Hacking and International Investigations Presented By: Nenette Day Harvard University Extension...
-
Upload
chastity-conley -
Category
Documents
-
view
213 -
download
0
Transcript of Hacking and International Investigations Presented By: Nenette Day Harvard University Extension...
![Page 1: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/1.jpg)
Hacking and International Investigations
Presented By:
Nenette Day
Harvard University Extension School
![Page 2: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/2.jpg)
Context
• Federal Law Enforcement is interested in business computers (interstate commerce)
• Title 18 Section 1030 ($5,000 damage)
• Personal Computer hacks, call the State or Local Police
• Identity Theft, call the Federal Trade Commission
![Page 3: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/3.jpg)
Hacking the Business
• Targets– Business Computers
– Cell phones (especially Camera Phones)
– Conference Call/Phone Systems
– Laptops
– PDAs
– Wireless Connections
– Business Partners w/ trusted connections
– Web Sites
![Page 4: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/4.jpg)
The Suspects
• Organized Crime
• Motivated Insiders
• Economic Espionage
• Individual Hacker
• Teenage Punks
• State Sponsored Actors: China for Example
![Page 5: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/5.jpg)
Tools of the Trade
• Any network connected computer• Vulnerabilities in software or operating system• Social Engineering• Classic Trojan Horse delivered through e-mail,
web site, infected CD, etc.• Unsecured wireless connection• Mobile computing in an unsecure environment
![Page 6: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/6.jpg)
Tools of the Trade cont…
• Loss of physical security over computing device (keystroke loggers, theft, etc)
• Outsourced partner
• Lack of passwords and encryption
• Letting someone use your cell phone
![Page 7: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/7.jpg)
Bottom Line
• Wetware (humans) are the most vulnerable link in the computer security chain
• Technology advances at a speed that outpaces security
• Hacking is a growth business
![Page 8: Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.](https://reader036.fdocuments.in/reader036/viewer/2022082821/56649e9f5503460f94ba1d37/html5/thumbnails/8.jpg)