SlideShare uma empresa Scribd logo
1 de 90
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
CYBER SECURITY
AND
BIG DATA
Professor Lili Saghafi
profsaghafi_cybersecurityexperts@eon.law.harvard.edu
Personal Web: https://sites.google.com/site/professorlilisaghafi/
Seminar on 'Digital Marketing –
Impact of Social Media Tools‘
Oct 10th, 2012
Cyber Security,
Social Networking and
Digital Media
Seminar on 'Digital Marketing - Impact
of Social Media Tools‘
Oct 10th, 2012
•Agenda
Seminar on 'Digital Marketing - Impact of Social Media Tools‘
The impact of Cyber Security and Social Networking on Digital Media
INFORMATION Assurance
Cyber Crime Definition and Examples
Social Networking and Digital Media
Cyber War
Solutions
Part C
Part D
Part G
Part E
Part F
Recent Research Results on Cyber crime
and Social Media
2
Prof. Lili Saghafi
CYBER SECURITY
Part B
Part A
Part H
Big Data, In memory processing, HANA
Big Data from Social Networking and its effect on
Digital Marketing
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Every day, we create 2.5 quintillion bytes of data — so much
that 90% of the data in the world today has been created in
the last two years alone.
• What we can do with big Data?
• Social Networking can be one source of Big Data
• Analytic using Big Data
• Just add Analytic , see the result
Prof. Lili Saghafi
3
•What is Big Data?
4 Prof. Lili Saghafi
•CAIRO
• Cairo population is approximately 17
million. It is the most populous
metropolitan area in Africa and also ranks
16th amongst the most populous
metropolitan area in the world.
• Majority of the population in Cairo are
Egyptians, with less number of foreigners.
• One third of the total population in Cairo is
under 15 and nearly three fifth is under 30.
• The positive implication is that Cairo
population is relatively young. Life
expectancy averages for both men and
women is 70 years.
• WHAT CAN WE DO THIS DATA?
• population of 16.3 million in
2011, the city is also the
eighth most populous
metropolis in the world
• Day time population
increase to 25.7 million ??!!
• Add Analytic and see what
you can do.
• WHAT CAN WE DO THIS
DATA?
5
Prof. Lili Saghafi
•Delhi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Just Add Analytics – Even to Toothbrushes
Prof. Lili Saghafi
6
•What is Analytic?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• I recently saw a presentation mentioning that there “are more
mobile phones than toothbrushes in the world”, and
according to some research by the 60 second marketer, it
seems that in all likelihood, this is absolutely true:
Prof. Lili Saghafi
7
•Analytic
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
8
“why not combine the two?!”. Here’s my quick
mockup of an iPhone case of the future:
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
The Beam Toothbrush is a bluetooth-enabled toothbrush and
associated iphone application:
Prof. Lili Saghafi
9
It provides detailed analytics, recording how long each
person brushes their teeth:
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
10
And like any good performance management
tool, it uses gamification techniques to
encourage the right behavior…
Gamification is the use of game design elements, game thinking
and game mechanics to enhance non-game contexts.
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
11
It seems as if analytics is being embedded in
every device possible, such as the new Nike
Hyperdunk+ basketball shoes and associated
application:
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• First, big data can unlock significant value by
making information transparent and usable at
much higher frequency.
• Second, as organizations create and store
more transactional data in digital form, they
can collect more accurate and detailed
performance information on everything from
product inventories to sick days, and therefore
expose variability and boost performance.
Prof. Lili Saghafi
12
BIG DATA
There are five broad ways in which using big
data can create value to any organization
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Leading companies are using data
collection and analysis to conduct
controlled experiments to make better
management decisions;
• others are using data for basic low-
frequency forecasting to high-frequency
nowcasting to adjust their business
levers ( tactics) just in time.
Prof. Lili Saghafi
13
Using big data…….
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Third, big data allows ever-
narrower segmentation of
customers and therefore much
more precisely tailored products or
services.
Prof. Lili Saghafi
15
BIG DATA
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Fourth, sophisticated analytics can
substantially improve decision-
making.
Prof. Lili Saghafi
17
BIG DATA
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, big data can be used to improve
the development of the next
generation of products and
services. For instance, manufacturers
are using data obtained from sensors
embedded in products to create
innovative after-sales service offerings
such as proactive maintenance
(preventive measures that take place
before a failure occurs or is even noticed).
Prof. Lili Saghafi
20
•BIG DATA
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
“A man without DATA is just a man with an opinion”
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• SAP is the market and technology leader in business
management software, solutions, services for improving
business process.
• The SAP HANA appliance software aggregates huge
volumes of valuable data and produces relevant results for
business at lightning speeds.
• Blink. You've Just Analyzed 460 Billion Rows of
Data with SAP HANA
Prof. Lili Saghafi
22
What is in memory processing
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
23
Knowledge makes you a LEADER in Business
not a follower
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Social networks, search engine poisoning, web
applications and Adobe Corp.’s software are among
the top 12 security risks that companies face.
• Joining them in the deadly dozen are more
targeted botnets, cloud computing, routine
negligence and the always popular Advanced
Persistent Threat – cyberwarfare. And, of course, the
tempting target mobile devices now present.
• Credit to FORBES
Prof. Lili Saghafi
24
•Top 12 Security Risks For 2012
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Using social media ‘Big Data’ analytics to analyze
or predict events
• In July, the Defense Advanced Research Projects
Agency (DARPA) issued an RFP ( Request for Proposal )
looking for new Big Data tools to track social media
postings and interactions, reflecting a growing interest
within government to use social media and open source
data to "fill-in" and "complement" traditional data
sources.
• The focus for the government is on using this public data
to develop analytics that can be used to anticipate how an
adversary or potential friend "thinks" and "feels" about a
particular situation, with the hope of being able to predict
their behavior, actions and reactions.
Prof. Lili Saghafi
25
Social Networking Sites are the source of Big Data
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Face Book
• My Space
• Orkut
• Twitter
• Flicker
• YouTube
• LinkdIn
• http://www.crime-research.org/latestnews/
Computer Crime Research Center
Prof. Lili Saghafi
26
•Social Networking
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Many cyber police is getting more complaints about Orkut these days
as many fake profiles being created and thus leads to crime.
• Orkut is a social networking service which is run by Google and
named after its creator, an employee of Google - Orkut Büyükkökten.
• The service states that it was designed to help users meet new friends
and maintain existing relationships.
• Similar to Facebook, Friendster and MySpace, Orkut goes a step
further by permitting the creation of easy-to-set-up simple forums
(called "communities") of users.
• Since October 2006, Orkut has permitted users to create accounts
without an invitation.
• Orkut is the most visited website in India and 2nd most visited
site in Brazil.
• The initial target market for orkut was the United States, but the
majority of its users are in India and Brazil.
• In fact, as of March 2008, 67.5% of the traffic comes from Brazil,
followed by 15.4%, which comes from India.
Orkut
27 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Cyber Crime
• Although the term cyber crime is usually restricted to
describing criminal activity in which the computer or network
is an essential part of the crime, this term is also used to
include traditional crimes in which computers or networks are
used to enable the illicit activity.
• Definition
Cyber Crime
28 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• By the use of Social Media and Social Networking the number
of Cyber Crimes increased dramatically
Prof. Lili Saghafi
29
•Cyber Crime
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber Security Prevent Cyber Crimes
Prof. Lili Saghafi
30
•Cyber Security
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• You've heard the news stories about credit card numbers
being stolen and email viruses spreading.
• Maybe you've even been a victim yourself.
• One of the best defenses is understanding the risks, what
some of the basic terms mean, and what you can do to
protect yourself against them.
Prof. Lili Saghafi
31
Why is Cyber Security a Problem?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It seems that everything relies on computers and the internet
now — communication (email, cellphones), entertainment
(digital cable, mp3s), transportation (car engine systems,
airplane navigation), shopping (online stores, credit cards),
medicine (equipment, medical records), and the list goes on.
• How much of your daily life relies on computers? How much
of your personal information is stored either on your own
computer or on someone else's system?
• Cyber security involves protecting that information by
preventing, detecting, and responding to attacks.
Prof. Lili Saghafi
32
•What is cyber security?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• There are many risks, some more serious than
others.
• Among these dangers are viruses erasing your
entire system, someone breaking into your system
and altering files, someone using your computer
to attack others, or someone stealing your credit
card information and making unauthorized
purchases. (Hacking and Cracking)
• Unfortunately, there's no 100% guarantee that
even with the best precautions some of these
things won't happen to you, but there are steps
you can take to minimize the chances.
Prof. Lili Saghafi
33
What are the risks?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The first step in protecting yourself is to
recognize the risks and become familiar with
some of the terminology associated with
them:
1. Hacker, attacker, or intruder
2. Malicious code
3. Vulnerability
Prof. Lili Saghafi
34
What can you do?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• These terms are applied to the people who seek to
exploit weaknesses in software and computer
systems for their own gain.
• Although their intentions are sometimes fairly benign and
motivated solely by curiosity, ( Hacking) their actions are
typically in violation of the intended use of the systems
they are exploiting.
• The results can range from mere mischief (creating a virus
with no intentionally negative impact) to malicious activity
(stealing or altering information, Conficker).
Prof. Lili Saghafi
35
Hacker, attacker, or intruder -
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Malicious code, sometimes called malware, is a broad category that
includes any code that could be used to attack your computer. Malicious
code can have the following characteristics:
• It might require you to actually do something before it infects your
computer. This action could be opening an email attachment or going
to a particular web page.
• Some forms propagate without user intervention and typically start by
