This document summarizes a seminar on the impact of social media tools on digital marketing. The seminar covered topics including cyber security, big data, social networking, and analytics. It discussed how social media is a source of big data and how analytics can be applied to various types of data, providing examples of analytics being used for toothbrush usage and basketball shoe performance. The seminar also covered cyber crimes and how social networking has increased certain crimes, as well as potential cyber security issues.
Conference Presenation Cyber security and big data , Prof. Lili Saghafi
1. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
CYBER SECURITY
AND
BIG DATA
Professor Lili Saghafi
profsaghafi_cybersecurityexperts@eon.law.harvard.edu
Personal Web: https://sites.google.com/site/professorlilisaghafi/
Seminar on 'Digital Marketing –
Impact of Social Media Tools‘
Oct 10th, 2012
Cyber Security,
Social Networking and
Digital Media
2. Seminar on 'Digital Marketing - Impact
of Social Media Tools‘
Oct 10th, 2012
•Agenda
Seminar on 'Digital Marketing - Impact of Social Media Tools‘
The impact of Cyber Security and Social Networking on Digital Media
INFORMATION Assurance
Cyber Crime Definition and Examples
Social Networking and Digital Media
Cyber War
Solutions
Part C
Part D
Part G
Part E
Part F
Recent Research Results on Cyber crime
and Social Media
2
Prof. Lili Saghafi
CYBER SECURITY
Part B
Part A
Part H
Big Data, In memory processing, HANA
Big Data from Social Networking and its effect on
Digital Marketing
3. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Every day, we create 2.5 quintillion bytes of data — so much
that 90% of the data in the world today has been created in
the last two years alone.
• What we can do with big Data?
• Social Networking can be one source of Big Data
• Analytic using Big Data
• Just add Analytic , see the result
Prof. Lili Saghafi
3
•What is Big Data?
4. 4 Prof. Lili Saghafi
•CAIRO
• Cairo population is approximately 17
million. It is the most populous
metropolitan area in Africa and also ranks
16th amongst the most populous
metropolitan area in the world.
• Majority of the population in Cairo are
Egyptians, with less number of foreigners.
• One third of the total population in Cairo is
under 15 and nearly three fifth is under 30.
• The positive implication is that Cairo
population is relatively young. Life
expectancy averages for both men and
women is 70 years.
• WHAT CAN WE DO THIS DATA?
5. • population of 16.3 million in
2011, the city is also the
eighth most populous
metropolis in the world
• Day time population
increase to 25.7 million ??!!
• Add Analytic and see what
you can do.
• WHAT CAN WE DO THIS
DATA?
5
Prof. Lili Saghafi
•Delhi
6. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Just Add Analytics – Even to Toothbrushes
Prof. Lili Saghafi
6
•What is Analytic?
7. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• I recently saw a presentation mentioning that there “are more
mobile phones than toothbrushes in the world”, and
according to some research by the 60 second marketer, it
seems that in all likelihood, this is absolutely true:
Prof. Lili Saghafi
7
•Analytic
8. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
8
“why not combine the two?!”. Here’s my quick
mockup of an iPhone case of the future:
9. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
The Beam Toothbrush is a bluetooth-enabled toothbrush and
associated iphone application:
Prof. Lili Saghafi
9
It provides detailed analytics, recording how long each
person brushes their teeth:
10. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
10
And like any good performance management
tool, it uses gamification techniques to
encourage the right behavior…
Gamification is the use of game design elements, game thinking
and game mechanics to enhance non-game contexts.
11. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
11
It seems as if analytics is being embedded in
every device possible, such as the new Nike
Hyperdunk+ basketball shoes and associated
application:
12. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• First, big data can unlock significant value by
making information transparent and usable at
much higher frequency.
• Second, as organizations create and store
more transactional data in digital form, they
can collect more accurate and detailed
performance information on everything from
product inventories to sick days, and therefore
expose variability and boost performance.
