Big Data Analysis in Cyber Security. K P Chow Law and Technology Center Center for Information Security and Cryptography
|
|
- Lewis Lucas
- 8 years ago
- Views:
Transcription
1 Big Data Analysis in Cyber Security K P Chow Law and Technology Center Center for Information Security and Cryptography University of Hong Kong Nov
2 Size of Attack Data Growing DDoS size now mostly ranges from 1Gbps to over 100Gbps, thus creating huge data logs for analysis 2
3 Log Review vs Big Data Analytics Extensive Sources of Data to be analyzed => Big Data Analytics Source: 3
4 BIG DATA IN MASSIVE CYBER ATTACKS CASE STUDY: CYBER ATTACKS BEFORE & AFTER OCM 4
5 The Beginning From June 2014 (after the d-day 3), Hong Kong citizens were invited to vote on a referendum on constitutional reforms that would guarantee all citizens the right to vote in elections that determine who will be the city's Chief Executive. To build a public consensus around a recent civil proposal on universal suffrage, the civic group Occupy Central with Love and Peace (OCLP) appointed the Public Opinion Programme (HKUPOP) at the University of Hong Kong to host the civil referendum on their servers. 5
6 The First Attack The voting system was hosted by Amazon Web Services (AWS), Cloudflare and UDomain. All three web hosting services suffered from large scale DDoS attacks on June 14 and 15: AWS recorded 10 billion system requests with 20 hours CloudFare recorded a 75Gb DDoS per second UDomain recorded 10Gb per second The Feb 2000 Attack Yahoo! received in excess of 1GB per second during the peak of the attack Buy.Com received traffic quantities approximately to 8 times of their total capacity 6
7 As the scale of attack is tremendous, all three service providers were forced to temporarily suspend their services. An expert estimated that there could be at least 5,000 but possibly more than 10,000 computers involved in the attack. CISC 7
8 Oct 2: Operation Hong Kong 'Anonymous' hacker group declares cyber war on Hong Kong government, police Greetings, world. We are Anonymous. Operation Hong Kong engaged. We are Anonymous. We are legion. We do not forgive. We do not forget. Government of Hong Kong, expect 8 us.
9 Oct 2: Anonymous declares war against HK Police Hactivist collective Anonymous, Antisec division, declared a cyber-war against Hong Kong for the treatment of protestors there. The group has already defaced several Hong Kongbased websites, and that dozens more would be affected over the next few days.
10 Cyber Attack during OCM
11 Cyber Attack after OCM
12 Total Number of Attacks Targeting Hong Kong (September and October, 2014) CISC 12
13 Peak Attack Sizes per Day (Gbps) in the first week of November It is apparent that DDoS attacks have become the new normal during periods of political unrest worldwide CISC 13
14 How to defense massive cyber attacks? Content Distribution Network CDN 14
15 Problems in Investigation Usually required to analyze large amount of attack data: do we have the data? Network forensics challenges Possibility of collecting all attack data Prerequisite settings for incident response and cyber attack analysis Cross jurisdiction issues - traceback
16 From Online to Offline CISC 16
17 CYBER CRIMINAL PROFILING USING BIG DATA CASE STUDY: PROFILING ONLINE FLASH MOB ORGANIZER AFTER OCM 17
18 After Occupy Central More conflicts between Hong Kong locals and mainland China visitors 18
19 From online to offline Flash-mob-like activity callings posted on the forum : Asking people to go shopping at a specified location and disperse afterwards 19
20 Questions of Interests Identification of Flash Mob Organizers online What are the key online behavioral attributes these flash-mob-like organizer(s) might have? Is it possible to identify these individuals at an early stage based on these attributes? Social Influence Index Is it possible to measure the social influence of these flash-mob-like organizer(s)? 20
21 Methodology STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer Discussion Forum is selected instead of Facebook because the privacy setting of Facebook might limit the data to be collected for research The key online behavioural attributes will be explained in the following slides Clustering will be used for the classification process A Social Influence Index will be introduced to measure the most influential flash mob organizer 21
22 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 22
23 Online Forum Variable name Description Value Forum_ID Identifier of a forum Nominal Forum_subcat Identifier of a forum subcategory Nominal (i) Topic variables Topic_ID Identifier of a topic ID Topic_author Author a new topic ID Topic_date Creation date of a new topic Date Topic_time Creation time of a new topic Time Topic_title Title of a new topic Text (i) Post variables Post_ID Identifier of a post under the topic ID Post_author Author a post under the topic ID Post _date Creation date of a post under the topic Date Post _time Creation time of a post under the topic Time Post _content Contents of a post under the topic Text 23
