Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Cybercrime

No description
by

Miranda Zhu

on 10 September 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cybercrime

ybercrime
presenters: YU Xuange
Lan Gao
Miranda Zhu
Jiaxin Huang

THE END
Same Instance Happened the Next Day
White hat hacker
What should we do ?
UNSW Facebook hijacked on Open Day
Scenario2
-- try to compromise computer systems for the sake of informing the content owner so they can fix the problem
security professionals
freelancing security enthusiast
ethical
ethical ???
“One time, I found a bug. I tried to report it (but) they replied that I was trying to hack or get into their system. I had no
intention
to do bad, but they said I was trying to infiltrate the company."

---- Allan Jay Dumanhug
How to balance
security
and
privacy
?
Cybercrime dilemma
is it
ethical
to hack a website for the purpose of helping the owner ?
Is it possible to
stop
the white hat hacking?
Is it
ethical
for white hat hacker to publish the security problem to public?
Is it
ethical
for the company ignoring the white hat hacker's advices?
Negative impact

According to a 2012 report by Symantec, more than 1.5 million people fall victim to some sort of cyber crime every day, ranging from simple password theft to extensive monetary swindles.
1.Economic losses
Reference: http://resources.infosecinstitute.com/2013-impact-cybercrime/
3.Damaged Reputations and personal privacy
Negative impact

UNSW Facebook hijacked on Open Day
The iCloud hack last year:
Celebrity photo leak
Hackers broke into the iCloud accounts of more than 500 people, predominantly celebrities.
"The reason ethical hacking exists is because somebody
less ethical
in a different country will hack your systems and not tell you - that is going to happen no matter what, So, ethical hacking is conducted to hack yourself first and
fix
the issues and vulnerabilities that remain to avoid being a headline like Sony"
---Jeremiah Grossman
Founder and CTO of WhiteHat Security
Consequentialism
Kantian Ethics (duty-based)
fix
the security flaw to prevent potential damage
no
rights
to access system without permission
privacy
can not be guaranteed
more abilities => more
responsibilities
?
A Diabetic Who Provoked Diabetics' Wrath
Jay Radcliffe found that insulin pumps could be hacked to administer potentially fatal doses of the life-saving medication. He expected to be hailed by other diabetics for helping improve their security. Instead, he was vilified for betraying the community and increasing their safety risks after giving the presentation ‘
Hacking Medical Devices for Fun and Insulin’
at the popular Black Hat security conference. But it wasn’t all negative, it has raised the awareness of congress on an investigation into the security of Internet connected health device and forced food and drug administration pay more attention to identify security problems in electronic medical equipment.

resource from: http://www.bloomberg.com/slideshow/2014-07-22/spectacles-of-insecurity-top-10-greatest-white-hat-hacks.html#slide6
What are the ethical issues involved ?
Should Jay publish this security flaw to conference?
THANKS!
presenters: YU Xuange
Lan Gao
Miranda Zhu
Jiaxin Huang
PRISM
A surveillance program under which the United States National Security Agency (NSA) collects internet communications from US internet companies.
Revealed by Edward Snowden
Including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012
Information collect: Email, Voice, Videos, File transfers, Stored data and Online Social Networking details
2.Security Costs

Hackers may attempt to take over company servers to steal information
Large companies found an average expenditure of $8.9 million per year on cyber security
Example of internet attack: http://map.norsecorp.com/
reputation
"Potential new students of the University of New South Wales would have been given a shock if they checked out the university's Facebook page this morning.
Posts of scantily clad voluptuous women, including a post showing 'the next Kim Kardashian' and a woman wearing a see through lace bodysuit, prompted one commenter to ask whether the administrator of the page was 'drunk'."



http://www.skynews.com.au/culture/offbeat/2015/09/05/unsw-facebook-hijacked-on-open-day.html#sthash.Zdyrk72K.dpuf
2015 SEP 06
1. How would you think this happened? (from a technology point of view)

2. If you are the university Facebook admin, how would you prevent this happens again?

3. Why this happened?
Invasion of privacy
。 For individual :
。 For government :
The development of the Internet technology brings :
。 Convenience to people
。 Economy growth

but also brings
cybercrimes
Summary
Full transcript