Prof. Lili Saghafi
12
BIG DATA
There are five broad ways in which using big
data can create value to any organization
13. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Leading companies are using data
collection and analysis to conduct
controlled experiments to make better
management decisions;
• others are using data for basic low-
frequency forecasting to high-frequency
nowcasting to adjust their business
levers ( tactics) just in time.
Prof. Lili Saghafi
13
Using big data…….
14. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
15. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Third, big data allows ever-
narrower segmentation of
customers and therefore much
more precisely tailored products or
services.
Prof. Lili Saghafi
15
BIG DATA
16. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
17. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Fourth, sophisticated analytics can
substantially improve decision-
making.
Prof. Lili Saghafi
17
BIG DATA
18. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
19. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
View In Presentation Mode For Interactivity
20. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, big data can be used to improve
the development of the next
generation of products and
services. For instance, manufacturers
are using data obtained from sensors
embedded in products to create
innovative after-sales service offerings
such as proactive maintenance
(preventive measures that take place
before a failure occurs or is even noticed).
Prof. Lili Saghafi
20
•BIG DATA
21. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
“A man without DATA is just a man with an opinion”
22. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• SAP is the market and technology leader in business
management software, solutions, services for improving
business process.
• The SAP HANA appliance software aggregates huge
volumes of valuable data and produces relevant results for
business at lightning speeds.
• Blink. You've Just Analyzed 460 Billion Rows of
Data with SAP HANA
Prof. Lili Saghafi
22
What is in memory processing
23. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Prof. Lili Saghafi
23
Knowledge makes you a LEADER in Business
not a follower
24. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Social networks, search engine poisoning, web
applications and Adobe Corp.’s software are among
the top 12 security risks that companies face.
• Joining them in the deadly dozen are more
targeted botnets, cloud computing, routine
negligence and the always popular Advanced
Persistent Threat – cyberwarfare. And, of course, the
tempting target mobile devices now present.
• Credit to FORBES
Prof. Lili Saghafi
24
•Top 12 Security Risks For 2012
25. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Using social media ‘Big Data’ analytics to analyze
or predict events
• In July, the Defense Advanced Research Projects
Agency (DARPA) issued an RFP ( Request for Proposal )
looking for new Big Data tools to track social media
postings and interactions, reflecting a growing interest
within government to use social media and open source
data to "fill-in" and "complement" traditional data
sources.
• The focus for the government is on using this public data
to develop analytics that can be used to anticipate how an
adversary or potential friend "thinks" and "feels" about a
particular situation, with the hope of being able to predict
their behavior, actions and reactions.
Prof. Lili Saghafi
25
Social Networking Sites are the source of Big Data
26. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Face Book
• My Space
• Orkut
• Twitter
• Flicker
• YouTube
• LinkdIn
• http://www.crime-research.org/latestnews/
Computer Crime Research Center
Prof. Lili Saghafi
26
•Social Networking
27. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Many cyber police is getting more complaints about Orkut these days
as many fake profiles being created and thus leads to crime.
• Orkut is a social networking service which is run by Google and
named after its creator, an employee of Google - Orkut Büyükkökten.
• The service states that it was designed to help users meet new friends
and maintain existing relationships.
• Similar to Facebook, Friendster and MySpace, Orkut goes a step
further by permitting the creation of easy-to-set-up simple forums
(called "communities") of users.
• Since October 2006, Orkut has permitted users to create accounts
without an invitation.
• Orkut is the most visited website in India and 2nd most visited
site in Brazil.
• The initial target market for orkut was the United States, but the
majority of its users are in India and Brazil.
• In fact, as of March 2008, 67.5% of the traffic comes from Brazil,
followed by 15.4%, which comes from India.
Orkut
27 Prof. Lili Saghafi
28. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
Cyber Crime
• Although the term cyber crime is usually restricted to
describing criminal activity in which the computer or network
is an essential part of the crime, this term is also used to
include traditional crimes in which computers or networks are
used to enable the illicit activity.
