Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Cyber-Bad
Lowering the barriers
Cyber-Bad for Hire
Hacking tools (commodity day
exploits)
Stolen credentials
Crime as Service
Spam
Botnets
Unwitting Accomplices (mules)
Receiving stolen goods
Money laundering
Cyber-bad Purposes
Vandalism
Vigilantism
Fraud
Terrorism
Warfare
Criminals extend reach
Compromise systems during manufacture
Pin Entry Devices compromised during
manufacture
Phone home with PIN data to Pakistan
Criminal insiders
Blackmailed or bought prior to hire
US Cert: 41% incidents involve insiders
Espionage
Find an honest expert, penetrate their machine
Internet Crime = Funding
Internet Crime = Money
Laundry
Internet Sabotage = Force
Multiplier
Is a Hollywood Scenario
likely?
Past Performance is no
guarantee
Security through obscurity
works
until it fails
Fixing the Problem
What is the problem?
Banks
Cost of Internet crime
Direct Losses
Customer Service
Opportunity Losses
National Security
Potential criminal profits
Potential sabotage damage
Are there solutions?
Chip and PIN
Eliminated Card Present Fraud in Europe
Remaining attacks exploit legacy channels