SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
ADDRESSING CYBER THREATS IN 
THE BANKING SECTOR	

by	
  	
  	
  
Lt Col Sazali Sukardi (Retired)	

Vice President	

Strategic Research	

CyberSecurity Malaysia	

	

7TH	
  Annual	
  Series	
  BankTechAsia	
  ‘15	
  	
  	
  
17	
  March	
  2015	
  
2	

CYBERSECURITY MALAYSIA S MANDATE
The	
  Cabinet	
  Mee=ng	
  on	
  28	
  September	
  2005,	
  through	
  the	
  Joint	
  Cabinet	
  Notes	
  between	
  Ministry	
  of	
  Finance	
  
(MOF)	
  and	
  Ministry	
  of	
  Science,	
  Technology	
  and	
  Innova=on	
  (MOSTI)	
  No.	
  H609/2005	
  agreed	
  to	
  create	
  the	
  
	
  
Na=onal	
  ICT	
  Security	
  and	
  Emergency	
  Response	
  Centre	
  (NISER),	
  currently	
  
known	
  as	
  CyberSecurity	
  Malaysia	
  as	
  a	
  Na=onal	
  Body	
  to	
  monitor	
  the	
  
Na=onal	
  e-­‐Security	
  aspect	
  	
  	
  
separated	
  from	
  MIMOS	
  as	
  an	
  agency	
  and	
  established	
  as	
  a	
  Company	
  Limited-­‐by-­‐Guarantee	
  under	
  the	
  
supervision	
  of	
  MOSTI	
  
The	
  Ministerial	
  Func=ons	
  Act	
  1969	
  and	
  The	
  Order	
  of	
  Federal	
  Government	
  Ministers	
  2013	
  
	
  	
  
Provide	
  specialized	
  services	
  in	
  cyber	
  security	
  and	
  con=nuously	
  iden=fy	
  areas	
  that	
  may	
  be	
  
detrimental	
  to	
  public	
  and	
  na=onal	
  security	
  
Arahan No.24 Dasar dan Mekanisme Pengurusan Krisis Siber Negara
- Majlis Keselamatan Negara:
CyberSecurity Malaysia merupakan agensi pakar dalam memberi
sokongan dan bantuan teknikal serta menyediakan perkhidmatan latihan
dalam pengurusan krisis siber Negara.
Technology Is Double-Edged Weapon
3	

Mobile	
  Devices	
  
Big	
  Data	
  
Internet	
  of	
  	
  
Things	
  
Trends	
  of	
  Compu=ng	
  
•  unregulated: no country rules and owns Internet
•  convenient services: Internet offers numerous services  connectivity
•  less risk: no fear of making mistakes  getting caught
•  asymmetric force: weapon for the weak
Why cyber space is attractive
5	

	
  
“Cyber	
  crime	
  costs	
  the	
  global	
  economy	
  about	
  $445	
  billion	
  every	
  year,	
  with	
  the	
  damage	
  
to	
  business	
  from	
  the	
  the7	
  of	
  intellectual	
  property	
  exceeding	
  the	
  $160	
  billion	
  loss	
  to	
  
individuals	
  from	
  hacking………”	
  
-­‐	
  The	
  Center	
  for	
  Strategic	
  and	
  Interna@onal	
  Studies,	
  U.S.A	
  2014	
  
“The	
  growing	
  menace	
  of	
  cybercrime	
  is	
  impac@ng	
  the	
  global	
  economy	
  significantly	
  
with	
  es@mated	
  annual	
  losses	
  of	
  up	
  to	
  USD	
  575	
  billion..”	
  