• Definition
Cyber Crime
28 Prof. Lili Saghafi
29. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• By the use of Social Media and Social Networking the number
of Cyber Crimes increased dramatically
Prof. Lili Saghafi
29
•Cyber Crime
30. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber Security Prevent Cyber Crimes
Prof. Lili Saghafi
30
•Cyber Security
31. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• You've heard the news stories about credit card numbers
being stolen and email viruses spreading.
• Maybe you've even been a victim yourself.
• One of the best defenses is understanding the risks, what
some of the basic terms mean, and what you can do to
protect yourself against them.
Prof. Lili Saghafi
31
Why is Cyber Security a Problem?
32. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It seems that everything relies on computers and the internet
now — communication (email, cellphones), entertainment
(digital cable, mp3s), transportation (car engine systems,
airplane navigation), shopping (online stores, credit cards),
medicine (equipment, medical records), and the list goes on.
• How much of your daily life relies on computers? How much
of your personal information is stored either on your own
computer or on someone else's system?
• Cyber security involves protecting that information by
preventing, detecting, and responding to attacks.
Prof. Lili Saghafi
32
•What is cyber security?
33. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• There are many risks, some more serious than
others.
• Among these dangers are viruses erasing your
entire system, someone breaking into your system
and altering files, someone using your computer
to attack others, or someone stealing your credit
card information and making unauthorized
purchases. (Hacking and Cracking)
• Unfortunately, there's no 100% guarantee that
even with the best precautions some of these
things won't happen to you, but there are steps
you can take to minimize the chances.
Prof. Lili Saghafi
33
What are the risks?
34. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The first step in protecting yourself is to
recognize the risks and become familiar with
some of the terminology associated with
them:
1. Hacker, attacker, or intruder
2. Malicious code
3. Vulnerability
Prof. Lili Saghafi
34
What can you do?
35. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• These terms are applied to the people who seek to
exploit weaknesses in software and computer
systems for their own gain.
• Although their intentions are sometimes fairly benign and
motivated solely by curiosity, ( Hacking) their actions are
typically in violation of the intended use of the systems
they are exploiting.
• The results can range from mere mischief (creating a virus
with no intentionally negative impact) to malicious activity
(stealing or altering information, Conficker).
Prof. Lili Saghafi
35
Hacker, attacker, or intruder -
36. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Malicious code, sometimes called malware, is a broad category that
includes any code that could be used to attack your computer. Malicious
code can have the following characteristics:
• It might require you to actually do something before it infects your
computer. This action could be opening an email attachment or going
to a particular web page.
• Some forms propagate without user intervention and typically start by
exploiting a software vulnerability. Once the victim computer has
been infected, the malicious code will attempt to find and infect other
computers. This code can also propagate via email, websites, or
network-based software, or even with a call on your cell!. Mobile
Viruses
• Some malicious code claims to be one thing while in fact doing
something different behind the scenes. For example, a program that
claims it will speed up your computer may actually be sending
confidential information to a remote intruder.
• Viruses and worms are examples of malicious code.
Prof. Lili Saghafi
36
•Malicious code -
37. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In most cases, vulnerabilities are caused by programming
errors in software.
• Attackers might be able to take advantage of these errors to
infect your computer, so it is important to apply updates or
patches that address known vulnerabilities
Prof. Lili Saghafi
37
•Vulnerability -
38. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Confidentiality, Privacy
2. Integrity (information hasn’t change)
3. Availability
4. Authentication ( the person is who they say they are)
5. Non repudiation ( legal aspect of tiding a contract and
signature)
• Examples: Health care Data and Records
INFORMATION Assurance Is Based On
5 Pillars
38 Prof. Lili Saghafi
39. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
1. Capability
2. Resources
3. Intent
4. Motivation
5. Access
6. Risk Version
•Treat / Adversary Model
39 Prof. Lili Saghafi
40. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime which the
computer or network is a tool of the
criminal activity include :
• Spamming and
• Criminal copyright crimes,
particularly those facilitated through
peer-to-peer networks.
