SlideShare a Scribd company logo
Cyberstorm
By: Janette Geoghan and Jose R.
Valdez
Benefits of program Cyberstorm
• The government can point out weaknesses of a companies
Information systems
• Weakness can then be turned into a strengh
• Helps prevent cyber crimes from occuring
• In the following slides we will see examples of scenarios
which can be prevented through the program Cyberstorm
and their consequences.
Scenario 1
• An authorized user steals credit reports and financial information
and sells it. In this scenario the job is a inside job, someone that
works from within and has privileges that others do not. This
scenario can happen to anyone all you need is someone who is
malicious and wants to take advantage of their position. The
consequences for a scenario such as this one is serious punishment
by the law if caught, but according to criminallaw.org most culprits
of this type of information breach never get caught, which is
actually very sad. (Cybercrimelaw.org)
Scenario 2
• Malicious software updates. In this scenario an attacker delivers
software updates that enables them to see critical information on
your hardware. Culprits of this scenario can expect many lawsuits
but that’s only if the users of their program even notice it. In a
article posted in criminallaw.org internet users sometimes install
programs into their computer without knowing who created the
software. An example of a company who did this is
DirectRevenue. (Cybercrimelaw.org) They were using their
program to get information on users bank accounts and social
security numbers. A couple of users noticed and sued the
company. After this DirectRevenue set up a link on their website
to settle with those users who were abused.
Scenario 3
• Insider Abuse. This scenario is similar to number
one but instead of someone who works for the
company committing the act it is someone who is
very knowledgeable in IT. In this case the
punishment for such act is serious punishment by
law but like stated before the percent of cyber
criminals that get caught is not very high.
(Cybercrimelaw.org)
Sources
• U.S Department of Homeland security, . "Cyber Storm: Securing Cyber Space."
09/27/2010: 3. Web. 9 Nov 2010.
<http://www.dhs.gov/files/training/gc_1204738275985.shtm>.
• Cybercrimelaw.org, . cybercrimelaw. cybercrimelaw, 09/12/2008. Web. 9 Nov 2010.
<http://www.cybercrimelaw.org/>.
• Stiennon, Richard. "Seven Cyber Scenarios To Keep You Awake At Night." Forbs.
Forbes, 03/29/2010. Web. 9 Nov 2010.
<http://blogs.forbes.com/firewall/2010/04/29/seven-cyber-scenarios-to-keep-you-
awake-at-night/>.
• "Hackers." Phandroid.com. Web. 9 Nov 2010.
<http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push-
google-to-plug-holes-at-security-conference/>.
Sources
• U.S Department of Homeland security, . "Cyber Storm: Securing Cyber Space."
09/27/2010: 3. Web. 9 Nov 2010.
<http://www.dhs.gov/files/training/gc_1204738275985.shtm>.
• Cybercrimelaw.org, . cybercrimelaw. cybercrimelaw, 09/12/2008. Web. 9 Nov 2010.
<http://www.cybercrimelaw.org/>.
• Stiennon, Richard. "Seven Cyber Scenarios To Keep You Awake At Night." Forbs.
Forbes, 03/29/2010. Web. 9 Nov 2010.
<http://blogs.forbes.com/firewall/2010/04/29/seven-cyber-scenarios-to-keep-you-
awake-at-night/>.
• "Hackers." Phandroid.com. Web. 9 Nov 2010.
<http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push-
google-to-plug-holes-at-security-conference/>.

More Related Content

PPTX
Equifax breach - how to lose friends and customers...
PPTX
Cybersecurity for IAEM Region 4
PDF
cybersecurity-101_4
PDF
Feds: You have a BYOD program whether you like it or not
PPTX
Fraud Detection With User Behavior Analytics
PPTX
chapter 3 ethics: computer and internet crime
PDF
Why is cybersecurity important for the entertainment industry
PPTX
Ransomware
Equifax breach - how to lose friends and customers...
Cybersecurity for IAEM Region 4
cybersecurity-101_4
Feds: You have a BYOD program whether you like it or not
Fraud Detection With User Behavior Analytics
chapter 3 ethics: computer and internet crime
Why is cybersecurity important for the entertainment industry
Ransomware

What's hot (18)

