Date post: | 26-May-2015 |
Category: |
Technology |
Upload: | andris-soroka |
View: | 908 times |
Download: | 0 times |
Cybercrime –the biggest
threat of the 21st Century
Andris SorokaManaging director
Data Security Solutions
15.04.2011
Where to start from?
Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever. No DNA forensics, no overarching laws – just lawlessness.
The 21st Century – the age of cybercrime
FBI warns Congress that cybercriminals can hack any internet-linked systemGordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011)
“Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks”“The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde” and more. 2010, 2011..
Background - technology development
IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.)
Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for that etc.)
Mobility and borderless enterprise
Cyber culture develops faster than cyber security
Every technology is vulnerable
New threats – targeted, professional, silent
There are Internet shops full of credit card, bank account, privacy, business and other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone.
Cybercriminal «CV Online»
Video trainings and eLearning available in social media, such as YouTube
«Black market community» (forums, blogs, interest groups, conferences etc.)
You don’t believe me?
The aim and drivers of the hacker
Why hackers might want to “contact” You?
BusinessCommercial espionage (financial, business and personal data)An attack can stop the business, services (competition)You are spam targetYour home page could be damagedThey can control and monitor youThey can change data in systemsHome page cross-scripting
Private personYou have the infrastructure for tests of new viruses and robotsYou have server where to store illegal stuff (programs, files etc.)They can do criminal activities using your computerWiFi – they can just borrow the internetYou have the information which could be sold in black market
The results of damageFinancial (costs, data, market, value)Reputation (customer, partner, HR)Development and competitiveness
Business & personal risk analysis matrix
Be prepared – stop the “bullets”
“Data Security Solutions” can help
Specialization – IT Security
IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support)
Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries