SlideShare a Scribd company logo
1 of 19
LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010 “Cybercrime 2.0: When the Cloud Turns Dark” Carlos EstebanLibrero Dario Gatti Roberto Held
Cybercrimerefers to any crime that involves a computerand a network.
Whatcrimes?      Crimes that primarily target computer networks or devices include: Malware (malicious code) Denial-of-service attacks Computer viruses      Crimes that merely use computer networks or devices include: Cyber stalking Fraud and identity theft Phishing scams Information warfare
   While the first hackers wanted to exhibit their technical superiority...
    …today they are primarily motivated by economic interests.
Cyber-wars
Who will win?
Types of Cybercrime Spam - sending out of junk e-mails for commercial purposes; Malware programs – Virus, worms, trojan horse; Drug Trafficking
Types of Cybercrime Cyber Terrorism – hacking official websites; Obscene or Offensive Content – Adults only!!
Security Tips ,[object Object]
 Anti-virus;
 Firewall;
 Internet;Programs out-of-date => very insecure
Possible Solutions Automatic updates; User education; More efficient malware detectors;
Social Engineering Attacks Process of manipulating users; Free examples – antivirus test;
WEB ATTACKS ,[object Object],-> new vulnerabilities ,[object Object]
 Exploiting = download payloads ,[object Object]
Security System identifying malicious content throw GOOGLE search. Browsers (Safari, Firefox…) use information to prevent users’ visits.

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsCYBERWISER .eu
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack MethodologiesGeeks Anonymes
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet security
Internet securityInternet security
Internet security
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Cyber security
Cyber securityCyber security
Cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & SolutionsTackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 

Viewers also liked

Bail in ou bail-out; o mesmo baile, outra música
Bail in  ou bail-out;  o mesmo baile, outra músicaBail in  ou bail-out;  o mesmo baile, outra música
Bail in ou bail-out; o mesmo baile, outra músicaGRAZIA TANTA
 
C:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers BureauC:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers BureauWendy
 
Trabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORDTrabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORDmaryjcardenasc
 
Speakers bureau current
Speakers bureau currentSpeakers bureau current
Speakers bureau currentWendy
 
Segurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectualSegurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectualGRAZIA TANTA
 
Reestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vidaReestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vidaGRAZIA TANTA
 
Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1GRAZIA TANTA
 
Mais um perdâo fiscal. Peres é a sua graça
Mais um perdâo fiscal.  Peres é a sua graçaMais um perdâo fiscal.  Peres é a sua graça
Mais um perdâo fiscal. Peres é a sua graçaGRAZIA TANTA
 
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jourA propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jourGRAZIA TANTA
 
União dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à soltaUnião dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à soltaGRAZIA TANTA
 
O projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos ViriatosO projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos ViriatosGRAZIA TANTA
 
O Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vidaO Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vidaGRAZIA TANTA
 
NFV Interoperability Evaluation Results
NFV Interoperability Evaluation ResultsNFV Interoperability Evaluation Results
NFV Interoperability Evaluation Resultsmlazar2000
 

Viewers also liked (19)

CTR YOOO!!!!!
CTR YOOO!!!!!CTR YOOO!!!!!
CTR YOOO!!!!!
 
Bail in ou bail-out; o mesmo baile, outra música
Bail in  ou bail-out;  o mesmo baile, outra músicaBail in  ou bail-out;  o mesmo baile, outra música
Bail in ou bail-out; o mesmo baile, outra música
 
C:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers BureauC:\Fakepath\Intro To Speakers Bureau
C:\Fakepath\Intro To Speakers Bureau
 
Acc hayro b.
Acc hayro b.Acc hayro b.
Acc hayro b.
 
Prefixes -teens talk latin-greek (Book 1)
Prefixes -teens talk latin-greek (Book 1)Prefixes -teens talk latin-greek (Book 1)
Prefixes -teens talk latin-greek (Book 1)
 
Trabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORDTrabajo de computacion 1er Bimestre WORD
Trabajo de computacion 1er Bimestre WORD
 
CTR YO!!!
CTR YO!!!CTR YO!!!
CTR YO!!!
 
