Cyber Security: The Current Threat T/Detective Chief Inspector Paul Peters Regional Cyber Crime Unit RCCU-Tarian@south-wales.pnn.police.uk §
The criminal landscape is changing……
OFFICIAL Why worry about Cybercrime? Reduce Threat Reduce Vulnerability OFFICIAL
Threats Social engineering • • Phishing • Data Breach Ransomware • • DDOS GDPR •
Social engineering
Interview with a Hacker
Phishing
Phishing
Data Breach Data Breaches are becoming more commonplace and cost is measured in financial terms and loss of reputation.
Ransomware
www.nomoreransom.org
Denial of Service Attacks For Sale
OFFICIAL General Data Protection Regulations OFFICIAL
OFFICIAL GDPR • All organisations holding or processing personal information will be affected (personal information can be as granular as an IP address) • The Regulation will come into existence on 25 th May 2018 • If there is a data breach (yet to be fully classified) the data handler/processor MUST inform the ICO • If there is a data breach (yet to be fully classified) the data handler/processor MUST inform ALL customers affected URL = https://ico.org.uk/for-organisations/data-protection-reform/overview-of-the-gdpr/ OFFICIAL
OFFICIAL General data Protection Regulations The maximum fine to be imposed will increase from £500,000 to 4% of global annual turnover for the preceding financial year or € 20m whichever is the greater. As an example Talk Talk were fined £400,000 by the ICO. When the new regulation is in place that could increase to: £70,000,000 !! OFFICIAL
OFFICIAL Case Study: Operation Purple Obsidian OFFICIAL
OFFICIAL Operation Purple Obsidian • DDoS attacks against Coleg Sir Gar between September 2013 – August 2014. • Part of the Public Sector Broadband Aggregation Network (PSBA). • DDoS attacks were impacting other public sector organisations E.g: transfer of patient data between hospitals. • PSBA part of Joint Academic Network (JANET) who were required to purchase / install a Corero SmartWall - £400k. OFFICIAL
OFFICIAL Daniel Kelly Pleaded guilty to 11 counts including hacking, blackmail, fraud and money laundering. OFFICIAL
OFFICIAL The Law Enforcement Response. OFFICIAL
OFFICIAL National Cyber Security Strategy OFFICIAL
OFFICIAL National Cyber Security Strategy DEFEND To respond effectively to incidents, and to ensure UK networks, data and systems are protected and resilient. Citizens, businesses and the public sector have the knowledge and ability to defend themselves. DETER We detect, understand, investigate and disrupt hostile action taken against us, pursuing and prosecuting offenders. DEVELOP We have an innovative, growing cyber security industry, underpinned by world leading scientific research and development. We have a self-sustaining pipeline of talent providing the skills to meet our national needs across the public and private sectors. OFFICIAL
OFFICIAL The CONTEST Strategy Pursue: Prosecute and disrupt those engaged in Cyber Crime Reduce Threat Prevent: Prevent people from engaging in Cyber Reduce Crime & people becoming victims Level of Cyber Crime Protect: Protect vulnerable groups, working in partnership to reduce risk Reduce Vulnerability Prepare: Reduce the impact of Cyber Crime OFFICIAL
National Cyber Security Strategy 2016-2021 Cyber-security Information Sharing Partnership • National CiSP launched March 2013. • CiSP is an online social networking tool to exchange information on threats and vulnerabilities. • Engagement with industry and government counterparts in a secure environment - Ability to learn from experiences, mistakes and successes of others and seek advice • Early warning of cyber threats
OFFICIAL CiSP OFFICIAL
Cyber Essentials
Cyber Essentials Cyber Essentials concentrates on five key controls: 1. Boundary firewalls and internet gateways - these are devices designed to prevent unauthorised access to or from private networks, but good setup of these devices either in hardware or software form is important for them to be fully effective. 2. Secure configuration – ensuring that systems are configured in the most secure way for the needs of the organisation. 3. Access control – Ensuring only those who should have access to systems to have access and at the appropriate level. 4. Malware protection – ensuring that virus and malware protection is installed and is up to date. 5. Patch management – ensuring the latest supported version of applications is used and all the necessary patches supplied by the vendor been applied.
10 Steps to Cyber Security
OFFICIAL Report Cybercrime OFFICIAL
OFFICIAL Question: Do you have an incident response plan? • RCCU can provide Cybercrime templates ✴ Website defacement ✴ Ransomware ✴ Hacking ✴ DDoS ✴ Banking malware • Guide on evidential standards OFFICIAL
OFFICIAL Questions? OFFICIAL
Recommend
More recommend