Enviar pesquisa
Carregar
August 2017 - Anatomy of a Cyber Attacker
•
Transferir como PPTX, PDF
•
1 gostou
•
34,367 visualizações
S
seadeloitte
Seguir
Leia menos
Leia mais
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 8
Baixar agora
Recomendados
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
seadeloitte
September 2019 part 9
September 2019 part 9
seadeloitte
November 2017: Part 6
November 2017: Part 6
seadeloitte
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
2017 october supplementary_reading
2017 october supplementary_reading
seadeloitte
December 2019 Part 10
December 2019 Part 10
seadeloitte
Cyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
In the news
In the news
Rob Wilson
Recomendados
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
seadeloitte
September 2019 part 9
September 2019 part 9
seadeloitte
November 2017: Part 6
November 2017: Part 6
seadeloitte
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
2017 october supplementary_reading
2017 october supplementary_reading
seadeloitte
December 2019 Part 10
December 2019 Part 10
seadeloitte
Cyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
In the news
In the news
Rob Wilson
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
Cyber Resilience
Cyber Resilience
Ian-Edward Stafrace
idg_secops-solutions
idg_secops-solutions
Jonny Nässlander
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
The ever increasing threat of cyber crime
The ever increasing threat of cyber crime
Nathan Desfontaines
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
Infosec Train
Cyber security
Cyber security
Rishav Sadhu
Mais conteúdo relacionado
Mais procurados
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
Cyber Resilience
Cyber Resilience
Ian-Edward Stafrace
idg_secops-solutions
idg_secops-solutions
Jonny Nässlander
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Proofpoint
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
Cybersecurity and The Board
Cybersecurity and The Board
Paul Melson
The ever increasing threat of cyber crime
The ever increasing threat of cyber crime
Nathan Desfontaines
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
Mais procurados
(20)
Cybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Cyber Resilience
Cyber Resilience
idg_secops-solutions
idg_secops-solutions
Cyber Security - Things you need to know
Cyber Security - Things you need to know
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Data Breach Guide 2013
Data Breach Guide 2013
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Cybersecurity and The Board
Cybersecurity and The Board
The ever increasing threat of cyber crime
The ever increasing threat of cyber crime
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Semelhante a August 2017 - Anatomy of a Cyber Attacker
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
Infosec Train
Cyber security
Cyber security
Rishav Sadhu
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
Xtandit_Marketing
File000154
File000154
Desmond Devendran
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
THESIS-2(2)
THESIS-2(2)
Elsayed Muhammad
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
Ict lec#9
Ict lec#9
amberkhan59
Hacking
Hacking
ritik shukla
What Is Hacking
What Is Hacking
ritik shukla
Information security
Information security
Laxmiprasad Bansod
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
RiyaNair19
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
CipherCloud
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKING
ActonRoy
Ethical hacking
Ethical hacking
Vishesh Singhal
Managed security services for financial services firms
Managed security services for financial services firms
Jake Weaver
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
Semelhante a August 2017 - Anatomy of a Cyber Attacker
(20)
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
Cyber security
Cyber security
Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
File000154
File000154
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
THESIS-2(2)
THESIS-2(2)
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
Ict lec#9
Ict lec#9
Hacking
Hacking
What Is Hacking
What Is Hacking
Information security
Information security
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKING
Ethical hacking
Ethical hacking
Managed security services for financial services firms
Managed security services for financial services firms
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
Mais de seadeloitte
Celebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
seadeloitte
Celebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
seadeloitte
Celebrating our people - Jill Lim
Celebrating our people - Jill Lim
seadeloitte
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
seadeloitte
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
seadeloitte
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
seadeloitte
Dtc event slide share
Dtc event slide share
seadeloitte
Kids edu event slide share
Kids edu event slide share
seadeloitte
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
seadeloitte
Celebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
seadeloitte
Celebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
seadeloitte
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
seadeloitte
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
seadeloitte
Celebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
seadeloitte
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
seadeloitte
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
seadeloitte
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
seadeloitte
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
seadeloitte
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
seadeloitte
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
seadeloitte
Mais de seadeloitte
(20)
Celebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
Celebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
Celebrating our people - Jill Lim
Celebrating our people - Jill Lim
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
Dtc event slide share
Dtc event slide share
Kids edu event slide share
Kids edu event slide share
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
Celebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
Celebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
Celebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
Último
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
AmzadHosen3
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Seta Wicaksana
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
Roland Driesen
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Workforce Group
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Lviv Startup Club
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
Ethan lee
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
Seo
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
rajveerescorts2022
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
anilsa9823
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
karancommunications
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Paul Menig
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
Any kyc Account
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
Último
(20)
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
August 2017 - Anatomy of a Cyber Attacker
1.
