ne r I de ntity  Sta ff I de ntity  Pa rish F unds ($’ s)  Pa rish – Dio c e se – Ca tho lic Re puta tio n  I ndire c t Co sts  Do wntime  L o st Pro duc tivity  L o st Da ta  Stre ss!

  11. Cyb e r Crime – Wha t I f T his Oc c urs to Me ?  I nc ide nt Re spo nse Pla n  Purpo se & Sc o pe  Prima ry & Se c o nda ry Re spo nse T e a m Me mb e rs  Co nta c t I nfo rma tio n: I SP, We b ho st, L e g a l, Ba nk, I nsura nc e  Ste p b y Ste p Re spo nse :  Ale rt & Ac tiva te  Re c o rd De ta ils  Se c ure the Are a  Sto p Additio na l Da ta L o ss

  12. Cyb e r Crime – Wha t I f T his Oc c urs to Me ?  Ste p b y Ste p Re spo nse (Co ntinue d)  Asse ss Prio ritie s & Risks  I de ntify L e g a l Ob lig a tio ns  Co nta c t F o re nsic I nve stig a to rs  Re po rt to E xe c utive T e a m  No tific a tio n Pro c e ss  Ope ra tio na l Cha lle ng e s  Re vie w & Wra p Up

  13. Cyb e r L ia b ility I nsura nc e :

Recommend


More recommend