SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Cyberthreats: causes, consequences, prevention
Quantity and Influence
Self-taught
BLASTER, SLAMMER
Motive: Entertainment
2003-2004
Evolution of Attacks
2005-Present day
Organized
crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Benefit
Self-taught
BLASTER, SLAMMER
Motive: Entertainment
2003-2004
Evolution of Attacks
2005-Present day
Organized
crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Benefit
Self-taught
BLASTER, SLAMMER
Motive: Entertainment
2012 and beyond
States,
Activists,
Terrorists
INSOLENT,
COMPLICATED,
TARGETED
Motive:
Intellectual
property theft,
Damage,
Disablement
2003-2004
Evolution of Attacks
Cyberthreats: NUMBERS
EVERY SECOND
12 PEOPLE
FALL PREY TO CYBER-CRIMINALS,
THAT IS ALMOST 400 MILLION
PEOPLE PER YEAR
Cyberthreats: NUMBERS
In CIS,
85% of grown-ups
were exposed to
ACTIVITIES CONDUCTED BY
CYBER-CRIMINALS
Cyberthreats: NUMBERS
96.5%
OF CEE SMBs
WERE EXPOSED TO
EXTERNAL THREATS
AT LEAST ONCE EACH YEAR
Cyberthreats: CAUSES
OF THE CAUSES OF OUTAGES,
50% OF PROGRAMS
INSTALLED ON PCs IN 2013 WERE
COUNTERFEIT
92%
POSSIBILITY to lose data/money
JUST BY TYPING
"DOWNLOAD WINDOWS FOR FREE“
IN THE SEARCH BOX AND CLICKING THE LINK

Cyberthreats: CAUSES
OF THE CAUSES OF OUTAGES,
WINDOWS ZVERCD
THE MOST POPULAR PIRATED
WINDOWS VERSION IN CIS
CONTAINS
63
VULNERABILITIES
INCLUDING KEY-LOGGERS,
VIRUSES AND TROJANS
THE NEW PARADIGM
PIRACY IS AN
INSTRUMENT OF
FINANCIAL FRAUD AND
PERSONAL DATA
THEFT
Cyberthreats: CAUSES
53% OF USERS
NEGLECT TO USE
AUTOMATIC UPDATES OF
SECURITY FUNCTIONS
Cyberthreats: CAUSES
28% of companies
reported regular
cyberattacks on
corporate PCs,
websites and IT
networks
Once a month
or more
in 65% of cases, corporate
employees' PC's
were revealed to contain
pirated software
Cyberthreats: CAUSES
27% of employees
INSTALL SOFTWARE AND APPLICATIONS
BY THEMSELVES
ON WORKPLACE PCs,
WHICH ACCOUNTS FOR
ALMOST 20%
OF ALL PIRATED SOFTWARE
IN USE BY COMPANIES
SURPRISINGLY, ONLY
14% OF COMPANIES
CONDUCT AN INVENTORY ANALYSIS OF THESE
SOFTWARE PROGRAMS
REGULARLY
NEW REALITY
317 million
NEW MALICIOUS PROGRAMS
WERE CREATED
DURING THE LAST YEAR
THAT AMOUNTS TO
APPROXIMATELY 1 MILLION
NEW cyberthreats
EVERYDAY
CONSEQUENCES
THE IT INDUSTRY LOSES
APPROXIMATELY $3 billion
a year IN CIS
WHICH IS MORE THAN
THE EARNINGS RECEIVED
BY DEVELOPERS FROM THE
EXPORT
OF IT PRODUCTS
TAX ISSUES
Not properly licensing/documenting commercial
software is a TAX EVASION in Latvia, Hungary,
Brazil, Russia
Even if you have not purchased something
of value but are using it, VAT is applicable
Software can be checked and taxes can be
applied as part of a tax inspection
ACTION:
 Use only genuine software. Conduct
regular inventory of installed software;
 Inform your employees of basic
security rules;
 Install specialized security software and
hardware solutions;
 Do not use out-of-date and
unsupported software and always
install the latest security updates;
Implement the SAM process.
BASIC RULES
dberes@microsoft.com
WINDOWS 10 SECURITY
Windows Hello
Microsoft Passport
BitLocker
Enterprise Data Protection
Device Guard
Windows Defender
UEFI Secure Boot
TPM 2.0, Virtualization
NEW PROTECTION MECHANISMS
NEW PROTECTION MECHANISMS
Windows Defender
‱ Scans the computer for malware
‱ Uses real-time protection for
checking of all downloaded
or executable files
Windows Firewall
‱ Filters information from the
Internet and blocks potential
malware
PROTECTION WITHIN MICROSOFT OFFICE
PROTECTION WITHIN MICROSOFT OFFICE
Microsoft: Security and Compliance
Provision of source codes
2002 – Russia became the first
country in the world, with which
Microsoft signed a Government
Security Program Agreement on
access to source codes of its
software
The agreement is prolonged
annually
Since 2003, a lab dedicated to
research of source codes of
Microsoft's products has been
functioning in Russia
PERMANENTLY
Trusted Microsoft Platform
Availability of source codes for examination
- more than 10 years
Delivery of certified updates by Russian partners
- more than 10 years
Certification for compliance with requirements of the Federal
Service for Technical and Export Control and the Federal
Security Service of Russia
- more than 10 years
No "inserts" in products
Availability of versions for work in compliance with advanced
security requirements