24 Big Data??? 200, , ,000 50,000 0 Total number of posts (Jan-Apr, 2015) 199, , ,400135,806 Jan Feb Mar Apr 6,000 5,000 4,000 3,000 2,000 1,000 0 Total number of topics (Jan-Apr, 2015) 3,273 3,896 5,912 4,174 Jan Feb Mar Apr These are just data from ONE subcategory. On average, there are: 4,314 topics per month, i.e. 51,765 topics per year 157,414 posts per month, i.e. 1,888,971 posts per year There are 33 subcategories under just ONE forum! 24
25 2 types of online users 16,000 14,000 12,000 10,000 8,000 6,000 4,000 2, ,484 13,221 1,026 1,154 1,506 1,161 Jan Feb Mar Apr Total number topic authors 14,694 14,343 Total number post authors These are just data from ONE subcategory. On average, there are: 1,212 topic-authors per month, i.e. 14,541 topic-authors per year 13,936 post-authors per month, i.e. 167,226 post-authors per year There are 33 subcategories under just ONE forum! 25
26 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 26
27 Type of Posts Empty & Spam Typical front page extracted from a subcategory of the forum: In order to keep a topic on the front page, topic-authors or post-authors might create some empty/spam posts to a topic. A typical empty/spam posts Spam post with the word push but no other contents Empty post with emoticons only, no contents 27
28 Key Online Attributes of Topic-Author Motivation#1 a Motivation#2 a Ability#1 b Ability#2 b Attributes total number of topics created by the Topic Author total number of empty/spam posts created by the Topic Author total number of posts responded by other Post Authors (including both empty posts and nonempty posts) Descriptions this shows the Topic Author is frequently engaging the community this shows the Topic Author is very eager to keep the topic at a higher rank a Motivation: In order to influence others, a Topic Author total number might of have non-empty/spam higher motivation in posts created by Topic trying to engage others in discussing the topics Author created by him/her. this shows the Topic Author is good at engaging conversation with other Post Authors this is an indication of the ability of Topic Author to attract others to discuss the topic b Ability: In order to influence other people, a Topic Author might have higher abilities than others to engage people in discussions of the topics created. 28
29 Results: Classification#1 Moderate-Inactive n=876, 28.8% of the sample s population No significant difference in motivation score with Inactive- Silent-Majority group Showed slightly better ability in engaging in topic discussion Inactive-Silent-Majority n=1552, 51.1% of the sample s population least motivated with the lowest ability creating an average of 1 to 2 topics during this 4- month period 29
30 Results: Classification#2 Active-Vocal-Minority n=155, 5.1% of the sample s population received an average of 1,853 posts/topic replied an average of 162 non-empty posts/topic posted an average of 71 new topics continuously during the 4-month period on average they are creating one new topic every 2.5 days Moderate-active n=457, 15.0% of the sample s population ranked second best in terms of motivation and ability as topic authors n=278, 61% of this group has been active as topic authors 30 for 2 to 3 months duration
31 STEP 1 STEP 2 STEP 3 Collection of data Extraction of key online behavioral attributes Classification of Topic Authors Identification of most influential flash mob organizer METHODOLOGY 31
32 We define as follows: Social Influence Index Social Influence Index = Log(z-score) Receives n (=r+e) posts to the topic Topic-author X creates a topic on the discussion forum By definition, z-score = Non-empty post #1 Non-empty post #r Empty/spam post #1 Empty/spam post #e x μ σ n 2 where μ = n p = σ = n p 1 p = n/2 Assume a random Post Author who responses with non-empty posts of probability p=0.5 and with empty posts of probability 1 - p =0.5 Thus, z score = r n/2 n/2 = r e r + e 32
33 Results Inactive- Silent- Majority (n=1552) Moderate -Inactive (n=876) Moderate -Active (n=457) Active- Vocal- Minority (n=155) Social Influence Index Total number of flash-mob-like topics Total number of posts replied to flash-mob-like topics ,076 29, , , ,279 The highest Social Influence Index score The most number (1,076) of flash-mob-like-demonstrationtopics, which accounted for 57% of the total. The most number (334,279) of responses, which accounted for 53% of the total. 33
34 Sample Topic-Author from Active- Vocal-Minority group Created 183 topics in just one month (March 2015)! Responded 552 times in just one month (March 2015)! 34
35 Challenges of Social Media Mining 1. Data collection issue 2. Empirical evaluation issue 3. Noise issue 35
36 Conclusion Cyber attacks investigation Do we have the data? Do we know how to analyze the data? From online to offline We have lots of data! Big data!!! Do we know how to analyze them? 36
37 谢 谢 Thank You
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationProtect Yourself in the Cloud Age
Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation
More informationTLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
More informationLegal Issues / Estonia Cyber Incident
Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia
More informationGovernment Projects (as Prime Contractor)
The Judiciary Security Risk Assessment & Audit Services for the Judiciary Mar 2014 HK$680,000 The Treasury Security Risk Assessment and Audit Services for the Treasury Oct 2013 HK$480,000 Lands Security
More informationSEO REPORT. Prepared for searchoptions.com.au
REPORT Prepared for searchoptions.com.au March 24, 2016 searchoptions.com.au ISSUES FOUND ON YOUR SITE (MARCH 24, 2016) This report shows the issues that, when solved, will improve your site rankings and
More informationCyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and
More informationInformation Security Summit 2005
Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government
More informationUsing big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationLeveraging Email, Social & Web. Budget Friendly & Effective Marketing
Leveraging Email, Social & Web Budget Friendly & Effective Marketing Agenda Why Leverage the Web? Web Metrics & Results Web Tactics Social & Email Marketing How to Get Started Today Feel free to ask questions
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationITRC announces latest updates of its Visitor Profile Study (VPS)
Thursday, 3 April 2014 ITRC announces latest updates of its Visitor Profile Study (VPS) IFT Tourism Research Centre (ITRC) is releasing today the most updated results of its Macao Visitor Profile Survey
More informationITRC Forum 2014 萬 雲 皆 有 險 : 雲 計 算 的 安 全 怎 影 響 你 的 管 理 概 念
ITRC Forum 2014 萬 雲 皆 有 險 : 雲 計 算 的 安 全 怎 影 響 你 的 管 理 概 念 How Cloud Computing Can Rain on Your IT Management Strategy By Roger Lee Presentation for ITRC Forum 2014 11 Dec 2014 (Thu) Agenda Response to
More informationWhite Paper. Intelligence Driven. Security Monitoring. v.2.1.1. nexusguard.com
White Paper 1 Intelligence Driven Security Monitoring v.2.1.1 Overview In today s hypercompetitive business environment, companies have to make swift and decisive decisions. Making the right judgment call
More informationCONTENT DELIVERY NETWORKS
T H E NEXT G E N E R A T I O N O F CONTENT DELIVERY NETWORKS For The Next Generation of Business to Go Forward, The Next Generation of CDN Must Go Faster THE FUTURE OF CDN 55% of global Internet traffic
More informationAN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH
AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH by Veronika Macková and Viktória Sučáková As we kick of spring of 2014, GNC Team is starting quarterly insight to cyber world from the point of view
More informationCorero Network Security plc
Corero Network Security plc The Stock Market Show 13 September 2014 Ashley Stephenson, CEO Overview Corero goes to market as a First Line of Defense that stops DDoS Attacks and Cyber Threats AIM listed
More informationHow To Understand The City Of Hong Kong
OGCIO Seminar on PSI/Data.One PSI and Big Data Jiannong Cao Department of Computing Hong Kong Polytechnic University Big Data TB (10 12 bytes) PB (10 15 bytes) EB (10 18 bytes) ZB (10 21 bytes)... The
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationTable of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience...
Table of Contents Overview... 1 Introduction... 2 Common Architectures... 3 Simple System... 3 Highly Available System... 4 Large Scale High-Performance System... 5 Technical Challenges with Magento...
More informationComputer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID
Computer Forensics and Incident Response in the Cloud SESSION ID: ANF-T07A Stephen Coty AlertLogic, Inc. @Twitter AlertLogic_ACID Why forensics in the cloud? Cloud market revenue will increase at a 36%
More informationDDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.
[ Executive Brief ] DDoS DETECTING DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. Your data isn t safe. And neither is your website or your business. Hacking has become more prevalent and more sophisticated
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationDomain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
More informationSEO-ANALYSE RAPPORT. Forberedt for tv2.dk
SEO-ANALYSE RAPPORT Forberedt for tv2.dk 25. marts 2016 tv2.dk SEO ISSUES FOUND ON YOUR SITE (25. MARTS 2016) This report shows the SEO issues that, when solved, will improve your site rankings and increase
More informationData Breaches, Identity Theft, and Employees
Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity
More informationBasheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends
More informationBT Retail Social Media making it easy for our customers
BT Retail Social Media making it easy for our customers Dawn Walton, GM Central Planning Nigel Elliott, Social Media Channel Manager Kerry Gulloch, Social Media Communities Manager Agenda o How we ended
More informationSEO Presentation. Asenyo Inc.
SEO Presentation What is Search Engine Optimization? Search Engine Optimization (SEO) : PPC and Organic Results Pay Per Click Ads The means of achieving top search engine results without having to incur
More informationFreedom of Information Request Reference No: I note you seek access to the following information:
Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly
More informationArchitectural Services Data Summary March 2011
Firms Typically Small in Size According to the latest U.S. Census Survey of Business Owners, majority of the firms under the description Architectural Services are less than 500 in staff size (99.78%).
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationDenial of Service. Tom Chen SMU tchen@engr.smu.edu
Denial of Service Tom Chen SMU tchen@engr.smu.edu Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
More information2/24/2011. What is Cyber Security? Law Enforcement Perspective. IT professional s Perspective. Managerial Perspective. Netizen s Perspective
Cyber Security & Internet Technology Laws in India What is Cyber Security? By (LBSIT on 24 th Feb 2011) There could be different Perspectives IT professional s Perspective Law Enforcement Perspective Netizen
More informationTaking stock of China s external debt: low indebtedness, but rapid growth is a concern
1991 1993 1995 1997 1999 21 23 25 27 29 211 213 1991 1992 1993 1994 1995 1996 1997 1998 1999 2 21 22 23 24 25 26 27 28 29 21 211 212 213 ECONOMIC ANALYSIS Taking stock of China s external debt: low indebtedness,
More informationUsing Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
More informationLarge-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
More informationComputer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance
Computer Software Bugs and Other IT Threats to Critical Infrastructure: A Preliminary Set of Considerations for IT Governance Presentation for the Seventh European Academic Conference on Internal Audit
More informationEmbracing Open Source: Practice and Experience from Alibaba. Wensong Zhang The 11 th Northeast Asia OSS Promotion Forum 2012.11.13
Embracing Open Source: Practice and Experience from Alibaba Wensong Zhang The 11 th Northeast Asia OSS Promotion Forum 2012.11.13 1 Agenda 1. Overview of Alibaba 2. Taobao Software Infrastructure 3. Cases:
More informationSurviving a DDoS Attack
Surviving a DDoS Attack Matt Johnson, Technical Director, Eduserv Networkshop14, April 2014 www.eduserv.org.uk Agenda Background Diary of the DDoS Attack profiles & social media Analysis and solution overview
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
More informationMarket Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.
Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Your Market Assessment Overview Your Inbound Market Assessment and Campaign SLA Calculator is broken down into several
More informationCyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
More informationSecurity Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
More informationFostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
More informationOnline Auto Insurance
Online Auto Insurance Presented to IIABA ACT Susan Engleson, Senior Director September 27, 2013 comscore is a leading internet technology company that provides Analytics for a Digital World NASDAQ SCOR
More informationGlasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
More informationCybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat www.etda.or.th
Cybersecurity: Thailand s and ASEAN s priorities Soranun Jiwasurat www.etda.or.th Cyber Threat Landscape Overview 2 Cyber threat a hostile act using computers, electronic information and/or digital networks
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More information立 法 會 Legislative Council
立 法 會 Legislative Council LC Paper No. CB(4)1212/14-15(04) Ref. : CB4/PL/ITB Panel on Information Technology and Broadcasting Meeting on 17 July 2015 Updated background brief on information security Purpose
More informationEngineering Doctorate (Engineering Management) 工 程 學 博 士 ( 工 程 管 理 )
College of Science and Engineering 科 學 及 工 程 學 院 Department of Systems Engineering and Engineering Management 系 統 工 程 及 工 程 管 理 學 系 Engineering Doctorate (Engineering Management) 工 程 學 博 士 ( 工 程 管 理 )
More informationEnd of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net
End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life
More informationQi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
More informationHope for the best, prepare for the worst:
Hope for the best, prepare for the worst: Why your customers will demand self-service back-up Presented by Ridley Ruth, COO Breaking News Yahoo email Accounts were hacked in Jan 2014 (Washington Post)
More informationjobsdb Compensation and Benefits Survey Report 2015
jobsdb Compensation and Benefits Survey Report 2015 Content Introduction. 7 Scope and methodology. 8-9 Chart Size of participating companies Definition...10-11 1. Hiring plan and market expectation 1.1
More information2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative
2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,
More informationExecutive Summary. McAfee Labs Threats Report: Third Quarter 2013
Executive Summary McAfee Labs Threats Report: Third Quarter Although summer can be a relatively slow season for cybercriminal activity (even the bad guys need a break occasionally), the third quarter of
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationEMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
More informationActivity Report for FY 2010 Real-time Traffic Signal Adjustments
Boston Transportation Management Center Activity Report for FY 2010 Real-time Traffic Signal Adjustments The Boston Transportation Department s Transportation Management Center (TMC) holds the mission
More informationProtecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
More informationHow to Develop a Mobile Strategy
How to Develop a Mobile Strategy 1 Presenter Andy Etemadi EYEMAGINE President & Chief Technology Officer 2 Presenter Greg Lett Lett Direct Vice President Web Marketing 3 Agenda Mobile Trends in ecommerce
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationABC PRIVACY POLICY. The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services.
