Cyber Crime Meeting
-
Upload
mkammerer -
Category
Technology
-
view
192 -
download
0
Transcript of Cyber Crime Meeting
![Page 1: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/1.jpg)
Secret Service Cyber Crime Unit
![Page 2: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/2.jpg)
“Series of tubes" is an analogy used by former United States Senator Ted Stevens (R-Alaska) to describe the Internet in the context of network neutrality.
![Page 3: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/3.jpg)
Background
“The first virus was born in the very beginning of 1970s or even in the end of 1960s, although nobody was calling it a virus then”
http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml
![Page 4: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/4.jpg)
How do they spread?
• You're part of a small group receiving this feature, so don't tweet about it yet!Spread two ways:
1) Social Engineering
2) Exploitation of security holes
![Page 5: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/5.jpg)
Who are they?
![Page 6: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/6.jpg)
White Hat vs Black Hat
![Page 7: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/7.jpg)
Proposed Courses of Action #1
• #1: Create an advertising campaign
![Page 8: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/8.jpg)
Proposed Courses of Action #2
• #2: Perform a raid on all suspected hackers
![Page 9: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/9.jpg)
Proposed Courses of Action #3
• #3: Develop a government white hat group
![Page 10: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/10.jpg)
Discussion Groups
• Break into groups to discuss our course of action.
![Page 11: Cyber Crime Meeting](https://reader036.fdocuments.in/reader036/viewer/2022062900/58f375021a28ab217c8b45df/html5/thumbnails/11.jpg)
Outcome