A- Examples of CyberCrime
40 Prof. Lili Saghafi
41. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a target
of criminal activity include:
•Unauthorized access (i.e, defeating
access controls),
•Malicious code
•Denial-of-service DSA attacks.
•B- Examples of CyberCrime
41 Prof. Lili Saghafi
42. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•Examples of cybercrime in which
the computer or network is a place
of criminal activity include :
•Theft of service (in particular,
telecom fraud)
•Certain financial frauds.
•C- Examples of CyberCrime
42 Prof. Lili Saghafi
43. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Finally, examples of traditional crimes
facilitated through the use of computers or
networks include :
• Nigerian 419 or other gullibility or
• Social engineering frauds (e.g., hacking
"phishing", identity theft, child pornography,
online gambling, securities fraud, etc.).
• Cyberstalking is an example of a traditional crime
-- harassment -- that has taken a new form when
facilitated through computer networks.
•D- Examples of CyberCrime
43 Prof. Lili Saghafi
44. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Additionally, certain other information
crimes, including:
• Trade secret theft
• industrial or economic espionage, are
sometimes considered cybercrimes
when computers or networks are
involved.
•E- Examples of CyberCrime
44 Prof. Lili Saghafi
45. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cybercrime in the context of national security
• may involve hacktivism (online activity
intended to influence policy),
• traditional espionage, or
• information warfare and related activities.
Prof. Lili Saghafi
45
•F- Examples of CyberCrime
46. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Another way to define cybercrime is simply as criminal activity
involving the information technology infrastructure, including:
• illegal access (unauthorized access),
• illegal interception (by technical means of non-public
transmissions of computer data to, from or within a computer
system),
• data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data),
• systems interference (interfering with the functioning of a
computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer
data),
• misuse of devices, forgery (ID theft), and electronic fraud.
• CYBERCRIME
46 Prof. Lili Saghafi
47. • One of the recent researches
showed that a new cybercrime is
being registered every 10 seconds
in Britain.
• During 2006 the computer crooks
were able to strike 3.24 million
times.
• The comparable volume for 2009 is
almost double at 491.2 million
• Some crimes performed on-line
even surpassed their equivalents in
real world 2012. In addition, experts
believe that about 90% of
cybercrimes stay unreported.
•RECENT RESEARCHES
47
Prof. Lili Saghafi
48. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• According to a study performed by Shirley McGuire, a
specialist in psychology of the University of San
Francisco, the majority of teenagers who hack and
invade computer systems are doing it for fun rather
than with the aim of causing harm.
• Shirley McGuire mentioned that quite often parents
cannot understand the motivation of the teenage hackers.
She performed an anonymous experiment, questioning
more than 4,800 students in the area of San Diego.
• Her results were presented at the American
Psychological Association conference:
•Research
48 Prof. Lili Saghafi
49. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• 38% of teenagers were involved in software piracy;
• 18% of all youngsters confessed of entering and using the
information stored on other personal computer or website;
• 13% of all the participants mentioned they performed changes in
computer systems or computer files.
• A criminal may represent himself to be a teenager, professional or
anyone who suits the purpose of both the parties. Adults are just as
susceptible to these crimes as the kids are.
• Proper awareness and guidance are an absolute necessity so that
the crimes can be controlled before becoming a full-grown
technological menace.
• http://theviewspaper.net/cyber_crimes/
•RESEARCH RESULT
49 Prof. Lili Saghafi
50. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The study revealed that only 1 out of 10
hackers were interested in causing certain
harm or earn money.
• Most teenagers performed illegal computer
actions of curiosity, to experience
excitement.
•RESEARCH RESULT
50 Prof. Lili Saghafi
51. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• A U.S. government report entitled Annual Report to
Congress on the Military Power of some countries talks
extensively about the increasing role of some countries
ability to conduct war over the Internet. In the past, such
talk of a "digital Pearl Harbor" has been dismissed by some
security experts as largely political hot air.