exploiting a software vulnerability. Once the victim computer has
been infected, the malicious code will attempt to find and infect other
computers. This code can also propagate via email, websites, or
network-based software, or even with a call on your cell!. Mobile
Viruses
• Some malicious code claims to be one thing while in fact doing
something different behind the scenes. For example, a program that
claims it will speed up your computer may actually be sending
confidential information to a remote intruder.
• Viruses and worms are examples of malicious code.
Prof. Lili Saghafi
36
•Malicious code -
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In most cases, vulnerabilities are caused by programming
errors in software.
• Attackers might be able to take advantage of these errors to
infect your computer, so it is important to apply updates or
patches that address known vulnerabilities
Prof. Lili Saghafi
37
•Vulnerability -
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Confidentiality, Privacy
2. Integrity (information hasn’t change)
3. Availability
4. Authentication ( the person is who they say they are)
5. Non repudiation ( legal aspect of tiding a contract and
signature)
• Examples: Health care Data and Records
INFORMATION Assurance Is Based On
5 Pillars
38 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Capability
2. Resources
3. Intent
4. Motivation
5. Access
6. Risk Version
•Treat / Adversary Model
39 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime which the
computer or network is a tool of the
criminal activity include :
• Spamming and
• Criminal copyright crimes,
particularly those facilitated through
peer-to-peer networks.
A- Examples of CyberCrime
40 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a target
of criminal activity include:
•Unauthorized access (i.e, defeating
access controls),
•Malicious code
•Denial-of-service DSA attacks.
•B- Examples of CyberCrime
41 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a place
of criminal activity include :
•Theft of service (in particular,
telecom fraud)
•Certain financial frauds.
•C- Examples of CyberCrime
42 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, examples of traditional crimes
facilitated through the use of computers or
networks include :
• Nigerian 419 or other gullibility or
• Social engineering frauds (e.g., hacking
"phishing", identity theft, child pornography,
online gambling, securities fraud, etc.).
• Cyberstalking is an example of a traditional crime
-- harassment -- that has taken a new form when
facilitated through computer networks.
•D- Examples of CyberCrime
43 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Additionally, certain other information
crimes, including:
• Trade secret theft
• industrial or economic espionage, are
sometimes considered cybercrimes
when computers or networks are
involved.
•E- Examples of CyberCrime
44 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cybercrime in the context of national security
• may involve hacktivism (online activity
intended to influence policy),
• traditional espionage, or
• information warfare and related activities.
Prof. Lili Saghafi
45
•F- Examples of CyberCrime
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Another way to define cybercrime is simply as criminal activity
involving the information technology infrastructure, including:
• illegal access (unauthorized access),
• illegal interception (by technical means of non-public
transmissions of computer data to, from or within a computer
system),
• data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data),
• systems interference (interfering with the functioning of a
computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer
data),
• misuse of devices, forgery (ID theft), and electronic fraud.
• CYBERCRIME
46 Prof. Lili Saghafi
• One of the recent researches
showed that a new cybercrime is
being registered every 10 seconds
in Britain.
• During 2006 the computer crooks
were able to strike 3.24 million
times.
• The comparable volume for 2009 is
almost double at 491.2 million
• Some crimes performed on-line
even surpassed their equivalents in
real world 2012. In addition, experts
believe that about 90% of
cybercrimes stay unreported.
•RECENT RESEARCHES
47
Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• According to a study performed by Shirley McGuire, a
specialist in psychology of the University of San
Francisco, the majority of teenagers who hack and
invade computer systems are doing it for fun rather
than with the aim of causing harm.
• Shirley McGuire mentioned that quite often parents
cannot understand the motivation of the teenage hackers.
She performed an anonymous experiment, questioning
more than 4,800 students in the area of San Diego.
• Her results were presented at the American
Psychological Association conference:
•Research
48 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• 38% of teenagers were involved in software piracy;
• 18% of all youngsters confessed of entering and using the
information stored on other personal computer or website;
• 13% of all the participants mentioned they performed changes in
computer systems or computer files.
• A criminal may represent himself to be a teenager, professional or
anyone who suits the purpose of both the parties. Adults are just as
susceptible to these crimes as the kids are.
• Proper awareness and guidance are an absolute necessity so that
the crimes can be controlled before becoming a full-grown
technological menace.
• http://theviewspaper.net/cyber_crimes/
•RESEARCH RESULT
49 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The study revealed that only 1 out of 10
hackers were interested in causing certain
harm or earn money.
• Most teenagers performed illegal computer
actions of curiosity, to experience
excitement.
•RESEARCH RESULT
50 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• A U.S. government report entitled Annual Report to
Congress on the Military Power of some countries talks
extensively about the increasing role of some countries
ability to conduct war over the Internet. In the past, such
talk of a "digital Pearl Harbor" has been dismissed by some
security experts as largely political hot air.
• Yet more and more evidence suggests that a politically
sponsored Internet event could occur sooner rather than later.
•Cyber War
51 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Criminal hackers follow three basic motivations:
• prestige,
• profit
• politics
• The three Ps.
•The three Ps.
52 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• "All of our security defense models," "were built based on a
model of threat which was purely prestige driven,"
referring to the virus writer who only wanted his
creation mentioned on the evening news. (Josh Corman,
principal security strategist for IBM Internet Security Systems)
• Now, we're currently living in a time of profit, and
have begun to react to that. I am talking about criminal
hackers--either independent or state sponsored--entering
the realm of politics.
•The three Ps.
53 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
"'Political' means different things," "I was telling
people not to be surprised if we saw the botnets (Botnet
is a jargon term for a collection of software robots, or bots, which run autonomously and
automatically) They run on groups of zombie computers
controlled remotely.
• This can also refer to the network of computers using
distributed computing software Participate in the
presidential primaries in the U.S." And then, in
October 2007, a Ukranian botnet was linked to a
flood of "Ron Paul for President" spam.
• But that's small potatoes compared to what I thinks
is possible.
•Getting political
54 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Those same botnet systems could "take down candidate
sites, send a whole bunch of free advertising or free smear
campaigns, and potentially have an impact on who became
the presidential candidates or who was successful on
fundraising." Worse "'political' could mean a cyber
protest, it could mean cyber espionage, or cyber
reconnaissance." Such political action has already
happened in 2009.
55 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• At least two "one-offs" within the last year. The
first is Estonia last spring, where a flash
mob of ethnic Russian students in Estonia
crippled the country's infrastructure for
several weeks.
• The other one-off is the recent CIA disclosures to
Congress about foreign-state-sponsored attacks
on U.S. military installations.
Some recent examples
56 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Neither were the crippling examples that worry me, and
neither were apparently well coordinated.
• I think we're at a point right now where the more we talk
about it, the more we use examples, we'll start to get to a
critical mass awareness."
• On profit-based attacks, "it wasn't until a number of
large corporations were hit with a data breach, a targeted
attack, or spear phishing that the security community
really took notice. (The enterprise people) said 'Ouch!'
Sometimes someone has to say, 'Ouch!'" I hopes that no
one has to be stung by a political attack before the
security community starts to take that threat seriously.
Critical mass awareness
57 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• How to Report Cyber and IP Crime How to
Report Computer- and Internet-Related Crime
• How to Report Intellectual Property Crime
Computer Crime & Intellectual Property
Section
United States Department of Justice
58 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Recently, the police captured four men who had kidnapped a
Johannesburg girl. The men had reportedly lured the young
women from her home in Kempton Park, through her
Facebook page.
• The girl was rescued by police, because she managed to SMS
her mother, with what she thought was her location.
• In another incident last year, two men in their mid-30s were
charged with the kidnapping and rape of a 14-year-old
Pretoria girl, who met the men on the popular chat room
application Mxit
Police tackle cyber crime
By Candice Jones, ITWeb online telecoms editor
Johannesburg, 17 Mar 2010
http://www.itweb.co.za/index.php?option=com_content&view=article&id=31384:police-tackle-cyber-
crime&catid=160:it-in-government
59 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• CyberTipline
• Protect Children online
Prof. Lili Saghafi
60
•CyberTipline
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Online Fraud and Identity Theft have become a growing
problem. One of the means that is used to obtain your personal
and financial information is through a technique known as
Phishing. (pronounced"fishing") A lot of information is obtained
through e-mail that appears legitimate but is not. These e-mails
then ask you to click on a link that appears correct but in fact,
re-directs you to another site which then captures your sensitive
information. Below is a 3 minute video from Microsoft that
some have found useful in better understanding Online Fraud
and Identity Theft.
•
http://www.microsoft.com/athome/security/videos/Phishing8-
hi.swf
Prof. Lili Saghafi
61
•Identity Theft
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Mobile Phones Malwares and Viruses
• Download
• Direct by sharing
• MMS (Multimedia message Signal) Commworrier
• Bluetooth
• Solution
• Antivirus
• Walk away
Prof. Lili Saghafi
62
Mobile Phones Hackers
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Reports from various sources in the security industry show
that a large takedown of servers associated with the
“Bredolab” trojan occurred within few weeks.
• While most of the reports have focused around the idea
that this infrastructure was solely related to the command
and control of Bredolab, research shows that these servers
were used as an all-purpose hosting infrastructure for
criminal activity.
• November 4, 2010
•“Bredolab” trojan
http://www.networkforensics.com/category/cybercrime/
63 Prof. Lili Saghafi
The number of Web
sites infected with
