Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security in the new era (Hacktivism (Types (Web Sit-ins,…
Information
Security in the new era
Hacktivism
Is the legal or illegal use of digital tools for political and protest purposes.
Breaks websites securities to spread their messages
Examples
WikiLeaks
LulzSec
Anonymous
Types
Web Sit-ins
Bombardment of e-mail
Destruction of web pages
Mirroring sites
Doxing
Geobombing
Ransomware
Is a form of malicious software (MALWARE)
How does it work?
It takes over the computer
Blocks access and encrypts device information
For the rescue, ask for a payment in Bitcoins
How to avoid?
Avoid browsing unsafe pages or with unverified content.
Don't open emails or files with unknown senders
Have a good antivirus installed
Keep our operating system updated
Examples
SimpleLocker
WannaCry
TeslaCrypt
CryptoLocker
Locky
NotPetya
AI-Powered Automated Hacking
Use of artificial intelligence for criminal purposes
Drones and autonomous vehicles could be hacked using AI and turned into weapons
Traditional cybersecurity methods won’t know how to cope with new attacks carried out by smart machines.
Example
DeepLocker
Consumer
Device Targeting
Attacks
They are DDoS attacks aimed at IoT devices
How to protect yourself?
Adopt a vulnerability disclosure policy (Technical Drivers)
Make secure software updates available for an explicitly
stated length of time.
Eliminate non-unique default passwords
Take advantage of vulnerabilities in Supply Chain Devices
Biometric Malware
Biometric
It makes authentication much faster, easier and more secure
Types
Fingerprints
Fingerprint scanner
Voice recognition
Iris recognition
Face recognition
Hand geometry
Behavior characteristics
The data stored in a biometric database may be more vulnerable than any other kind of data
Any collection of data could eventually get hacked
Some pieces of your physical identity can be duplicated