How CMS Systems are being used to stage a cybercrime (1) - PowerPoint PPT Presentation

About This Presentation
Title:

How CMS Systems are being used to stage a cybercrime (1)

Description:

The WikiPedia definition of a CMS is “a computer application that supports the creation and modification of digital content. It is often used to support multiple users working in a collaborative environment.” Simply put, a CMS is a set of tools and applications that are used to build and manage electronic text. They are available as point and press development tools for non-IT literate users to develop their own websites and blogs. – PowerPoint PPT presentation

Number of Views:4

less

Transcript and Presenter's Notes

Title: How CMS Systems are being used to stage a cybercrime (1)


1
HowCMS Systemsare being usedby hackersto
stagea cybercrime
  • www.cybersechub.net

2
How CMS Systems are being usedby hackers to
stage a cybercrime
  • Who are the hackers and what do they want?  They
    range from geeks looking for boasting credits, to
    criminals stealing personal information for later
    sale, to businesses carrying out industrial
    espionage and spies and terrorists looking for
    classified information.
  • CMS attackers tend to be geeks or outright
    criminals.

www.cybersechub.net
3
How CMS Systems are being usedby hackers to
stage a cybercrime
  • To distribute malware, hackers seed a CMS website
    or blogging platform with malware so that
    unsuspecting users download it when visiting the
    site, and subsequently seed the other blogs and
    websites they visit. Its not just the malware
    protection software.  It is also very important
    to keep the CMS software up to date with patches
    and version upgrades to ensure that all potential
    threats are recognised and countered.

www.cybersechub.net
4
How CMS Systems are being usedby hackers to
stage a cybercrime
  • Ransomware is a relatively new phenomenon that is
    rapidly heading to a Billion dollar a year
    turnover according to the FBI.  Basically it
    involves encoding or encrypting a users systems
    and or data. The user is asked to pay for a
    decryption key to return the data to a usable
    format.  Formerly targeted only at large
    corporate sites able to pay a large ransom to
    have their systems returned, it is now
    diversifying to smaller individual personal sites
    holding family picture and video albums.  Most
    individuals will pay out to have their precious
    memories returned to them.

www.cybersechub.net
5
HowCMS Systemsare being usedby hackersto
stagea cybercrime
  • www.cybersechub.net
Write a Comment
User Comments (0)
About PowerShow.com