Speakers bureau current
Speakers bureau currentSpeakers bureau current
Speakers bureau current
 
MUSIC SLIDESHOW
MUSIC SLIDESHOWMUSIC SLIDESHOW
MUSIC SLIDESHOW
 
Gems for rails
Gems for railsGems for rails
Gems for rails
 
Segurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectualSegurança social dispensa pechisbeque intelectual
Segurança social dispensa pechisbeque intelectual
 
Reestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vidaReestruturar a dívida pública nada resolve na nossa vida
Reestruturar a dívida pública nada resolve na nossa vida
 
Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1Economia, capitalismo e revolta – 1
Economia, capitalismo e revolta – 1
 
Mais um perdâo fiscal. Peres é a sua graça
Mais um perdâo fiscal.  Peres é a sua graçaMais um perdâo fiscal.  Peres é a sua graça
Mais um perdâo fiscal. Peres é a sua graça
 
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jourA propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
A propósito do doutoramento honoris coisa do guterres ou a feira do abat jour
 
União dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à soltaUnião dos Povos da Europa ou o nacionalismo à solta
União dos Povos da Europa ou o nacionalismo à solta
 
O projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos ViriatosO projeto UE. Desvalorização interna, o euro e os novos Viriatos
O projeto UE. Desvalorização interna, o euro e os novos Viriatos
 
O Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vidaO Pib, o Imi e outros modos de mercantilização da vida
O Pib, o Imi e outros modos de mercantilização da vida
 
NFV Interoperability Evaluation Results
NFV Interoperability Evaluation ResultsNFV Interoperability Evaluation Results
NFV Interoperability Evaluation Results
 

Similar to CyberCrime - Lse summer school 2010 mg270

A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks TrendsCharles Mok
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threatsSsendiSamuel
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 

Similar to CyberCrime - Lse summer school 2010 mg270 (20)

A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Hamza
HamzaHamza
Hamza
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
105 Common information security threats
105 Common information security threats105 Common information security threats
105 Common information security threats
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 

Recently uploaded

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Recently uploaded (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

CyberCrime - Lse summer school 2010 mg270

  • 1. LSE Summer School 2010MG270: Business Development and ICT Innovation9th July 2010 “Cybercrime 2.0: When the Cloud Turns Dark” Carlos EstebanLibrero Dario Gatti Roberto Held
  • 2. Cybercrimerefers to any crime that involves a computerand a network.
  • 3. Whatcrimes? Crimes that primarily target computer networks or devices include: Malware (malicious code) Denial-of-service attacks Computer viruses Crimes that merely use computer networks or devices include: Cyber stalking Fraud and identity theft Phishing scams Information warfare
  • 4. While the first hackers wanted to exhibit their technical superiority...
  • 5. …today they are primarily motivated by economic interests.
  • 8.
  • 9. Types of Cybercrime Spam - sending out of junk e-mails for commercial purposes; Malware programs – Virus, worms, trojan horse; Drug Trafficking
  • 10. Types of Cybercrime Cyber Terrorism – hacking official websites; Obscene or Offensive Content – Adults only!!
  • 11.
  • 15. Possible Solutions Automatic updates; User education; More efficient malware detectors;
  • 16. Social Engineering Attacks Process of manipulating users; Free examples – antivirus test;
  • 17.
  • 18.
  • 19. Security System identifying malicious content throw GOOGLE search. Browsers (Safari, Firefox…) use information to prevent users’ visits.
  • 20. Pirate Bay Attack 4 million accounts exposed Break into vulnerable database History and personal information (passwords, e-mails…)
  • 21. Cybercrimeis a criticalissuenotonlyforpages and applications on the Web. Itsimplications can begreater and can affectalso the real world. Blackout that may have been caused by hackers in 2009, Brazil.
  • 22. And, if you have enjoyed our presentation, you can find it at: http://www.slideshare.net/class2010mg270