-­‐	
  	
  McAfee	
  2014	
  
COST OF CYBER CRIMES
6	

Cyber Crimes and Underground Economy
The modern thief can steal more
with a computer than with a gun….
Computers at Risk, National Research Council, 1991
Cyber crimes targeting economic sectors are on the rise replacing
traditional crimes - Symantec 2010 State of Enterprise Security Survey
7	

Number	
  and	
  severity	
  of	
  cyber-­‐crimes	
  conAnues	
  to	
  grow,	
  it's	
  
important	
  to	
  understand:	
  
	
  
•  the	
  steps	
  cyber-­‐criminals	
  take	
  to	
  aGack	
  our	
  network	
  
•  	
  the	
  types	
  of	
  malware	
  they	
  use,	
  and	
  the	
  tools	
  we	
  need	
  to	
  stop	
  
them.	
  	
  
	
  
The	
  basic	
  steps	
  of	
  a	
  cyber	
  aGack	
  include	
  	
  
•  reconnaissance	
  (finding	
  vulnerabiliAes);	
  
•  intrusion	
  (actual	
  penetraAon	
  of	
  the	
  network);	
  
•  malware	
  inserAon	
  (secretly	
  leaving	
  code	
  behind);	
  and	
  
•  cleanup	
  (covering	
  tracks).	
  
CYBER ATTACKS
- How Much We How How They Happen
Cyber	
  Incidents	
  Referred	
  to	
  CyberSecurity	
  
Malaysia	
  from	
  1997	
  –	
  2014	
  
	
  Number	
  of	
  cyber	
  security	
  incidents	
  referred	
  to	
  CyberSecurity	
  Malaysia	
  
(excluding	
  spams)	
  
Cyber	
  Security	
  Incidents	
  In	
  Malaysia	
  
8
Incident/	
  
Month	
  
2013	
  
2014	
  	
  
Jan	
   Feb	
   Mar	
   Apr	
   May	
   June	
   July	
  	
   Aug	
   Sept	
   Oct	
   Nov	
   Dec	
  
Fraud	
   4,485	
   250	
   264	
   280	
   399	
   401	
   519	
   406	
   372	
   435	
   366	
   377	
   408	
  
Malicious	
  
Codes	
  
1,751	
   251	
   78	
   101	
   55	
   47	
   48	
   29	
   14	
   22	
   13	
   16	
   42	
  
Intrusion	
   2,770	
   109	
   76	
   216	
   70	
   15	
   28	
   43	
   47	
   104	
   105	
   178	
   134	
  
Cyber	
  
Harassment	
  
512	
   57	
   41	
   45	
   44	
   46	
   48	
   52	
   44	
   53	
   36	
   50	
   34	
  
Spam	
   950	
   40	
   23	
   32	
   36	
   61	
   55	
   385	
   530	
   548	
   671	
   735	
   534	
  
Intrusion	
  
AGempt	
  
76	
   3	
   11	
   24	
   157	
   63	
   75	
   21	
   241	
   649	
   12	
   19	
   27	
  
Content	
  
Related	
  
54	
   5	
   2	
   2	
   1	
   4	
   2	
   4	
   6	
   3	
   3	
   0	
   3	
  
Denial	
  of	
  
Service	
  
19	
   1	
   2	
   3	
   2	
   4	
   1	
   3	
   1	
   6	
   3	
   0	
   3	
  
VulnerabiliAes	
  
Report	
  
19	
   1	
   1	
   4	
   9	
   4	
   1	
   0	
   3	
   2	
   7	
   1	
   1	
  
Total	
   10,636	
  
717	
   498	
   707	
   773	
   645	
   777	
   943	
   1,258	
   1,822	
   1,216	
   1,376	
   1,186	
  
