Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis
|
|
|
- Patience Golden
- 10 years ago
- Views:
Transcription
1 Dangerous Minds: The Art of Guerrilla Data Mining Mark Ryan del Moral Talabis
2 Background Security Analytics : Concept of using data mining and AI in security Presented techniques and theories that we could use This Talk: Move from theory to practical applications Provide scenarios and examples to leverage these techniques for your research 2
3 Introduction Traditional warfare vs. Information Security Very similar Reconnaissance, information gathering, and espionage play an important part in battle tactics 3
4 This is Sparta! Anyone watched 300? Spartans: they knew and understood the terrain Persians: They did not win because of overwhelming numbers, they actually won because someone told them about a hidden pass. 4
5 Information Security In information security: Not only in hacking systems The more information you have, you ll have a better chance to protect you organization Drafting good policies and procedures as well as picking the correct tools and techniques based on the information that you have. 5
6 Words of Wisdom It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles - Sun Tzu 6
7 Information Warfare Information Warfare The use and management of information in pursuit of a competitive advantage over an opponent Information are just 1 s and 0 s if not used properly Analysis makes information meaningful - INTELLIGENCE 7
8 The Business of Information Warfare People who are into the Information Warfare Business: CIA FBI NSA Information Awareness Office Foreign Governments 8
9 Projects Government Projects: ECHELON TALON ADVISE MATRIX Able Danger Large endeavors! 9
10 Challenges Amount of data: there s just too much Resources: way too little Data Data Data Challenge Intelligence 10
11 The Veritas Project Veritas is latin for Truth The Veritas Project Modeled in the same general threat intelligence premise Primarily based on community sharing approach and using tools, technologies, and techniques that are freely available. Hawaii Honeynet Project and Secure- DNA 11
12 An Analogy Field Agents Decision Makers Information Warfare HQ Analysts 12
13 Framework Data Collection Decision Making Framework Data Storage Data Analysis 13
14 Data Collection Sources of Data Depends on what you want to research Forums Bulletins Chat logs News Articles Blogs Word documents The more you can gather, the better results It s not as easy, unless you re Google 14
15 Data Storage Information can be stored in: Relational databases Flat files Possibly the easiest part of all this 15
16 Analysis Possible the most important aspect of the framework Crunching large amount of data. Making data and information meaningful Some Data Mining and Artificial Intelligence Concepts K-Means Neural Networks SVM A lot more Not too easy but there are a lot of tools out there 16
17 Data Analysis Tools Some very useful tools that are free Text Garden Ontogen Weka Rapid Miner Tanagra Orange MEAD 17
18 Human Factor Why do we need humans? Interpretation of Results and Analysis = Intelligence 18
19 Demo Scenarios Let s look at the scenarios that you can use as templates for your own research 19
20 Applications Examples Trends Research Malware Taxonomy Monitoring Persons of Interest Corporate Intelligence - Strategy Opinion Polls What people are thinking about 20
21 Trends Research Track increases in chatter across time Gives researchers focus Find relationships between topics Framework Data Collection Crawlers (News articles, Forums) Data Storage MySQL Analysis Text Garden (html2txt, txt2bow, bowkmeans) Decision Making Me! 21
22 China Activity 22
23 China Computer Assisted 23
24 China Nuclear / Power 24
25 Thought Cloud 25
26 Defcon 26
27 Defcon Sumbissions 27
28 Defcon Crime 28
29 Conclusion Defcon = Crime 29
30 irobot! 30
31 Skynet? 31
32 Malware Taxonomy Grouping similar malwares together Framework Data Collection Notes from Malware Analysts Data Storage Flat files Analysis Ontogen Decision Making Depends 32
33 Thousands of malware descriptions 33
34 Unsupervised Learning 34
35 Monitoring Persons of Interest Monitoring of chat logs and finding persons of interest and who they talk to. Cells. 35
36 Monitoring Persons of Interest 36
37 Monitoring Persons of Interest 37
38 Corporate Intelligence Using data mining to profile companies to determine strategy 38
39 What the Public is Thinking About Obama Town Hall Meeting Data mining of over 100,000 questions to get a pulse of what people are concerned about Healthcare 39
40 Our Love Affair with Marijuana 40
