Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Miranda Zhu

on 10 September 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cybercrime

presenters: YU Xuange
Lan Gao
Miranda Zhu
Jiaxin Huang

Same Instance Happened the Next Day
White hat hacker
What should we do ?
UNSW Facebook hijacked on Open Day
-- try to compromise computer systems for the sake of informing the content owner so they can fix the problem
security professionals
freelancing security enthusiast
ethical ???
“One time, I found a bug. I tried to report it (but) they replied that I was trying to hack or get into their system. I had no
to do bad, but they said I was trying to infiltrate the company."

---- Allan Jay Dumanhug
How to balance
Cybercrime dilemma
is it
to hack a website for the purpose of helping the owner ?
Is it possible to
the white hat hacking?
Is it
for white hat hacker to publish the security problem to public?
Is it
for the company ignoring the white hat hacker's advices?
Negative impact

According to a 2012 report by Symantec, more than 1.5 million people fall victim to some sort of cyber crime every day, ranging from simple password theft to extensive monetary swindles.
1.Economic losses
Reference: http://resources.infosecinstitute.com/2013-impact-cybercrime/
3.Damaged Reputations and personal privacy
Negative impact

UNSW Facebook hijacked on Open Day
The iCloud hack last year:
Celebrity photo leak
Hackers broke into the iCloud accounts of more than 500 people, predominantly celebrities.
"The reason ethical hacking exists is because somebody
less ethical
in a different country will hack your systems and not tell you - that is going to happen no matter what, So, ethical hacking is conducted to hack yourself first and
the issues and vulnerabilities that remain to avoid being a headline like Sony"
---Jeremiah Grossman
Founder and CTO of WhiteHat Security
Kantian Ethics (duty-based)
the security flaw to prevent potential damage
to access system without permission
can not be guaranteed
more abilities => more
A Diabetic Who Provoked Diabetics' Wrath
Jay Radcliffe found that insulin pumps could be hacked to administer potentially fatal doses of the life-saving medication. He expected to be hailed by other diabetics for helping improve their security. Instead, he was vilified for betraying the community and increasing their safety risks after giving the presentation ‘
Hacking Medical Devices for Fun and Insulin’
at the popular Black Hat security conference. But it wasn’t all negative, it has raised the awareness of congress on an investigation into the security of Internet connected health device and forced food and drug administration pay more attention to identify security problems in electronic medical equipment.

resource from: http://www.bloomberg.com/slideshow/2014-07-22/spectacles-of-insecurity-top-10-greatest-white-hat-hacks.html#slide6
What are the ethical issues involved ?
Should Jay publish this security flaw to conference?
presenters: YU Xuange
Lan Gao
Miranda Zhu
Jiaxin Huang
A surveillance program under which the United States National Security Agency (NSA) collects internet communications from US internet companies.
Revealed by Edward Snowden
Including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012
Information collect: Email, Voice, Videos, File transfers, Stored data and Online Social Networking details
2.Security Costs

Hackers may attempt to take over company servers to steal information
Large companies found an average expenditure of $8.9 million per year on cyber security
Example of internet attack: http://map.norsecorp.com/
"Potential new students of the University of New South Wales would have been given a shock if they checked out the university's Facebook page this morning.
Posts of scantily clad voluptuous women, including a post showing 'the next Kim Kardashian' and a woman wearing a see through lace bodysuit, prompted one commenter to ask whether the administrator of the page was 'drunk'."

2015 SEP 06
1. How would you think this happened? (from a technology point of view)

2. If you are the university Facebook admin, how would you prevent this happens again?

3. Why this happened?
Invasion of privacy
。 For individual :
。 For government :
The development of the Internet technology brings :
。 Convenience to people
。 Economy growth

but also brings
Full transcript