Weitere Àhnliche Inhalte

Was ist angesagt?

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity TrainingWindstoneHealth
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 

Was ist angesagt? (20)

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 

Ähnlich wie Cyberthreats: causes, consequences, prevention

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAbhishekDas794104
 
Information security
Information securityInformation security
Information securityAppin Faridabad
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx56ushodayareddy
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptxPradeeshSAI
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxdhananjay80
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptxJoselitoJMebolos
 

Ähnlich wie Cyberthreats: causes, consequences, prevention (20)

Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
C3
C3C3
C3
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information security
Information securityInformation security
Information security
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 

Mehr von moldovaictsummit2016

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldovamoldovaictsummit2016
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabilmoldovaictsummit2016
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticemoldovaictsummit2016
 
Genericul Ɵi specificul crimelor cibernetice ün republica moldova
Genericul Ɵi specificul crimelor cibernetice ün republica moldovaGenericul Ɵi specificul crimelor cibernetice ün republica moldova
Genericul Ɵi specificul crimelor cibernetice ün republica moldovamoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms daymoldovaictsummit2016
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlinemoldovaictsummit2016
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativamoldovaictsummit2016
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMmoldovaictsummit2016
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniationmoldovaictsummit2016
 

Mehr von moldovaictsummit2016 (20)

cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
ghidul parintelui responsabil
ghidul parintelui responsabilghidul parintelui responsabil
ghidul parintelui responsabil
 
Centrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informaticeCentrul pentru combaterea crimelor informatice
Centrul pentru combaterea crimelor informatice
 
Genericul Ɵi specificul crimelor cibernetice ün republica moldova
Genericul Ɵi specificul crimelor cibernetice ün republica moldovaGenericul Ɵi specificul crimelor cibernetice ün republica moldova
Genericul Ɵi specificul crimelor cibernetice ün republica moldova
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Internet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms dayInternet user's rights and fundamental freedoms day
Internet user's rights and fundamental freedoms day
 
Libertatea de exprimare si Informare online
Libertatea de exprimare si Informare onlineLibertatea de exprimare si Informare online
Libertatea de exprimare si Informare online
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
Xenia Siminciuc
Xenia Siminciuc Xenia Siminciuc
Xenia Siminciuc
 
Internetul-platforma multi participativa
Internetul-platforma multi participativaInternetul-platforma multi participativa
Internetul-platforma multi participativa
 
Caracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RMCaracteristica serviciilor de acces la internet fix si mobil in RM
Caracteristica serviciilor de acces la internet fix si mobil in RM
 
ICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service ModerniationICT driven innovation for Public Service Moderniation
ICT driven innovation for Public Service Moderniation
 
Greating from ICANN
Greating from ICANNGreating from ICANN
Greating from ICANN
 
EMC avalability
EMC avalability EMC avalability
EMC avalability
 
Cisco safe
Cisco safeCisco safe
Cisco safe
 
EMC
EMCEMC
EMC
 
Cisco byod
Cisco byodCisco byod
Cisco byod
 
emc hyper converged
emc hyper convergedemc hyper converged
emc hyper converged
 
cisco collaboration
cisco collaborationcisco collaboration
cisco collaboration
 

KĂŒrzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

KĂŒrzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Cyberthreats: causes, consequences, prevention