malware has doubled
from a year ago to more
than 1.2 million,
according to a study
released today
November 22, 2010 ,by
Internet security
company Dasient.
.
•Report: Infected Web sites double in 2010
Star
Burst!
http://news.cnet.com/8301-27080_3-20023576-245.html?tag=mncol;posts
64 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Simulation of your Computer display on Hackers Computer
• Clickjacking
Prof. Lili Saghafi
65
•Conficker
• The definition of safe computing has
changed. Within ISS and IBM, started an
education awareness campaign called
"The Evolving Threat." "We do seminars,
we made a videogame, we're trying to
make some of these new security
concepts more tangible and digestible to
both enterprise practitioners and the
consumers because some of this is
simply the weakest link. "What's allowing
(the Storm botnet) to be so successful is
not an unpatched system per se, but it's
an uninformed end user."
•Solution
Recognizing the weakest link
66 Prof. Lili Sagh
Also important is end-user awareness.
"Among ourselves in the security
intelligentsia, those of us who do security for
a living, we talk about practicing safe
computing. That used to include 'it's OK, just
don't double-click on an executable, but it's
fine to open a GIF, a JPEG, or an MP3.' But as
you've seen, botnets are now using MP3s as
a source of an infection. I mean, just the very
podcasts you're listening to could be a source
of infection."
•Solution
Awareness Among ourselves in the security intelligentsia
67 Prof. Lili Sagh
• Democratic politicians are
proposing a novel approach
to cybersecurity: fine
technology companies
$100,000 a day unless they
comply with directives
imposed by the U.S.
Department of Homeland
Security.
• A "bunker" in this case is a
new IP address served to a
business that is under
persistent DDoS attack but
lacks the funds or resources
to protect itself.
• Traffic from the DDoS attack
continues to hit the original IP
address while the business
remains in operation under a
new address.
• Distributed Denial of Service
(DDoS) attacks
• Google has launched
a program to
encourage outsiders
to find security
vulnerabilities in its
Web properties.
• http://news.cnet.com/8301-
30685_3-20021436-
264.html?tag=mncol;mlt_related
Cybersecurity bill gives DHS
power to punish tech firms
http://news.cnet.com/8301-
13578_3-20023464-
38.html#ixzz16BwzIU9M
Fights Ddos Attacks With
Digital 'Bunkers‘
http://news.cnet.com/8301-
1009_3-20023260-
83.html?tag=nl.e757
Google offers cash for finding
Web security holes
68 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Facebook application developers are able to store their own check-in data in the
Facebook Places database and retrieve information from the database.
• But Facebook is far from the only source of "leakage" for this location data.
• EPIC cites an AT&T research paper (PDF) that found some kind of private data leaked to third
parties in all 20 of the mobile online social networks studied. The services examined include
Facebook, MySpace, Twitter, Flickr, Foursquare, Yelp, and Loopt.
• While these services may have robust privacy policies, the advertisers and developers
they deal with may be less secure.
• As reported last February on the ReadWriteWeb, a site named PleaseRobMe aggregated
information from several location-based services to indicate houses whose
residents were away, making them easy pickings for thieves.
•
Report Your Location To A Social Network And Get A Coupon For
Discounts And Prizes. The Price?
http://news.cnet.com/8301-13880_3-20022700-
68.html#ixzz16C5xfMhX
69 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Location-based services promise to make it
easier to connect with family, friends, and
associates and to be rewarded for being a
loyal customer.
• But in their current form, the services make it
too easy for people and organizations to
access your private information without your
explicit consent.
• Prevent Facebook friends from checking you in
•Solution
70 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cloud computing is Internet-based computing,
whereby shared resources, software, and
information are provided to computers and other
devices on demand, as with the electricity grid.
• Cloud computing is a natural evolution of the
widespread adoption of virtualization, Service-
oriented architecture and utility computing.
• Details are abstracted from consumers, who no
longer have need for expertise in, or control over, the
technology infrastructure "in the cloud" that supports
them.
Prof. Lili Saghafi
71
Is Cloud the Solution?
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The major cloud service providers include Amazon,
Salesforce, SAP, Microsoft and Google.
• Some of the larger IT firms that are actively involved in
cloud computing are Fujitsu, Dell, Hewlett Packard, IBM,
VMware, NetApp and Microsoft.
Prof. Lili Saghafi
72
•Cloud Computing
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We have all kinds of controls, but they
don't work very well
• It's the little things that lead to most
internal compromises, like walking
away from your desk and not locking
your screen
• It would be very easy for an IT guy to
swap out a hard-drive and just
take it (impact on financial
institution)
Prof. Lili Saghafi
73
Internal Problem VS External Problems
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Most chief security information officers CSIO focus on outside
threats -- cyber attacks, socially engineered breaches like
phishing and vishing (phishing over phones) , and the
interception of transaction data.
• While it might not be easy to limit the information employees
must access, it is relatively easy to monitor that
access -- keeping an eye on what
information and files are being
viewed, by whom and how often,
Prof. Lili Saghafi
74
Internal Problem VS External Problems
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage (Spy versus spy)
• Technology race (Space, atomic weapon)
•Cold War in 70
75 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage - Cyber
• Technology Race – Cyber
Prof. Lili Saghafi
76
•Cold War Now
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In the past government was target now is technology
• Who are the adversary was clear on COLDWAR
• today are unknown hackers in CYBERWAR
• Consider the Model of adversary every hacker/kid /
organized cyber crime has it
1. Capability (computer knowledge)
2. Resources (a laptop computer and access to internet)
3. Intent
4. Motivation
5. Access (to homes cyber)
6. Risk Version (no risk for them)
Prof. Lili Saghafi
77
•Comparison
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber terrorists can use unprotected
systems to aggressively target our
nation’s critical infrastructure.
• Are you an easy target?
Cyber Terrorism:
How Vulnerable Are We?
78 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The malicious software, known as Stuxnet, was discovered in
mid July 2010, at least several months after its creation, by
VirusBlokAda, a Belarussian computer security company that
was alerted by a customer.
• The malicious software has infected an unknown number of
power plants, pipelines and factories over the past year is the
first program designed to cause serious damage in the
physical world
• The Stuxnet spreads through previously unknown holes in
Microsoft’s Windows operating system and then looks for a
type of software made by Siemens and used to control
industrial components, including valves and brakes.
Prof. Lili Saghafi
79
•Stuxnet Worm
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet can hide itself, wait for certain conditions
and give new orders to the components that reverse
what they would normally do.
• The commands are so specific that they appear
aimed at an industrial sector, mostly atomic centers
but officials do not know which one or what the
affected equipment would do.
• Cyber attacks on computer networks have slowed or
stopped communication in countries such as Estonia
and Georgia,
• Stuxnet is the first aimed at physical destruction and
it heralds a new era in cyberwar.
Prof. Lili Saghafi
80
•Stuxnet
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• “It is not speculation that this is the first directed cyber
weapon”, or one aimed at a specific real-world process, said
Joe Weiss, a US expert who has testified to Congress on
technological security threats to the electric grid and other
physical operations.
• “The only speculation is what it is being used against, and by
whom.”
Prof. Lili Saghafi
81
The first directed cyber weapon
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet’s knowledge of Microsoft’s Windows operating
system, the Siemens program and the associated hardware
of the target industry make it the work of a well-financed,
highly organized team.
• The malicious software marks the first attack on critical
industrial infrastructure that sits at the foundation of modern
economies.
Prof. Lili Saghafi
82
Stuxnet’s knowledge of Microsoft’s Windows
operating system,
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
• The Operation Aurora, Zeus, and piracy
• While we still use many of the same old names - viruses, Trojans, and
worms - today's malware deserves much more respect than many are
giving it. Where traditional viruses mostly aimed to disrupt operations
or win fame for their coders' cleverness,
• today's malware enables potent multistage attacks called
advanced persistent threats. In these carefully sequenced attacks,
criminals rely on custom and constantly changing malware being
placed where it will go unnoticed, returning the maximum value from
their investment.
Prof. Lili Saghafi
83
How 3 Cyber Threats Transform Incident
Response: Oct 2012
Targeted Attacks, System Exploits, Data Theft,
and You
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Intrinsic -try to build it right -commercial/technology
component should change frequently
• Extrinsic - evaluate it so you know something about
residual risk
• Implementation – Combine component in the best way
maintain system, patch, scan frequently
• Operational – Monitor everything ,update, look for bad
behaviour, Authentication, privileges and different users
level of accessibility
• Don’t only block everything have strategy
Prof. Lili Saghafi
84
How to build the assurance
A Tip for IT MANAGERS
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It Is very real
• Cyber activity is constant
• All of us are target
• We need to be hard target, (people are strongest link if we
make them hard target)
• This is the matter of life and Death , it is about freedom
our way of life
Prof. Lili Saghafi
85
•Cyber Crime
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We need strong technology
• We need users understanding of treats
and respond (.com/.cm) masquerading
and spoofing
• We need cyber professional to know
the risk/treats and mitigation
Prof. Lili Saghafi
86
•Solution
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In home you can prevent 90%
attacks,
• In industry 80% of attacks are
known , 10% are too new to be
known , and 10% we just don’t know
it exist.
• RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an
algorithm for public-key cryptography in information Security
Prof. Lili Saghafi
87
2010 RSA Conference research result
REMEMBER
People are the strongest link to build the security
assurance , Together we can , Remember we are the
Masterpiece of God , he Breathed into us, we are capable
of doing anything.
88 Prof. Lili Saghafi
Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Computer Crime Research Center
• http://www.crime-research.org/news/20.03.2010/3779/
• Network Forensics Blog » cybercrime
• http://www.networkforensics.com/category/cybercrime/
• Information Policy
• http://www.i-policy.org/cybercrime/
• Security
• http://news.cnet.com/security/?tag=hdr;snav
• RSA Conference
• Computer Crime & Intellectual Property Section
United States Department of Justice
• FORBES Magazine
•REFERENCES
89 Prof. Lili Saghafi
Thank you for being
great audience
Any
Question?
90 Prof. Lili Saghafi

