Cyber Crime Game Players

Cyber Crime Game Players
By Marharyta Abreu & Iwona Sornat
There is no way to get rid of the cyber crime,
but it is possible to limit it by making society
aware of existing threats and methods used
by hackers to deceive potential victims.
Cyber Crime Definition
What the cyber crime really means???????
 The U.S. Department of Justice - expanded definition of
Who are the cyber game players?
 Governmental and non-governmental parties
Hacktivist groups
Big military superpowers
- cyberspace as the fifth domain in warfare
Big software companies
Security companies
Traditional cyber-criminals and cyber-criminal gangs
History and Trends
 60’s - physical damage to computer`s systems and long distance
telephone networks subversion
 80`s – malicious software (viruses, worms and Trojan horses)
 1995 – Internet commercialized, cyber crime definition really born
 End of 90`s - credit card fraud as border category of identity theft
 Mid 2000s - hardware Trojans designed
Cyber Game Players: Hacktivists
 The Saudi and Israeli hacktivists
 Attacks on official websites of Saudi
 publishing the email passwords of nearly a hundred Saudi university
students (Anonymous 972 )
 Release of credit card numbers and other sensitive information that
affected about 14,000 (xOmar)
 Anonymous group
Cyber Game Players: Big
military superpowers
 China's cyber warfare skills
- penetration the U.S. electric grid,
- gained access to U.S. government and corporate networks
 Japan engaged recently in cyber activity
Cyber Crime Game Players: Big
software companies
 Apple, Adobe and Microsoft
 Create the software which runs on all computers
 New zero-day exploits
 “Operation Aurora” - Google, Adobe, Juniper Networks,
Rackspace, Symantec, Northrop Grumman, Morgan
Stanley and Dow Chemical
Cyber Crime Game Players:
Security Companies
 Security companies might be susceptible to
attacks – RSA attacks
 Counter – espionage - The Mykonos software
Cyber Crime Game Players:
Cyber-criminals and cybercriminal gangs
 Most originate from US, China, and Eastern
Europe and focus on:
1. Stealing financial information - Eastern
2. Intellectual property - China
3. Cooperation of cyber gangs and street
gangs for extortion or industrial espionage US
Accounting for Cyber Security
 SEC guidance issued in 2011 requires
disclosure of material cybersecurity risks and
cyber events.
 Possible effect on F/S:
1. Remediation costs
2. Increased protection costs
3. Litigation
4. Reputational damage
5. Loss of revenues

similar documents