SlideShare ist ein Scribd-Unternehmen logo
1 von 69
charl van der walt jaco van graan roelof temmingh CYBERCRIME
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AGENDA CYBERCRIME charl van der walt jaco van graan roelof temmingh
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CYBERCRIME jaco van graan
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],AGENDA INFORMATION SECURITY AWARENESS jaco van graan
Age of the Net... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
Threats and Risks in IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
What’s this hacking stuff? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
What hackers do: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
But why hack? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
How do they do it? ,[object Object],[object Object],[object Object],INFORMATION SECURITY AWARENESS jaco van graan
Security breaches past 12 months INFORMATION SECURITY AWARENESS jaco van graan
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TRENDS & STATISTICS SECURITY TRENDS & STATISTICS charl van der walt
Statistics on Commercial Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY TRENDS & STATISTICS charl van der walt
Statistics on Computer Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY TRENDS & STATISTICS charl van der walt
Statistics on Computer Crime SECURITY TRENDS & STATISTICS charl van der walt “ Just ask Edgars, the clothing retail group, which lost more than  R1m  after a computer programmer brought down more than 600 stores for an entire day.” Financial Mail - April 2000
Threat Distribution - International SECURITY TRENDS & STATISTICS charl van der walt ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Threat Distribution - RSA SECURITY TRENDS & STATISTICS charl van der walt ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computers & Commercial Crime ,[object Object],[object Object],[object Object],[object Object],SECURITY TRENDS & STATISTICS charl van der walt
The value of statistics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY TRENDS & STATISTICS charl van der walt
Trends in IT security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY TRENDS & STATISTICS charl van der walt
Determining your own risk SECURITY TRENDS & STATISTICS charl van der walt The magnitude of the risk is a product of the  value  of the information and the  degree  to which the vulnerability can be exploited.
[object Object],[object Object],[object Object],[object Object],[object Object],PROFILING THE ENEMY PROFILING THE ENEMY roelof temmingh
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY FUNDAMENTALS INFORMATION SECURITY FUNDAMENTALS charl van der walt
Understanding the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Four Pillars of Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Security Control Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
More about Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Still more about Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Security Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Security Products ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
Case Study - www.bluebean.com ,[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY FUNDAMENTALS charl van der walt
SECURITY DEMONSTRATED ,[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
SECURITY DEMONSTRATED ,[object Object],[object Object],SECURITY DEMO roelof temmingh
SECURITY DEMONSTRATED ,[object Object],SECURITY DEMO roelof temmingh
SECURITY DEMONSTRATED ,[object Object],SECURITY DEMO roelof temmingh
THE SECURITY PROCESS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Proactive or Reactive? ,[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan ,[object Object],[object Object],[object Object],[object Object]
The Process… THE INFORMATION SECURITY PROCESS jaco van graan Threat/Risk Analysis Security Policy Creation Planning Policy  Enforcement/ Implementation Monitor & Manage Intrusion detection Security Audit 1 2 3 4 5 6 7
Threat/risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Security Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan A security policy helps to define what you consider to be valuable, and it specifies what steps should be taken to safeguard those assets.
Planning ,[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Planning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Manage & Monitor ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Internal & External Audit ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Internal Audit ,[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
External Audit - Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
External Audit - Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
External Audit - Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
External Audit - Evaluation ,[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Intrusion Detection ,[object Object],[object Object],[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
Adjust Security Policy ,[object Object],[object Object],THE INFORMATION SECURITY PROCESS jaco van graan
SECURITY CERTIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Definition INFORMATION SECURITY CERTIFICATION charl van der walt The evaluation of the security of a computer system by a recognised third party. If the system being tested meets all the criteria it receives certification (also called accreditation) which is an indication of the level of security of the system being tested.
Objective ,[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Leading Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Leading Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Leading Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Leading Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Is Certification for you? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
Choosing the right standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INFORMATION SECURITY CERTIFICATION charl van der walt
THE BOTTOM LINE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],THE BOTTOM LINE jaco van graan

Weitere ähnliche Inhalte

Was ist angesagt?

Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptography
Mehrdad Jingoism
 
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and AbuseData Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
David Freeman
 
Server-Side Second Factors: Approaches to Measuring User Authenticity
Server-Side Second Factors: Approaches to Measuring User AuthenticityServer-Side Second Factors: Approaches to Measuring User Authenticity
Server-Side Second Factors: Approaches to Measuring User Authenticity
David Freeman
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
DallasHaselhorst
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
Dan Kunkel
 

Was ist angesagt? (20)

Ce hv8 module 19 cryptography
Ce hv8 module 19 cryptographyCe hv8 module 19 cryptography
Ce hv8 module 19 cryptography
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
DeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AIDeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AI
 
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and AbuseData Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
 