41 Future Contributors Sentiment Analysis Good or Bad? We need more data! 41
42 Acknowledgements Howard Van de Vaarst Chris Potter Secure DNA management University of Santo Tomas (Philippines) Blaz Fortuna (Ontogen) Jozef Stefan Institute, Slovenia (Text Garden) 42
43 Mahalo The Veritas Project 43
Introduction to Forensics 101. Joseph A. Juchniewicz Security Analyst AmeriCredit
Introduction to Forensics 101 Joseph A. Juchniewicz Security Analyst AmeriCredit The Game s Afoot.. Today s Topics What is Forensics Is it right for your company s What are your company s needs Internal
Social Media Monitoring in Fifteen Minutes
Social Media Monitoring in Fifteen Minutes By Murray Newlands Murray Newlands 1 Table of Contents Social Media monitoring Guides your Business Introduction: Social Media Monitoring How Social Media monitoring
2015 State of Artificial Intelligence & Big Data in the Enterprise
2015 State of Artificial Intelligence & Big Data in the Enterprise 2 Table of Contents Introduction...3 Demographics...3 Executive Summary...4 Key Findings...5 Conclusions, Insights and Guidance...8 Respondent
POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges
Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges Synopsis Seminar #3 : Domestic Information Challenges and Tactical vs. National Requirements Who Should Do Domestic
Beyond listening Driving better decisions with business intelligence from social sources
Beyond listening Driving better decisions with business intelligence from social sources From insight to action with IBM Social Media Analytics State of the Union Opinions prevail on the Internet Social
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Competitive intelligence: History, importance, objectives, process and issues
Competitive intelligence: History, importance, objectives, process and issues Dhekra BEN SASSI Anissa FRINI Wahiba BEN ABDESLAM May 13-15 2015, Athens, Greece Introduction State of the art Critical Issues
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Developing Cyber Threat Intelligence or not failing in battle.
Developing Cyber Threat Intelligence or not failing in battle. AtlSecCon 2012, 02 March 2012 Adrien de Beaupré SANS ISC Handler Intru-Shun.ca Inc. Natasha Hellberg Bell Canada About me 32+, 22+, 12+ years
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
How To Use Social Media To Improve Your Business
IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
Using the Internet to Raise Funds and Mobilize Supporters: Lessons Nonprofits Can Learn from the Dean for America Presidential Campaign.
white paper December, 2003 Introduction In early 2003, Democratic presidential hopeful and former Vermont Governor Howard Dean faced a challenge: How could he make the most of a small staff and a limited
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
Foundations of Computer Security
Foundations of Computer Security Lecture 1: Dr. Bill Young Department of Computer Sciences University of Texas at Austin Lecture 1: 1 Course Topics Topics we will cover include: What is computer security?
Barack Obama won the battle on social media too!
Think... Special Edition Barack Obama won the battle on social media too! On the 4th of April 2011, Barack Obama announced his candidacy for the 2012 US Presidential election on Youtube* Yesterday evening
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
Data Science and Business Analytics Certificate Data Science and Business Intelligence Certificate
Data Science and Business Analytics Certificate Data Science and Business Intelligence Certificate Description The Helzberg School of Management has launched two graduate-level certificates: one in Data
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
LEAD NURTURING. Master s Series Lead Nurturing Basics. Marketing Qualified. Engaged. Sales Accepted. Sales Qualified. Anonymous. Closed. Lead.
Master s Series Nurturing Basics Engaged Marketing Qualified Sales Accepted Anonymous Sales Qualified s Closed Nurturing Campaigns L E A D N U R T U R I N G The Net-Results Master s Series started as an
WHITE PAPER. Creating your Intranet Checklist
WHITE PAPER Creating your Intranet Checklist About this guide It can be overwhelming to run and manage an Intranet project. As a provider of Intranet software and services to small, medium and large organizations,
SALES & MARKETING. Solution Guide for the Social Enterprise
Solution Guide for the Social Enterprise SALES & MARKETING Real-world ideas for transforming your business through the use of enterprise social networking 2013 VMware, Inc. Web: socialcast.com Twitter:
Mortgage Secrets. What the banks don t want you to know.