Mais conteúdo relacionado

Mais procurados

Krithi talk-impact
Krithi talk-impactKrithi talk-impact
Krithi talk-impactKaran7755
 
International Business Negotation
International Business NegotationInternational Business Negotation
International Business NegotationNabaraj Giri
 
Module 10 Open Government and Data
Module 10 Open Government and DataModule 10 Open Government and Data
Module 10 Open Government and DataIPAC-IAPC
 
When size matters Is social media data really that BIG
When size matters Is social media data really that BIGWhen size matters Is social media data really that BIG
When size matters Is social media data really that BIGOlha Bondarenko
 
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...Smart Chicago Collaborative
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Desiree Miloshevic
 
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...Bringing IoT ideas to life: start from the user ... not the API! - API days 2...
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...Claro Partners Inc.
 
How technologies like big data and social
How technologies like big data and socialHow technologies like big data and social
How technologies like big data and socialEdward Chenard
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersNicole Black
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationDavid Bellocchi
 
Navvis and Company - Emerging Technologies Presentation: Douglas Pollei
Navvis and Company - Emerging Technologies Presentation: Douglas PolleiNavvis and Company - Emerging Technologies Presentation: Douglas Pollei
Navvis and Company - Emerging Technologies Presentation: Douglas PolleiDouglas Pollei
 
Big data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webBig data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webRick Bouter
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Ian Glazer
 
What does an internet of things business look like?
What does an internet of things business look like?What does an internet of things business look like?
What does an internet of things business look like?Alexandra Deschamps-Sonsino
 
ReImagining Governance
ReImagining Governance ReImagining Governance
ReImagining Governance Nagarajan M
 
Five Misconceptions about Personal Data - Dataconomy Barcelona -
Five Misconceptions about Personal Data - Dataconomy Barcelona -Five Misconceptions about Personal Data - Dataconomy Barcelona -
Five Misconceptions about Personal Data - Dataconomy Barcelona -Claro Partners Inc.
 
Big data 2 4 - big-social-predicting-behavior-with-big-data
Big data 2 4 - big-social-predicting-behavior-with-big-dataBig data 2 4 - big-social-predicting-behavior-with-big-data
Big data 2 4 - big-social-predicting-behavior-with-big-dataRick Bouter
 

Mais procurados (20)

Krithi talk-impact
Krithi talk-impactKrithi talk-impact
Krithi talk-impact
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
International Business Negotation
International Business NegotationInternational Business Negotation
International Business Negotation
 
Module 10 Open Government and Data
Module 10 Open Government and DataModule 10 Open Government and Data
Module 10 Open Government and Data
 
When size matters Is social media data really that BIG
When size matters Is social media data really that BIGWhen size matters Is social media data really that BIG
When size matters Is social media data really that BIG
 
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...
Experimental Modes of Civic Engagement in Civic Tech: Meeting people where th...
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013Internet of Things - IoT Webinar 2013
Internet of Things - IoT Webinar 2013
 
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...Bringing IoT ideas to life: start from the user ... not the API! - API days 2...
Bringing IoT ideas to life: start from the user ... not the API! - API days 2...
 
How technologies like big data and social
How technologies like big data and socialHow technologies like big data and social
How technologies like big data and social
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
ARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classificationARMA Winnipeg | AI Auto-classification
ARMA Winnipeg | AI Auto-classification
 
Navvis and Company - Emerging Technologies Presentation: Douglas Pollei
Navvis and Company - Emerging Technologies Presentation: Douglas PolleiNavvis and Company - Emerging Technologies Presentation: Douglas Pollei
Navvis and Company - Emerging Technologies Presentation: Douglas Pollei
 
Big data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-webBig data 4 4 the art of the possible 4-en-web
Big data 4 4 the art of the possible 4-en-web
 
Google In China (CSR)
Google In China (CSR)Google In China (CSR)
Google In China (CSR)
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
 
What does an internet of things business look like?
What does an internet of things business look like?What does an internet of things business look like?
What does an internet of things business look like?
 
