CYBER SECURITY ISSUUES AND ETHICAL HACKING IN PAKISTAN

Size: px
Start display at page:

Download "CYBER SECURITY ISSUUES AND ETHICAL HACKING IN PAKISTAN"

Transcription

1 CYBER SECURITY ISSUUES AND ETHICAL HACKING IN PAKISTAN Arshee Ahmed Telecom Engineer National University of Computer and Emerging Sciences- FAST MS Student Bahria University Dr. Sadiq Ali Khan Associate Professor Department of Computer Science Karachi University Abstract: The objective of this study to embark the light on the issues regarding cyber security and the preventive measures to be taken. This paper covers various types of cybercrime, along with deployment of cyber law on international level.further role of the social media and Pakistan s contribution in the cyber world have been discussed. This study also focuses on Pakistan s role in producing highly qualified ethical hackers. The scope of this study is survey based, the results along with interpretations have been discussed at the end of the paper. 1. INTRODUCTION After the advent of the internet, it has been the most efficient mean of communication. No doubt there are uncountable advantages of the internet but on the other side the world is at the dangerous zone due to the misuse of the technology. There are unlimited number of crimes which have been committed by the use of the internet. There are three broader categories in internet world. The crime in which internet is used as the tool of the criminal is called cybercrime. Cybercrimes violate the law and committed by means of a computer system. Other two broader categories are cyber-attack and cyber warfare. The objective of cyber-attack and cyber warfare is to undermine the functions of computer network [1]. While ever growing demand of the internet, cyber security has been the top issues around the world [1].The intensity of the cyber crime varies from hacking of a account to the airplane crashes due to false message to air traffic control system.[1].in cyber crime criminals can easily hide their identity because there are no physical limitations and boundaries. 1

2 1.1Cybercrimes in Pakistan: The rate of cybercrime in Pakistan is less than the first world countries.because internet usage in not as much wide spread. Majority of the population reside in rural areas where the people are not aware of the technology usage. There was an ICT 7th exhibition CONNECT 2012 held in Expo Centre Karachi where President Pakistan Information Security Association (PISA) and former additional director general FIA Ammar Jaffery said The unwillingness of cyber crime victims to pursue cases is the major hurdle in the way of investigations and action against hackers and criminals in the country. According to him around 200 cases were reported in 2011 including internet fraud, website hacking.the victims do not report against the crime because of the fear of police, black mailing and personal secrets. There are lots of crimes which have been committed during the past five years.on February 16, 2012 FIA arrested a software engineer of a local institution. The boy was accused for hacking and Facebook IDs. He was used to blackmail females via Facebook accounts.the cybercrime of wing of FIA arrested a man for sending threatening s to the managing director of the Karachi Water and Sewerage Board.On May 16,2012 CIA arrested four people and handle them to FIA.Two of them were carrying Italian passports and had committed crimes like credit card fraud in Italy.There are uncountable number of cybercrimes which take place in our day to day life. 1.2 The Role of Social Network Sites: The SNS plays the vital role in cyber crimes. The sites like Facebook, twitter are at the top. In SNS one can easily create false profile [3].The criminal usually create the dummy profiles of the celebrities and attractive women[3].men accept the friend request from women even if they are complete stranger [3].You can imagine how convenient it is to get access to your victim s information. There are cases like the criminal sends messages to the users, claims to be old friend of them. He asks for financial assistance claiming that he is in the foreign country and has been a victim of robbery[3] The lack of awareness will cause SNS users to become the victim of fraudulent. The trend of online marriages has become so common nowadays. People socialize themselves through these SNS. The criminals trap girls and play with them. Intelligence gathering can easily done with SNS[2].Locative social media like Facebook, twitter have been the source to check potential targets[2].sns is also used for propaganda[3].terrorist can easily communicate with the wide audience[3].there was a report generated in 2010.According to the report terrorist target young people through these SNS and online video games[3].there was a case of Irhabi terrorist in 2005[3].He was used to hacking websites and was teaching online hacking skill to other Jihadis [3].In Mexico city, according to a report generated in 2009, fraud led is the number one cybercrime. In USA Air force, there is enough personal information available in SNS for cyber-attack [3]. 1.3 Types of cybercrimes: Pakistan is the bottleneck of following cybercrimes. Financial Crimes Cyber pornography Spoofing Forgery Cyber defamation Cyber stalking Unauthorized access to computer systems or networks: 2