Mortgage Secrets What the banks don t want you to know. Copyright Notice: Copyright 2006 - All Rights Reserved Contents may not be shared or transmitted in any form, so don t even think about it. Trust
WHAT YOU NEED TO KNOW, AND WHY OUR COMPETITORS DON T LIKE US
COMPLETE TRADER WHAT YOU NEED TO KNOW, AND WHY OUR COMPETITORS DON T LIKE US Whether or not you decide to train with us, this document has very useful information to help you get started and so you know
Churn Rate 101 ANALYTICS BASICS. What is churn? How does it affect your business? How do you measure it?
Churn Rate 101 ANALYTICS BASICS What is churn? How does it affect your business? How do you measure it? The most important metric for an online business is Revenue; the second most important is Churn. Your
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
HOW TO ACCURATELY TRACK YOUR SOCIAL MEDIA BUZZ
TIP SHEET HOW TO ACCURATELY TRACK YOUR SOCIAL MEDIA BUZZ Ten years ago, marketers had to rely primarily on customer surveys and mainstream media coverage to track the buzz created by a new product launch
Analytics Scheduling reports
Analytics Scheduling reports 1 1 Contents How to schedule reports for page visits How to schedule reports for goals and conversions Additional resources 2 Scheduling reports is an easy and convenient way
MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management
MassMutual Cyber Security University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management Position Title: Threat Intelligence Intern Job Location: Boston, MA Timeframe:
Chapter 6 - Enhancing Business Intelligence Using Information Systems
Chapter 6 - Enhancing Business Intelligence Using Information Systems Managers need high-quality and timely information to support decision making Copyright 2014 Pearson Education, Inc. 1 Chapter 6 Learning
Turn a first impression into a client
Turn a first impression into a client Search Engine Optimisation Search Engine Marketing Website Design Blogging & Mobile Analytics DISCOVER FINDLAW UK FINDLAW UK Search Potential clients are looking for
In this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry
The Bibliomining Process: Data Warehousing and Data Mining for Library Decision-Making
Nicholson, S. (2003) The Bibliomining Process: Data Warehousing and Data Mining for Library Decision-Making. Information Technology and Libraries 22 (4). The Bibliomining Process: Data Warehousing and
Why You Need to Test All Your Cloud, Mobile and Web Applications
Why You Need to Test All Your Cloud, Introduction In a recent survey of security executives, more than 70 percent of respondents acknowledged that they are performing vulnerability tests on fewer than
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
What is Data Science? Data, Databases, and the Extraction of Knowledge Renée T., @becomingdatasci, November 2014
What is Data Science? { Data, Databases, and the Extraction of Knowledge Renée T., @becomingdatasci, November 2014 Let s start with: What is Data? http://upload.wikimedia.org/wikipedia/commons/f/f0/darpa
Big Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization
CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All
HOW TO GET. 1,000+ Followers ON TWITTER
HOW TO GET 1,000+ Followers ON TWITTER CONTENTS. 3. INTRODUCTION. 6. FIRST THINGS FIRST: CREATE AND OPTIMIZE YOUR PROFILE. 11. TWEET 24/7 (WITHOUT BEING ON TWITTER 24/7). 23.CURATE CONTENT LIKE A PRO.
