SlideShare uma empresa Scribd logo
1 de 8
Anatomy of a Cyber Attacker
Supplementary Reading
August 2017
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 2
Let’s briefly go through the types of cyber crimes before
understanding the types of cyber attackers.
Here are the most common types:
Hacking: an individual’s computer is accessed without their
knowledge and personal or sensitive information is stolen.
IP Piracy: when a person violates copyrights and downloads
music, movies, games and software. There are even peer
sharing websites which encourage software piracy and many
of these websites are now being targeted by the authorities.
Identity Theft: the use of an individual’s personal credentials
to impersonate the victim for unlawful personal gain. This can
lead to financial losses for the individual and reputational
damage for organisations.
Malicious Software: Software or programs that are used for
a variety of criminal purposes. These software can be used to
gain access to a system to steal sensitive information or data
or cripple systems or networks.
Examples of Cyber Crime
One of the best ways to
avoid being a victim of
cyber crimes and
protecting your sensitive
information is by making
use of impenetrable
security that uses a
unified system of software
and hardware to
authenticate any
information that is sent or
accessed over the
Internet.
http://www.crossdomainsolutions.com/cyber-crime/
https://www.theguardian.com/money/2017/aug/23/identity-fraud-figures-
cifas-theft
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 3
White Hats
Who are they?
White hats use their powers for good and are also known as
“ethical hackers,” white hats can sometimes be paid
employees or contractors working for companies as
security specialists that attempt to find security holes
via hacking.
White hats employ the same methods of hacking as black hats,
with one exception- they do it with permission from
owners of the system, which makes the process
completely legal. White hat hackers perform penetration
testing to validate security controls within the organisation.
Ethical hacking skills can be acquired through various training
and certifications.
Here are some known White Hat Hackers:
“The smart watch is a
very good example,” said
Mr Toh Jing Hui , Research
Assistant from Singapore
University of Technology,
who would be considered
a white hat or ethical
computer hacker. “What
the attacker can do is to
infect your smartwatch
with a malicious software
that makes it run like a
printer.”
http://www.channelnewsasia.com/news/singapore/ethical-hackers-on-the-
frontline-keeping-your-home-safe-from-cyb-8577866
http://www.makeuseof.com/tag/5-worlds-famous-influential-white-hat-
hackers/
Steve Wozniak Linus Torvalds Tim Berners-Lee
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 4
Black Hats
Who are they?
A black hat is a person who attempts to find security
weaknesses and exploit them for personal financial gain
or other malicious reasons.
Black hats can inflict major damage on both individuals
and large organizations by stealing personal financial
information, compromising the security of major systems, or
shutting down or altering the function of websites and
networks.
Here are some known Black Hat Hackers:
A ransomware attack is
relatively easy to
overcome if you have a
current and complete copy
of your data; you can
simply restore the
untainted files to your
machine, says Beyer.
(Before you do, though, be
sure to install security
software that will remove
the ransomware, or you
may find yourself being
jacked all over again, he
warns.)
http://www.express.co.uk/life-style/science-technology/602157/Lizard-Squad-
Hacking-Group-Ddos-Attack-PS4-Xbox-NCA
https://www.technotification.com/2014/12/top-10-best-black-hat-hackers-in-the-
world.html
https://www.theguardian.com/technology/2016/aug/08/cyber-security-black-hat-
defcon-hacking
http://thementalclub.com/top-5-black-hat-hackers-world-572
Vladimir Levin George HotzLizard squad
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 5
Grey Hats
Who are they?
A Grey Hat in the IT community refers to a skilled hacker
who toe the line of ethical boundaries. Grey Hats usually
do not hack for personal gain nor have malicious intentions.
However, Grey Hats may occasionally commit crimes during
the course of his/her technological exploits. A grey hat will
not necessarily notify the system admin of a successful
compromise. Such a hacker prefers anonymity at almost all