• Yet more and more evidence suggests that a politically
sponsored Internet event could occur sooner rather than later.
•Cyber War
51 Prof. Lili Saghafi
52. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Criminal hackers follow three basic motivations:
• prestige,
• profit
• politics
• The three Ps.
•The three Ps.
52 Prof. Lili Saghafi
53. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• "All of our security defense models," "were built based on a
model of threat which was purely prestige driven,"
referring to the virus writer who only wanted his
creation mentioned on the evening news. (Josh Corman,
principal security strategist for IBM Internet Security Systems)
• Now, we're currently living in a time of profit, and
have begun to react to that. I am talking about criminal
hackers--either independent or state sponsored--entering
the realm of politics.
•The three Ps.
53 Prof. Lili Saghafi
54. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
"'Political' means different things," "I was telling
people not to be surprised if we saw the botnets (Botnet
is a jargon term for a collection of software robots, or bots, which run autonomously and
automatically) They run on groups of zombie computers
controlled remotely.
• This can also refer to the network of computers using
distributed computing software Participate in the
presidential primaries in the U.S." And then, in
October 2007, a Ukranian botnet was linked to a
flood of "Ron Paul for President" spam.
• But that's small potatoes compared to what I thinks
is possible.
•Getting political
54 Prof. Lili Saghafi
55. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Those same botnet systems could "take down candidate
sites, send a whole bunch of free advertising or free smear
campaigns, and potentially have an impact on who became
the presidential candidates or who was successful on
fundraising." Worse "'political' could mean a cyber
protest, it could mean cyber espionage, or cyber
reconnaissance." Such political action has already
happened in 2009.
55 Prof. Lili Saghafi
56. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• At least two "one-offs" within the last year. The
first is Estonia last spring, where a flash
mob of ethnic Russian students in Estonia
crippled the country's infrastructure for
several weeks.
• The other one-off is the recent CIA disclosures to
Congress about foreign-state-sponsored attacks
on U.S. military installations.
Some recent examples
56 Prof. Lili Saghafi
57. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Neither were the crippling examples that worry me, and
neither were apparently well coordinated.
• I think we're at a point right now where the more we talk
about it, the more we use examples, we'll start to get to a
critical mass awareness."
• On profit-based attacks, "it wasn't until a number of
large corporations were hit with a data breach, a targeted
attack, or spear phishing that the security community
really took notice. (The enterprise people) said 'Ouch!'
Sometimes someone has to say, 'Ouch!'" I hopes that no
one has to be stung by a political attack before the
security community starts to take that threat seriously.
Critical mass awareness
57 Prof. Lili Saghafi
58. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• How to Report Cyber and IP Crime How to
Report Computer- and Internet-Related Crime
• How to Report Intellectual Property Crime
Computer Crime & Intellectual Property
Section
United States Department of Justice
58 Prof. Lili Saghafi
59. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Recently, the police captured four men who had kidnapped a
Johannesburg girl. The men had reportedly lured the young
women from her home in Kempton Park, through her
Facebook page.
• The girl was rescued by police, because she managed to SMS
her mother, with what she thought was her location.
• In another incident last year, two men in their mid-30s were
charged with the kidnapping and rape of a 14-year-old
Pretoria girl, who met the men on the popular chat room
application Mxit
Police tackle cyber crime
By Candice Jones, ITWeb online telecoms editor
Johannesburg, 17 Mar 2010
http://www.itweb.co.za/index.php?option=com_content&view=article&id=31384:police-tackle-cyber-
crime&catid=160:it-in-government
59 Prof. Lili Saghafi
60. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• CyberTipline
• Protect Children online
Prof. Lili Saghafi
60
•CyberTipline
61. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Online Fraud and Identity Theft have become a growing
problem. One of the means that is used to obtain your personal
and financial information is through a technique known as
Phishing. (pronounced"fishing") A lot of information is obtained
through e-mail that appears legitimate but is not. These e-mails
then ask you to click on a link that appears correct but in fact,
re-directs you to another site which then captures your sensitive
information. Below is a 3 minute video from Microsoft that
some have found useful in better understanding Online Fraud
and Identity Theft.