  • 2. Quantity and Influence Self-taught BLASTER, SLAMMER Motive: Entertainment 2003-2004 Evolution of Attacks
  • 3. 2005-Present day Organized crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Benefit Self-taught BLASTER, SLAMMER Motive: Entertainment 2003-2004 Evolution of Attacks
  • 4. 2005-Present day Organized crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Benefit Self-taught BLASTER, SLAMMER Motive: Entertainment 2012 and beyond States, Activists, Terrorists INSOLENT, COMPLICATED, TARGETED Motive: Intellectual property theft, Damage, Disablement 2003-2004 Evolution of Attacks
  • 5. Cyberthreats: NUMBERS EVERY SECOND 12 PEOPLE FALL PREY TO CYBER-CRIMINALS, THAT IS ALMOST 400 MILLION PEOPLE PER YEAR
  • 6. Cyberthreats: NUMBERS In CIS, 85% of grown-ups were exposed to ACTIVITIES CONDUCTED BY CYBER-CRIMINALS
  • 7. Cyberthreats: NUMBERS 96.5% OF CEE SMBs WERE EXPOSED TO EXTERNAL THREATS AT LEAST ONCE EACH YEAR
  • 8. Cyberthreats: CAUSES OF THE CAUSES OF OUTAGES, 50% OF PROGRAMS INSTALLED ON PCs IN 2013 WERE COUNTERFEIT 92% POSSIBILITY to lose data/money JUST BY TYPING "DOWNLOAD WINDOWS FOR FREE“ IN THE SEARCH BOX AND CLICKING THE LINK

  • 9. Cyberthreats: CAUSES OF THE CAUSES OF OUTAGES, WINDOWS ZVERCD THE MOST POPULAR PIRATED WINDOWS VERSION IN CIS CONTAINS 63 VULNERABILITIES INCLUDING KEY-LOGGERS, VIRUSES AND TROJANS
  • 10. THE NEW PARADIGM PIRACY IS AN INSTRUMENT OF FINANCIAL FRAUD AND PERSONAL DATA THEFT
  • 11. Cyberthreats: CAUSES 53% OF USERS NEGLECT TO USE AUTOMATIC UPDATES OF SECURITY FUNCTIONS
  • 12. Cyberthreats: CAUSES 28% of companies reported regular cyberattacks on corporate PCs, websites and IT networks Once a month or more in 65% of cases, corporate employees' PC's were revealed to contain pirated software
  • 13. Cyberthreats: CAUSES 27% of employees INSTALL SOFTWARE AND APPLICATIONS BY THEMSELVES ON WORKPLACE PCs, WHICH ACCOUNTS FOR ALMOST 20% OF ALL PIRATED SOFTWARE IN USE BY COMPANIES SURPRISINGLY, ONLY 14% OF COMPANIES CONDUCT AN INVENTORY ANALYSIS OF THESE SOFTWARE PROGRAMS REGULARLY
  • 14. NEW REALITY 317 million NEW MALICIOUS PROGRAMS WERE CREATED DURING THE LAST YEAR THAT AMOUNTS TO APPROXIMATELY 1 MILLION NEW cyberthreats EVERYDAY
  • 15. CONSEQUENCES THE IT INDUSTRY LOSES APPROXIMATELY $3 billion a year IN CIS WHICH IS MORE THAN THE EARNINGS RECEIVED BY DEVELOPERS FROM THE EXPORT OF IT PRODUCTS
  • 16. TAX ISSUES Not properly licensing/documenting commercial software is a TAX EVASION in Latvia, Hungary, Brazil, Russia Even if you have not purchased something of value but are using it, VAT is applicable Software can be checked and taxes can be applied as part of a tax inspection
  • 18.  Use only genuine software. Conduct regular inventory of installed software;  Inform your employees of basic security rules;  Install specialized security software and hardware solutions;  Do not use out-of-date and unsupported software and always install the latest security updates; Implement the SAM process. BASIC RULES
  • 21. Windows Hello Microsoft Passport BitLocker Enterprise Data Protection Device Guard Windows Defender UEFI Secure Boot TPM 2.0, Virtualization NEW PROTECTION MECHANISMS
  • 22. NEW PROTECTION MECHANISMS Windows Defender ‱ Scans the computer for malware ‱ Uses real-time protection for checking of all downloaded or executable files Windows Firewall ‱ Filters information from the Internet and blocks potential malware
  • 26. Provision of source codes 2002 – Russia became the first country in the world, with which Microsoft signed a Government Security Program Agreement on access to source codes of its software The agreement is prolonged annually Since 2003, a lab dedicated to research of source codes of Microsoft's products has been functioning in Russia PERMANENTLY
  • 27. Trusted Microsoft Platform Availability of source codes for examination - more than 10 years Delivery of certified updates by Russian partners - more than 10 years Certification for compliance with requirements of the Federal Service for Technical and Export Control and the Federal Security Service of Russia - more than 10 years No "inserts" in products Availability of versions for work in compliance with advanced security requirements