11,918	
  
CYBER SECURITY INCIDENTS IN MALAYSIA
10	

ADVANCED	
  PERSISTENT	
  THREAT	
  
-­‐	
  Trend	
  od	
  Cyber	
  AGack	
  on	
  Banking	
  and	
  
Financial	
  Sector	
  
11	

DISTTRIBUTION	
  OF	
  PHISHING	
  ATTACKS	
  2014	
  
Source:	
  KARSPESKY	
  LAB	
  REPORT	
  
Financial	
  Cyber	
  Threats	
  in	
  2014	
  	
  
12	

Source:	
  KARSPESKY	
  LAB	
  REPORT	
  
Financial	
  Cyber	
  Threats	
  in	
  2014	
  	
  
13	

Source:	
  KARSPESKY	
  LAB	
  REPORT	
  
Financial	
  Cyber	
  Threats	
  in	
  2014	
  	
  
14	

Source:	
  KARSPESKY	
  LAB	
  REPORT	
  
Financial	
  Cyber	
  Threats	
  in	
  2014	
  	
  
MALWARE GIVES THE ATTACKER THE
KEY TO FINANCIAL NETWORKS
During	
  cyber	
  aGacks	
  on	
  South	
  Korea	
  in	
  2013,	
  the	
  loss	
  combined	
  damage	
  was	
  $800m.	
  	
  
MALWARE GIVES THE ATTACKER THE
KEY TO FINANCIAL NETWORKS
18	

Cyber Security Concerns
- Ransomware
“In	
  the	
  beginning	
  of	
  2014	
  Svpeng	
  Ransomware	
  
was	
  detected	
  	
  -­‐	
  the	
  malware	
  aGempted	
  to	
  
block	
  the	
  user’s	
  phone	
  and	
  display	
  a	
  message	
  
demanding	
  payment	
  of	
  a	
  US$500	
  ‘fee’	
  for	
  
alleged	
  criminal	
  acAvity.”	
  
	
  
19
20
21
22
INTERNET OF THINGS (IoT)	

Interconnec=on	
  of	
  uniquely	
  iden=fiable	
  devices,	
  systems,	
  and	
  services	
  into	
  Internet	
  
Infrastructure	
  
	
  
“There	
  will	
  be	
  nearly	
  26	
  billion	
  devices	
  on	
  the	
  Internet	
  of	
  Things	
  by	
  2020”	
  	
  	
  	
  –	
  Gartner	
  
	
  
“More	
  than	
  30	
  billion	
  devices	
  will	
  be	
  wirelessly	
  connected	
  to	
  the	
  Internet	
  of	
  Things	
  
(Internet	
  of	
  Everything)	
  by	
  2020”	
  	
  	
  -­‐	
  ABI	
  Research,	
  	
  
24	

•  Mobile	
  users	
  now	
  overtake	
  PC	
  users	
  
•  More	
  than	
  50%	
  mobile	
  user	
  doesn’t	
  enable	
  lock	
  screen	
  protecAon	
  
•  	
  About	
  70	
  million	
  gadget	
  lost/stolen	
  per	
  year	
  
•  	
  Only	
  about	
  57%	
  mobile	
  users	
  worry	
  about	
  losing	
  data	
  
•  Only	
  about	
  43%	
  mobile	
  users	
  worry	
  about	
  losing	
  the	
  device	
  itself	
  
•  	
  About	
  81%	
  mobile	
  users	
  use	
  their	
  device	
  for	
  business	
  use	
  
•  	
  About	
  48%	
  of	
  mobile	
  user	
  use	
  unsecured	
  public	
  WiFi	
  network	
  	
  
	
  
MOBILE COMPUTING
- Risks of the trends’ combination
MOBILE MALWARE
25	

7	
  billion	
  Internet-­‐connected	
  devices	
  by	
  end	
  of	
  2014	
  are	
  
exposed	
  to	
  mobile	
  malware	
  
26	

EMERGING CYBER ATTACKS ON MOBILE DEVICES
PayPal Survey:
73% of Malaysian adults shopped online at
least once a month. Doing so with mobile
devices such as smartphones or tables is
becoming the preferred way.
27
FUNDAMENTALS	
  OF	
  	
