SlideShare uma empresa Scribd logo
1 de 17
Tackling Cyber threats together
Sean O’Neil
Areas of discussion (in brief)
• What is Cyber Crime?
• Possible threats
• Police response
• Recent intelligence and events
• Advice on how to protect yourselves
with CE, ISO, basic steps.
What is Cyber Crime?
The adopted definition of Cyber Crime is:
• Cyber Dependent Crimes, where a digital system is the target as
well as the means of attack. These include attacks on computer
systems to disrupt IT infrastructure, and stealing data over a
network using malware (the purpose of the data theft is usually to
commit further crime).
• Cyber Enabled Crimes. ‘Existing’ crimes that have been
transformed in scale or form by their use of the Internet. The
growth of the Internet has allowed these crimes to be carried out
on an industrial scale.
• The use of the Internet to facilitate drug dealing, people smuggling
and many other 'traditional' crime types.
What is Cyber Crime?
Crimes
42615 crimes recorded
2986 Burglary offences
688 Robbery offences
8900 Cyber/fraud reports (10% of reality).
Statistics therefore may suggest Cyber
crime/frauds are largest number of crime
in society
Highest reported incidents
Online fraud
Mandate
Ransomware
Romance frauds.
Simply not being reported:
Phishing emails / data loss/ DDOS /
internal loss by theft/fraud
Theft triangle
POTENTIALLY ALL OF THEM!
Which of these is a cyber threat?
Law enforcement response
• Obtain relevant evidence & statements from Victim (company)
• Obtain server event & team viewer logs (which show who
logged into server upon which data was deleted/stolen).
• Obtain 3rd party data, using relevant legislation to locate IP
addresses.
• Execute search warrant at suspects addresses, resulting in the
seizure of source devices.
• Conduct examination of exhibits leading to identification of
evidence which supports prosecution.
• Interview suspect under caution
Typical Scene visit
• Identification & prioritisation of devices.
• Preservation & capture of volatile data.
• Router examination to ID network devices.
• Forensic triage of devices.
• Forensic examination of mobile devices.
• Hard drive imagery.
learning's
• Need for Business BCP to include ICT/data loss.
• Need for forensic recovery plan in disaster recovery plan.
• Do not turn off devices; but remove from network (i.e.
disconnect).
• Do not delay response to LE, IT recovery company.
• Have more than 1 ICT manager (build ICT team)
• Back up key corporate and customer data.
• Instigate Recovery plan & major incident processes.
• Plan for such an event with Cyber essentials or
ISO 270001
• Do not fail GDPR
But what are some of the biggest threats?
•Insider Threat (theft/fraud/data breach)
•Malware by phishing attacks
•Data Breach
• DDoS
•Social Engineering leading to scams
• Theft/fraud by Customers or vendors.
Ultimately it depends on the business, how it is set up, the
infrastructure and the policies and procedures, and protect
mechanisms in place.
Does your BCP include no use of IT or loss of data!
Current Scams
Invoice emails – i.e. new vendors, changes to current vendors, Apple [little mix]
Vouchers - Supermarkets, on line stores
Account updates – amazon, Sky, Virgin, Utilities.
Advice – any unsolicited emails. Do not press that link; simply delete. Go via normal website. Send to phishing email address for
company
Microsoft/BT router/system faults – Dunstable case £4500
Advice – Do not engage, go via normal website.
Mandate fraud – Bedford company lost £100K put 27 staff at risk. £1M in Luton in
September. Bedford company had windows 365 compromised with poor PW. L/Buzzard
company 17 fake invoices by post in Jan17.
Solicitor companies being targeted – Luton March 2017, Bedford Dec
Advice - Slow down, check via second source. Get copy of our advice.
Ransomware – Luton Hotel attacked over New year – pay and enter suckers list
Advice - Plan with 2x back ups, have details of local IT repair company
80% is easily preventable
And now for some good news!!
GCHQ reported in 2014 that in terms of Cyber Crime…
Cyber essentials (plus)
ISO27001
Thank you! • CBR - Free service to all local businesses,
organisations, charities, vulnerable people
• Offering a review of current practices
• Suggesting improvements to ICT/physical
security
• Leading to greater ability to reach ‘cyber
essentials’ accreditation - Minimum standard
suggested for government contracts in the future.
• CiSP
• POC
Sean O’Neil
Cyber Security Advisor (2219)
Bedfordshire Police Headquarters,
Woburn Road, Kempston, Bedfordshire, MK43 9AX
(+44) 7720204358
sean.oneil@bedfordshire.pnn.police.uk
cyberprotect@bedfordshire.pnn.police.uk
http://www.omic.pub/cybercrime (free electronic book giving basic advice)

Mais conteúdo relacionado

Semelhante a Tackling Cyber threats together: TITLE

Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerceSudeshna07
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingPKF Francis Clark
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 

Semelhante a Tackling Cyber threats together: TITLE (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Cyber fraud a threat to E commerce
Cyber fraud a threat to E commerceCyber fraud a threat to E commerce
Cyber fraud a threat to E commerce
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Exeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast BriefingExeter - Cyber Security Breakfast Briefing
Exeter - Cyber Security Breakfast Briefing
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 

Último

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxjohnpazperpetua10
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 