Hinweis der Redaktion

  1. According to Norton Report, 2013
  2. According to Symantec Based on the results of Norton Report 2013: 85% Russians were exposed to cyber-criminals' activities in 2013
  3. Kaspersky Lab and B2B research, 2014 According to the report, almost all companies (98.5%) were exposed to external threats at least once each year. Overall, the top 5 most popular threats to the SMB segment include: virus attacks and malware (75 percent), and software vulnerabilities (44 percent).
  4. IDC research, Russia, 2013 Group-IB research, Russia, 2012 A variety of research, conducted in numerous countries, confirm a direct correlation between the situation with cybersecurity and the level of popularity of counterfeit software. If the program is downloaded online after typing "download Windows for free" in a search engine, the user risks to lose his/her data in 92 out of 100 cases.
  5. Obviously, it leads to significant reduction in the security level of both private and corporate users; today, cyber-criminals are using counterfeit software not supported by the manufacturer even more often than regular malware. It is no coincidence that the popular Windows XP became an object of the close attention of cyber-criminals who specialize in financial fraud, after Microsoft stopped its official support. Keep in mind that the most popular pirate version, ZverCD, is uploaded to almost every pirate website together with 63 integrated vulnerabilities.
  6. Today, cyber-criminals represent serious international criminal groups,conducting their unlawful activities throughout the world and often "specializing" in different types of crime. For instance, cyberfraud is quite often primarily about monetary theft, however it is also a popular method for the distribution of counterfeit products, such as counterfeit medications, or the online distribution of child pornography and other types of criminal and perverted activities.
  7. SAM CyberSecurity allows for the identification of common scenarios of IT vulnerabilities Use of outdated software Use of outdated software not supported by the manufacturer creates a serious risk and is a tempting target for cyber-criminals. Not updated software. Failure to use the latest version of software or absence of the latest updates leaves the door open to cybercrime. Absence of rules for software installation. Uncontrolled installation of software or purchase of software from an unknown vendor substantially increases the risk of the accidental downloading of malware.
  8. Do not open suspicious messages received by email and do not follow the links they contain; Do not download files from unverified resources (websites, memory cards) to PC; Do not insert unknown flash drives (or USB flash drives) into corporate computers; Do not install unverified third-party software on PCs; Do not connect to the Internet using unverified Wi-Fi networks; Use passwords which have the form of long phrases or sentences and contain a combination of lower-case letters, numbers and symbols etc.
  9. Identifying common vulnerability scenarios: Use of outdated software; Use of older software not supported by the manufacturer; Lack of rules on installing the software, and so forth At the end of the project: Plan a road map for improving cybersecurity levels Reduction of legal risk by 98% Savings of 15% on software over the next three years
  10. Through the use of Excel Power Maps, as we investigated Citadel, we noticed an interesting phenomenon – the Citadel infections seemed to suddenly stop at the political border separating western Europe from eastern Europe. We asked – HOW would a randomly spreading computer infection know where national borders are situated? To answer this question, the Digital Crimes Unit malware team conducted additional forensic analysis of the code underlying the botnet. The team identified that this program, designed to steal financial information from around the world, would check a computer’s language settings BEFORE infecting it, and would not infect computers with certain Slavic languages (Ukrainian or Russian, specifically). The criminals who created the botnet didn’t want to give their own local authorities reason, or jurisdiction, to take action against them.   Without big data and business intelligence, none of this would be possible.
  11. Provision of source codes DOES NOT MEAN data transfer!! All user data is protected and immune!