Server-Side Second Factors: Approaches to Measuring User Authenticity
Server-Side Second Factors: Approaches to Measuring User AuthenticityServer-Side Second Factors: Approaches to Measuring User Authenticity
Server-Side Second Factors: Approaches to Measuring User Authenticity
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_Barac
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
NetworkWorld-SafeBreach
NetworkWorld-SafeBreachNetworkWorld-SafeBreach
NetworkWorld-SafeBreach
 
Stealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile SurveillancewareStealth Mango and the Prevalence of Mobile Surveillanceware
Stealth Mango and the Prevalence of Mobile Surveillanceware
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ Websites
 

Ähnlich wie Cybercrime

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
Kristin Helgeson
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015
Eddie Cohen
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of Security
Fabian Borg
 

Ähnlich wie Cybercrime (20)

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
6DCP Presentation_12.19.2015
6DCP Presentation_12.19.20156DCP Presentation_12.19.2015
6DCP Presentation_12.19.2015
 
ISACA - The False Sense of Security
ISACA - The False Sense of SecurityISACA - The False Sense of Security
ISACA - The False Sense of Security
 
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdfcyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Hackers
HackersHackers
Hackers
 

Mehr von SensePost

Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
SensePost
 

Mehr von SensePost (20)

objection - runtime mobile exploration
objection - runtime mobile explorationobjection - runtime mobile exploration
objection - runtime mobile exploration
 
Vulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based ApplicationVulnerabilities in TN3270 based Application
Vulnerabilities in TN3270 based Application
 
Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17Ruler and Liniaal @ Troopers 17
Ruler and Liniaal @ Troopers 17
 
Introducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration ToolkitIntroducing (DET) the Data Exfiltration Toolkit
Introducing (DET) the Data Exfiltration Toolkit
 
ZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana AttacksZaCon 2015 - Zombie Mana Attacks
ZaCon 2015 - Zombie Mana Attacks
 
Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22Improvement in Rogue Access Points - SensePost Defcon 22
Improvement in Rogue Access Points - SensePost Defcon 22
 
Heartbleed Overview
Heartbleed OverviewHeartbleed Overview
Heartbleed Overview
 
Botconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server DetectionBotconf 2013 - DNS-based Botnet C2 Server Detection
Botconf 2013 - DNS-based Botnet C2 Server Detection
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Hacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation SystemsHacking Z-Wave Home Automation Systems
Hacking Z-Wave Home Automation Systems
 
Offence oriented Defence
Offence oriented DefenceOffence oriented Defence
Offence oriented Defence
 
Threats to machine clouds
Threats to machine cloudsThreats to machine clouds
Threats to machine clouds
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Its Ok To Get Hacked
Its Ok To Get HackedIts Ok To Get Hacked
Its Ok To Get Hacked
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Putting the tea back into cyber terrorism
Putting the tea back into cyber terrorismPutting the tea back into cyber terrorism
Putting the tea back into cyber terrorism
 
Major global information security trends - a summary
Major global information security trends - a  summaryMajor global information security trends - a  summary
Major global information security trends - a summary
 
Attacks and Defences
Attacks and DefencesAttacks and Defences
Attacks and Defences
 
Corporate Threat Modeling v2
Corporate Threat Modeling v2Corporate Threat Modeling v2
Corporate Threat Modeling v2
 

Kürzlich hochgeladen

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Kürzlich hochgeladen (20)

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Cybercrime

  • 1. charl van der walt jaco van graan roelof temmingh CYBERCRIME
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Security breaches past 12 months INFORMATION SECURITY AWARENESS jaco van graan
  • 12.
  • 13.
  • 14.
  • 15. Statistics on Computer Crime SECURITY TRENDS & STATISTICS charl van der walt “ Just ask Edgars, the clothing retail group, which lost more than R1m after a computer programmer brought down more than 600 stores for an entire day.” Financial Mail - April 2000
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Determining your own risk SECURITY TRENDS & STATISTICS charl van der walt The magnitude of the risk is a product of the value of the information and the degree to which the vulnerability can be exploited.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. The Process… THE INFORMATION SECURITY PROCESS jaco van graan Threat/Risk Analysis Security Policy Creation Planning Policy Enforcement/ Implementation Monitor & Manage Intrusion detection Security Audit 1 2 3 4 5 6 7
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. Definition INFORMATION SECURITY CERTIFICATION charl van der walt The evaluation of the security of a computer system by a recognised third party. If the system being tested meets all the criteria it receives certification (also called accreditation) which is an indication of the level of security of the system being tested.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.

Hinweis der Redaktion

  1. Comment on our background and the kind of work we do - technology focused
  2. Comment on our background and the kind of work we do - technology focused
  3. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  4. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  5. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  6. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  7. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  8. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  9. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...
  10. Comment on actual statistics Give URL as source ** Refer to John Tullet’s talk earlier...