Último (20)

如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Group 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptxGroup 2 Marlaw Definition of Bill of Lading .pptx
Group 2 Marlaw Definition of Bill of Lading .pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 

Tackling Cyber threats together: TITLE

  • 1. Tackling Cyber threats together Sean O’Neil
  • 2. Areas of discussion (in brief) • What is Cyber Crime? • Possible threats • Police response • Recent intelligence and events • Advice on how to protect yourselves with CE, ISO, basic steps.
  • 3. What is Cyber Crime? The adopted definition of Cyber Crime is: • Cyber Dependent Crimes, where a digital system is the target as well as the means of attack. These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime). • Cyber Enabled Crimes. ‘Existing’ crimes that have been transformed in scale or form by their use of the Internet. The growth of the Internet has allowed these crimes to be carried out on an industrial scale. • The use of the Internet to facilitate drug dealing, people smuggling and many other 'traditional' crime types.
  • 4. What is Cyber Crime?
  • 5. Crimes 42615 crimes recorded 2986 Burglary offences 688 Robbery offences 8900 Cyber/fraud reports (10% of reality). Statistics therefore may suggest Cyber crime/frauds are largest number of crime in society Highest reported incidents Online fraud Mandate Ransomware Romance frauds. Simply not being reported: Phishing emails / data loss/ DDOS / internal loss by theft/fraud
  • 7. POTENTIALLY ALL OF THEM! Which of these is a cyber threat?
  • 8. Law enforcement response • Obtain relevant evidence & statements from Victim (company) • Obtain server event & team viewer logs (which show who logged into server upon which data was deleted/stolen). • Obtain 3rd party data, using relevant legislation to locate IP addresses. • Execute search warrant at suspects addresses, resulting in the seizure of source devices. • Conduct examination of exhibits leading to identification of evidence which supports prosecution. • Interview suspect under caution
  • 9. Typical Scene visit • Identification & prioritisation of devices. • Preservation & capture of volatile data. • Router examination to ID network devices. • Forensic triage of devices. • Forensic examination of mobile devices. • Hard drive imagery.
  • 10. learning's • Need for Business BCP to include ICT/data loss. • Need for forensic recovery plan in disaster recovery plan. • Do not turn off devices; but remove from network (i.e. disconnect). • Do not delay response to LE, IT recovery company. • Have more than 1 ICT manager (build ICT team) • Back up key corporate and customer data. • Instigate Recovery plan & major incident processes. • Plan for such an event with Cyber essentials or ISO 270001 • Do not fail GDPR
  • 11. But what are some of the biggest threats? •Insider Threat (theft/fraud/data breach) •Malware by phishing attacks •Data Breach • DDoS •Social Engineering leading to scams • Theft/fraud by Customers or vendors. Ultimately it depends on the business, how it is set up, the infrastructure and the policies and procedures, and protect mechanisms in place. Does your BCP include no use of IT or loss of data!
  • 12. Current Scams Invoice emails – i.e. new vendors, changes to current vendors, Apple [little mix] Vouchers - Supermarkets, on line stores Account updates – amazon, Sky, Virgin, Utilities. Advice – any unsolicited emails. Do not press that link; simply delete. Go via normal website. Send to phishing email address for company Microsoft/BT router/system faults – Dunstable case £4500 Advice – Do not engage, go via normal website. Mandate fraud – Bedford company lost £100K put 27 staff at risk. £1M in Luton in September. Bedford company had windows 365 compromised with poor PW. L/Buzzard company 17 fake invoices by post in Jan17. Solicitor companies being targeted – Luton March 2017, Bedford Dec Advice - Slow down, check via second source. Get copy of our advice. Ransomware – Luton Hotel attacked over New year – pay and enter suckers list Advice - Plan with 2x back ups, have details of local IT repair company
  • 13. 80% is easily preventable And now for some good news!! GCHQ reported in 2014 that in terms of Cyber Crime…
  • 16.
  • 17. Thank you! • CBR - Free service to all local businesses, organisations, charities, vulnerable people • Offering a review of current practices • Suggesting improvements to ICT/physical security • Leading to greater ability to reach ‘cyber essentials’ accreditation - Minimum standard suggested for government contracts in the future. • CiSP • POC Sean O’Neil Cyber Security Advisor (2219) Bedfordshire Police Headquarters, Woburn Road, Kempston, Bedfordshire, MK43 9AX (+44) 7720204358 sean.oneil@bedfordshire.pnn.police.uk cyberprotect@bedfordshire.pnn.police.uk http://www.omic.pub/cybercrime (free electronic book giving basic advice)

Notas do Editor

  1. Recent survey of reported crime had 96% as cyber element – either computers used to facilitate or used in commission. Consdier the number of times, telephones/computers are used to research, facilitate crimes or used as a means of communication.
  2. Smart fridge anecdote… Own staff/insider Chip in hand Social engineering. Frying pan USB stick in car park
  3. 23 in a Million phishing emails are successful 5.5 Billion in 2011 attacks world wide 42% increase in a year to £7.8 Billion in 2012 People don’t rob banks with shotguns, they now hire a hacker – lower risk and jail time if caught Peelian Principle – First duty of any Constable is to Prevent Crime