ReImagining Governance
ReImagining Governance ReImagining Governance
ReImagining Governance
 
Five Misconceptions about Personal Data - Dataconomy Barcelona -
Five Misconceptions about Personal Data - Dataconomy Barcelona -Five Misconceptions about Personal Data - Dataconomy Barcelona -
Five Misconceptions about Personal Data - Dataconomy Barcelona -
 
Big data 2 4 - big-social-predicting-behavior-with-big-data
Big data 2 4 - big-social-predicting-behavior-with-big-dataBig data 2 4 - big-social-predicting-behavior-with-big-data
Big data 2 4 - big-social-predicting-behavior-with-big-data
 

Destaque

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Nilesh Sapariya
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesRoger Oldham
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 

Destaque (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slidesLMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
LMTE Cyber Security Sping Summit 20 May 2015 - Presenters' slides
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 

Semelhante a Conference Presenation Cyber security and big data , Prof. Lili Saghafi

India unlocking the potential of Open Data
India unlocking the potential of Open DataIndia unlocking the potential of Open Data
India unlocking the potential of Open DataData Portal India
 
Data for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops CareersData for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops CareersSocialCops
 
Social Media Policy In The Enterprise - Bridging The Digital Social Skills Gap
Social Media Policy In The Enterprise - Bridging The Digital Social Skills GapSocial Media Policy In The Enterprise - Bridging The Digital Social Skills Gap
Social Media Policy In The Enterprise - Bridging The Digital Social Skills GapDr. William J. Ward
 
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...ux singapore
 
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’ JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’JIMS Rohini Sector 5
 
Ten IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadTen IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadarms8586
 
Technology Toolbox
Technology ToolboxTechnology Toolbox
Technology ToolboxMitch Miles
 
Android Application Development for Social Network
Android Application Development for Social NetworkAndroid Application Development for Social Network
Android Application Development for Social NetworkIRJET Journal
 
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad Campaign
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad CampaignPeople’s Insights Volume 1, Issue 52: Vicks Mobile Ad Campaign
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad CampaignMSL
 
Internal communications for a digital age
Internal communications for a digital ageInternal communications for a digital age
Internal communications for a digital ageEmily Gibbs
 
The Digital IBMer at ESMT Schloss Gracht October 2013
The Digital IBMer at ESMT Schloss Gracht October 2013The Digital IBMer at ESMT Schloss Gracht October 2013
The Digital IBMer at ESMT Schloss Gracht October 2013lmarten
 
Social Media and Market Intelligence
Social Media and Market IntelligenceSocial Media and Market Intelligence
Social Media and Market IntelligenceMonster
 
Get Smart: The Present and Future of Data Discovery
Get Smart: The Present and Future of Data DiscoveryGet Smart: The Present and Future of Data Discovery
Get Smart: The Present and Future of Data DiscoveryInside Analysis
 
Business Social Media - Central CT SIM Meeting
Business Social Media - Central CT SIM MeetingBusiness Social Media - Central CT SIM Meeting
Business Social Media - Central CT SIM MeetingMichael Rawlins
 
Consumer attitudes synopsis [www.writekraft.com]
Consumer attitudes synopsis [www.writekraft.com]Consumer attitudes synopsis [www.writekraft.com]
Consumer attitudes synopsis [www.writekraft.com]WriteKraft Dissertations
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
The Social Organization - IBM - The Business Value of Social Software CIO Forum
The Social Organization - IBM - The Business Value of Social Software CIO ForumThe Social Organization - IBM - The Business Value of Social Software CIO Forum
The Social Organization - IBM - The Business Value of Social Software CIO ForumBilal Jaffery
 

Semelhante a Conference Presenation Cyber security and big data , Prof. Lili Saghafi (20)

India unlocking the potential of Open Data
India unlocking the potential of Open DataIndia unlocking the potential of Open Data
India unlocking the potential of Open Data
 
Social media is the emerging martketing tool
Social media is the emerging martketing toolSocial media is the emerging martketing tool
Social media is the emerging martketing tool
 
Data for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops CareersData for Impact Fellowship - SocialCops Careers
Data for Impact Fellowship - SocialCops Careers
 
Social Media Policy In The Enterprise - Bridging The Digital Social Skills Gap
Social Media Policy In The Enterprise - Bridging The Digital Social Skills GapSocial Media Policy In The Enterprise - Bridging The Digital Social Skills Gap
Social Media Policy In The Enterprise - Bridging The Digital Social Skills Gap
 
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...
Lightning Talk #13: Anticipatory Design: Invisible Interfaces and Predictive ...
 
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’ JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
JIMS Rohini Conclave 2016 "Digitalization of Businesses: Promises and Perils’
 
Ten IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade aheadTen IT-enabled business trends for the decade ahead
Ten IT-enabled business trends for the decade ahead
 
Technology Toolbox
Technology ToolboxTechnology Toolbox
Technology Toolbox
 
Android Application Development for Social Network
Android Application Development for Social NetworkAndroid Application Development for Social Network
Android Application Development for Social Network
 
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad Campaign
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad CampaignPeople’s Insights Volume 1, Issue 52: Vicks Mobile Ad Campaign
People’s Insights Volume 1, Issue 52: Vicks Mobile Ad Campaign
 
2010 06-29 introduction ss
2010 06-29 introduction ss2010 06-29 introduction ss
2010 06-29 introduction ss
 
Internal communications for a digital age
Internal communications for a digital ageInternal communications for a digital age
Internal communications for a digital age
 
The Digital IBMer at ESMT Schloss Gracht October 2013
The Digital IBMer at ESMT Schloss Gracht October 2013The Digital IBMer at ESMT Schloss Gracht October 2013
The Digital IBMer at ESMT Schloss Gracht October 2013
 
Social Media and Market Intelligence
Social Media and Market IntelligenceSocial Media and Market Intelligence
Social Media and Market Intelligence
 
Get Smart: The Present and Future of Data Discovery
Get Smart: The Present and Future of Data DiscoveryGet Smart: The Present and Future of Data Discovery
Get Smart: The Present and Future of Data Discovery
 
Business Social Media - Central CT SIM Meeting
Business Social Media - Central CT SIM MeetingBusiness Social Media - Central CT SIM Meeting
Business Social Media - Central CT SIM Meeting
 
Consumer attitudes synopsis [www.writekraft.com]
Consumer attitudes synopsis [www.writekraft.com]Consumer attitudes synopsis [www.writekraft.com]
Consumer attitudes synopsis [www.writekraft.com]
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
The Social Organization - IBM - The Business Value of Social Software CIO Forum
The Social Organization - IBM - The Business Value of Social Software CIO ForumThe Social Organization - IBM - The Business Value of Social Software CIO Forum
The Social Organization - IBM - The Business Value of Social Software CIO Forum
 
MBA final project
MBA final projectMBA final project
MBA final project
 

Mais de Professor Lili Saghafi

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili SaghafiProfessor Lili Saghafi
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsProfessor Lili Saghafi
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiProfessor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Professor Lili Saghafi
 
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiIntroduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiProfessor Lili Saghafi
 
Introduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiIntroduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiProfessor Lili Saghafi
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Professor Lili Saghafi
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Professor Lili Saghafi
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiProfessor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiProfessor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiProfessor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiProfessor Lili Saghafi
 

Mais de Professor Lili Saghafi (20)

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Ai
AiAi
Ai
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: Fundamentals
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
 
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiIntroduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
 
Introduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiIntroduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili Saghafi
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili Saghafi
 

Último

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Último (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Conference Presenation Cyber security and big data , Prof. Lili Saghafi

