SAM KAMANGA - Cyber Security Presentation-JimYonaz

Embed Size (px)

Citation preview

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    1/29

    Sam KamangaCyber Security and Computer Forensics Consultant

    CYBER SECURITY IN THE SOCIAL NETWORKING ERA

    IN TANZANIA

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    2/29

    Contents

    Cyberspace

    Internet

    Cyber Security and Cybercrime

    Types of Cyber threatsSocial Media

    Cyber-bullying

    Preventing Cybercrime

    Conclusion

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    3/29

    Cyberspace

    What is a Cyberspace Cyberspace is a world wide network of computers and

    the equipment that connect, which by its very design isfree and open to the public (the internet)

    Weve become increasingly reliant on the net and its

    being used right now to transfer everything from friendlyemails to hypersensitive data.

    The Problem has gotten more prevalent with always on,high speed internet access. Attackers are always outthere looking for that computer

    As long as your computer is connected to the internet,that connection can go both ways.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    4/29

    The Internet

    Every business is connected to the Internet. Every

    businesss network is part of the internet.

    The capacity to interact with each other is a key part

    of their risk environment. Telco's, businesses,

    universities, and households are all connected indifferent ways.

    Cyber crime and cyber espionage pose increasing

    risk to various Nations.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    5/29

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    6/29

    Why Need of Cyber Security

    Cyber crimes are increasingat a very rapid pace

    Hackers can ; Steal all information from a

    victim computer

    Can hack Bank Accounts andsteal all the money from them

    Can misuse sensitiveinformation for Terrorism orpolitical causes.

    Can disrupt critical nationsinfrastructure

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    7/29

    Cybercrime

    Computernetworks havedone for criminalsthe same thingtheyve done forlegitimatecomputers users.

    Theyve made thejob easier andmore convenient.

    What are cyber-

    criminals after?Money

    Confidential information

    Testing out some scripts

    Bring-down competition

    Political agenda

    Identify weaknesses insystems for educationalreasons

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    8/29

    Cybercrime

    Cyber attacks generally refer to criminal activity

    conducted via the internet

    The attacks can include stealing an organizationsintellectual property, confiscating online bankaccounts, creating and distributing viruses on the

    other computers, posting confidential businessinformation on the internet and disrupting acountrys critical national infrastructure

    Fact: Cybercrimes are costly if not quickly resolved : Cybercrimes can

    do serious damage to an organizations bottom line.

    All industries can fall victim to cybercrime

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    9/29

    Types of Cyber Threats

    Type Motivation Target Method

    Cyber Warfare Military or political

    dominance

    Critical infrastructure,

    political and military

    assets

    Attack, corrupt, exploit,

    deny, conjoint with

    physical attack

    Cyber Espionage Gain of intellectual

    Property and Secrets

    Governments,

    companies, individuals

    Advanced Persistent

    Threats

    Cyber Crime Economic gain Individuals, companies,

    governments

    Fraud, ID theft,

    extortion, Attack,

    Exploit

    Cracking Ego, personal enmity Individuals, companies,

    governments

    Attack, Exploit

    Hacktivism Political change Governments,

    Companies

    Attack, defacing

    Cyber Terror Political change Innocent victims,

    recruiting

    Marketing, command

    and control, computer

    based violence

    Source analysis, Dr Irv Lachov Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    10/29

    Cyber Attacks Being Observed

    Web defacementSpamSpoofingProxy ScanDenial of ServiceDistributed Denial of ServiceMalicious CodesVirusBots

    Data Theft and Data

    Manipulation Identity Theft Financial Frauds

    Social engineering Scams

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    11/29

    Extortion

    Loss of intellectual

    property/data

    Potential for disruption

    As part of cyber conflict

    (i.e. Estonia)

    As target of cyber protest

    (i.e. anti-globalization)

    Potential accountability formisuse (i.e. botnets)

    Potential for data corruption

    Terrorism

    Cyber Risks Are An Increasing Threat To Sources Of

    Enterprise Capability And Brand Competitiveness

    Now

    Now

    Emerging

    Now

    Future

    Emerging

    Phishing and pharming driving increasedcustomer costs, especially for financial

    services sector

    DDOS extortion attacks

    National security information/export controlled

    information

    Sensitive competitive data Sensitive personal/customer data

    E-Business and internal administration

    Connections with partners

    Ability to operate and deliver core services

    Reputational hits; legal accountability

    Impact operations or customers through data

    DDOS and poisoning attacks

    Focused attacks coordinated with physicalattacks

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    12/29

    Africa Could Become The Cybercrime Capital Of

    The World

    It is estimated that approximately 80% of

    computers in the African continent are alreadyinfected with viruses and other malicioussoftware

    Broadband services are opening in thecontinentMore users are accessing the web

    The number of virus and spam related cases as well asonline fraudsters is in the rise

    No clear ICT laws and policies in place

    Mobile Phone phishing in Tanzania is common

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    13/29

    Cybercrime Is On The RiseCyber Crime

    The computer as a target -attacking the computers ofothers (spreading viruses isan example).

    The computer as a weapon -

    using a computer to commit"traditional crime" that wesee in the physical world(such as fraud or illegalactivities).

    The computer as anaccessory - using acomputer as a "fancy filingcabinet" to store illegal orstolen information.

    Cybercrime is on the rise

    Organizations' run onvulnerable systems

    Cybercrime is borderlessand anonymous

    High demand for services,low risk

    Relative easy to conductactivities

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    14/29

    Why Cyber Security Needs Special Attention?