  
INFORMATION	
  	
  
SECURITY	
  
Integrity	
  
Availability	
  	
  
THE FUNDAMENTALS OF INFORMATION
SECURITY
Confiden=ality	
  
29	
  
Cyber	
  espionage	
  for	
  economic	
  interests	
  
	
  Economic	
  espionage	
  will	
  be	
  a	
  major	
  concern	
  as	
  naFon-­‐states	
  use	
  cyber	
  the7	
  of	
  
data	
  to	
  gain	
  economic	
  advantage	
  in	
  mulFnaFonal	
  deals 	
  
- PC World Business Center
	
  
Cyber	
  espionage	
  	
  targe=ng	
  cri=cal	
  sectors	
  
	
  
Evidence	
  suggests	
  that	
  governments	
  and	
  government-­‐allied	
  groups	
  are	
  now	
  	
  
using	
  the	
  Internet	
  for	
  espionage	
  and	
  cyber-­‐aIacks	
  on	
  the	
  criFcal	
  naFonal	
  	
  
infrastructure	
  (financial	
  markets,	
  uFlity	
  providers,	
  air	
  traffic	
  control)	
  of	
  other	
  
countries 	
  
- McAfee Virtual Criminology
Copyright	
  ©	
  2011	
  CyberSecurity	
  Malaysia	
  
	
  CYBER	
  ESPIONAGE	
  
 
NATIONAL	
  CYBER	
  SECURITY	
  
POLICY	
  
	
  
POLICY	
  
Formula=ng	
  	
  Coordina=ng	
  Policy	
  
NATIONAL	
  SECURITY	
  COUNCIL	
  
LAW	
  ENFORCEMENT	
  AGENCIES	
  	
  
REGULATORS	
  
Preven=ng	
  	
  Comba=ng	
  Terrorism	
  	
  through	
  
Law	
  Enforcement	
  
§ 	
  	
  	
  ROYAL	
  MALAYSIAN	
  POLICE	
  
§ 	
  	
  BANK	
  NEGARA	
  MALAYSIA	
  
§ 	
  	
  	
  	
  MALAYSIAN	
  COMMUNICATION	
  	
  
MULTIMEDIA	
  COMMISSION	
  
TECHNICAL	
  SUPPORT	
  
Providing	
  Technical	
  Supports	
  	
  
Services	
  	
  	
  
CYBERSECURITY	
  MALAYSIA	
  
Strengthening Cyber Security Eco System
§  Government Agencies
§  Critical Information Infrastructure
§  Internet Service Providers
§  Industry
§  Academia
§  Cyber Security Professionals
§  Public
31	

Internet Banking Task Force
32

Weitere ähnliche Inhalte

Was ist angesagt?

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
Scott Geye
 

Was ist angesagt? (20)

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Utilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and InvestigationUtilizing Internet for Fraud Examination and Investigation
Utilizing Internet for Fraud Examination and Investigation
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 

Andere mochten auch

Cyber Attacks from China
Cyber Attacks from ChinaCyber Attacks from China
Cyber Attacks from China
yepu45
 
Detection of Financial Statement Frauds
Detection of Financial Statement FraudsDetection of Financial Statement Frauds
Detection of Financial Statement Frauds
rehan012
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in Banks
Akshay Virkar
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
Venktesh Venke
 
Banking system ppt
Banking system pptBanking system ppt
Banking system ppt
Lohith Lohi
 

Andere mochten auch (16)

Cyber Attacks from China
Cyber Attacks from ChinaCyber Attacks from China
Cyber Attacks from China
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
W P Current And Future Threats Toward The Retail Banking
W P Current And Future Threats Toward The Retail BankingW P Current And Future Threats Toward The Retail Banking
W P Current And Future Threats Toward The Retail Banking
 
Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.Scams and Frauds: Seniors, beware.
Scams and Frauds: Seniors, beware.
 