cost, carrying out their activities undetected with as little
forensic traces as possible.
Here are some common Grey Hat Hackers:
“In order to get access to
that information, at a
minimum you need to turn
to a grey hat hacker, who
may have access to that
side of the fence.” says
Dave Millier, CEO of Sentry
Metrics, a Toronto-based
security consulting firm
http://www.toptenz.net/top-10-infamous-hackers.php
http://www.itworldcanada.com/article/experts-divided-on-grey-hat-
hackers/45669
Robert T. Morris, Jr Mark AbeneKevin Mitnick
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 6
Hacktivism
What does Hacktivism mean?
Hacktivism is the act of hacking a website or computer network
in an effort to convey a social or political message. The person
who carries out the act of hacktivism is known as a hacktivist.
In contrast to a malicious hacker who hacks with the intent to
steal private information or cause others harm, hacktivists
engage in similar forms of disruptive activities to highlight
political or social causes. For the hacktivist, hacktivism is an
Internet-enabled strategy to exercise civil disobedience. Acts of
hacktivism may include website defacement, denial-of-
service(DoS) attacks, redirects, website parodies, information
theft, virtual sabotage and virtual sit-ins.
What motivates them?
Hacktivism and hacktivists are motivated by an active desire to
cripple government control and censorship of electronic and
Web technologies and content. It is also their attempt at
effecting change according to the beliefs they subscribe to.
As such, hacktivism may be employed by those opposing
rigorous copyright regulations or fervently interested in
circumventing restricted electronic data.
Digital Economy Minister
Ed Vaizey said: "The UK is
a world-leading digital
economy and this
Government has made
cyber security a top
priority. Too many firms
are losing money, data
and consumer confidence
with the vast number of
cyber attacks. It's
absolutely crucial
businesses are secure and
can protect data."
https://www.techopedia.com/definition/2410/hacktivism
http://www.express.co.uk/news/world/669346/Anonymous-hackers-take-
down-nine-banks-in-30-day-cyber-attack
Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited
Slide 7
As a business owner, you
rarely think about the
threat of cyber-attacks
day-to-day, but when one
happens to your
businesses the result can
be catastrophic. By
making sure you have
these basic security tips in
place now, you can save
yourself from a lot of
preventable headaches
down the line
4 Easy Ways to protect your organisation from cyber attackers
• Know the risks
Properly protecting your company from a cyber-attack starts with a comprehensive understanding of the
internal and external threat exposure your organisation. You will want to have an understanding of your
assets and potential areas where hackers may gain entry to your organisation.
• Encrypt your data
Keep your information safe by turning to encryption tools which come standard with most operating systems on.
• Practise cyber hygiene
Cyber-attacks are not limited to networked systems. Practising good cyber hygiene and culture can dramatically
raise your security posture. Activities like shredding your documents and physically locking your computer while
you are away from your desk is a good place to start.
• Be vigilant
Help employees understand the role they play in contributing to your organisation’s security posture. Organise
regular awareness campaigns to detect and report potential threats and as well as awareness on how to
keep information safe.
https://www.entrepreneur.com/article/289680
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its
network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent
entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about to
learn more about our global network of member firms.
Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.
With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class
capabilities and high-quality service to clients, delivering the insights they need to address their most complex business
challenges. Deloitte’s more than 244,000 professionals are committed to becoming the standard of excellence.
This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their
related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services.
No entity in the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this
communication.
© 2017. For information, contact Deloitte Touche Tohmatsu Limited

