Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
La amenaza del cibercrimen: articulando una respuesta Infosecurity 2014 Hotel Fiesta Americana Reforma
Jorge Vega-Iracelay Director de Asuntos Jurídicos, Corporativos y de Ciudadanía Microsoft México [email protected]
Leading the fight
against cybercrime
The Impact of Cybercrime
Digital Crimes Unit Overview
The Threat of Malware
Confronting IP Crimes
Combatting Online Child Exploitation
The Impact of
Cybercrime
Cybercriminals have sophisticated their
operations to create and distribute malware
Cybercrime is evolving at lightning speed
The risk to individuals and companies is
growing
Online criminals have global reach
Cybercrime has been embraced by organized
crime
Traditional responses won’t suffice – proactive,
aggressive action is required
Every second, 12 people are
victims of cybercrime – nearly
400 million every year*
1 in 5 small and medium
enterprises are targeted by
cyber criminals**
Cybercrime costs consumers
$113 billion a year*
50% of online adults have
been victims in the past year
Online Child Exploitation The NCMEC has reviewed more than 90 million
images and videos of child pornography.***
Financial Fraud 53% of the world’s securities exchanges were
targeted in 2012
* 2013 Norton Report
** National Cyber Security Alliance
*** National Center for Missing and
Exploited Children
Leading the fight
against cybercrime
The Impact of Cybercrime
Digital Crimes Unit Overview
The Threat of Malware
Confronting IP Crimes
Combatting Online Child Exploitation
How You Can Help
A new era in the fight against cybercrime
Industry Partners Criminal Law
Enforcement Government
Trustworthy
Computing Public Sector
Digital
Crimes Unit Government
Affairs
Microsoft
Consulting
Services Cybercrime Center
PROACTIVE DISRUPTION We work with our customers and partners to proactively target online criminals
MALICIOUS SOFTWARE CRIMES • Viruses • Trojans
IP CRIMES • Counterfeiting • End-User Piracy
CHILD EXPLOITATION • Child Abuse Images • Sex Trafficking
• Worms • Botnets
Security, Reliability,
Privacy
Solutions, Initiatives,
Innovations Policy, Legislation
Risk Assessment,
Cybersecurity Services
Microsoft
Leading the fight
against cybercrime
The Impact of Cybercrime
Digital Crimes Unit Overview
The Threat of Malware
Confronting IP Crimes
Combatting Online Child Exploitation
How You Can Help
Botnets are networks of infected
computers that can be remotely
controlled by an individual or
organization
Attacker
Command and
Control Server
Bots
Victim
What is a botnet?
Robot networks – Botnets 101
Dance
Stop
Attack!
Spam!
Sleep
Malware, Botnets and Organized
Crime
Malware evokes danger
A whole industry behind malware
Operations against prominent botnets like
Waledac, Rustock, Kelihos, Zeus, Nitol, Bamital,
Citadel and ZeroAccess
Study on “The Link between Pirated Software
and Cybersecurity Breaches”
Botnet
Organized
Crime
Spam Counterfeited
Software
Unsecure supply
chain
Leading the fight
against cybercrime
The Impact of Cybercrime
Digital Crimes Unit Overview
The Threat of Malware
Confronting IP Crimes
Combatting Online Child Exploitation
How You Can Help
Distribution of Counterfeit and Pirated Software
Counterfeit Ecommerce Online Marketplaces One-Click Downloads
BitTorrent P2P Downloads PC Malls
Cyberforensics
Detecting pirated software
Suspected material obtained via test purchases, seizures and customer submissions
Conduct inspection of digital and physical elements
Infrared reader or UV light checks for security thread
Product key is checked against database of stolen keys
Evidence is stored and findings are reported
Cyberforensics: identifying and tracking stolen keys
Stolen product keys are a significant tool for criminals
Every hour approximately 100,000 PCs attempt to active products using a key
Approximately 45% are unsuccessful due to stolen keys
invalid
Cyberforensics: identifying and tracking stolen keys
Failed activations are mapped in real-time
Easily establish distribution patterns of stolen keys
Focus on global hotspots where fraud originates
Leading the fight
against cybercrime
The Impact of Cybercrime
Digital Crimes Unit Overview
The Threat of Malware
Confronting IP Crimes
Combatting Online Child Exploitation
How You Can Help
Online Child Exploitation
As technology has evolved, the spread of child
abuse content has grown.
Since 2002, experts at the National Center for
Missing & Exploited Children have reviewed more
than 90 million images and videos of suspected
child abuse.
identifying and removing millions of
illegal images across the web.
Our challenge:
PhotoDNA
Putting a digital fingerprint on child abuse content
Original image Photo is broken down
into regions
Intensity derivative for
each pixel is calculated
Creates unique histogram
for all pixels
PhotoDNA
Putting a digital fingerprint on child abuse content PhotoDNA in action
Creates signatures of the worst
known child abuse images
Can locate these images among
the millions online
Shared with law enforcement to
accelerate prosecution
Also used by Facebook, Google,
and Twitter and others
To recap
Cybercrime is evolving and poses a
significant threat to consumers, businesses
and governments
Global, organized crime rings have embraced
cybercrime as a key tactic
The threats range from malware and botnets
to counterfeit software and online child
exploitation
The Digital Crimes Unit is committed to
aggressive, proactive action to stop
cybercriminals
How you can help
Ensure a legislative landscape that deters
cybercrime
Protect economies, jobs and innovation by
prioritizing cybercrime disruption
Disrupt the demand for counterfeit software
Deploy threat intelligence technology
Demonstrate zero tolerance on child exploitation
Policy Makers
How you can help
Dismantle counterfeit supply operations
Take down botnets tied to criminal organizations
Remove illegal online storefronts selling counterfeit
products and devices
Establish new tactics to combat child exploitation
online
Use data gathered in civil actions to accelerate
prosecution of cybercriminals
Criminal Law Enforcement
How you can help
Deploy threat intelligence technology
Disrupt the demand for counterfeit software
Strengthen supply chains
Demonstrate zero tolerance for child
abuse content
Require other partners to adopt similar actions
Industry Partners
Gracias