Rise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScanRise of Cyber Frauds in Digital Banking - eScan
Rise of Cyber Frauds in Digital Banking - eScan
 
Bank of baroda
Bank of barodaBank of baroda
Bank of baroda
 
Detection of Financial Statement Frauds
Detection of Financial Statement FraudsDetection of Financial Statement Frauds
Detection of Financial Statement Frauds
 
Indian banking
Indian bankingIndian banking
Indian banking
 
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in Banks
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Banking system ppt
Banking system pptBanking system ppt
Banking system ppt
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Ähnlich wie Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi

The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
Zsolt Nemeth
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 

Ähnlich wie Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi (20)

188
188188
188
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Cybersecurity Threats Businesses Facing in 2024.pdf
Cybersecurity Threats Businesses Facing in 2024.pdfCybersecurity Threats Businesses Facing in 2024.pdf
Cybersecurity Threats Businesses Facing in 2024.pdf
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 

Mehr von Knowledge Group

Mehr von Knowledge Group (14)

Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh Technology Risk Management Simulation - Mahesh
Technology Risk Management Simulation - Mahesh
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
Evaluating Cloud Computing Risk :Recounting PBB’s Journey into the Cloud - Ke...
 
Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream) Suresh - Mobile Banking (Corporate Banking Stream)
Suresh - Mobile Banking (Corporate Banking Stream)
 
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for BanksLeonard - (Security & Risk Stream)  Discovering Optimum Risk Solution for Banks
Leonard - (Security & Risk Stream) Discovering Optimum Risk Solution for Banks
 
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...Daryl Pereira(Compliance & Regulations Stream)  Learning From The Expert – Mo...
Daryl Pereira(Compliance & Regulations Stream) Learning From The Expert – Mo...
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
 
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...Harry Singh (Security & Risk Management Stream)-  Managing Technology Risk in...
Harry Singh (Security & Risk Management Stream)- Managing Technology Risk in...
 
Steven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed BankingSteven Gan - Signifying The Need for Speed Banking
Steven Gan - Signifying The Need for Speed Banking
 
David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!David Wortley - Gamification Is Not Funny!
David Wortley - Gamification Is Not Funny!
 
Andrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New TechnologyAndrew Fell, Harnessing the Customer Experience via New Technology
Andrew Fell, Harnessing the Customer Experience via New Technology
 
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...Aman Narain,  Viva La Revolution -How Banking Should and Will be Disrupted an...
Aman Narain, Viva La Revolution -How Banking Should and Will be Disrupted an...
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi

  • 1. ADDRESSING CYBER THREATS IN THE BANKING SECTOR by       Lt Col Sazali Sukardi (Retired) Vice President Strategic Research CyberSecurity Malaysia 7TH  Annual  Series  BankTechAsia  ‘15       17  March  2015  
  • 2. 2 CYBERSECURITY MALAYSIA S MANDATE The  Cabinet  Mee=ng  on  28  September  2005,  through  the  Joint  Cabinet  Notes  between  Ministry  of  Finance   (MOF)  and  Ministry  of  Science,  Technology  and  Innova=on  (MOSTI)  No.  H609/2005  agreed  to  create  the     Na=onal  ICT  Security  and  Emergency  Response  Centre  (NISER),  currently   known  as  CyberSecurity  Malaysia  as  a  Na=onal  Body  to  monitor  the   Na=onal  e-­‐Security  aspect       separated  from  MIMOS  as  an  agency  and  established  as  a  Company  Limited-­‐by-­‐Guarantee  under  the   supervision  of  MOSTI   The  Ministerial  Func=ons  Act  1969  and  The  Order  of  Federal  Government  Ministers  2013       Provide  specialized  services  in  cyber  security  and  con=nuously  iden=fy  areas  that  may  be   detrimental  to  public  and  na=onal  security   Arahan No.24 Dasar dan Mekanisme Pengurusan Krisis Siber Negara - Majlis Keselamatan Negara: CyberSecurity Malaysia merupakan agensi pakar dalam memberi sokongan dan bantuan teknikal serta menyediakan perkhidmatan latihan dalam pengurusan krisis siber Negara.
  • 3. Technology Is Double-Edged Weapon 3 Mobile  Devices   Big  Data   Internet  of     Things   Trends  of  Compu=ng  
  • 4. •  unregulated: no country rules and owns Internet •  convenient services: Internet offers numerous services connectivity •  less risk: no fear of making mistakes getting caught •  asymmetric force: weapon for the weak Why cyber space is attractive
  • 5. 5   “Cyber  crime  costs  the  global  economy  about  $445  billion  every  year,  with  the  damage   to  business  from  the  the7  of  intellectual  property  exceeding  the  $160  billion  loss  to   individuals  from  hacking………”   -­‐  The  Center  for  Strategic  and  Interna@onal  Studies,  U.S.A  2014   “The  growing  menace  of  cybercrime  is  impac@ng  the  global  economy  significantly   with  es@mated  annual  losses  of  up  to  USD  575  billion..”   -­‐    McAfee  2014   COST OF CYBER CRIMES
  • 6. 6 Cyber Crimes and Underground Economy The modern thief can steal more with a computer than with a gun…. Computers at Risk, National Research Council, 1991 Cyber crimes targeting economic sectors are on the rise replacing traditional crimes - Symantec 2010 State of Enterprise Security Survey
  • 7. 7 Number  and  severity  of  cyber-­‐crimes  conAnues  to  grow,  it's   important  to  understand:     •  the  steps  cyber-­‐criminals  take  to  aGack  our  network   •   the  types  of  malware  they  use,  and  the  tools  we  need  to  stop   them.       The  basic  steps  of  a  cyber  aGack  include     •  reconnaissance  (finding  vulnerabiliAes);   •  intrusion  (actual  penetraAon  of  the  network);   •  malware  inserAon  (secretly  leaving  code  behind);  and   •  cleanup  (covering  tracks).   CYBER ATTACKS - How Much We How How They Happen
  • 8. Cyber  Incidents  Referred  to  CyberSecurity   Malaysia  from  1997  –  2014    Number  of  cyber  security  incidents  referred  to  CyberSecurity  Malaysia   (excluding  spams)   Cyber  Security  Incidents  In  Malaysia   8
  • 9. Incident/   Month   2013   2014     Jan   Feb   Mar   Apr   May   June   July     Aug   Sept   Oct   Nov   Dec   Fraud   4,485   250   264   280   399   401   519   406   372   435   366   377   408   Malicious   Codes   1,751   251   78   101   55   47   48   29   14   22   13   16   42   Intrusion   2,770   109   76   216   70   15   28   43   47   104   105   178   134   Cyber   Harassment   512   57   41   45   44   46   48   52   44   53   36   50   34   Spam   950   40   23   32   36   61   55   385   530   548   671   735   534   Intrusion   AGempt   76   3   11   24   157   63   75   21   241   649   12   19   27   Content   Related   54   5   2   2   1   4   2   4   6   3   3   0   3   Denial  of   Service   19   1   2   3   2   4   1   3   1   6   3   0   3   VulnerabiliAes   Report   19   1   1   4   9   4   1   0   3   2   7   1   1   Total   10,636   717   498   707   773   645   777   943   1,258   1,822   1,216   1,376   1,186   11,918   CYBER SECURITY INCIDENTS IN MALAYSIA
