McCarthyism and the Mathematization of Economics Presentation at LSE HPPE Summer Workshop.
CyberCrime - Lse summer school 2010 mg270
description
Transcript of CyberCrime - Lse summer school 2010 mg270
![Page 1: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/1.jpg)
LSE Summer School 2010MG270: Business Development and ICT Innovation
9th July 2010
“Cybercrime 2.0: When the Cloud Turns Dark”
Carlos Esteban LibreroDario GattiRoberto Held
![Page 2: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/2.jpg)
Cybercrime refers to any crime that involves a computer and a network.
![Page 3: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/3.jpg)
What crimes?
Crimes that primarily target computer networks or devices include:• Malware (malicious code)• Denial-of-service attacks• Computer viruses
Crimes that merely use computer networks or devices include:• Cyber stalking• Fraud and identity theft• Phishing scams• Information warfare
![Page 4: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/4.jpg)
While the first hackers wanted to exhibit their technical superiority...
![Page 5: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/5.jpg)
…today they are primarily motivated by economic interests.
![Page 6: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/6.jpg)
Cyber-wars
![Page 7: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/7.jpg)
Who will win?
![Page 8: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/8.jpg)
![Page 9: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/9.jpg)
Types of Cybercrime
• Spam - sending out of junk e-mails for commercial purposes;
• Malware programs – Virus, worms, trojan horse;
• Drug Trafficking
![Page 10: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/10.jpg)
Types of Cybercrime
• Cyber Terrorism – hacking official websites;
• Obscene or Offensive Content – Adults only!!
![Page 11: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/11.jpg)
Security Tips
• Keep programs Updated:– Anti-virus;– Firewall;– Internet;
Programs out-of-date => very insecure
![Page 12: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/12.jpg)
Possible Solutions
• Automatic updates;
• User education;
• More efficient malware detectors;
![Page 13: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/13.jpg)
Social Engineering Attacks
• Process of manipulating users;
• Free examples – antivirus test;
![Page 14: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/14.jpg)
WEB ATTACKS• Growing complexity -> new vulnerabilities
• Launching malware throw web browsers / web servers
• Exploiting = download payloads
![Page 15: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/15.jpg)
Procedure• Infecting Web Server->redirecting to infected
servers (SQL and Redirecting via .htaccess)
• Exploit web user (download payloads)
-> drive-by downloads-> social engineering
attacks (continuous growth)
![Page 16: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/16.jpg)
Security
• System identifying malicious content throw GOOGLE search.
• Browsers (Safari, Firefox…) use information to prevent users’ visits.
![Page 17: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/17.jpg)
Pirate Bay Attack• 4 million accounts
exposed
• Break into vulnerable database
• History and personal information (passwords, e-mails…)
![Page 18: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/18.jpg)
Cybercrime is a critical issue not only for pages and applications on the Web.
Its implications can be greater and can affect also the real world.
Blackout that may have been caused by hackers in 2009, Brazil.
![Page 19: CyberCrime - Lse summer school 2010 mg270](https://reader035.fdocuments.us/reader035/viewer/2022081602/546c45d8af795953298b4e31/html5/thumbnails/19.jpg)
And, if you have enjoyed our presentation, you can find it at:
http://www.slideshare.net/class2010mg270