•
http://www.microsoft.com/athome/security/videos/Phishing8-
hi.swf
Prof. Lili Saghafi
61
•Identity Theft
62. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Mobile Phones Malwares and Viruses
• Download
• Direct by sharing
• MMS (Multimedia message Signal) Commworrier
• Bluetooth
• Solution
• Antivirus
• Walk away
Prof. Lili Saghafi
62
Mobile Phones Hackers
63. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Reports from various sources in the security industry show
that a large takedown of servers associated with the
“Bredolab” trojan occurred within few weeks.
• While most of the reports have focused around the idea
that this infrastructure was solely related to the command
and control of Bredolab, research shows that these servers
were used as an all-purpose hosting infrastructure for
criminal activity.
• November 4, 2010
•“Bredolab” trojan
http://www.networkforensics.com/category/cybercrime/
63 Prof. Lili Saghafi
64. The number of Web
sites infected with
malware has doubled
from a year ago to more
than 1.2 million,
according to a study
released today
November 22, 2010 ,by
Internet security
company Dasient.
.
•Report: Infected Web sites double in 2010
Star
Burst!
http://news.cnet.com/8301-27080_3-20023576-245.html?tag=mncol;posts
64 Prof. Lili Saghafi
65. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Simulation of your Computer display on Hackers Computer
• Clickjacking
Prof. Lili Saghafi
65
•Conficker
66. • The definition of safe computing has
changed. Within ISS and IBM, started an
education awareness campaign called
"The Evolving Threat." "We do seminars,
we made a videogame, we're trying to
make some of these new security
concepts more tangible and digestible to
both enterprise practitioners and the
consumers because some of this is
simply the weakest link. "What's allowing
(the Storm botnet) to be so successful is
not an unpatched system per se, but it's
an uninformed end user."
•Solution
Recognizing the weakest link
66 Prof. Lili Sagh
67. Also important is end-user awareness.
"Among ourselves in the security
intelligentsia, those of us who do security for
a living, we talk about practicing safe
computing. That used to include 'it's OK, just
don't double-click on an executable, but it's
fine to open a GIF, a JPEG, or an MP3.' But as
you've seen, botnets are now using MP3s as
a source of an infection. I mean, just the very
podcasts you're listening to could be a source
of infection."
•Solution
Awareness Among ourselves in the security intelligentsia
67 Prof. Lili Sagh
68. • Democratic politicians are
proposing a novel approach
to cybersecurity: fine
technology companies
$100,000 a day unless they
comply with directives
imposed by the U.S.
Department of Homeland
Security.
• A "bunker" in this case is a
new IP address served to a
business that is under
persistent DDoS attack but
lacks the funds or resources
to protect itself.
• Traffic from the DDoS attack
continues to hit the original IP
address while the business
remains in operation under a
new address.
• Distributed Denial of Service
(DDoS) attacks
• Google has launched
a program to
encourage outsiders
to find security
vulnerabilities in its
Web properties.
• http://news.cnet.com/8301-
30685_3-20021436-
264.html?tag=mncol;mlt_related
Cybersecurity bill gives DHS
power to punish tech firms
http://news.cnet.com/8301-
13578_3-20023464-
38.html#ixzz16BwzIU9M
Fights Ddos Attacks With
Digital 'Bunkers‘
http://news.cnet.com/8301-
1009_3-20023260-
83.html?tag=nl.e757
Google offers cash for finding
Web security holes
68 Prof. Lili Saghafi
69. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Facebook application developers are able to store their own check-in data in the
Facebook Places database and retrieve information from the database.
• But Facebook is far from the only source of "leakage" for this location data.