  • 10. 10 ADVANCED  PERSISTENT  THREAT   -­‐  Trend  od  Cyber  AGack  on  Banking  and   Financial  Sector  
  • 11. 11 DISTTRIBUTION  OF  PHISHING  ATTACKS  2014   Source:  KARSPESKY  LAB  REPORT   Financial  Cyber  Threats  in  2014    
  • 12. 12 Source:  KARSPESKY  LAB  REPORT   Financial  Cyber  Threats  in  2014    
  • 13. 13 Source:  KARSPESKY  LAB  REPORT   Financial  Cyber  Threats  in  2014    
  • 14. 14 Source:  KARSPESKY  LAB  REPORT   Financial  Cyber  Threats  in  2014    
  • 15.
  • 16. MALWARE GIVES THE ATTACKER THE KEY TO FINANCIAL NETWORKS
  • 17. During  cyber  aGacks  on  South  Korea  in  2013,  the  loss  combined  damage  was  $800m.     MALWARE GIVES THE ATTACKER THE KEY TO FINANCIAL NETWORKS
  • 18. 18 Cyber Security Concerns - Ransomware “In  the  beginning  of  2014  Svpeng  Ransomware   was  detected    -­‐  the  malware  aGempted  to   block  the  user’s  phone  and  display  a  message   demanding  payment  of  a  US$500  ‘fee’  for   alleged  criminal  acAvity.”    
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. INTERNET OF THINGS (IoT) Interconnec=on  of  uniquely  iden=fiable  devices,  systems,  and  services  into  Internet   Infrastructure     “There  will  be  nearly  26  billion  devices  on  the  Internet  of  Things  by  2020”        –  Gartner     “More  than  30  billion  devices  will  be  wirelessly  connected  to  the  Internet  of  Things   (Internet  of  Everything)  by  2020”      -­‐  ABI  Research,    
  • 24. 24 •  Mobile  users  now  overtake  PC  users   •  More  than  50%  mobile  user  doesn’t  enable  lock  screen  protecAon   •   About  70  million  gadget  lost/stolen  per  year   •   Only  about  57%  mobile  users  worry  about  losing  data   •  Only  about  43%  mobile  users  worry  about  losing  the  device  itself   •   About  81%  mobile  users  use  their  device  for  business  use   •   About  48%  of  mobile  user  use  unsecured  public  WiFi  network       MOBILE COMPUTING - Risks of the trends’ combination
  • 25. MOBILE MALWARE 25 7  billion  Internet-­‐connected  devices  by  end  of  2014  are   exposed  to  mobile  malware  
  • 26. 26 EMERGING CYBER ATTACKS ON MOBILE DEVICES PayPal Survey: 73% of Malaysian adults shopped online at least once a month. Doing so with mobile devices such as smartphones or tables is becoming the preferred way.
  • 27. 27
  • 28. FUNDAMENTALS  OF     INFORMATION     SECURITY   Integrity   Availability     THE FUNDAMENTALS OF INFORMATION SECURITY Confiden=ality  
  • 29. 29   Cyber  espionage  for  economic  interests    Economic  espionage  will  be  a  major  concern  as  naFon-­‐states  use  cyber  the7  of   data  to  gain  economic  advantage  in  mulFnaFonal  deals   - PC World Business Center   Cyber  espionage    targe=ng  cri=cal  sectors     Evidence  suggests  that  governments  and  government-­‐allied  groups  are  now     using  the  Internet  for  espionage  and  cyber-­‐aIacks  on  the  criFcal  naFonal     infrastructure  (financial  markets,  uFlity  providers,  air  traffic  control)  of  other   countries   - McAfee Virtual Criminology Copyright  ©  2011  CyberSecurity  Malaysia    CYBER  ESPIONAGE  
  • 30.   NATIONAL  CYBER  SECURITY   POLICY     POLICY   Formula=ng    Coordina=ng  Policy   NATIONAL  SECURITY  COUNCIL   LAW  ENFORCEMENT  AGENCIES     REGULATORS   Preven=ng    Comba=ng  Terrorism    through   Law  Enforcement   §       ROYAL  MALAYSIAN  POLICE   §     BANK  NEGARA  MALAYSIA   §         MALAYSIAN  COMMUNICATION     MULTIMEDIA  COMMISSION   TECHNICAL  SUPPORT   Providing  Technical  Supports     Services       CYBERSECURITY  MALAYSIA   Strengthening Cyber Security Eco System §  Government Agencies §  Critical Information Infrastructure §  Internet Service Providers §  Industry §  Academia §  Cyber Security Professionals §  Public
  • 32. 32