1 / 18

Child soldiers of the modern age

Child soldiers of the modern age. How to protect young hackers ? Buherátor – Dr. Csaba Krasznay. Dr. Krasznay Csaba. A katonai műszaki tudományok doktora Leading IT Security Expert of 2011 Regular speaker at conferences and universities

morela
Download Presentation

Child soldiers of the modern age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Childsoldiers of the modern age Howtoprotectyounghackers? Buherátor – Dr. Csaba Krasznay

  2. Dr. Krasznay Csaba • A katonai műszaki tudományok doktora • Leading IT SecurityExpert of 2011 • Regularspeakeratconferences and universities • Chairman of severalprofessionalorganizations • Heavilycertified • Main organizer of theHacktivityconferenceforyears • VoluntaryteacherintheSafer Internet Project of the International Children's Safety Service

  3. Whoarethechildsoldiers of the modern age?

  4. The cost of cybercrime Forrás: Norton CybercrimeReport 2012

  5. Hacker profiles Forrás: UNICRI, Hacker Profiling Project

  6. Distributionbyage

  7. Distributionbyage

  8. Even a childcanhacknowdays

  9. Buherátor • IT securityexpert • EthicalHacking • Vulnerabilityresearch • Education • Blogger – http://buhera.blog.hu • News • Analysis • Socialbughunt

  10. Could be different…

  11. Target?

  12. DEMO

  13. (D)DoS?

  14. Luckily, everythingturnedout right • ~100 bugreportforHungarianwebsites • ~10% criticalinfrastructure • Dozens of successfulethicalhackingprojects • International and domestic • Software vulnerabilityreports • (Tens of?) Millionsofusers

  15. Digital Mohács • Imaginaryscenario of a cyberattackagainst Hungary from2009 (Dr. László Kovács , Csaba Krasznay) • Basedonthe Digital Pearl Harbourscenario and thecyberattackagainstEstonia • ALL steps of theattackhappenedbefore – somewhereelse • The scenario has beenjustifiedbyrealitysincethen…

  16. Real dangers • Anonymous is notsomethingto be afraid of • No intelligencebackground; • Limited monetary and human resources; • No realisticstrategicgoals. • Butit is frighteningtoimaginewhatthemembers of Anonymouscouldbecomewith "appropriate" criminalorgovernmentalbackground!

  17. Education, Education, Education

  18. Buherátor: buherator@gmail.com, buhera.blog.hu Csaba Krasznay: csaba@krasznay.hu, www.krasznay.hu ThankYou!

More Related