    Nowadays almost everybody isusing computers, smart mobiledevices

    Individual persons, Business andClients

    White collar criminals Hackers

    Terrorist organizations

    There are more Cyber-criminals thanlaw enforcers

    Information has become a big asset

    Money transactions are moving throughthe internet (Mobile money)

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    15/29

    The Dilemma of Security The problem that we cannot get

    away from computer security.

    We can only have a good Cybersecurity if everyoneunderstands what Computersecurity means, and agrees withthe need for security.

    Computer Security is a socialproblem, because it has nomeaning until a person defineswhat it means to them.

    The harsh reality is thefollowing:

    In practice, most users havelittle or no understanding ofcomputer security.

    THIS IS BIGGEST SECURITYHOLE

    Is your computer

    secure?

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    16/29

    Social Media As computer technology

    increases, social media

    becomes more and more of awidely used source ofcommunication. It has becomeso popular that it is completelychanging the way people viewand respond to society, andopening up new ways for people

    to interact with each other.

    This is both a good and badthing. Advantages being that ithas given people theconvenience of being able toconnect with others all over the

    world without having to step afoot out of their homes and alsothe rare cases that crimes aresometimes solved through thehelp of a social media site.

    However, the problems createdby these sites are much more

    prevalent than advantagesbecause it gives maliciouspeople the ability to create moredanger among the millions ofinternet users.

    Information that is posted onthe internet by people who

    believe it to only to be viewableamong their friends often findthat they have unintentionallyshared personal facts withhundreds of people, somewhom plan to use it againstthem.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    17/29

    Social Media It is amazing how technology

    has sped up every process of

    life, from social interaction toyour local public getting itsnews.

    The social media also has a wayof molding the minds of people,especially the youth, toopinions presented ontelevision and the internet.

    These stories are usually basedon entertainment and politicalvalues. People begin to seewhat is popular and what themajority of people think aboutcertain events. This can alterthe way they may think ofsomething that happens even ifit wasnt their initial opinion inthe first place.

    Facebook has reached 900 Million

    global users

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    18/29

    Facebook's Impact

    A Driver for Democracy

    With roughly 80% of Facebook's monthly userslocated outside the U.S. and Canada, it is no

    huge surprise that Facebook is responsible forsparking the uprisings in the Middle East at thebeginning of 2011, which started in Tunisia aftera man selling fruits and vegetables set himselfon fire in a market. He felt humiliated whenpolice demanded him to hand over his cart fornot having a permit. His personal revolt ignitedprotests in Tunisia which spread to Egypt, Libya,Syria and Yemen.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    19/29

    Facebook's Impact

    Facebook was gigantic in the Arab Spring and in

    every other political uprising that we have heard ofin Spain and the Occupy Movement becausepeople do not think of it as a political act.

    Facebook users can just update their status on

    Facebook and their friends see it and they arebroadcasting without even knowing it.

    In 2009, a video showing the death of a youngfemale Iranian protester, named Neda, shot by a

    government gunman gripped the world. The videowent viral with the help of Facebook and othersocial media networks.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    20/29

    Employment and Social Media Networking

    Although these social networking sites areintended for friends to see, a recentMicrosoft survey found that 79 percent of

    employers use these site to evaluatepotential employees.

    Microsoft also found that 70 percent ofrecruiters and hiring managers haverejected an applicant based on informationthey had found online.

    Lets say you are an employer looking over

    somebodys application and CV. Everythingis looking good, this person seems to bequalified, they have a good CV and no runs-ins with the law. Now all you have to do ischeck their Facebook or MySpace to seehow they spend their time out of the officeto try to get a feel of what kind of personthey are.

    E.g. You get to the page and look at thepictures to find that they are pictures of youat parties; drinking or using drugs.

    It isn't just the photos that are causingemployees to make rash decisions, but alsotext content found on users home pages.

    A study conducted by Career Builder aboutwhat content caused employers to not hirecandidates;

    E.g. Job Candidate: Gangemasi Sempili

    Study showed inappropriate photographs onsocial media networks or information, contentabout drinking or using drugs were the majorcauses of not employing certain people.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    21/29

    Cyber Bullying in Social Media Networking

    Source: Mwananchi Newspaper August 2012

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    22/29

    Social Media Websites

    Composite of the logos of more than 200 social media websites

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    23/29

    Are We Safe ?

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    24/29

    It Is Happening

    Source: Mwananchi Newspaper August 2012

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    25/29

    Preventing Cybercrime

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    26/29

    Conclusion

    The threat on Cyber Security is real.

    Cyber security management requires acombined

    effort and collaboration between all

    stakeholders.

    As a country we need to develop relevantPolicies, Legal and Regulatory.

    We need to build capacity in ; Technical

    Legal and

    Policy.

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    27/29

    Quote Of The Day

    The only system which is trulysecure is one

    which is switched offandunplugged, locked in a

    titanium lined safe, buried ina concrete bunker,

    and surrounded by nerve gasand very highly paid armed

    guards. Even then, Iwouldnt stake my life on it.

    - Professor Gene Spafford

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    28/29

    Questions

    Copyright Sam Kamanga 2012

  • 7/28/2019 SAM KAMANGA - Cyber Security Presentation-JimYonaz

    29/29

    Contact Information

    Email: [email protected]

    Tel: 0784-761167

    Tel: 0715761167

    mailto:[email protected]:[email protected]