Introduction to Cyber Security



Similar documents
THE GLOBAL CYBER SECURITY WORKFORCE - AN ONGOING HUMAN CAPITAL CRISIS

Cyber Security Strategy

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Technology Crime Services

The UK cyber security strategy: Landscape review. Cross-government

2015 Information Security Awareness Catalogue

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

IT Security Risks & Trends

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Cybercrime in the Automotive Industry How to improve your business cyber security

The State of Play in Cyber Payments Fraud Improving Security for Online & Card Not Present Transactions

Certificate in Cyber Security

The FBI and the Internet

Cybersecurity. Are you prepared?

Promoting a cyber security culture and demand compliance with minimum security standards;

Cyber security Indian perspective & Collaboration With EU

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

What legal aspects are needed to address specific ICT related issues?

The Human Factor of Cyber Crime and Cyber Security

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

NEW ZEALAND S CYBER SECURITY STRATEGY

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Deception scams drive increase in financial fraud

Who s Doing the Hacking?

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

3 day Workshop on Cyber Security & Ethical Hacking

Cyber Crime ACC Crime

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Training Courses Catalog 2015

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Computer Systems Technology Pathway

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Qualifications in Practice Management (Health)

2012 NORTON CYBERCRIME REPORT

Establishing a State Cyber Crimes Unit White Paper

FBI CHALLENGES IN A CYBER-BASED WORLD

Cybercrime: risks, penalties and prevention

Incident Informa.on Exchange in Darknet Monitoring System dra9- suzuki- mile- darknet- 00

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

September 20, 2013 Senior IT Examiner Gene Lilienthal

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

LONDON 2012: CYBER SECURITY

Perspectives on Cybersecurity in Healthcare June 2015

A NEW APPROACH TO CYBER SECURITY

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

2 Gabi Siboni, 1 Senior Research Fellow and Director,

National Cyber Crime Unit

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Collateral Effects of Cyberwar

Certified Cyber Security Analyst VS-1160

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Securing the Nation: Creating cyber security, resilience and readiness

STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure

Small businesses: What you need to know about cyber security

Business Plan 2012/13

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Resilience and Cyber Essentials

BACHELOR OF CRIMINOLOGY AND SECURITY MANAGEMENT(BCSM

National Cyber Security Month 2015: Daily Security Awareness Tips

Course Descriptions November 2014

ICT Barriers, High Tech Crime, and Police

Cyber Security - What Would a Breach Really Mean for your Business?

SPEAR PHISHING UNDERSTANDING THE THREAT

Identifying Cyber Risks and How they Impact Your Business

Master of Science in Cyber Security and Management

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Transcription:

Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop

You are sitting in New Zealand s first joint research centre for cyber security Centre of Computational Intelligence for Cyber Security (CICS) 2

Reasons for founding the centre Cyber security is a major risk internationally and locally Many New Zealander s do not take cyber security seriously, and are unaware of major cyber security risks that they might encounter or to which they might expose themselves Cyber security research is an important area in the field of computing New Zealand needs graduates who are experienced in cyber security 3

Cyber Security Risks Amy Adams Communications and Information Technology Minister May 2013 In 2012 New Zealand s National Cyber Security Centre incident summary reported an increase of about 50 per cent in serious cyber intrusions when compared to 2011. By serious, we mean incidents that met a threshold of putting New Zealand government information or critical national infrastructure at risk. There were 134 of these incidents in 2012 and we think this number is likely to be the tip of the iceberg. This year already we have had 149, showing the trend of rapid acceleration continuing. 4

Cyber Security - why should we care? Cyber crime is bigger than the global black market in marijuana, cocaine and heroin combined. Globally over the last 12 months, cybercrime cost 463 billion dollars and was experienced by 431 Source: www.neowin.net million adults. In that same period cybercrime against New Zealanders cost 625 million dollars. (Statistics from NZ s National Cyber Security Centre (http://www.ncsc.govt.nz/) 5

Types of Cyber Threats Broadly - cyber crime is often aimed at getting money or information from individuals, organisations and governments Source: www.infotech4you.com 6

Types of Cyber Threats Cyber espionage often aimed at businesses (industrial espionage), government or critical infrastructure Source: www.siliconangle.com 7

Types of Cyber Threats Hacktivism usually aim at taking over a system to promote a particular cause Source: www.pcadvisor.co.uk 8

Types of Cyber Threats Cyber terrorism could be a combination of all above Source: www.pcadvisor.co.uk 9

Types of Cyber Threats Cyber bullying using information technologies to target individuals in a negative and unwelcome manner Source: www.siliconangle.com 10

Types of Cyber Threats Phishing persuading people to actions that endanger their IT systems by posing as a trusted identity Source: www.allspammedup.com 11

How could you and your students be affected by cyber crime? National infrastructure cyber criminals could take control of the power grid/govt IT systems Cyber theft people convinced by emails to give strangers money, or enter their online banking passwords, or allow cyber criminals access to their computers Cyber bullying through IT devices (including cellphones)and IT tools such as email, facebook, ask.fm, Interfering with electronic devices pacemakers can be externally controlled, which could be fatal 12

Unitec s response to these cyber threats A partnership with the National Institute of Information and Communications Technology in Japan has provided us with both a cyber security monitoring system and an attack alert system. 13

Unitec s response to these cyber threats The monitoring system Darknet Monitor System (nicter) Livenet Monitor System (nivarna) 14

Unitec s response to these cyber threats The alert system Darknet Alert System (daedalus) 15

Cyber security job opportunities There is an international shortage of cyber security professional in 2010 the US government referred to their being a human capital crisis in cyber security USA Today: The U.S. Bureau of Labour Statistics confirmed the need for a larger and more dynamic network security Key part of 2011 New Zealand Cyber Security strategy is to work with educators to meet the demand for CS graduates

Other responses to CS issues CS Research by our students and lecturers Capture the flag CS competition for schools encouraging students to learn cyber security skills with the fun and rewards of a competition Student visits to the Centre or travel to schools to expose students to the importance of this area Public Awareness working with government and industry to enhance this Continuing education courses programme of courses to be initiated in 2014

Formal programmes at Unitec Undergraduate pathway in cyber security Graduate Diploma in Cyber Security Master of Computing cyber security endorsement Doctor of Computing (professional doctorate) - theses Joint badged PhD 18

The Future Vision of the centre as a national centre New teaching programmes needed to address the demand for graduates Creation of a public awareness capability School programs Games Competitions Courses that can be credited Development of curriculum for schools Mock attacks servers 19

20

Questions 21