Cyb e r Crime Wha t is it? Ho w do e s it o c c ur? Ho w c a n we pre ve nt it? Wha t if it ha ppe ns?
Cyb e r Crime : T ho ug ht Pro vo king Sta tistic s I n the Ye a r 2020: 5 Billio n Pe o ple will b e “Online ” 50 Billio n De vic e s will b e Co nne c te d 75% o f the o nline infra struc ture will b e c o ntro lle d b y 3 rd Pa rty Clo ud o r I nte rne t Se rvic e Pro vide rs. 92% o f wo rklo a ds will b e pro c e sse d b y c lo ud da ta c e nte rs. www.dig ita ltre nds.c o m
Cyb e r Crime – Wha t is it? Crime tha t invo lve s a c o mpute r a nd a ne two rk. T he c o mpute r ma y ha ve b e e n use d in the c o mmissio n o f a c rime , o r it ma y b e the ta rg e t. …..c rimina l mo tive to inte ntio na lly ha rm the vic tim…..
Cyb e r Crime – Wha t is it? Co mpute r F ra ud Disho ne st misre pre se nta tio n o f fa c t inte nde d to c a use lo ss
Cyb e r Crime – Wha t is it? Co mpute r F ra ud T he ft o f Pe rso na lly I de ntifia b le I nfo rma tio n Na me So c ia l Se c urity Numb e r Addre ss Drive r’ s L ic e nse Numb e r F ing e rprints Da te o f Birth o r Birthpla c e T e le pho ne Numb e r o r E ma il Addre ss I nfo rma tio n tha t c a n b e use d o n its o wn o r with o the r info rma tio n to ide ntify, c o nta c t, o r lo c a te a sing le pe rso n, o r to ide ntify a n individua l in c o nte xt. (I de ntify T he ft)
Cyb e r Crime – Wha t is it? T he ft o f Cre dit Ca rd Ac c o unt I nfo rma tio n Cre dit Ca rd Numb e r E xpira tio n Da te T hre e Dig it Se c urity Co de (CSS) T he ft o f Ba nk Ac c o unt I nfo rma tio n Ac c o unt Numb e r : Ro uting Numb e r Online Ba nking Ac c e ss Cre de ntia ls
Cyb e r Crime – Wha t is it? E xto rtio n T he ft o f Cla ssifie d I nfo rma tio n Cyb e r T e rro rism Cyb e rwa rfa re Da rkNe t Ma rke ts Co mpute r Viruse s, De nia l o f Se rvic e , Ma lwa re
Cyb e r Crime – Ho w Do e s it Oc c ur? Phishing & Spe a r Phishing : L inks Spa mming : Atta c hme nts, L inks Skimming : Physic a l a nd Wire le ss Ma lwa re & Viruse s: K e y L o g g e rs, Ra nso mwa re SQL I nje c to rs: We b site s De nia l o f Distrib ute d Se rvic e Atta c ks: We b site s Se c urity F la ws: Upda te s a nd Pa tc he s Pa sswo rd Ha c king : Stro ng , Cha ng e , No Sha ring Huma ns: E duc a tio n & Awa re ne ss
Cyb e r Crime – Ho w Ca n we Pre ve nt T his? E ma il F ilte rs We b F ilte rs Upda te a nd Pa tc hing Po lic y Pa sswo rd Po lic y – 2 F a c to r Authe ntic a tio n, No De fa ults Ba c kups E nc ryptio n Use r L o g in Privile g e s L a ye re d Se c urity Awa re ne ss T ra ining
Cyb e r Crime – Ho w Do e s T his Affe c t Me ? Pa rishio ne r I de ntity Sta ff I de ntity Pa rish F unds ($’ s) Pa rish – Dio c e se – Ca tho lic Re puta tio n I ndire c t Co sts Do wntime L o st Pro duc tivity L o st Da ta Stre ss!
Cyb e r Crime – Wha t I f T his Oc c urs to Me ? I nc ide nt Re spo nse Pla n Purpo se & Sc o pe Prima ry & Se c o nda ry Re spo nse T e a m Me mb e rs Co nta c t I nfo rma tio n: I SP, We b ho st, L e g a l, Ba nk, I nsura nc e Ste p b y Ste p Re spo nse : Ale rt & Ac tiva te Re c o rd De ta ils Se c ure the Are a Sto p Additio na l Da ta L o ss
Cyb e r Crime – Wha t I f T his Oc c urs to Me ? Ste p b y Ste p Re spo nse (Co ntinue d) Asse ss Prio ritie s & Risks I de ntify L e g a l Ob lig a tio ns Co nta c t F o re nsic I nve stig a to rs Re po rt to E xe c utive T e a m No tific a tio n Pro c e ss Ope ra tio na l Cha lle ng e s Re vie w & Wra p Up
Cyb e r L ia b ility I nsura nc e :
Recommend
More recommend