3 Theft of information contained in electronic form Data diddling Salami attacks Denial of Service attack Virus/worm attacks Logic bombs Physically damaging a computer system Financial crimes include credit card fraud, money laundering. Spoofing is a mail that appears to be sent from a source but actually some other source is the originator of the .forging is the counterfeit of various things like mark sheets with the help of computers, printers. Cyber defamation is used to defame a person by posting defamatory material on sites. Cyber stalking means following a person via internet keep eye on his activities and constantly sending . There are crimes in which computer is target of the criminal or criminal use computer as the tool of their target.here are some of the examples.unauthorized access to computer system network comes under hacking like hacking of website.data didding is to play with data. There are Salami attacks which are used to crash a system. Like attackers send requests more than the capacity of the system. This causes system to get crash as it won t be capable of handling excessive demands. There are other viruses and worms which stick to the file and computers, causes them damage. Some viruses are event dependent. These viruses tend to be active on particular day. There is a program called Trojan which is the unauthorized program but looks like the authorized one and conceals the information.web jacking also occurs in Pakistan in which the person takes control over the website and the site is not in the control of the owner. Physically damaging and theft the computer peripherals is also a cyber-crime. 1.4 Ethical Hacking: When you design a network, you need to check whether your system is capable of fighting all forms of cyber-attacks. In ethical hacking we test our system by hiring ethical hacker. An ethical hacker uses all the tools and techniques that hacker does to exploit the security system. So, it is required for all of the developed and developing countries to produce Certified Ethical Hacker.The Professional Development Centre at Riphah Institute of Systems Engineering (RISE) in collaboration with EC-Council has launched a certified Ethical Hacker program. In Pakistan, Karachi Kalsoft Company has launched its ethical hacker program in November 2008 from E council..new Horizons has also launched its ethical hacking program. 1.5 Pakistan s contribution in Cyber World: In Karachi there are maximum number of internet users then in Lahore and Islamabad. To compete with the cyber-attacks, Transaction Ordinance 2002 was passed by the Pakistan s Government for facilitating and monitor all the forms of communication in electronic media.with the legal frame work we can now have legal backing of all the documents and day to day transactions.this IT contribution is the land mark of the 21 st century. The Electronic Crime Act 2004 was prepared with the collaboration of Ministry of Information Technology with the electronic transaction order 2002.The act has defined legislative terms for the following cybercrimes. Criminal access Criminal data access Data damage System damage 3