PPT
Cyber crime and security
PPTX
Ransomware attack
PDF
Targeted Defense for Malware & Targeted Attacks
PDF
The Seven Kinds of Security
PPTX
Cyber Crime - "Who, What and How"
PDF
2015 Cybersecurity Predictions
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Data Breach Risk Intelligence
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PDF
Data Breach Risk Brief - 2015
PDF
Security Is an Enabler, Not Securing Is an Inhibitor
PDF
The Immune System of Internet
PPTX
Cyber crime
PDF
The Growing Threat of Ransomware
PPTX
Wannacry ransomware attack (Sherly)
PPTX
Cyber security for women using mobile devices
PPTX
Cybercrimes
PPTX
Cyber Security Threats in the Financial Sector
Cyber crime and security
Ransomware attack
Targeted Defense for Malware & Targeted Attacks
The Seven Kinds of Security
Cyber Crime - "Who, What and How"
2015 Cybersecurity Predictions
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Data Breach Risk Intelligence
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Data Breach Risk Brief - 2015
Security Is an Enabler, Not Securing Is an Inhibitor
The Immune System of Internet
Cyber crime
The Growing Threat of Ransomware
Wannacry ransomware attack (Sherly)
Cyber security for women using mobile devices
Cybercrimes
Cyber Security Threats in the Financial Sector
Ad

Viewers also liked (20)

PDF
5. Experience from recent national & international cyber exercises
PDF
Internet Pirates: blackholing, hijacking and other dirty tricks
PDF
IP Hijacking - Securing Internet Routing
PDF
Cyber after Snowden (OA Cyber Summit)
PDF
Massif cluster meeting
PPT
PPTX
Cyber Crime
PDF
Panda security Presentación Adaptive Defense
PDF
Digital Threats: Scenarios Exercise
PPT
Active Testing
PPTX
Attack on graph
PDF
Wireless Spreading of WiFi APs Infections Using WPS Flaws
PDF
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
PDF
Cyber Warfare Systems
PDF
OWASP Top 10 : Scanning JSF
PPTX
Cyber warfare: an unorthodox view from the battlefield
PPTX
Penetration Testing Techniques - DREAD Methodology
PPTX
Making Threat Management More Manageable
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
5. Experience from recent national & international cyber exercises
Internet Pirates: blackholing, hijacking and other dirty tricks
IP Hijacking - Securing Internet Routing
Cyber after Snowden (OA Cyber Summit)
Massif cluster meeting
Cyber Crime
Panda security Presentación Adaptive Defense
Digital Threats: Scenarios Exercise
Active Testing
Attack on graph
Wireless Spreading of WiFi APs Infections Using WPS Flaws
Anatomy of a Targeted Attack against Mobile Device Management (MDM)
Cyber Warfare Systems
OWASP Top 10 : Scanning JSF
Cyber warfare: an unorthodox view from the battlefield
Penetration Testing Techniques - DREAD Methodology
Making Threat Management More Manageable
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
Ad

Similar to Cyberstorm[1] (20)

PPTX
Computer Security risks Shelly
DOCX
87161911 selected-case-studies-on-cyber-crime
PPTX
Cyber crime
PPT
Cyber crime and forensic
PPTX
Cyber crimes
PDF
Unit 1.pdf cybers laws and security auditing
PDF
Cyber Crime Multi-State Information Sharing and Analysis Center
PPT
PDF
Cybercrimeandforensic 120828021931-phpapp02
PPTX
Captive Insurance and Cyber Risk
PPTX
Cyber security mis
PPTX
Cyber crime
PPTX
Cyber crime
PDF
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
DOCX
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
PPTX
Cybercrime(this)
PPT
Introduction to Cyber Law
Computer Security risks Shelly
87161911 selected-case-studies-on-cyber-crime
Cyber crime
Cyber crime and forensic
Cyber crimes
Unit 1.pdf cybers laws and security auditing
Cyber Crime Multi-State Information Sharing and Analysis Center
Cybercrimeandforensic 120828021931-phpapp02
Captive Insurance and Cyber Risk
Cyber security mis
Cyber crime
Cyber crime
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
Cybercrime(this)
Introduction to Cyber Law