• EPIC cites an AT&T research paper (PDF) that found some kind of private data leaked to third
parties in all 20 of the mobile online social networks studied. The services examined include
Facebook, MySpace, Twitter, Flickr, Foursquare, Yelp, and Loopt.
• While these services may have robust privacy policies, the advertisers and developers
they deal with may be less secure.
• As reported last February on the ReadWriteWeb, a site named PleaseRobMe aggregated
information from several location-based services to indicate houses whose
residents were away, making them easy pickings for thieves.
•
Report Your Location To A Social Network And Get A Coupon For
Discounts And Prizes. The Price?
http://news.cnet.com/8301-13880_3-20022700-
68.html#ixzz16C5xfMhX
69 Prof. Lili Saghafi
70. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Location-based services promise to make it
easier to connect with family, friends, and
associates and to be rewarded for being a
loyal customer.
• But in their current form, the services make it
too easy for people and organizations to
access your private information without your
explicit consent.
• Prevent Facebook friends from checking you in
•Solution
70 Prof. Lili Saghafi
71. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cloud computing is Internet-based computing,
whereby shared resources, software, and
information are provided to computers and other
devices on demand, as with the electricity grid.
• Cloud computing is a natural evolution of the
widespread adoption of virtualization, Service-
oriented architecture and utility computing.
• Details are abstracted from consumers, who no
longer have need for expertise in, or control over, the
technology infrastructure "in the cloud" that supports
them.
Prof. Lili Saghafi
71
Is Cloud the Solution?
72. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The major cloud service providers include Amazon,
Salesforce, SAP, Microsoft and Google.
• Some of the larger IT firms that are actively involved in
cloud computing are Fujitsu, Dell, Hewlett Packard, IBM,
VMware, NetApp and Microsoft.
Prof. Lili Saghafi
72
•Cloud Computing
73. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We have all kinds of controls, but they
don't work very well
• It's the little things that lead to most
internal compromises, like walking
away from your desk and not locking
your screen
• It would be very easy for an IT guy to
swap out a hard-drive and just
take it (impact on financial
institution)
Prof. Lili Saghafi
73
Internal Problem VS External Problems
74. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Most chief security information officers CSIO focus on outside
threats -- cyber attacks, socially engineered breaches like
phishing and vishing (phishing over phones) , and the
interception of transaction data.
• While it might not be easy to limit the information employees
must access, it is relatively easy to monitor that
access -- keeping an eye on what
information and files are being
viewed, by whom and how often,
Prof. Lili Saghafi
74
Internal Problem VS External Problems
75. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage (Spy versus spy)
• Technology race (Space, atomic weapon)
•Cold War in 70
75 Prof. Lili Saghafi
76. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Espionage - Cyber
• Technology Race – Cyber
Prof. Lili Saghafi
76
•Cold War Now
77. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In the past government was target now is technology
• Who are the adversary was clear on COLDWAR
• today are unknown hackers in CYBERWAR
• Consider the Model of adversary every hacker/kid /
organized cyber crime has it
1. Capability (computer knowledge)
2. Resources (a laptop computer and access to internet)
3. Intent
4. Motivation
5. Access (to homes cyber)
6. Risk Version (no risk for them)
Prof. Lili Saghafi
77
•Comparison
78. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Cyber terrorists can use unprotected
systems to aggressively target our
nation’s critical infrastructure.
• Are you an easy target?
Cyber Terrorism:
How Vulnerable Are We?
78 Prof. Lili Saghafi
79. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• The malicious software, known as Stuxnet, was discovered in
mid July 2010, at least several months after its creation, by
VirusBlokAda, a Belarussian computer security company that
was alerted by a customer.
• The malicious software has infected an unknown number of
power plants, pipelines and factories over the past year is the
first program designed to cause serious damage in the
physical world
• The Stuxnet spreads through previously unknown holes in
Microsoft’s Windows operating system and then looks for a
type of software made by Siemens and used to control
industrial components, including valves and brakes.
Prof. Lili Saghafi
79
•Stuxnet Worm
80. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet can hide itself, wait for certain conditions
and give new orders to the components that reverse
what they would normally do.