4 Electronic fraud Electronic forgery Misuse of devices Misuse of encryption Malicious code Cyber stalking Spamming Spoofing Unauthorized interception Cyber Terrorism National Response Centre is another step taken by the Government of Pakistan to stop misusing the internet. Under the General Pervaiz Musharaf government in July 2002, PTA put orders for cyber café owners to keep the record of their customers. The report says, Gen Musharraf says his government has invested more than 100 million euros in communications and sharply reduced the cost of connections and services since 1999.Pakistan has since launched a program to boost digital technology and information technology.on April 2, 2003 PTCL announced that internet operators have been asked to block 400 websites in addition with earlier 100 sites which contain unethical data. A senior PTCL official, Zahir Khan, said on April 6, 2003, that access to nearly 1,800 pornographic sites had been banned and the PTCL was thinking of importing software to make it easier to do. PTCL also targeted anti- Islamic and blasphemous sites. 2. LITERATURE SURVEY: With the ever growing technology, its advantages and disadvantages are increasing too.technology is Cyber Security is the most serious issue around the world. In April 2007, Estonia suffered a major cyber-attack[4].after which Estonia is contributing in securing cyber space worldwide. According to Joak AAVIKSOO, Minister of education and Research Estonia, they have analyzed weak point in their infrastructure.[4].as per their conclusions their law enforcements, border line do not hold in cyberspace[4].and most of the infrastructure is not under single body, 80% of web infrastructure is in private hands[4].in 2008 Estonia has formulated a National Cyber Security Strategy[4].The objective of National Cyber Security Strategy is to ensure cyber security and help private sectors to develop highly secured standards[4].in Malaysian primary school, cyber bullying and hacking are the major occurring crimes[5].there is an Adaptive Information Security Model which was developed to lessen the gap between what we can do and control with ICT[6].There are five critical systems which ensure the highly secured and prospered network[6].there are 41 internet crimes have been analyzed[6].the analyses show that victims were missing in these five security measures[6].a penetration test on internet service provider was conducted in Sweden[7].The purpose of the test was to discover system vulnerabilities and security flaws in their infrastructure[7].in Burma just before country s first national elections in twenty years, the internet was shutdown[1]. Offenders usually use public places to commit crimes which hides their identity and where there is no effective legislation..internet has given birth to terrorist propaganda. Radicalization can be done using internet [4].Terrorist can edit some video and make it according to their cause [4].Misconfiguration of websites causes search engines to penetrate into website and causes illegal access to data [8].Search engines need to obey some rules, disallowing some of the folders, files and images [8]. producing several negative impacts on society Internet hacking is worth noting. 4

5 2.1 Tools used for the crime: Stuxnet was launched in 2009 and 2010.It was created by USA and Israel.Its target was Iran s nuclear enrichment plant.stuxnet spread via usb jacks.stuxnet was built for not only just spy the industrial system but also reprogram them.a research conducted by Symantec showed that its main affected countries were Iran, Indonesia and India. Country Infected computers Iran 58.85% Indonesia 18.22% India 8.31% Azerbaijan 2.57% United States 1.56% Pakistan 1.28% Others 9.2% There is another term developed for cyber-attacks, Botnets. The term Bot originated from robot. Attackers distribute this software via spam mail.this turns your computer into a bot.the bot is also called a Zombie.Criminals use botnet to infect a huge number of computers. been provided, people have been asked to select multiple answers. The six choices are Greed, Power, Publicity, Revenge, Desire to access forbidden information and Destructive mind set. To judge the awareness about the implementation of cyber laws in Pakistan, people s level of knowledge about the deployment of laws have been asked. People s knowledge about occurring of cybercrimes have been asked to check whether the people have access to such magazines, newspaper and news. The next question determines what the citizens think regarding the occurring of various forms crimes.several crimes like Financial crimes, Cyber Pornography, related crime, Hacking, Web Jacking, Sales of illegal articles are listed. The next item determines whether the targeted persons have been a victim of the any form of the crime. My other question checks what the people think about the role of the Ethical Hacker in securing a system. Upto what percentage a company is secured against an attack or crime. According to my research a huge number crimes are due to the social networking sites. People consideration regarding the ban of these SNS have been judged. I have also determined where the companies stand in these five security measures.these are Deterrence, Prevention, Detection, Response and Recovery. 3. METHODOLOGY: In this research paper I have conducted a survey on the security issues and ethical hacking..questions were distributed in such a way that it covered all of the relevant material. In first question people knowledge about the cyber-crime was judged. The purpose of the first question was to determine how much of the people are aware of this term. The second question was designed to determine the internet usage among the people. In my next question I asked whether people consider cybercrime a threat or not. Because I have studied the cases in which victim especially females have been black mailing via social media sites In fourth question the reason behind committing crime have been asked. Six options have 3.1 Results and Discussions: I have targeted people who are teenagers, are in the age of 20s, 30s and 40s.According to the survey 93% of the people is aware about cybercrime. While 7% of the people are not familiar with the term cybercrime. Age does not matter in this scenario; all depends on your exposure and nature the of job. Criminals use internet more than the average man because they use internet to plan their targets, their ways of attack.greater the internet usage, greater the chance of people being turning into criminals. In Pakistan 52% of people use internet frequently,34% of the people have internet usage more frequently while only 13% of the people use internet once a while. basis. Fiqure1 shows graph of the responses. 5

