Jason Samide - State of Security & 2016 Predictions
Carregando em ... 3
1 de 5
Top clipped slide
article cybersecurity must B2B metaverse
21 de Jul de 2022•0 gostou
0 gostaram
Seja o primeiro a gostar disto
mostrar mais
•10 visualizações
visualizações
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar para ler offline
Denunciar
Negócios
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity.
Hacking a short history
Common thieves, wishing to get rich by putting their hand in the others pocket? No, rarely they are... Are
they the Robin Hoods of the Net? the legendary British outlaw one would think of. Well, it's a little of that
and a lot more complex...
Your data has a value
Hacking has been a growing problem since the beginning of this century, and can have very serious
consequences if confidential information falls into the wrong hands. Intrusions into computer networks,
combined with physical attacks, have caused many people
sleepless nights, significant financial damage or physical harm.
Many people are still unaware of these facts, the attacks affect
"small" as well as "large" companies, government agencies,
NASA,… and even those who implement security standards and
algorithms. Attacks affect everyone, at all levels: individual,
community, organizational and national.
Everyone has assets, sensitive or private data, we all have some
"market value" of exchange on the internet or dark-net, our
private lives can be sold or traded.
Individuals learn about cyber attacks often once the damage is done to them... once our (your) data is
hacked or hijacked, by the theft of credit card data from a merchant site, by a hijacked legal identity, by a
hacker who breaks into your home via emails that seem relevant
and authentic, or through your home automation/IoT network and
takes control of your computers or spies on you without your
knowledge.
For businesses, in a world of increasingly interconnected systems,
theft of industrial data, intellectual property, or production line
takeover is becoming a sad reality. Some, too many, are forced to
close their doors because of a computer attack, others pay heavy
charges...
Some attacks target the security of a country, others influence presidential elections, others affect pipelines
in the US or paralyze French hospitals.
Facts
I'm not going to make an apology for hacking, but if you look for statistics on the web, you can find some
worrying things about it:
⋅Every 39 seconds there is a hacker attack.
⋅More than 300,000 new pieces of malware are created every day.
⋅On the dark-net, you can become a US citizen for $6,000.
⋅The US cybersecurity budget was around $15 billion in 2020, the GDP of a
country like Albania, or various African countries.
Intriguing, isn't it? Let's take a closer look…
Motivation count age doesn’t matter
You see, I would say that hackers are like you, me and the rest of the
world. They like to find out what's going on around them... they're
curious and intelligent. It's true, we all have something we like and that
characterizes us: some like to run, some like to climb, some like to take
pictures...
Well, they like to find ways around the restrictions imposed on them, to
find flows to break into other people's lives or to go to places that other
people don't even think about.
They like to "poke around" ... Hackers exploit vulnerabilities, just like burglars trying to break-in your
home, but now in the digital world!
Don't think you have to be a certain age to gain experience before you become a hacker. This is true for
some, but it is definitely not always the case. The history of the last 30 years has given us many
"personalities" who have made a name for themselves by their exploits at a very young age, I will mention
only 3 that made an impression on me during my readings…
Even if this example is already 20 years old, remember that he was 15 years old,
Jonathan James, when he managed to hack NASA and put its computers out of
service for three weeks. He was prosecuted by the FBI after hacking into the
computers of the Defense Threat Reduction Agency (DTRA), a division of the US
DoD. Jonathan James became the first juvenile incarcerated for cybercrime in the
US (The New York Times).
Also at the age of 15, Michael Calce (MafiaBoy) from Quebec shook the heads of various American
corporations. In February 2000, under the pseudonym Mafiaboy, he made it impossible for users to access
eleven websites, including Dell, E*Trade, Yahoo!, Amazon, eBay and CNN. At the time, the losses to these
companies amounted to about CA$1.7 billion... to carry out the attacks, he used software developed by more
knowledgeable "buddies", carrying out denial of service attacks. In 2008, Michael returned to the forefront
with his autobiography and since 2015 he has been writing cyber articles in the Montreal newspaper
(wikipedia).
It is also a young man, Mr. George Hotz or George Francis Hotz (alias geohot,
million75 or simply mil), born in 1989 who, in 2007, successfully jailbreaks the
iPhone1 and gets another SIM recognized than the AT&T imposed one for his
iPhone. Three years later, he was the author of a new success: hacking the Sony
Playstation 3 in a few weeks, even though it had the reputation of being
impenetrable. This prompted Sony to release an update to counter the flaw. The
company went to court against the young man. They finally came to an agreement
that George Hotz should never hack into Sony products again... Well, in meanwhile George found other
interesting things to do... autonomous cars.
Hacking and economy
By their effects, the hacking allowed indirectly going forward. New safeguards and communication
standards were developed to respond to the attacks allowing
protecting the data, the assets.
The industrials place higher and higher importance in the battle
against hacking. More and more large companies are recruiting
ethical hackers to protect their resources.
Why do they do this? Simple, it's economic... it is better to pay to
protect than to pay to fix.
These experts will:
• Provide adequate preventive measures against security breaches, discover vulnerabilities and
explore the risk potential, thus preventing intrusions into the organization's information systems
• Protect customer data available in business transactions,
• Conduct a risk analysis and strengthen the organization cyber’s posture at several levels:
policy, IT hygiene, network infrastructure,
• Increase security knowledge and awareness for all employees.
•
Big companies are also involved in cyber education, and I will just give just the example of Microsoft who,
according to tribuneindia.com, has offered Virender Raika, the son of a labourer in Kurukshetra, India, a
reward of 560,000 euros a year for his extraordinary anti-hacking skills.
Must as you know is a Startup. But for us, right from the inception, cyber has been and still is an important
concern every day. We take this subject very seriously.
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our
virtual exhibitions, on different high tech thematic and especially on cybersecurity.
----------------------------------------------------------------------------------------
Images credit
Steve Jennings/Getty Images, CC BY 2.0 <https://creativecommons.org/licenses/by/2.0>, via Wikimedia Commons
Naranj8, CC BY-SA 4.0 <https://creativecommons.org/licenses/by-sa/4.0>, via Wikimedia Commons