Mais conteúdo relacionado

Mais procurados

Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 

Mais procurados (20)

Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 

Semelhante a August 2017 - Anatomy of a Cyber Attacker

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxRiyaNair19
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGActonRoy
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 

Semelhante a August 2017 - Anatomy of a Cyber Attacker (20)

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
File000154
File000154File000154
File000154
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Hacking
HackingHacking
Hacking
 
What Is Hacking
What Is HackingWhat Is Hacking
What Is Hacking
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKING
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 

Mais de seadeloitte

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landichoseadeloitte
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christianseadeloitte
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Limseadeloitte
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnettseadeloitte
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgadoseadeloitte
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishakseadeloitte
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide shareseadeloitte
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide shareseadeloitte
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh seadeloitte
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chanseadeloitte
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ngseadeloitte
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantocseadeloitte
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanaraseadeloitte
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Lohseadeloitte
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawiseadeloitte
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiongseadeloitte
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthianseadeloitte
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thuseadeloitte
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin seadeloitte
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien seadeloitte
 

Mais de seadeloitte (20)

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Lim
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide share
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide share
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
 

Último

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 

Último (20)

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

August 2017 - Anatomy of a Cyber Attacker

  • 1. Anatomy of a Cyber Attacker Supplementary Reading August 2017
  • 2. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 2 Let’s briefly go through the types of cyber crimes before understanding the types of cyber attackers. Here are the most common types: Hacking: an individual’s computer is accessed without their knowledge and personal or sensitive information is stolen. IP Piracy: when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the authorities. Identity Theft: the use of an individual’s personal credentials to impersonate the victim for unlawful personal gain. This can lead to financial losses for the individual and reputational damage for organisations. Malicious Software: Software or programs that are used for a variety of criminal purposes. These software can be used to gain access to a system to steal sensitive information or data or cripple systems or networks. Examples of Cyber Crime One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. http://www.crossdomainsolutions.com/cyber-crime/ https://www.theguardian.com/money/2017/aug/23/identity-fraud-figures- cifas-theft
  • 3. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 3 White Hats Who are they? White hats use their powers for good and are also known as “ethical hackers,” white hats can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking. White hats employ the same methods of hacking as black hats, with one exception- they do it with permission from owners of the system, which makes the process completely legal. White hat hackers perform penetration testing to validate security controls within the organisation. Ethical hacking skills can be acquired through various training and certifications. Here are some known White Hat Hackers: “The smart watch is a very good example,” said Mr Toh Jing Hui , Research Assistant from Singapore University of Technology, who would be considered a white hat or ethical computer hacker. “What the attacker can do is to infect your smartwatch with a malicious software that makes it run like a printer.” http://www.channelnewsasia.com/news/singapore/ethical-hackers-on-the- frontline-keeping-your-home-safe-from-cyb-8577866 http://www.makeuseof.com/tag/5-worlds-famous-influential-white-hat- hackers/ Steve Wozniak Linus Torvalds Tim Berners-Lee
  • 4. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 4 Black Hats Who are they? A black hat is a person who attempts to find security weaknesses and exploit them for personal financial gain or other malicious reasons. Black hats can inflict major damage on both individuals and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks. Here are some known Black Hat Hackers: A ransomware attack is relatively easy to overcome if you have a current and complete copy of your data; you can simply restore the untainted files to your machine, says Beyer. (Before you do, though, be sure to install security software that will remove the ransomware, or you may find yourself being jacked all over again, he warns.) http://www.express.co.uk/life-style/science-technology/602157/Lizard-Squad- Hacking-Group-Ddos-Attack-PS4-Xbox-NCA https://www.technotification.com/2014/12/top-10-best-black-hat-hackers-in-the- world.html https://www.theguardian.com/technology/2016/aug/08/cyber-security-black-hat- defcon-hacking http://thementalclub.com/top-5-black-hat-hackers-world-572 Vladimir Levin George HotzLizard squad
  • 5. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 5 Grey Hats Who are they? A Grey Hat in the IT community refers to a skilled hacker who toe the line of ethical boundaries. Grey Hats usually do not hack for personal gain nor have malicious intentions. However, Grey Hats may occasionally commit crimes during the course of his/her technological exploits. A grey hat will not necessarily notify the system admin of a successful compromise. Such a hacker prefers anonymity at almost all cost, carrying out their activities undetected with as little forensic traces as possible. Here are some common Grey Hat Hackers: “In order to get access to that information, at a minimum you need to turn to a grey hat hacker, who may have access to that side of the fence.” says Dave Millier, CEO of Sentry Metrics, a Toronto-based security consulting firm http://www.toptenz.net/top-10-infamous-hackers.php http://www.itworldcanada.com/article/experts-divided-on-grey-hat- hackers/45669 Robert T. Morris, Jr Mark AbeneKevin Mitnick
  • 6. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 6 Hacktivism What does Hacktivism mean? Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. In contrast to a malicious hacker who hacks with the intent to steal private information or cause others harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial-of- service(DoS) attacks, redirects, website parodies, information theft, virtual sabotage and virtual sit-ins. What motivates them? Hacktivism and hacktivists are motivated by an active desire to cripple government control and censorship of electronic and Web technologies and content. It is also their attempt at effecting change according to the beliefs they subscribe to. As such, hacktivism may be employed by those opposing rigorous copyright regulations or fervently interested in circumventing restricted electronic data. Digital Economy Minister Ed Vaizey said: "The UK is a world-leading digital economy and this Government has made cyber security a top priority. Too many firms are losing money, data and consumer confidence with the vast number of cyber attacks. It's absolutely crucial businesses are secure and can protect data." https://www.techopedia.com/definition/2410/hacktivism http://www.express.co.uk/news/world/669346/Anonymous-hackers-take- down-nine-banks-in-30-day-cyber-attack
  • 7. Cyber 101: Supplementary Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 7 As a business owner, you rarely think about the threat of cyber-attacks day-to-day, but when one happens to your businesses the result can be catastrophic. By making sure you have these basic security tips in place now, you can save yourself from a lot of preventable headaches down the line 4 Easy Ways to protect your organisation from cyber attackers • Know the risks Properly protecting your company from a cyber-attack starts with a comprehensive understanding of the internal and external threat exposure your organisation. You will want to have an understanding of your assets and potential areas where hackers may gain entry to your organisation. • Encrypt your data Keep your information safe by turning to encryption tools which come standard with most operating systems on. • Practise cyber hygiene Cyber-attacks are not limited to networked systems. Practising good cyber hygiene and culture can dramatically raise your security posture. Activities like shredding your documents and physically locking your computer while you are away from your desk is a good place to start. • Be vigilant Help employees understand the role they play in contributing to your organisation’s security posture. Organise regular awareness campaigns to detect and report potential threats and as well as awareness on how to keep information safe. https://www.entrepreneur.com/article/289680
  • 8. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about to learn more about our global network of member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s more than 244,000 professionals are committed to becoming the standard of excellence. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services. No entity in the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication. © 2017. For information, contact Deloitte Touche Tohmatsu Limited