  • 1. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 CYBER SECURITY AND BIG DATA Professor Lili Saghafi profsaghafi_cybersecurityexperts@eon.law.harvard.edu Personal Web: https://sites.google.com/site/professorlilisaghafi/ Seminar on 'Digital Marketing – Impact of Social Media Tools‘ Oct 10th, 2012 Cyber Security, Social Networking and Digital Media
  • 2. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Agenda Seminar on 'Digital Marketing - Impact of Social Media Tools‘ The impact of Cyber Security and Social Networking on Digital Media INFORMATION Assurance Cyber Crime Definition and Examples Social Networking and Digital Media Cyber War Solutions Part C Part D Part G Part E Part F Recent Research Results on Cyber crime and Social Media 2 Prof. Lili Saghafi CYBER SECURITY Part B Part A Part H Big Data, In memory processing, HANA Big Data from Social Networking and its effect on Digital Marketing
  • 3. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone. • What we can do with big Data? • Social Networking can be one source of Big Data • Analytic using Big Data • Just add Analytic , see the result Prof. Lili Saghafi 3 •What is Big Data?
  • 4. 4 Prof. Lili Saghafi •CAIRO • Cairo population is approximately 17 million. It is the most populous metropolitan area in Africa and also ranks 16th amongst the most populous metropolitan area in the world. • Majority of the population in Cairo are Egyptians, with less number of foreigners. • One third of the total population in Cairo is under 15 and nearly three fifth is under 30. • The positive implication is that Cairo population is relatively young. Life expectancy averages for both men and women is 70 years. • WHAT CAN WE DO THIS DATA?
  • 5. • population of 16.3 million in 2011, the city is also the eighth most populous metropolis in the world • Day time population increase to 25.7 million ??!! • Add Analytic and see what you can do. • WHAT CAN WE DO THIS DATA? 5 Prof. Lili Saghafi •Delhi
  • 6. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Just Add Analytics – Even to Toothbrushes Prof. Lili Saghafi 6 •What is Analytic?
  • 7. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • I recently saw a presentation mentioning that there “are more mobile phones than toothbrushes in the world”, and according to some research by the 60 second marketer, it seems that in all likelihood, this is absolutely true: Prof. Lili Saghafi 7 •Analytic
  • 8. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 Prof. Lili Saghafi 8 “why not combine the two?!”. Here’s my quick mockup of an iPhone case of the future:
  • 9. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 The Beam Toothbrush is a bluetooth-enabled toothbrush and associated iphone application: Prof. Lili Saghafi 9 It provides detailed analytics, recording how long each person brushes their teeth:
  • 10. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 Prof. Lili Saghafi 10 And like any good performance management tool, it uses gamification techniques to encourage the right behavior… Gamification is the use of game design elements, game thinking and game mechanics to enhance non-game contexts.
  • 11. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 Prof. Lili Saghafi 11 It seems as if analytics is being embedded in every device possible, such as the new Nike Hyperdunk+ basketball shoes and associated application:
  • 12. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • First, big data can unlock significant value by making information transparent and usable at much higher frequency. • Second, as organizations create and store more transactional data in digital form, they can collect more accurate and detailed performance information on everything from product inventories to sick days, and therefore expose variability and boost performance. Prof. Lili Saghafi 12 BIG DATA There are five broad ways in which using big data can create value to any organization
  • 13. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Leading companies are using data collection and analysis to conduct controlled experiments to make better management decisions; • others are using data for basic low- frequency forecasting to high-frequency nowcasting to adjust their business levers ( tactics) just in time. Prof. Lili Saghafi 13 Using big data…….
  • 14. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 View In Presentation Mode For Interactivity
  • 15. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Third, big data allows ever- narrower segmentation of customers and therefore much more precisely tailored products or services. Prof. Lili Saghafi 15 BIG DATA
  • 16. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012
  • 17. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Fourth, sophisticated analytics can substantially improve decision- making. Prof. Lili Saghafi 17 BIG DATA
  • 18. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 View In Presentation Mode For Interactivity
  • 19. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 View In Presentation Mode For Interactivity
  • 20. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Finally, big data can be used to improve the development of the next generation of products and services. For instance, manufacturers are using data obtained from sensors embedded in products to create innovative after-sales service offerings such as proactive maintenance (preventive measures that take place before a failure occurs or is even noticed). Prof. Lili Saghafi 20 •BIG DATA
  • 21. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 “A man without DATA is just a man with an opinion”
  • 22. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • SAP is the market and technology leader in business management software, solutions, services for improving business process. • The SAP HANA appliance software aggregates huge volumes of valuable data and produces relevant results for business at lightning speeds. • Blink. You've Just Analyzed 460 Billion Rows of Data with SAP HANA Prof. Lili Saghafi 22 What is in memory processing
  • 23. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 Prof. Lili Saghafi 23 Knowledge makes you a LEADER in Business not a follower
  • 24. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Social networks, search engine poisoning, web applications and Adobe Corp.’s software are among the top 12 security risks that companies face. • Joining them in the deadly dozen are more targeted botnets, cloud computing, routine negligence and the always popular Advanced Persistent Threat – cyberwarfare. And, of course, the tempting target mobile devices now present. • Credit to FORBES Prof. Lili Saghafi 24 •Top 12 Security Risks For 2012
  • 25. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Using social media ‘Big Data’ analytics to analyze or predict events • In July, the Defense Advanced Research Projects Agency (DARPA) issued an RFP ( Request for Proposal ) looking for new Big Data tools to track social media postings and interactions, reflecting a growing interest within government to use social media and open source data to "fill-in" and "complement" traditional data sources. • The focus for the government is on using this public data to develop analytics that can be used to anticipate how an adversary or potential friend "thinks" and "feels" about a particular situation, with the hope of being able to predict their behavior, actions and reactions. Prof. Lili Saghafi 25 Social Networking Sites are the source of Big Data
  • 26. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Face Book • My Space • Orkut • Twitter • Flicker • YouTube • LinkdIn • http://www.crime-research.org/latestnews/ Computer Crime Research Center Prof. Lili Saghafi 26 •Social Networking
  • 27. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Many cyber police is getting more complaints about Orkut these days as many fake profiles being created and thus leads to crime. • Orkut is a social networking service which is run by Google and named after its creator, an employee of Google - Orkut Büyükkökten. • The service states that it was designed to help users meet new friends and maintain existing relationships. • Similar to Facebook, Friendster and MySpace, Orkut goes a step further by permitting the creation of easy-to-set-up simple forums (called "communities") of users. • Since October 2006, Orkut has permitted users to create accounts without an invitation. • Orkut is the most visited website in India and 2nd most visited site in Brazil. • The initial target market for orkut was the United States, but the majority of its users are in India and Brazil. • In fact, as of March 2008, 67.5% of the traffic comes from Brazil, followed by 15.4%, which comes from India. Orkut 27 Prof. Lili Saghafi
  • 28. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 Cyber Crime • Although the term cyber crime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. • Definition Cyber Crime 28 Prof. Lili Saghafi
  • 29. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • By the use of Social Media and Social Networking the number of Cyber Crimes increased dramatically Prof. Lili Saghafi 29 •Cyber Crime
  • 30. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Cyber Security Prevent Cyber Crimes Prof. Lili Saghafi 30 •Cyber Security
  • 31. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • You've heard the news stories about credit card numbers being stolen and email viruses spreading. • Maybe you've even been a victim yourself. • One of the best defenses is understanding the risks, what some of the basic terms mean, and what you can do to protect yourself against them. Prof. Lili Saghafi 31 Why is Cyber Security a Problem?
  • 32. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. • How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? • Cyber security involves protecting that information by preventing, detecting, and responding to attacks. Prof. Lili Saghafi 32 •What is cyber security?
  • 33. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • There are many risks, some more serious than others. • Among these dangers are viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. (Hacking and Cracking) • Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. Prof. Lili Saghafi 33 What are the risks?
  • 34. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them: 1. Hacker, attacker, or intruder 2. Malicious code 3. Vulnerability Prof. Lili Saghafi 34 What can you do?
  • 35. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. • Although their intentions are sometimes fairly benign and motivated solely by curiosity, ( Hacking) their actions are typically in violation of the intended use of the systems they are exploiting. • The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information, Conficker). Prof. Lili Saghafi 35 Hacker, attacker, or intruder -
  • 36. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Malicious code can have the following characteristics: • It might require you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page. • Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via email, websites, or network-based software, or even with a call on your cell!. Mobile Viruses • Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder. • Viruses and worms are examples of malicious code. Prof. Lili Saghafi 36 •Malicious code -
  • 37. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • In most cases, vulnerabilities are caused by programming errors in software. • Attackers might be able to take advantage of these errors to infect your computer, so it is important to apply updates or patches that address known vulnerabilities Prof. Lili Saghafi 37 •Vulnerability -
