What happened with Equifax
What was the Target Hack
What did the data breaches of Equifax and Target show?
security must be a top organizational priority, but also that the vast majority of security breaches are preventable. it is important to determine whether firm has technologies, training, policies, and procedures to assess risks, lessen the liklihood of damage, and respond in the event of a breacj
Annual worldwide cybercrime costs:
$600B per year
Motivations for hackers?
account theft and illegal funds transfer, stealing personal or financial data, compromising computing assets for use in othr crimes, extortion, intellectual property theft, espionage, cyberwarfare, terrorism, pranksters, protest hacking , revenge
what are data harvesters?
cybercriminals who infiltrate systems and collect data for illegal resale, typically to cash-out faudsters
what are cash-out fraudsters
criminals who might purchase assets from data harvesters to be used for illegal financial gain. they might buy goods using stolen credit cards or create false accounts
what are botnets?
networks of infiltrated and compromised machines controlled by a central command; can be used for sending spam from thousands of accounts, launching fraud efforts or staging distributed denial of service (DDoS), which effectively shut down websites by overwhleming with a crushing load of seemingly legit requests sent by thousands of machines at the same time.
Extorsionist might leverage botnets or hacked data to demand payment to avoid retribution. (T/F)
True, a US-based extortion plot againt VA threatened to reveal names, SSN and other info stolen from medical recorrds database.
What is ransomware?
allows criminals to take data assets hostage, locking and encrypting infected computers, rendering them unusable and irrecoverable unless wants are met like payment
Coorporate espionage is performed by:
insiders, rivals, or foreign government
for ex. a scientist was busted trying to sell R&D documents and secret data on proprietary products.
How has cyberware become a legitimate threat?
technology disruptions by terrorits or a foreign power might be devastating
ex. cutting off power, communication, temperature controls (demonstrated by white hat hackers in a 60 minute news program; forcing oil refinery to overheat and cause an explosion, which would be expensive and difficult to replace).
What is Stuxnet?
a worm that infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges; caused devices to spin into damage. the sophisticated attack went undetected as it was happening.
showed that it’s now possible to destroy critical infrastructure without firing a shot.
Malicious pranksters are also called
griefers or trolls; one group posted seizure-inducing images on websites frequently visited by people suffering with epilepsy.
What are hacktivists?
target firms, websites, or even users as a protest measure; Twitter was once brought down, and Facebook was hobbled as hackers targeted the social networking and blog accounts of Georgian blogger Cyxymu. this attack silences millions of accounts as collateral damage in a DDoS attack meant to mute the single critic.
Example of revenge-seeking motivation?
San Francisco city government lost control of a large portion of its own computer netwrok over ten-day period when an employee refused to share critical passwords
What did former CIA employee, Edward Snowden do?
He leaked over 1.7 million documents from US, British, and Australian agencies that revelaed that the agencies had data-monitoring efforts far more pervasive than many realized (direct access to audio, video, photos, e-mails, documents, etc. at major US companies and unlimited access to phone records from Verizon US customers). Such surveillance efforts can put citizens and corporations at risk if poorly executed and inefftively managed.
What is XKeyscore?
a tool that allows the collection of data on nearly everything a user does on the Internet
Why are the good guys outmatched?
Law enforcement agencies dealing with computer crime are undersourced, outnumbered, outskilled, and underfunded. Staffed with weak personnel. Govt can rarely match the pay scale offered by private industry to deal with the growing hacker threat.
What is a hacker? White hat? black hat?
someone who breaks into a computer or a paricularly clever programmer; white hat hackers are good guys sharing their knowwledge to uncover computer weaknesses without exploiting them in hopes security will be improved; black hat criminals, crackers, are computer criminals
User and Admin threats
zero-day exploits
Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.
what is being done to build better passwords?
biometrics, single-use passwords, multi-factor authentication, transactions only on authorized devices
Technology threats