6 How often you use the internet in your daily routine? The result shows that people are familiar with the number of ways in which a person can used different forms of the crimes for threatening somebody. There is some reason behind the scene which turns a noble man to a criminal. Usually a person commit a cybercrime due to greed, power, publicity, revenge, desire to access forbidden information and destructive mindset. The point of view of the people is as under. Fig Table shows the percentage usage of the internet. According to your point of view what is the reason behind committing the crime? Frequently 54% More Frequently 34% Once in a while 13% PERCENTAGE USAGE OF INTERNET Table When it comes to whether the people in Pakistan thinks cybercrime is a threat or not.92%of the people consider cybercrime a threat while 8% people consider cybercrime is not a threat. Fig Do you consider cybercrime a threat? Fig Greed 11% Power 13% Publicity 10% Revenge 11% Desire to access forbidden information 31% Destructive mindset 23% 6

7 shows majority of the citizen in Pakistan are not fully Result of the views regarding mindset of crime Table The result of the question whether Cyber laws in Pakistan are being implemented or not, conflicts with my researched material. Figure and table summarizes the result. acknowledged with the cyber laws. About the occurring various forms of the crime, cyber pornography is the,most occurring crime in Pakistan. While Sales of illegal articles(sale of narcotics, weapons and wildlife is the least occurring crime.occurrence of various crimes have been summarized in table to table Financial Crimes Do you think in Pakistan there is no particular implementation of cyber laws? Occur Frequently 53% Occur more frequently 24% Occur infrequently 21% Has not occurred 2% Occurrence of Financial Crimes Table Fig Agree 47% Strongly agree 34% Disagree 19% Strongly disagree 0% Cyber pornography Occur Frequently 49% Occur more frequently 41% Occur infrequently 7% Has not occurred 4% Occurrence of Cyber Pornography Views of the people regarding implementation of Laws Table Table According to the researched material, Cyber laws in Pakistan have been implemented [see introduction section].but result Related Crimes 7

8 Occur Frequently 35% Occur more frequently 38% Occur infrequently 22% Has not occurred 5% Has not occurred 23% Occurrence of sales of Ilegal Articles Table Occurrence of Related Crimes Hacking Table Occur Frequently 40% Occur infrequently 19% Has not occurred 1% In my survey, I found majority of the victims of related crime. And one person have been a victim of web jacking. Regarding ethical hacking my findings are 59% of the citizens think that company gets highly secured approximately 70-80% against all types of attacks after hiring an ethical hacker New methods to combat cyber-attack are being developing and the criminals are equipping themselves with the new ways of cyber-attacks. Table summarizes the result. Occurrence of Hacking Table If an ethical hacker is employed by a company, the company gets secured against the crime to what extent. Web Jacking Occur Frequently 34% Occur infrequently 36% Has not occurred 9% % 12% 70-80% 60% 50-60% 28% Occurrence of Web Jacking Table Table Sales of illegal Articles Occur Frequently 26% Occur more frequently 20% Occur infrequently 31% 50% of the citizens in Pakistan think that social networking sites should be banned in Pakistan. While 50% of the citizens are against such bans. Result is as under. 8

