investigating & proving cybercrime

26

Upload: jenny-reid

Post on 09-Jun-2015

55 views

Category:

Leadership & Management


0 download

DESCRIPTION

Cybercrime is all around us. Are you aware of the risks and how to investigate and prevent this from happening.

TRANSCRIPT

Page 1: Investigating & proving cybercrime
Page 2: Investigating & proving cybercrime

Investigating and Proving Computer Fraud

Jenny Reid

Director

Page 3: Investigating & proving cybercrime

WAS• Hacking• Phishing• Data Espionage• Data Interference

MOVING TO• Intellectual property theft• Identity theft• Social Engineering

Fin24 – April 2014

Computer Fraud

Page 4: Investigating & proving cybercrime

HACKING

A technical effort to manipulate the normal behaviour of networks, connections and information

Page 5: Investigating & proving cybercrime

PHISHING / SMISHING

Fraudulent practice of sending messages purporting to be fromreputable companies in orderto induce individuals to reveal personal information, such as passwords and credit card numbers, online.

Page 6: Investigating & proving cybercrime

DATA ESPIONAGE

Data espionage describes the stealing of secrets stored in digital formats or on computers and IT networks

Page 7: Investigating & proving cybercrime

DATA INTERFERENCEData corruption refers to errors in computer data resulting in unintended changes to the original data.

Page 8: Investigating & proving cybercrime

INTELLECTUAL PROPERTY THEFT

The theft of any innovation any method or formula with economic value; or any unique name, symbol, or logo that is used commercially. It can also be the theft of company data.

Page 9: Investigating & proving cybercrime

IDENTITY THEFT

Identity theft is a form of stealing an identity for personal or corporate gain.

• True Name• Account Takeover

Page 10: Investigating & proving cybercrime

SOCIAL ENGINEERING

The manipulation of people to divulge confidential information

Page 11: Investigating & proving cybercrime

Common Denominator???

Page 12: Investigating & proving cybercrime

70% of African companies have been subjected to

computer fraud

Page 13: Investigating & proving cybercrime

• Global incidents increased by 48%

• 117 339 incidents per day

• Increased 66% year on year since 2009

• Budgets have remained steady since 2009

Page 14: Investigating & proving cybercrime

• Financial costs• Reputation damage• Social damage• Personnel infiltration• Theft of resources

Implications……

Page 15: Investigating & proving cybercrime

Common Denominator

Page 16: Investigating & proving cybercrime

The problem with human resourcesIs that they are human, with all that entails.

Truthfully, the human condition is by and large good.

Most people are honest, sincere, responsible

And prepared to work hard for a fair shake.

But there are others that give people a bad name.

These are the ones that lie, cheat and steal.

They are the businessman’s worst nightmare

For the damage they can cause.

These are the people you don’t want working for you.

Page 17: Investigating & proving cybercrime

• Incidents by insiders increased by 10%

• Incidents by contractors / suppliers rose by 17%

• Incidents by competitors increased by 64%

Page 18: Investigating & proving cybercrime

The problem with human resources• Communication via social networks is one of the

most popular activites on the internet• Social networking – 3rd most popular activity• 75% of people pay no attention to possible

hackers• 13% discuss private information with strangers• 20% share information on social networks that

they would never share in person• 18% share online account data from public wi-fi

Page 19: Investigating & proving cybercrime

Computer Forensics

Imaging hard drives

Analysis of data

Data verificationTransgressions

of internal policies

Legal Advice

Page 20: Investigating & proving cybercrime

Where are you right now?

Page 21: Investigating & proving cybercrime

Insurance against Cybercrime

People

Risk

Risk Assessment

Training

Established relationship with fraud

investigations expert

Ongoing vulnerability assessments People Risk

Management Programme

Page 22: Investigating & proving cybercrime

People RiskPre

Employment Screening

Lifestyle Audits

ContractorsSuppliers

Exit Interviews

People Risk Management Programme

Page 23: Investigating & proving cybercrime

Risk Assessment

Physical Risk

Systems & Procedures

TechnologyManpower

Ongoing vulnerability assessments Cybercrime

Risk Assessment

Page 24: Investigating & proving cybercrime

Training

Policies

Social Media

Regular Updates

Ongoing vulnerability

assessments

People Risk Management Programme

Page 25: Investigating & proving cybercrime

Company Value SystemDisciplinary

Code

Company

Culture

Value

SystemCorporate

Ethics

Regular Assessments

Page 26: Investigating & proving cybercrime

Jenny Reid+27 82 600 [email protected]