101 Introduction to How Cybercrime and Cyber Defenses Actually Work

Cybercrime and Defenses: A 101 Introduction To How It Works
Duration: 60 Minutes
Module 1 Resources
Recorded February 1, 2018
Unit 1 101 Introduction to How Cybercrime and Cyber Defenses Actually Work: Slide Deck
Unit 2 Cybercrime and Defenses: Recording

These days, when almost everything we do is dependent on technology, it's as if damage to our devices and lack of connectivity is as distressing as physical injury. For companies and government agencies, the losses and harm of an attack on their technological infrastructure and systems can mean utter chaos and incapacity to do their tasks, function properly, or earn revenue.

Cybercrime is a vast subject that might fluster your typical non-IT staff. While disconcerting, it is something that should be handled only by those with the technical know-how. Especially since with cybercrime and technological vulnerabilities, anyone can be a victim. With the objective of ensuring everyone is aware and educated on what we're facing each time we connect to the internet, check our emails, or read, browse, shop, and transact online, Stacey Wright comes back to the Justice Clearinghouse to provide a Cybercrime and Defense basics to the attendees.

Stacey's credentials include working for FBI's Cyber Intelligence, teaching graduate programs on cybersecurity, and being a national keynote speaker on Cybercrime. Today, she breaks down Cybercrime and Defense in this foundational course that covers:

  • Terminologies used by IT professionals and what each of the concepts mean.
  • DoS and DDoS attacks: What happens during an attack, the impact of the attack, how to protect our computers/systems from such attacks, and who are your potential DDoS attackers.
  • What malware or malicious softwares are.
  • The different types of malware: viruses, worms, trojan horses, scareware, spyware, click fraud and adware, rootkits, exploit kits, and botnet malware.
  • What botnets are, what comprises this network, and the complex and dangerous structure that allows botnets to control multiple computers around the world.
  • How botnets are utilized to initiate DDoS attacks and send malicious emails like spam, malspam, phishing, and spear-phishing.
  • What fake antivirus is, how it can function as scareware, trojan horse, ransomware and/or worm.
  • The concept of ransomware as a malware that blocks access to a network, system, device, or file until a ransom is paid to the attacker.
  • How cryptocurrencies like Bitcoins provide anonymity to attackers.
  • The three types of ransomware based on the technique it uses to limit users from using/accessing their device/network.
  • Using backups as the best preventive solution from ransomware.
  • The procedure and elements necessary for an effective backup.
  • Information-stealing and record-collecting malware called keyloggers and how this can compromise your professional, financial and personal accounts.
  • Ways that keyloggers were utilized in workplaces, court systems, and even in domestic disputes and divorce cases.
  • Click fraud as a way to manipulate online advertisements.
  • How click fraud is done either competitively or as an affiliate.
  • Malvertising, where online ads have malware embedded and once clicked, infects your computer/system.
  • Dangerous drive-by downloads where merely visiting a webpage infects your computer/system without any additional action from the user.
  • How anti-virus softwares, firewalls, IDS, and IPS are used to defend your device/network from malware and other intrusions.
  • How an anti-virus keeps off the malicious contents through the hashing and heuristics approach.
  • The differences in filtering processes and functions of firewalls, IDS, and IPS.
  • Protecting your credentials by following the password creation standards.
  • A list of the 10 most common passwords used by people online worldwide to avoid as it makes your credentials easily compromised.
  • Creating an additional level of security through two-factor or multi-factor authentication.
  • How social engineering is done via phishing email, spam or malspam.
  • A social engineering case where a key executive was targeted, and using his credentials requested for a fund transfer and employees' tax information.
  • Falsified claims made by hacktivists.
  • Structured Query Language injection (SQLi) where full databases are breached and accessed resulting in exfiltration/database dumps.
  • Another form of SQLi where website defacements or cyber graffiti are done illustrating the control and access that the attacker has on your full system.
  • Patching as a solution that can fix vulnerabilities within your website/system.
  • Recommendations on what agencies and individuals can do to ensure that they are cyber-secured.
  • Poll question measured MS-ISAC membership of the attendees.
  • The Q&A portion of the webinar tackled a myriad of topics such as:

     

     

     

    • Choosing a company to help to build-up the security of a compromised system.
    • How to deal with questionable received files and ways to check if its free from malicious content.
    • Dealing with malware on a device and how to prevent it from spreading through your network.
    • ISACs’ membership.
    • Finding patterns through personality testing on hackers.
    • Leading an IT team when you lack technical knowledge or background.
    • Vulnerability assessments.
    • Raising awareness about spear-phishing to key leaders.
    • Practical training/drills for cyber-attacks.
    • Ensuring that the workforce is protected from keyloggers and other cyber threats.

 

The Multi-State Information Sharing and Analysis Center (MS-ISAC) is the focal point for cyber threat prevention, protection, response and recovery for the nation’s state, local, tribal, and territorial (SLTT) governments. MS-ISAC membership is free for all SLTT governments as the MS-ISAC is funded by the U.S. Department of Homeland Security (DHS). To join MS-ISAC please fill out the application and mention you heard about them through the Justice Clearinghouse.

Additional Resources
cyber security -Cybercrime and Cyber Defenses infographic cover image
Yesterday
Infographic: 101 Introduction to Cybercrime and Cyber Defenses
With cybercrime and technological vulnerabilities, anyone can be a victim. With the objective of […]
11 days ago
Webinar NOTES: 101 Introduction to How Cybercrime and Cyber Defenses Actually Work
NOTES Cybercrime and Defense   Webinar Focus (0:18) How cybercri […]
Cyber Crime
1 month ago
Cybercrime and Defenses: An Interview with Stacey Wright
Cybercrime and threats can be confusing - particularly if you're not an IT person. The alphab […]
5 months ago
Understanding CyberThreats to Your Organization: An Update from Stacey Wright
Is there ever a week where there isn't a report of a hacking? Some major corporation being in […]
Join the Justice Clearinghouse Community of over 23,309 Justice Practitioners!

Join the Justice Clearinghouse Community of over 23,309 Justice Practitioners!

3-5 times per week we will send you updates on free upcoming webinars, custom created infographics and interviews with our presenters

You have Successfully Subscribed!

X