9 Researches have shown majority of the cyber attackers use social network sites as the source of the victim s private information. Do you agree these sites should be banned in Pakistan? Fig % people go with yes while 50% go with no. day to day routine. Only those people who have been the victim of the crime have taken some preventive measures.obviously someone belongs to the IT world, he or she familiar with the tool to combat cyber-attack. Regarding Pakistan s role in to combat cyber-attack. Regarding Pakistan s role in securing cyber space is worth noting. FIA and its regulatory bodies have been performing well in maintaining legislative law. According to my point of view, some of the features in social networking sites should be banned in Pakistan. I am 100% sure that if we ban SNS, 90% of the cyber security issues will be resolved.further I recommend parents of the teenagers to keep check on your children.because this is the age of developing the habit of misuse of technology. Regarding the five security measures, responses show that majority of the companies are fully acknowledged about the importance of security measures and the companies have deployed such measures in their systems. 4. CONCLUSION I conclude my research by mentioning that in Pakistan people are less attentive on cyber security. People are busy in their 9

10 References [1] Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix,Aileen Nowlan, William Perdue, Julia Spiegel; The Law of Cyber Attack ; Forthcoming in the California Law Review, 2012 [7] Petter Svenhard & Amir Radaslic A Penetration Test of an Internet Service Provider ; Copyright Petter Svenhard, Amir Radaslic, All rights reserved Bachelor Thesis Report, IDE1256 School of Information Science, Computer and Electrical Engineering Halmstad University [2] Mindy Chidester ; The Exploitation of Social Media by Clandestine Groups, How Law Enforcement & Intelligent Can Better Utilize Social Media, and Legal Concerns to Ensure its Appropriate Use by Government Entities ; A Thesis Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Master of Science in Homeland Security by Mindy Chidester Summer 2012 [8] Rizik M.H Al-Sayyed atel ; Search Engines in Website Security Leak ; World Applied Sciences Journal 20 (5): , 2012 ISSN IDOSI Publications, 2012 DOI: /idosi.wasj [9] Mrs.Yogini A. Kulkarni Mr. Rajendra.G. Kaduskar [3] Julian Charvat; Radicalization on the Internet ;Defence Against Terrorism Review Vol.3, No2,F all 2010,pp Copyright COE-DAT ISSN: [4] Jaak AAVIKSOO, Minister of Education and Research,Estonia; Cyberattacks Against Estonia Raised Awareness of Cyberthreats; Defence Against Terrorism Review Vol.3,No. 2 F all 2010,pp Copyright COE-DAT ISSN: Department Of Computer Engg., Department Of E &TC Engg. PVG s COET, PVG s COET, Pune, India Pune, India,; Security against Malicious Code in Web Based Applications ; / IEEE DOI /ICETET [10] Eric Ke Wang,Yunming Ye, Xiaofei Xu [5] Maslin Masrom, Nik Hasnaa Nik Mahmood, Othman Zainon, Hooi Lai Wan, Nadia Jamal ; Information and Communication Technology Issues: A Case of Malaysian Primary School ; VOL. 2, NO. 5, June 2012 ISSN ARPN Journal of Science and Technology All rights reserved. Department of Computer Science Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China, S.M.Yiu, L.C.K.Hui, K.P.Chow Department of Computer Science The University of Hong Kong Pokfulam, Hong Kong; Security Issues and Challenges for Cyber Physical System; 2010 IEEE/ACM International Conference on Green Computing and Communications & 2010 IEEE/ACM International Conference [6] Jeffy Mwakalinga and Stewart Kowalski; ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security ; IJCSNS International Journal of Computer 114 Science and Network Security, VOL.11 No.3, March 2011 on Cyber, Physical and Social Computing / IEEE DOI /GreenCom- CPSCom

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013 Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

AN INTEGRATED APPROACH TOWARDS A PENETRATION TESTING FOR CYBERSPACES. Hanaa. M. Said, Mohamed Hamdy, Rania El Gohary and Abdel-Badeeh M.