• The commands are so specific that they appear
aimed at an industrial sector, mostly atomic centers
but officials do not know which one or what the
affected equipment would do.
• Cyber attacks on computer networks have slowed or
stopped communication in countries such as Estonia
and Georgia,
• Stuxnet is the first aimed at physical destruction and
it heralds a new era in cyberwar.
Prof. Lili Saghafi
80
•Stuxnet
81. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• “It is not speculation that this is the first directed cyber
weapon”, or one aimed at a specific real-world process, said
Joe Weiss, a US expert who has testified to Congress on
technological security threats to the electric grid and other
physical operations.
• “The only speculation is what it is being used against, and by
whom.”
Prof. Lili Saghafi
81
The first directed cyber weapon
82. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Stuxnet’s knowledge of Microsoft’s Windows operating
system, the Siemens program and the associated hardware
of the target industry make it the work of a well-financed,
highly organized team.
• The malicious software marks the first attack on critical
industrial infrastructure that sits at the foundation of modern
economies.
Prof. Lili Saghafi
82
Stuxnet’s knowledge of Microsoft’s Windows
operating system,
83. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
•
• The Operation Aurora, Zeus, and piracy
• While we still use many of the same old names - viruses, Trojans, and
worms - today's malware deserves much more respect than many are
giving it. Where traditional viruses mostly aimed to disrupt operations
or win fame for their coders' cleverness,
• today's malware enables potent multistage attacks called
advanced persistent threats. In these carefully sequenced attacks,
criminals rely on custom and constantly changing malware being
placed where it will go unnoticed, returning the maximum value from
their investment.
Prof. Lili Saghafi
83
How 3 Cyber Threats Transform Incident
Response: Oct 2012
Targeted Attacks, System Exploits, Data Theft,
and You
84. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Intrinsic -try to build it right -commercial/technology
component should change frequently
• Extrinsic - evaluate it so you know something about
residual risk
• Implementation – Combine component in the best way
maintain system, patch, scan frequently
• Operational – Monitor everything ,update, look for bad
behaviour, Authentication, privileges and different users
level of accessibility
• Don’t only block everything have strategy
Prof. Lili Saghafi
84
How to build the assurance
A Tip for IT MANAGERS
85. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• It Is very real
• Cyber activity is constant
• All of us are target
• We need to be hard target, (people are strongest link if we
make them hard target)
• This is the matter of life and Death , it is about freedom
our way of life
Prof. Lili Saghafi
85
•Cyber Crime
86. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• We need strong technology
• We need users understanding of treats
and respond (.com/.cm) masquerading
and spoofing
• We need cyber professional to know
the risk/treats and mitigation
Prof. Lili Saghafi
86
•Solution
87. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• In home you can prevent 90%
attacks,
• In industry 80% of attacks are
known , 10% are too new to be
known , and 10% we just don’t know
it exist.
• RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an
algorithm for public-key cryptography in information Security
Prof. Lili Saghafi
87
2010 RSA Conference research result
88. REMEMBER
People are the strongest link to build the security
assurance , Together we can , Remember we are the
Masterpiece of God , he Breathed into us, we are capable
of doing anything.
88 Prof. Lili Saghafi
89. Seminar on 'Digital Marketing - Impact of Social
Media Tools‘
Oct 10th, 2012
• Computer Crime Research Center
• http://www.crime-research.org/news/20.03.2010/3779/
• Network Forensics Blog » cybercrime
• http://www.networkforensics.com/category/cybercrime/
• Information Policy
• http://www.i-policy.org/cybercrime/
• Security
• http://news.cnet.com/security/?tag=hdr;snav
• RSA Conference
• Computer Crime & Intellectual Property Section
United States Department of Justice
• FORBES Magazine
•REFERENCES
89 Prof. Lili Saghafi
90. Thank you for being
great audience
Any
Question?
90 Prof. Lili Saghafi