Cybercrime and Cybersecurity
Overview of Cybercrime
Speaker Introductions:
Jenny Martin: Director of Cybersecurity Investigations at Symantec.
Parisa: Security Princess at Google.
Impact of Cybercrime:
Causes significant problems in society:
Personal issues
Financial difficulties
National security threats
Recent statistics:
Hundreds of millions of credit card numbers stolen.
Tens of millions of social security numbers and health care records compromised.
High-profile hacks: nuclear centrifuges and unmanned aerial drones.
Vulnerabilities Exploited:
Hardware and software vulnerabilities.
Unintentional human decisions lead to security breaches.
Cyber criminals can range from:
International terrorists
Teenagers seeking notoriety.
Cyber Armies:
Major countries now possess both regular armies and cyber armies.
Potential future warfare could be digital, targeting critical infrastructure like:
Water supplies
Energy grids
Transportation systems.
Cybercrime Mechanisms
Types of Cybercrime Attacks:
Computer Viruses:
Definition: An executable program that harms the user and their computer, often installed unintentionally.
Infection Methods:
Luring users into installing deceptive programs, often disguised as security updates.
Exploiting software vulnerabilities to install malicious software without permission.
Malicious Capabilities of Viruses:
Steal or delete files.
Control other programs.
Enable remote access to the computer.
Botnets:
Definition: A network of infected computers controlled by hackers.
Used for attacks, such as Distributed Denial-of-Service (DDoS).
Denial-of-Service Attacks:
Definition: Overwhelming a target website with too many requests to overload the system.
Distributed Denial-of-Service (DDoS):
Attack originates from multiple computers simultaneously, leading to extensive overload.
Typical websites can handle millions of requests but struggle against billions or trillions of requests, causing system failure.
Phishing Scams:
Definition: Fraudulent attempts to acquire sensitive personal information via fake communications.
Common Method:
Trustworthy-looking emails leading to fake websites.
Users log in and unknowingly disclose passwords.
Consequences:
Hackers gain access to real accounts to steal information or funds.
Cybersecurity Considerations
Prevalence of Human Errors:
90% of breaches not due to software flaws:
Most often result from simple human mistakes.
Importance of Personal Responsibility:
Cybersecurity actions impact not just personal data but also broader networks like schools and workplaces.
Need to stay educated against evolving cybercriminal tactics.
Financial stakes are immense; loss of billions or trillions reinforces necessity for vigilance.