  • 38. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 1. Confidentiality, Privacy 2. Integrity (information hasn’t change) 3. Availability 4. Authentication ( the person is who they say they are) 5. Non repudiation ( legal aspect of tiding a contract and signature) • Examples: Health care Data and Records INFORMATION Assurance Is Based On 5 Pillars 38 Prof. Lili Saghafi
  • 39. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 1. Capability 2. Resources 3. Intent 4. Motivation 5. Access 6. Risk Version •Treat / Adversary Model 39 Prof. Lili Saghafi
  • 40. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Examples of cybercrime which the computer or network is a tool of the criminal activity include : • Spamming and • Criminal copyright crimes, particularly those facilitated through peer-to-peer networks. A- Examples of CyberCrime 40 Prof. Lili Saghafi
  • 41. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Examples of cybercrime in which the computer or network is a target of criminal activity include: •Unauthorized access (i.e, defeating access controls), •Malicious code •Denial-of-service DSA attacks. •B- Examples of CyberCrime 41 Prof. Lili Saghafi
  • 42. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 •Examples of cybercrime in which the computer or network is a place of criminal activity include : •Theft of service (in particular, telecom fraud) •Certain financial frauds. •C- Examples of CyberCrime 42 Prof. Lili Saghafi
  • 43. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Finally, examples of traditional crimes facilitated through the use of computers or networks include : • Nigerian 419 or other gullibility or • Social engineering frauds (e.g., hacking "phishing", identity theft, child pornography, online gambling, securities fraud, etc.). • Cyberstalking is an example of a traditional crime -- harassment -- that has taken a new form when facilitated through computer networks. •D- Examples of CyberCrime 43 Prof. Lili Saghafi
  • 44. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Additionally, certain other information crimes, including: • Trade secret theft • industrial or economic espionage, are sometimes considered cybercrimes when computers or networks are involved. •E- Examples of CyberCrime 44 Prof. Lili Saghafi
  • 45. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Cybercrime in the context of national security • may involve hacktivism (online activity intended to influence policy), • traditional espionage, or • information warfare and related activities. Prof. Lili Saghafi 45 •F- Examples of CyberCrime
  • 46. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, including: • illegal access (unauthorized access), • illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), • data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), • systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), • misuse of devices, forgery (ID theft), and electronic fraud. • CYBERCRIME 46 Prof. Lili Saghafi
  • 47. • One of the recent researches showed that a new cybercrime is being registered every 10 seconds in Britain. • During 2006 the computer crooks were able to strike 3.24 million times. • The comparable volume for 2009 is almost double at 491.2 million • Some crimes performed on-line even surpassed their equivalents in real world 2012. In addition, experts believe that about 90% of cybercrimes stay unreported. •RECENT RESEARCHES 47 Prof. Lili Saghafi
  • 48. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • According to a study performed by Shirley McGuire, a specialist in psychology of the University of San Francisco, the majority of teenagers who hack and invade computer systems are doing it for fun rather than with the aim of causing harm. • Shirley McGuire mentioned that quite often parents cannot understand the motivation of the teenage hackers. She performed an anonymous experiment, questioning more than 4,800 students in the area of San Diego. • Her results were presented at the American Psychological Association conference: •Research 48 Prof. Lili Saghafi
  • 49. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • 38% of teenagers were involved in software piracy; • 18% of all youngsters confessed of entering and using the information stored on other personal computer or website; • 13% of all the participants mentioned they performed changes in computer systems or computer files. • A criminal may represent himself to be a teenager, professional or anyone who suits the purpose of both the parties. Adults are just as susceptible to these crimes as the kids are. • Proper awareness and guidance are an absolute necessity so that the crimes can be controlled before becoming a full-grown technological menace. • http://theviewspaper.net/cyber_crimes/ •RESEARCH RESULT 49 Prof. Lili Saghafi
  • 50. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earn money. • Most teenagers performed illegal computer actions of curiosity, to experience excitement. •RESEARCH RESULT 50 Prof. Lili Saghafi
  • 51. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • A U.S. government report entitled Annual Report to Congress on the Military Power of some countries talks extensively about the increasing role of some countries ability to conduct war over the Internet. In the past, such talk of a "digital Pearl Harbor" has been dismissed by some security experts as largely political hot air. • Yet more and more evidence suggests that a politically sponsored Internet event could occur sooner rather than later. •Cyber War 51 Prof. Lili Saghafi
  • 52. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Criminal hackers follow three basic motivations: • prestige, • profit • politics • The three Ps. •The three Ps. 52 Prof. Lili Saghafi
  • 53. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • "All of our security defense models," "were built based on a model of threat which was purely prestige driven," referring to the virus writer who only wanted his creation mentioned on the evening news. (Josh Corman, principal security strategist for IBM Internet Security Systems) • Now, we're currently living in a time of profit, and have begun to react to that. I am talking about criminal hackers--either independent or state sponsored--entering the realm of politics. •The three Ps. 53 Prof. Lili Saghafi
  • 54. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • "'Political' means different things," "I was telling people not to be surprised if we saw the botnets (Botnet is a jargon term for a collection of software robots, or bots, which run autonomously and automatically) They run on groups of zombie computers controlled remotely. • This can also refer to the network of computers using distributed computing software Participate in the presidential primaries in the U.S." And then, in October 2007, a Ukranian botnet was linked to a flood of "Ron Paul for President" spam. • But that's small potatoes compared to what I thinks is possible. •Getting political 54 Prof. Lili Saghafi
  • 55. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Those same botnet systems could "take down candidate sites, send a whole bunch of free advertising or free smear campaigns, and potentially have an impact on who became the presidential candidates or who was successful on fundraising." Worse "'political' could mean a cyber protest, it could mean cyber espionage, or cyber reconnaissance." Such political action has already happened in 2009. 55 Prof. Lili Saghafi
  • 56. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • At least two "one-offs" within the last year. The first is Estonia last spring, where a flash mob of ethnic Russian students in Estonia crippled the country's infrastructure for several weeks. • The other one-off is the recent CIA disclosures to Congress about foreign-state-sponsored attacks on U.S. military installations. Some recent examples 56 Prof. Lili Saghafi
  • 57. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Neither were the crippling examples that worry me, and neither were apparently well coordinated. • I think we're at a point right now where the more we talk about it, the more we use examples, we'll start to get to a critical mass awareness." • On profit-based attacks, "it wasn't until a number of large corporations were hit with a data breach, a targeted attack, or spear phishing that the security community really took notice. (The enterprise people) said 'Ouch!' Sometimes someone has to say, 'Ouch!'" I hopes that no one has to be stung by a political attack before the security community starts to take that threat seriously. Critical mass awareness 57 Prof. Lili Saghafi
  • 58. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • How to Report Cyber and IP Crime How to Report Computer- and Internet-Related Crime • How to Report Intellectual Property Crime Computer Crime & Intellectual Property Section United States Department of Justice 58 Prof. Lili Saghafi
  • 59. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Recently, the police captured four men who had kidnapped a Johannesburg girl. The men had reportedly lured the young women from her home in Kempton Park, through her Facebook page. • The girl was rescued by police, because she managed to SMS her mother, with what she thought was her location. • In another incident last year, two men in their mid-30s were charged with the kidnapping and rape of a 14-year-old Pretoria girl, who met the men on the popular chat room application Mxit Police tackle cyber crime By Candice Jones, ITWeb online telecoms editor Johannesburg, 17 Mar 2010 http://www.itweb.co.za/index.php?option=com_content&view=article&id=31384:police-tackle-cyber- crime&catid=160:it-in-government 59 Prof. Lili Saghafi
  • 60. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • CyberTipline • Protect Children online Prof. Lili Saghafi 60 •CyberTipline
  • 61. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Online Fraud and Identity Theft have become a growing problem. One of the means that is used to obtain your personal and financial information is through a technique known as Phishing. (pronounced"fishing") A lot of information is obtained through e-mail that appears legitimate but is not. These e-mails then ask you to click on a link that appears correct but in fact, re-directs you to another site which then captures your sensitive information. Below is a 3 minute video from Microsoft that some have found useful in better understanding Online Fraud and Identity Theft. • http://www.microsoft.com/athome/security/videos/Phishing8- hi.swf Prof. Lili Saghafi 61 •Identity Theft
  • 62. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Mobile Phones Malwares and Viruses • Download • Direct by sharing • MMS (Multimedia message Signal) Commworrier • Bluetooth • Solution • Antivirus • Walk away Prof. Lili Saghafi 62 Mobile Phones Hackers
  • 63. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Reports from various sources in the security industry show that a large takedown of servers associated with the “Bredolab” trojan occurred within few weeks. • While most of the reports have focused around the idea that this infrastructure was solely related to the command and control of Bredolab, research shows that these servers were used as an all-purpose hosting infrastructure for criminal activity. • November 4, 2010 •“Bredolab” trojan http://www.networkforensics.com/category/cybercrime/ 63 Prof. Lili Saghafi
  • 64. The number of Web sites infected with malware has doubled from a year ago to more than 1.2 million, according to a study released today November 22, 2010 ,by Internet security company Dasient. . •Report: Infected Web sites double in 2010 Star Burst! http://news.cnet.com/8301-27080_3-20023576-245.html?tag=mncol;posts 64 Prof. Lili Saghafi
