. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - - PowerPoint PPT Presentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - - PowerPoint PPT Presentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Build your business with our Autumn seminars
Wednesday 14 October: Cyber Security Wednesday 11 November: Social Media cranfieldtechnologypark.co.uk
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Phil Cobley
Regional Cyber Protect Coordinator ERSOU (East Region Special Operations Unit) Cyber Security
Cyber Security and Cyber Criminality:
The Facts
Sergeant Phil Cobley Regional Cyber Crime Unit
What we shall discuss…
n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime
Investigations?
n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute
Firstly…who is this guy?!
n 10 years experience in the Police n Was previously the Digital Forensics Manager and Cyber
Crime Investigations Manager at Bedfordshire Police
n Now the Regional Cyber Protect Coordinator n Qualified Digital Forensics Practitioner and Network
Investigator
n Currently studying BSc Software Development n Force Practitioner Lead on Cybercrime n Guest Lecturer at University of Bedfordshire on Cyber Crime n Sit on the National ISO 17025 Standards Expert Network n Published in the law Journal ‘Cyber Security Law & Practice’ n Co-authored the recently released eBook produced by the
NCCR – “A Practical Guide to Coping with Cyberstalking”
What is Cyber Crime?
Cyber crime IS crime…
The adopted definition of Cyber Crime is:
- Cyber Dependent Crimes, where a digital system is the target as
well as the means of attack. These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime).
- Cyber Enabled Crimes. ‘Existing’ crimes that have been
transformed in scale or form by their use of the Internet. The growth
- f the Internet has allowed these crimes to be carried out on an
industrial scale.
- The use of the Internet to facilitate drug dealing, people smuggling
and many other 'traditional' crime types.
Think Digital
Think Digital
Which of these is a cyber threat? Common house hold ‘smart’ goods are now being hacked and used in Spam and DDOS activity
Is it really such a big deal?
We live our lives online
3bn people will be using the internet worldwide by 2016 and by the end of the year, networked devices will
- utnumber people by six to one
On average each household has 3 internet enabled devices and 2/5 adults have smart phones 8% of GDP generated through the internet economy £121bn in 2010 with Household annual retail sales worth £2.6bn with 30% year on year growth
£27billion – 2% GDP (Detica 2011)
n
£21 billion to business
n
£2.2 billion to government
n
£3.1 billion to ‘Jo Public’
n
44m cyber attacks in 2011 in UK
Estimated cost of Cyber Crime…
National Security Strategy Tier 1 threat
n One in three adults suffered online
crime in the previous 12 months
n One in five suffered offline crime
Federation of Small Business (21/05/12) 41% of members suffered cyber crime In the last 12 months cost of £800m 20% had taken no steps to protect themselves
Crime Survey for England & Wales 2012
Regional & Local Capabilities within Law Enforcement
National Regional Organised Crime Units (ROCUs)
(NEROCU) (ODYSSEY) (ZEPHYR) (WMROCU) (SEROCU) (London ROCU) (TARIAN) (TITAN) (EMSOU) (ERSOU)
NCA
Regional Organised Crime Units (ERSOU)
Local Forces
(Beds, Herts, Cambs, Norfolk, Suffolk & Essex)
National/ International Cross Border First Responders & Local Investigations
National Structure
Local Investigation:
n SME n Insider Threat n Data deletion / Website Defaced / Malicious Transactions
Regional Investigation:
n Large Corporation n £14m worth of data extracted over several months n Multiple offenders across several regions working as a gang n Numerous attack vectors
Some Examples
n Do you know the value of your data? n Reputational Damage/IP/Trust…what if these were effected? n Do you know where you data is stored? n Who has access to your data? n Do you have backups? n Do you really know your employees? n Do you have suitable business continuity and disaster recovery
in place?
n What would you do if you lost all your data tonight? n Do you know what your responsibilities are if you have a data
breach?
Ask yourself…
What support is out there?
Resources – Get Safe Online
Resources – Cyber Streetwise
Resources – CESG – 10 Steps
Resources – Cyber Essentials
Innovation Vouchers
https://interact.innovateuk.org/competition-display-page/-/asset_publisher/RqEt2AKmEBhi/content/cyber-security- innovation-vouchers-round-13#
CiSP
Cyber Information Sharing Partnership
CiSP
Cyber Information Sharing Partnership What is the Cyber-security Information Sharing Partnership (CiSP)?
n CiSP is a joint industry and government scheme based in
CERT-UK. CiSP is an online social networking tool and enables its members to exchange information on threats and vulnerabilities as they occur in real time.
Basic steps to stay in control
What we discussed…
n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime
Investigations?
n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute