Top Banner
Jamaica: Vic)m or perpetrator of cyber crime and intrusions? INFOSEC Execu)ve Breakfast Kingston, Jamaica 26 June 2012
15

Jamaica: victim or perpetrator of cyber crime and intrusions (final)

May 08, 2015

Download

Technology

Michele Marius

Presentation given at the Paladion seminar, “Scaling up Security Management for Newer Threats”, on 26 June 2012 in Kingston, Jamaica
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Jamaica:  Vic)m  or  perpetrator  of  cyber  crime  and  intrusions?  

INFOSEC  Execu)ve  Breakfast    Kingston,  Jamaica    �    26  June  2012  

Page 2: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Cyber  incidents  not  widely  reported  in  the  Caribbean  

A  few  possible  excep.ons:  •  Tax  Administra.on  of  Jamaica  –  June  2012  •  Hacking  of  Trinidad  &  Tobago  Parliament  website  –  April  2012  

•  Hacking  of  Trinidad  &  Tobago  Ministry  of  Finance  website  –  March  2012  

•  DDoS  aHack  LIME  Barbados  network  –  March  2012  

Page 3: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

What  do  Caribbean  network  security  experts  think  about  cyber  security  in  

the  region?  

Page 4: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Intrusions  are  highly  prevalent  in  the  Caribbean  

•  Success  rate  of  aHempts  unknown  •  Top  sources  for  threats  –  Russia,  China,  HK  •  Organisa.ons  have  a  narrow  view  of  security  •  Caribbean  has  not  commiHed  the  necessary  resources  or  effort  to  strengthen  frameworks  

•  In  addi.on  to  threats  in-­‐country,  Caribbean  countries  can  be  used  as  jump-­‐off  points  for  aHacks  in  other  countries  

Page 5: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

What  is  the  situa)on  in  Jamaica?  

Page 6: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

A  legal  &  enforcement  framework    exists  for  cyber  crime  

•  Cybercrimes  Act  2010  exists  along  with  a  Cybercrime  Unit  (CCU)  

•  CCU  can  only  enforce  with  coopera.on  of  vic.ms  and  other  affected  interests  

•  Unit  has  its  hand  full  tackling  local  crimes  plus  loHo/telemarke.ng  scams  targeted  at  the  US  

•  LoHo  scams  are  affec.ng  country’s  reputa.on  –  “Beware  876”  campaign  

Page 7: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

CCU  tackled  32  cases  in  2011  

Page 8: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

So  far,  Jan—May  2012:  26  cases  

Page 9: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

CCU  data  doesn’t  tell  us  much  

•  Incidents  reported  as  cyber  crimes  are  done  according  to  Cybercrimes  Act  

•  CCU’s  main  goal  is  prosecu.on  •  Focus  likely  to  be  incidents  origina.ng  in  Jamaica  

•  LiHle  or  possibly  no  framework  for  incidents  affec.ng  Jamaicans  but  origina.ng  elsewhere  

•  Cases  reported  to  CCU  only  a  drop  in  the  bucket    

Page 10: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

How  can  we  stem  the  )de?  

Page 11: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Cyber  incidents  can  be    debilita)ng  and  isola)ng  

•  Majority  of  organisa.ons  are  unaware  that  they  have  been  compromised  

•  Incidents  cost  organisa.ons  $MM  –  .me,  revenues,  produc.vity,  remedia.on  

•  Many  organisa.ons  could  be  having  iden.cal  experiences  –  unbeknownst  to  the  other  

•  Oaen  limited  insight  into  scope  of  incidents  -­‐    frequency,  characteris.cs,  paHerns,  possible  solu.ons,  etc.  

Page 12: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Internally,  we  must  be  beUer  prepared  and  equipped  

•  Comprehensively  examine  systems,  networks,  equipment  

•  Strategically  establish  priori.es  &  con.ngencies  

•  Invest  in  the  con.nual  maintenance  and  update  of  defences  

•  Exercise  even  greater  vigilance    •  Support  staff  training  and  capacity  building  

Page 13: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

We  must  also  be  prepared  to  establish  trust  rela)onships  

CERTs/CSIRTs  are  urgently  needed:  •  Provide  expert  informa.on  and  support  •  Supplement  internal  security  plans/structures    •  Increase  awareness  of  incidents  -­‐  frequency,  characteris.cs,  commonali.es,  possible  solu.ons,  etc.  

•  Ensure  that  appropriate  industry  standards  and  prac.ces  are  established  

Page 14: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

 Thank  you!  

Michele  Marius  Blog:    ict-­‐pulse.com  

FB:  facebook.com/ICTPulse  TwiHer:  @ictpulse  

Page 15: Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Image  credits  •  Stethoscope:  dreams  designs  /  FreeDigitalPhotos.net,  

hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=1449  

•  Binocular  image:  Ntwowe  /  FreeDigitalPhotos.net,  hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=2043    

•  Hermosa  Wave  image:  watch4u  /  flickr,  hHp://www.flickr.com/photos/look4u/