Anatomy of a
Cyber Attacker Supplementary Reading August 2017
2.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 2 Let’s briefly go through the types of cyber crimes before understanding the types of cyber attackers. Here are the most common types: Hacking: an individual’s computer is accessed without their knowledge and personal or sensitive information is stolen. IP Piracy: when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the authorities. Identity Theft: the use of an individual’s personal credentials to impersonate the victim for unlawful personal gain. This can lead to financial losses for the individual and reputational damage for organisations. Malicious Software: Software or programs that are used for a variety of criminal purposes. These software can be used to gain access to a system to steal sensitive information or data or cripple systems or networks. Examples of Cyber Crime One of the best ways to avoid being a victim of cyber crimes and protecting your sensitive information is by making use of impenetrable security that uses a unified system of software and hardware to authenticate any information that is sent or accessed over the Internet. http://www.crossdomainsolutions.com/cyber-crime/ https://www.theguardian.com/money/2017/aug/23/identity-fraud-figures- cifas-theft
3.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 3 White Hats Who are they? White hats use their powers for good and are also known as “ethical hackers,” white hats can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking. White hats employ the same methods of hacking as black hats, with one exception- they do it with permission from owners of the system, which makes the process completely legal. White hat hackers perform penetration testing to validate security controls within the organisation. Ethical hacking skills can be acquired through various training and certifications. Here are some known White Hat Hackers: “The smart watch is a very good example,” said Mr Toh Jing Hui , Research Assistant from Singapore University of Technology, who would be considered a white hat or ethical computer hacker. “What the attacker can do is to infect your smartwatch with a malicious software that makes it run like a printer.” http://www.channelnewsasia.com/news/singapore/ethical-hackers-on-the- frontline-keeping-your-home-safe-from-cyb-8577866 http://www.makeuseof.com/tag/5-worlds-famous-influential-white-hat- hackers/ Steve Wozniak Linus Torvalds Tim Berners-Lee
4.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 4 Black Hats Who are they? A black hat is a person who attempts to find security weaknesses and exploit them for personal financial gain or other malicious reasons. Black hats can inflict major damage on both individuals and large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks. Here are some known Black Hat Hackers: A ransomware attack is relatively easy to overcome if you have a current and complete copy of your data; you can simply restore the untainted files to your machine, says Beyer. (Before you do, though, be sure to install security software that will remove the ransomware, or you may find yourself being jacked all over again, he warns.) http://www.express.co.uk/life-style/science-technology/602157/Lizard-Squad- Hacking-Group-Ddos-Attack-PS4-Xbox-NCA https://www.technotification.com/2014/12/top-10-best-black-hat-hackers-in-the- world.html https://www.theguardian.com/technology/2016/aug/08/cyber-security-black-hat- defcon-hacking http://thementalclub.com/top-5-black-hat-hackers-world-572 Vladimir Levin George HotzLizard squad
5.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 5 Grey Hats Who are they? A Grey Hat in the IT community refers to a skilled hacker who toe the line of ethical boundaries. Grey Hats usually do not hack for personal gain nor have malicious intentions. However, Grey Hats may occasionally commit crimes during the course of his/her technological exploits. A grey hat will not necessarily notify the system admin of a successful compromise. Such a hacker prefers anonymity at almost all cost, carrying out their activities undetected with as little forensic traces as possible. Here are some common Grey Hat Hackers: “In order to get access to that information, at a minimum you need to turn to a grey hat hacker, who may have access to that side of the fence.” says Dave Millier, CEO of Sentry Metrics, a Toronto-based security consulting firm http://www.toptenz.net/top-10-infamous-hackers.php http://www.itworldcanada.com/article/experts-divided-on-grey-hat- hackers/45669 Robert T. Morris, Jr Mark AbeneKevin Mitnick
6.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 6 Hacktivism What does Hacktivism mean? Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist. In contrast to a malicious hacker who hacks with the intent to steal private information or cause others harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial-of- service(DoS) attacks, redirects, website parodies, information theft, virtual sabotage and virtual sit-ins. What motivates them? Hacktivism and hacktivists are motivated by an active desire to cripple government control and censorship of electronic and Web technologies and content. It is also their attempt at effecting change according to the beliefs they subscribe to. As such, hacktivism may be employed by those opposing rigorous copyright regulations or fervently interested in circumventing restricted electronic data. Digital Economy Minister Ed Vaizey said: "The UK is a world-leading digital economy and this Government has made cyber security a top priority. Too many firms are losing money, data and consumer confidence with the vast number of cyber attacks. It's absolutely crucial businesses are secure and can protect data." https://www.techopedia.com/definition/2410/hacktivism http://www.express.co.uk/news/world/669346/Anonymous-hackers-take- down-nine-banks-in-30-day-cyber-attack
7.
Cyber 101: Supplementary
Reading© 2017 Deloitte Touche Tohmatsu Limited Slide 7 As a business owner, you rarely think about the threat of cyber-attacks day-to-day, but when one happens to your businesses the result can be catastrophic. By making sure you have these basic security tips in place now, you can save yourself from a lot of preventable headaches down the line 4 Easy Ways to protect your organisation from cyber attackers • Know the risks Properly protecting your company from a cyber-attack starts with a comprehensive understanding of the internal and external threat exposure your organisation. You will want to have an understanding of your assets and potential areas where hackers may gain entry to your organisation. • Encrypt your data Keep your information safe by turning to encryption tools which come standard with most operating systems on. • Practise cyber hygiene Cyber-attacks are not limited to networked systems. Practising good cyber hygiene and culture can dramatically raise your security posture. Activities like shredding your documents and physically locking your computer while you are away from your desk is a good place to start. • Be vigilant Help employees understand the role they play in contributing to your organisation’s security posture. Organise regular awareness campaigns to detect and report potential threats and as well as awareness on how to keep information safe. https://www.entrepreneur.com/article/289680
8.
Deloitte refers to
one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about to learn more about our global network of member firms. Deloitte provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries and territories, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s more than 244,000 professionals are committed to becoming the standard of excellence. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services. No entity in the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication. © 2017. For information, contact Deloitte Touche Tohmatsu Limited
Baixar agora