Social Media Measuring Your Efforts 03. Step One Align Your Objectives 04. Step Two Measure Reach and Share of Conversation 05
Social Media Measuring Your Efforts 03 Step One Align Your Objectives 04 Step Two Measure Reach and Share of Conversation 05 Step Three Measure Conversions and Sales 08 Step Four Track and Measure Your
Keyword Research: Exactly what cash buyers, motivated sellers, and private lenders are looking for online. (and how to get in front of them)
Keyword Research: Exactly what cash buyers, motivated sellers, and private lenders are looking for online. (and how to get in front of them) 52 Keywords + How To Guide More Traffic. More Leads. Keywords
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations
Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation
Malware in the clouds. Building the Undetectable Bot
Malware in the clouds Building the Undetectable Bot Who am I? Philip Porter nullbnx twitter [email protected] Ex-Intel Analyst, Reverse Engineer/Forensic Analyst, studier of advanced threats, Red Teamer,
Travel agents guide to SMS messaging. How to use SMS messaging for marketing, booking, and customer support
Travel agents guide to SMS messaging How to use SMS messaging for marketing, booking, and customer support Why should you use SMS messaging? When was the last time you didn t have your mobile? Chances
Management Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011
Management Decision Making Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011 Management decision making Decision making Spreadsheet exercise Data visualization,
National Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
The Dating Guide to SEO
TheMxGroup.com (800) 827-0170 1 The Dating Guide to SEO Maybe you re still hoping for a first date. Or maybe you ve been together for a while, but things just aren t clicking. Either way, if you re not
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
Big Data for Banks: 5 Profitable Use Cases
Big Data for Banks: 5 Profitable Use Cases Did you know that one of the earliest forms of structured data as we know it, at least in Western culture, came from trade? Italian merchants saw an increase
Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:
#300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital
How to Structure Your First BPM Project to Avoid Disaster
How to Structure Your First BPM Project to Avoid Disaster Table of Contents Table of Contents...2 Introduction...3 Pick The Right Process and Avoid the Wrong Ones...4 Field the Right Team and Include a
London Business Interruption Association Technology new risks and opportunities for the Insurance industry
London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in
INTO SMART CRISIS PREVENTION
TIP SHEET TURN SOCIAL INTELLIGENCE INTO SMART CRISIS PREVENTION Crisis management has completely changed in less than a decade. In 2003, a crisis happened when the press got wind of something that hurt
3 Ways to Restore Salesforce Data
White Paper 3 Ways to Restore Salesforce Data LEARN MORE AT WWW.SPANNING.COM OR CALL 512.236.1277 3 Ways to Restore Salesforce Data How do you know when you need to do more to protect your Salesforce data?
VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents
VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents Wade Baker Alex Hutton Chris Porter Risk Intelligence Verizon Cybertrust Security Verizon Risk Intelligence View of Information
What is a process? So a good process must:
PROCESS DESIGN BEST PRACTICES TABLE OF CONTENTS 1 What is a process? 2 The five Ws of process design 3 Standards are key 4 The how creating a model 5 How do you know when you have finished? 6 About ARIS
Using Mindjet Software and Templates for Strategic Consulting
Getting Started Guide Using Mindjet Software and Templates for Strategic Consulting Mindjet Getting Started Guide Using Mindjet Software and Templates for Strategic Consulting 2 One of the challenges we
NORTON CYBERSECURITY INSIGHTS REPORT
NORTON CYBERSECURITY INSIGHTS REPORT Get informed about the truths of online crime and the personal impact it has on you Table of Contents > INTRODUCTION... 3 > WE KNOW THE RISK FOR ONLINE CRIME IS HIGH...
Stand OUT Stay TOP of mind Sell MORE
Stand OUT Stay TOP of mind Sell MORE Use the arrows to navigate through the pages. next 1/14 [close] What is SEO? Search Engine Optimization (SEO) is the process of improving the volume and quality of
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
Reputation Management for Local Businesses: Protect Your Image
By: James Iannelli RI Reputation Management www.reputationmanagementri.com (401) 316-2931 1 Introduction As a business owner, you already know that managing a business is a LOT of work; from keeping the
MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS
Presentation to the Cyber Security & Critical Infrastructure Protection Symposium March 20, 2013 PREPARED REMARKS BARBARA ALEXANDER, DIRECTOR OF CYBER INTELLIGENCE TASC INFRASTRUCTURE PROTECTION AND SECURITY
Workday Big Data Analytics
Workday Big Data Analytics Today s fast-paced business climate demands that decision-makers stay informed. Having access to key information gives them the best insight into their business. However, many
How CNCERT/CC fighting to Botnets. Dr.Mingqi CHEN CNCERT/CC March 31, 2006. Beijing
How CNCERT/CC fighting to Botnets Dr.Mingqi CHEN CNCERT/CC March 31, 2006. Beijing Part 1 Content New security threats Part 2 How to detect and handle BotNets Part 3 Fighting BotNets Activities Part 4
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age
Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age Southern California Association for Financial Professionals February 14, 2014 Stan Stahl, Ph.D.
Internet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