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Five Habits of High-Impact Board Members
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Architecture types and enterprise applications.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
DOCX
search engine optimization ppt fir known well about this
PDF
August Patch Tuesday
PDF
STKI Israel Market Study 2025 version august
PPT
What is a Computer? Input Devices /output devices
PPTX
The various Industrial Revolutions .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
observCloud-Native Containerability and monitoring.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Chapter 5: Probability Theory and Statistics
Five Habits of High-Impact Board Members
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
A review of recent deep learning applications in wood surface defect identifi...
Getting Started with Data Integration: FME Form 101
Architecture types and enterprise applications.pdf
Module 1.ppt Iot fundamentals and Architecture
Taming the Chaos: How to Turn Unstructured Data into Decisions
search engine optimization ppt fir known well about this
August Patch Tuesday
STKI Israel Market Study 2025 version august
What is a Computer? Input Devices /output devices
The various Industrial Revolutions .pptx
Benefits of Physical activity for teenagers.pptx
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
observCloud-Native Containerability and monitoring.pptx

Cyberstorm[1]

  • 1. Cyberstorm By: Janette Geoghan and Jose R. Valdez
  • 2. Benefits of program Cyberstorm • The government can point out weaknesses of a companies Information systems • Weakness can then be turned into a strengh • Helps prevent cyber crimes from occuring • In the following slides we will see examples of scenarios which can be prevented through the program Cyberstorm and their consequences.
  • 3. Scenario 1 • An authorized user steals credit reports and financial information and sells it. In this scenario the job is a inside job, someone that works from within and has privileges that others do not. This scenario can happen to anyone all you need is someone who is malicious and wants to take advantage of their position. The consequences for a scenario such as this one is serious punishment by the law if caught, but according to criminallaw.org most culprits of this type of information breach never get caught, which is actually very sad. (Cybercrimelaw.org)
  • 4. Scenario 2 • Malicious software updates. In this scenario an attacker delivers software updates that enables them to see critical information on your hardware. Culprits of this scenario can expect many lawsuits but that’s only if the users of their program even notice it. In a article posted in criminallaw.org internet users sometimes install programs into their computer without knowing who created the software. An example of a company who did this is DirectRevenue. (Cybercrimelaw.org) They were using their program to get information on users bank accounts and social security numbers. A couple of users noticed and sued the company. After this DirectRevenue set up a link on their website to settle with those users who were abused.
  • 5. Scenario 3 • Insider Abuse. This scenario is similar to number one but instead of someone who works for the company committing the act it is someone who is very knowledgeable in IT. In this case the punishment for such act is serious punishment by law but like stated before the percent of cyber criminals that get caught is not very high. (Cybercrimelaw.org)
  • 6. Sources • U.S Department of Homeland security, . "Cyber Storm: Securing Cyber Space." 09/27/2010: 3. Web. 9 Nov 2010. <http://www.dhs.gov/files/training/gc_1204738275985.shtm>. • Cybercrimelaw.org, . cybercrimelaw. cybercrimelaw, 09/12/2008. Web. 9 Nov 2010. <http://www.cybercrimelaw.org/>. • Stiennon, Richard. "Seven Cyber Scenarios To Keep You Awake At Night." Forbs. Forbes, 03/29/2010. Web. 9 Nov 2010. <http://blogs.forbes.com/firewall/2010/04/29/seven-cyber-scenarios-to-keep-you- awake-at-night/>. • "Hackers." Phandroid.com. Web. 9 Nov 2010. <http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push- google-to-plug-holes-at-security-conference/>.
  • 7. Sources • U.S Department of Homeland security, . "Cyber Storm: Securing Cyber Space." 09/27/2010: 3. Web. 9 Nov 2010. <http://www.dhs.gov/files/training/gc_1204738275985.shtm>. • Cybercrimelaw.org, . cybercrimelaw. cybercrimelaw, 09/12/2008. Web. 9 Nov 2010. <http://www.cybercrimelaw.org/>. • Stiennon, Richard. "Seven Cyber Scenarios To Keep You Awake At Night." Forbs. Forbes, 03/29/2010. Web. 9 Nov 2010. <http://blogs.forbes.com/firewall/2010/04/29/seven-cyber-scenarios-to-keep-you- awake-at-night/>. • "Hackers." Phandroid.com. Web. 9 Nov 2010. <http://phandroid.com/2010/07/31/hackers-release-data-stealing-program-to-push- google-to-plug-holes-at-security-conference/>.