dss @sfk conference_2012_cybercrime_welcomes_you
DESCRIPTION
Brief update of today's digital world and its biggest nightmare - cybercrime.TRANSCRIPT
![Page 1: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/1.jpg)
![Page 2: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/2.jpg)
Global figures - WEB
At least one new domain
each second
2010 – 196 million domain
per quarter
2011 – 220 million domain
names per quarter
Source: VeriSign (Dec,2011)
![Page 3: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/3.jpg)
Global figures - WEB
Google: 88 000 000 000 searches per month, 3 billion
per day, 121 million per hour
Twitter: 6939 tweets per second, billion tweets per
week, 24 000 000 000 searches per month
Yahoo Sites: 9 400 000 000 searches per month
Microsoft sites: “just” around 4,1 billion
![Page 4: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/4.jpg)
![Page 5: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/5.jpg)
![Page 6: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/6.jpg)
Financial IM
Unified Communications
Web Conferencing
VoIP
Remote Admin Tools
Public IM
P2P
Anonymizers
VoIP
Social Networks
Games
Virtual Worlds
IPTV
![Page 7: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/7.jpg)
Social Networking 936
Instant Messaging 259
IPTV 62
Remote Admin Tools 23
P2P 170
VoIP 100
Web Conferencing 55
Commercial Monitoring Software 257
Anonymizer 58
Web Mail 21
6000 +
Category Number Example
![Page 8: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/8.jpg)
IT continues taking the lead in business
(ERP, CRM, document management, digital
prototyping, business intelligence etc.)
Development of e-World continues (B2B,
B2C, e-Services, e-Government, e-Health,
social networking, Web 2.0, unified
communications etc.)
Consumerization, mobility and borderless
enterprise is a reality
Cyber culture grows faster than cyber
security (as well – not all countries have
compliance or penalties)
![Page 9: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/9.jpg)
![Page 10: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/10.jpg)
Global figures - cybercrime
2011 – 431 billion people
affected, with more than 114
billion USD directly and
another 274 billion USD
related to direct loss
(Source: Symantec, Dec 2011)
Cybercrime costs the world significantly more than
the global black market of marijuana, cocaine and heroin
combined ($228 billion world wide)
![Page 11: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/11.jpg)
Security today -
Financially motivated
Bank Accounts
Identity theft
Insiders
Intellectual Property Theft
“Hacktivists”
Denial of Service
Reputation Damage
Customer data
![Page 12: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/12.jpg)
![Page 13: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/13.jpg)
![Page 14: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/14.jpg)
FBI warns USA Congress that cybercriminals can
hack any internet-linked system
Gordon M. Snow, assistant director of the FBI’s Cyber
Division (13th of April, 2011)
Exclusive: Computer Virus Hits U.S. Drone Fleet
Noah Shachtman, Wired Magazine
(7th of October, 2011)
Betfair admits data hack... after 18 months - over
two million card details were stolen
Rory Cellan-Jones, BBC Technology
(30th of September, 2011)
![Page 15: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/15.jpg)
![Page 16: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/16.jpg)
![Page 17: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/17.jpg)
![Page 18: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/18.jpg)
![Page 19: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/19.jpg)
![Page 20: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/20.jpg)
![Page 21: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/21.jpg)
![Page 22: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/22.jpg)
Policy and real time control
Of devices and applications
Of people and IT stuff
Of data leak protection
Of internet usage
Of remote access
Of employees training
Of….
Encryption
Mobile phones
Voice calls and text messages
eMails
Computers and devices
Data bases
…
![Page 23: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/23.jpg)
![Page 24: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/24.jpg)
Specialization – IT Security
IT Security consulting
(vulnerability assessment
tests, security audit, new
systems integration, HR
training, technical support)
Innovative & selected
software / hardware & hybrid
solutions from leading
technology vendors from
over 10 different countries
![Page 25: DSS @SFK Conference_2012_Cybercrime_welcomes_you](https://reader034.vdocument.in/reader034/viewer/2022052601/559878131a28abb1218b4570/html5/thumbnails/25.jpg)
www.dss.lv
Mobile: +371 2 9162784
Twitter: andris_soroka