  • 65. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Simulation of your Computer display on Hackers Computer • Clickjacking Prof. Lili Saghafi 65 •Conficker
  • 66. • The definition of safe computing has changed. Within ISS and IBM, started an education awareness campaign called "The Evolving Threat." "We do seminars, we made a videogame, we're trying to make some of these new security concepts more tangible and digestible to both enterprise practitioners and the consumers because some of this is simply the weakest link. "What's allowing (the Storm botnet) to be so successful is not an unpatched system per se, but it's an uninformed end user." •Solution Recognizing the weakest link 66 Prof. Lili Sagh
  • 67. Also important is end-user awareness. "Among ourselves in the security intelligentsia, those of us who do security for a living, we talk about practicing safe computing. That used to include 'it's OK, just don't double-click on an executable, but it's fine to open a GIF, a JPEG, or an MP3.' But as you've seen, botnets are now using MP3s as a source of an infection. I mean, just the very podcasts you're listening to could be a source of infection." •Solution Awareness Among ourselves in the security intelligentsia 67 Prof. Lili Sagh
  • 68. • Democratic politicians are proposing a novel approach to cybersecurity: fine technology companies $100,000 a day unless they comply with directives imposed by the U.S. Department of Homeland Security. • A "bunker" in this case is a new IP address served to a business that is under persistent DDoS attack but lacks the funds or resources to protect itself. • Traffic from the DDoS attack continues to hit the original IP address while the business remains in operation under a new address. • Distributed Denial of Service (DDoS) attacks • Google has launched a program to encourage outsiders to find security vulnerabilities in its Web properties. • http://news.cnet.com/8301- 30685_3-20021436- 264.html?tag=mncol;mlt_related Cybersecurity bill gives DHS power to punish tech firms http://news.cnet.com/8301- 13578_3-20023464- 38.html#ixzz16BwzIU9M Fights Ddos Attacks With Digital 'Bunkers‘ http://news.cnet.com/8301- 1009_3-20023260- 83.html?tag=nl.e757 Google offers cash for finding Web security holes 68 Prof. Lili Saghafi
  • 69. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Facebook application developers are able to store their own check-in data in the Facebook Places database and retrieve information from the database. • But Facebook is far from the only source of "leakage" for this location data. • EPIC cites an AT&T research paper (PDF) that found some kind of private data leaked to third parties in all 20 of the mobile online social networks studied. The services examined include Facebook, MySpace, Twitter, Flickr, Foursquare, Yelp, and Loopt. • While these services may have robust privacy policies, the advertisers and developers they deal with may be less secure. • As reported last February on the ReadWriteWeb, a site named PleaseRobMe aggregated information from several location-based services to indicate houses whose residents were away, making them easy pickings for thieves. • Report Your Location To A Social Network And Get A Coupon For Discounts And Prizes. The Price? http://news.cnet.com/8301-13880_3-20022700- 68.html#ixzz16C5xfMhX 69 Prof. Lili Saghafi
  • 70. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Location-based services promise to make it easier to connect with family, friends, and associates and to be rewarded for being a loyal customer. • But in their current form, the services make it too easy for people and organizations to access your private information without your explicit consent. • Prevent Facebook friends from checking you in •Solution 70 Prof. Lili Saghafi
  • 71. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid. • Cloud computing is a natural evolution of the widespread adoption of virtualization, Service- oriented architecture and utility computing. • Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Prof. Lili Saghafi 71 Is Cloud the Solution?
  • 72. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • The major cloud service providers include Amazon, Salesforce, SAP, Microsoft and Google. • Some of the larger IT firms that are actively involved in cloud computing are Fujitsu, Dell, Hewlett Packard, IBM, VMware, NetApp and Microsoft. Prof. Lili Saghafi 72 •Cloud Computing
  • 73. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • We have all kinds of controls, but they don't work very well • It's the little things that lead to most internal compromises, like walking away from your desk and not locking your screen • It would be very easy for an IT guy to swap out a hard-drive and just take it (impact on financial institution) Prof. Lili Saghafi 73 Internal Problem VS External Problems
  • 74. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Most chief security information officers CSIO focus on outside threats -- cyber attacks, socially engineered breaches like phishing and vishing (phishing over phones) , and the interception of transaction data. • While it might not be easy to limit the information employees must access, it is relatively easy to monitor that access -- keeping an eye on what information and files are being viewed, by whom and how often, Prof. Lili Saghafi 74 Internal Problem VS External Problems
  • 75. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Espionage (Spy versus spy) • Technology race (Space, atomic weapon) •Cold War in 70 75 Prof. Lili Saghafi
  • 76. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Espionage - Cyber • Technology Race – Cyber Prof. Lili Saghafi 76 •Cold War Now
  • 77. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • In the past government was target now is technology • Who are the adversary was clear on COLDWAR • today are unknown hackers in CYBERWAR • Consider the Model of adversary every hacker/kid / organized cyber crime has it 1. Capability (computer knowledge) 2. Resources (a laptop computer and access to internet) 3. Intent 4. Motivation 5. Access (to homes cyber) 6. Risk Version (no risk for them) Prof. Lili Saghafi 77 •Comparison
  • 78. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Cyber terrorists can use unprotected systems to aggressively target our nation’s critical infrastructure. • Are you an easy target? Cyber Terrorism: How Vulnerable Are We? 78 Prof. Lili Saghafi
  • 79. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • The malicious software, known as Stuxnet, was discovered in mid July 2010, at least several months after its creation, by VirusBlokAda, a Belarussian computer security company that was alerted by a customer. • The malicious software has infected an unknown number of power plants, pipelines and factories over the past year is the first program designed to cause serious damage in the physical world • The Stuxnet spreads through previously unknown holes in Microsoft’s Windows operating system and then looks for a type of software made by Siemens and used to control industrial components, including valves and brakes. Prof. Lili Saghafi 79 •Stuxnet Worm
  • 80. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Stuxnet can hide itself, wait for certain conditions and give new orders to the components that reverse what they would normally do. • The commands are so specific that they appear aimed at an industrial sector, mostly atomic centers but officials do not know which one or what the affected equipment would do. • Cyber attacks on computer networks have slowed or stopped communication in countries such as Estonia and Georgia, • Stuxnet is the first aimed at physical destruction and it heralds a new era in cyberwar. Prof. Lili Saghafi 80 •Stuxnet
  • 81. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • “It is not speculation that this is the first directed cyber weapon”, or one aimed at a specific real-world process, said Joe Weiss, a US expert who has testified to Congress on technological security threats to the electric grid and other physical operations. • “The only speculation is what it is being used against, and by whom.” Prof. Lili Saghafi 81 The first directed cyber weapon
  • 82. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Stuxnet’s knowledge of Microsoft’s Windows operating system, the Siemens program and the associated hardware of the target industry make it the work of a well-financed, highly organized team. • The malicious software marks the first attack on critical industrial infrastructure that sits at the foundation of modern economies. Prof. Lili Saghafi 82 Stuxnet’s knowledge of Microsoft’s Windows operating system,
  • 83. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • • The Operation Aurora, Zeus, and piracy • While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, • today's malware enables potent multistage attacks called advanced persistent threats. In these carefully sequenced attacks, criminals rely on custom and constantly changing malware being placed where it will go unnoticed, returning the maximum value from their investment. Prof. Lili Saghafi 83 How 3 Cyber Threats Transform Incident Response: Oct 2012 Targeted Attacks, System Exploits, Data Theft, and You
  • 84. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Intrinsic -try to build it right -commercial/technology component should change frequently • Extrinsic - evaluate it so you know something about residual risk • Implementation – Combine component in the best way maintain system, patch, scan frequently • Operational – Monitor everything ,update, look for bad behaviour, Authentication, privileges and different users level of accessibility • Don’t only block everything have strategy Prof. Lili Saghafi 84 How to build the assurance A Tip for IT MANAGERS
  • 85. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • It Is very real • Cyber activity is constant • All of us are target • We need to be hard target, (people are strongest link if we make them hard target) • This is the matter of life and Death , it is about freedom our way of life Prof. Lili Saghafi 85 •Cyber Crime
  • 86. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • We need strong technology • We need users understanding of treats and respond (.com/.cm) masquerading and spoofing • We need cyber professional to know the risk/treats and mitigation Prof. Lili Saghafi 86 •Solution
  • 87. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • In home you can prevent 90% attacks, • In industry 80% of attacks are known , 10% are too new to be known , and 10% we just don’t know it exist. • RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an algorithm for public-key cryptography in information Security Prof. Lili Saghafi 87 2010 RSA Conference research result
  • 88. REMEMBER People are the strongest link to build the security assurance , Together we can , Remember we are the Masterpiece of God , he Breathed into us, we are capable of doing anything. 88 Prof. Lili Saghafi
  • 89. Seminar on 'Digital Marketing - Impact of Social Media Tools‘ Oct 10th, 2012 • Computer Crime Research Center • http://www.crime-research.org/news/20.03.2010/3779/ • Network Forensics Blog » cybercrime • http://www.networkforensics.com/category/cybercrime/ • Information Policy • http://www.i-policy.org/cybercrime/ • Security • http://news.cnet.com/security/?tag=hdr;snav • RSA Conference • Computer Crime & Intellectual Property Section United States Department of Justice • FORBES Magazine •REFERENCES 89 Prof. Lili Saghafi
  • 90. Thank you for being great audience Any Question? 90 Prof. Lili Saghafi