AN INTEGRATED APPROACH TOWARDS A PENETRATION TESTING FOR CYBERSPACES. Hanaa. M. Said, Mohamed Hamdy, Rania El Gohary and Abdel-Badeeh M. AN INTEGRATED APPROACH TOWARDS A PENETRATION TESTING FOR CYBERSPACES Hanaa. M. Said, Mohamed Hamdy, Rania El Gohary and Abdel-Badeeh M. Salem Ain Shams University Faculty of Computing, Information Science

More information

CYBER CRIME AWARENESS

CYBER CRIME AWARENESS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 2, March-April (ISSN 2278 5973) CYBER CRIME AWARENESS RITU DHANOA* ABSTRACT: Cyber crime is emerging as

More information

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

Real world cyber crime cases

Real world cyber crime cases Real world cyber crime cases This document is an extract from the book Cyber Crime & Digital Evidence Indian Perspective authored by Rohas Nagpal. This book is available as courseware for the Diploma in

More information

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

CYBER SECURITY IN INDIA

CYBER SECURITY IN INDIA CYBER SECURITY IN INDIA Introduction In the last couple of decades India has carved a niche for itself in the field of Information technology. Optimization of Information technology in Banking, Defence,

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Internet security: Shutting the doors to keep hackers off your network

Internet security: Shutting the doors to keep hackers off your network Internet security: Shutting the doors to keep hackers off your network A Paralogic Networks Guide www.scholarisintl.com Introduction Like all revolutionary steps in technological development the Internet

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services announces Training

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

TECHNOLOGY ACCEPTABLE USE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and

More information

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop

More information

Cyber Security Threats and Countermeasures

Cyber Security Threats and Countermeasures GBDe 2006 Issue Group Cyber Security Threats and Countermeasures Issue Chair: Buheita Fujiwara, Chairman, Information-technology Promotion Agency (IPA), Japan 1. Overview Cyber security is expanding its

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range

More information

IT Security Management 100 Success Secrets

IT Security Management 100 Success Secrets IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management

More information

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013 Investigating Computer Crime Professor Carsten Maple University of Bedfordshire 8th February 2013 Why am I here? Background Computer Scientist applicable computing Co-author of UK Security Breaches Report

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Cyber security trends & strategy for business (digital?)

Cyber security trends & strategy for business (digital?) Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST

More information

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

ITU Global Cybersecurity Agenda (GCA)

ITU Global Cybersecurity Agenda (GCA) International Telecommunication Union ITU Global Cybersecurity Agenda (GCA) Framework for International Cooperation in Cybersecurity ITU 2007 All rights reserved. No part of this publication may be reproduced,

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my Identity Fraud: Platform for Cybercrime Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia zabri@cybersecurity.my Introduction of Digital Forensics Department, CyberSecurity

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V Subject Name: Cyber Security and Forensics (CSF) (Elective-II) Subject Code: 2650008 1. Learning Objectives: To understand

More information

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510 TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime The Global Polity Cybercrime, Cybersecurity and the Future of the Internet The Challenges Cybercrime is now the fastest growing sector of cross-border organized crime. In 2009, reported losses in the US

More information

ON COMBATING CURRENT AND EMERGING CYBERCRIMES IN KENYA

ON COMBATING CURRENT AND EMERGING CYBERCRIMES IN KENYA International Journal of Education and Research Vol. 3 No. 11 November 2015 ON COMBATING CURRENT AND EMERGING CYBERCRIMES IN KENYA Fredrick Mugambi Muthengi Department of Computer Science Chuka University

More information

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.