ABC PRIVACY POLICY The ABC is strongly committed to protecting your privacy when you interact with us, our content, products and services. Our goal is to provide you and your family with media experiences
More informationDDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
More informationAMPIFY YOUR BRAND ON SNAP MOBILE S MOBILE WEB NETWORK. May 2014
AMPIFY YOUR BRAND ON SNAP MOBILE S MOBILE WEB NETWORK May 2014 FLYDAY Monthly Page Views: 200,000+ Monthly Unique Visitors: 130,000+ URL: Flyday,.hk Flyday.hk is a leading online travel deals distribution
More informationUS Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources
Vision Statement Be the premier stewards of entrusted hydropower resources Mission Statement Provide reliable hydroelectric power services at the lowest possible cost, consistent with sound business principles,
More information2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH
More informationMata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework. FIRST Conference Berlin, 19 June 2015
Mata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework FIRST Conference Berlin, 19 June 2015 1 Security in Real Life 2 3 Car Alarms Network Security Alarms 4 Our responsibility
More informationAuthenticating and policing the internet for consumer confidence and security
Authenticating and policing the internet for consumer confidence and security Secure On-Line ID Introduction Unique zero intervention at a glance solution Built on positive site validation Allows policing
More information"BIG DATA A PROLIFIC USE OF INFORMATION"
Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationGovernment Projects (as Prime Contractor)
Civil Service Training and Development Institute, Civil Service Bureau (CSTDI, CSB) System Maintenance and Support Services of the Training Administration System (TAS) for the Civil Service Training and
More informationDDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack
DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack Sugih Jamin EECS Department University of Michigan jamin@eecs.umich.edu Internet Design Goals Key design goals of Internet protocols:
More informationResource Management Spreadsheet Capabilities. Stuart Dixon Resource Manager
Resource Management Spreadsheet Capabilities Stuart Dixon Resource Manager Purpose Single view of resource data Shows rolling demand vs supply for 14 months, 2 months back, current month, and 11 forward
More informationThe following is issued on behalf of the Committee on the Promotion of Civic Education:
Results of 2004 Civic Education Opinion Survey released *************************************************** The following is issued on behalf of the Committee on the Promotion of Civic Education: The Committee
More informationCONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY
CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY MATTHIAS YEO Chief Technology Officer - APAC CISSP, CISA, CISM, PMP 1 OVER REACTING VS UNDER REACTING Reason for the world today
More informationBoston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments
Boston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments The mission of the Traffic Management Center (TMC) within the Boston Transportation Department is to monitor,
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationONLINE TRADING IN TAIWAN
ONLINE TRADING IN TAIWAN Online trading is still not the mainstream. In December 2001, only 8.7% of the total market turnover value was conducted online and 16% of total investor accounts were online accounts.
More informationMobile Marketing A New Analytics Framework What we have & what we need 2/28/12
Mobile Marketing A New Analytics Framework What we have & what we need 2/28/12 1! The future is increasingly mobile Yesterday 6 billion mobile devices globally and 1.2 billion mobile web users in 2011
More informationDigital War in e-business
Digital War in e-business Ricci Ieong, Secretary of ISFS, Senior Security Consultant, PrivyLink (HK) Ltd. Trend in Internet Commerce Market More Internet Commerce Market G Increase in Business to Commerce
More informationMaster Move in Mastering the Online Multi-Channel. Mark Craig Business Development Manager
Master Move in Mastering the Online Multi-Channel Mark Craig Business Development Manager Agenda What is multichannel? Opportunities & challenges of multichannel The need to be platform agnostic One high
More informationFirewalls & Intrusion Detection
Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion
More informationCentral Hosting. Case Study
Central Hosting Case Study October, 2014 Central Hosting Case Study Background An Chéim was originally set up to procure, distribute and implement key MIS systems (hardware and software) for the Institutes
More informationPreventing road crash injuries involving children
Preventing road crash injuries involving children Experience of Slovenia Robert Štaba, AMZS Road Safety Comission Secretary SOL Road Safety Conference - Budapest 2011 SLOVENIA 2 million people Capital
More informationSecurity Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
More informationTake My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)
Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein,
More informationInformation Security Seminar 2013
Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative
More informationBig Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.
Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention. I m not going to get more money. I m not going to get more cops. I have
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More information