More information

How To Protect Your Computer From Attack

How To Protect Your Computer From Attack FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework

Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework Edith Cowan University Research Online Australian Counter Terrorism Conference Security Research Institute Conferences 2012 Cyberterrorism: Addressing the Challenges for Establishing an International Legal

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Framework for Live Digital Forensics using Data Mining

Framework for Live Digital Forensics using Data Mining Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract

More information

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges An Introduction to Cyber Crime and Terrorism: Problems and the Challenges Marc Goodman Director of International Cooperation International Multilateral Partnership Against Cyber Threats (IMPACT) What is

More information

7 Cs of WEB design - Customer Interface

7 Cs of WEB design - Customer Interface 7 Cs of WEB design - Customer Interface Exhibit 6-1: The 7Cs of the Customer Interface Context Site s layout and design Content Text, pictures, sound and video that web pages contain Commerce Site s capabilities

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

National Cybersecurity Awareness Campaign

National Cybersecurity Awareness Campaign National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013

ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 ADVANCEMENT OF CYBER SECUIRTY THROUGH PUBLIC PRIVATE PARTENERSHIP ICT WEEK AUC 4-6 DEC 2013 1 CONTENT INTRODUCTION COMESA CYBER SECUIRTY PROGRAMME CYBER SECURITY ECONOMICS WHY PPPs? PPPs ACTORs CHALLENGES

More information

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors FP7-SEC-2013.2.5-2 Grant Agreement Number 607775 Collaborative Project E-CRIME The economic impacts of cyber crime D2.2 Executive summary and brief: Cyber crime inventory and networks in non-ict sectors

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN

TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN TOWARD A SAFER INTERNET ENVIRONMENT FOR CHILDREN Ngo Quang Huy Information Security Expert, Vietnam Computer Emergency Response Team Ministry of Information and Communications, Vietnam Email: huynq@mic.gov.vn

More information

How to Prevent It What to Do If You Are a Victim

How to Prevent It What to Do If You Are a Victim How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses

More information

HOW SECURE IS YOUR ORGANIZATION FROM CYBER CRIME? Presented by

HOW SECURE IS YOUR ORGANIZATION FROM CYBER CRIME? Presented by HOW SECURE IS YOUR ORGANIZATION FROM CYBER CRIME? Presented by PPN PRESENTATION OBJECTIVES To create or increase awareness of some areas of risk exposures as they pertain to information and network security.

More information

Cybercrime in Canadian Criminal Law

Cybercrime in Canadian Criminal Law Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime

More information

Ed Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business

Ed Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP eferrara@temple.edu Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes

More information

Cybersecurity. Canisius College

Cybersecurity. Canisius College Cybersecurity Introduction In the year 2013, cybersecurity is a relevant issue on both the most personal level and the global level. Never has humanity had access to such a vast array of information. Never

More information

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern

More information

TLP WHITE. Denial of service attacks: what you need to know

TLP WHITE. Denial of service attacks: what you need to know Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...

More information

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks

MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Project 2020: Preparing Your Organization for Future Cyber Threats Today Project 2020: Preparing Your Organization for Future Cyber Threats Today SESSION ID: CLE-T08 Ken Low CISSP GSLC Director of Cybersecurity Programs, Asia Pacific TREND MICRO 2 PROJECT 2020 An initiative

More information

ISO 27000 Information Security Management Systems Foundation

ISO 27000 Information Security Management Systems Foundation ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Australia s proposed accession to the Council of Europe Convention on Cybercrime Assistant Secretary Telecommunications and Surveillance Law Branch National Security Law and Policy Division Attorney-General's Department 3-5 National Circuit Barton ACT 2600 Email: tslb@ag.gov.au Australia

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

Computer Networks & Computer Security

Computer Networks & Computer Security Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:

More information

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations.

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations. Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations. The exponential increase in Cyber Crimes, the rapid advancement in technology,

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function

More information

FBI AND CYBER SECURITY

FBI AND CYBER SECURITY FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

More information

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Albert Rees Computer Crime and Intellectual Property Section (CCIPS) Criminal Division,

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

Vulnerability Assessment & Compliance

Vulnerability Assessment & Compliance www.pwc.com Vulnerability Assessment & Compliance August 3 rd, 2011 Building trust through Information security* Citizen-Centric egovernment state Consultantion workshop Agenda VAPT What and Why Threats

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information