Click me
Transcribed

Profile of a Cyber Criminal

THE PROFILE OF A CYBER CRIMINAL EVERY DAY OVER {1.5 MILLION WORLDWIDE 11600000 . 8.1 MILLION} 11600000 AMERICANS WERE HIT BY IDENTITY THEFT IN 2010 ARE VICTIM TO CYBERCRIMME EVERYONE IS A TARGET 165% GLOBAL INTERNET USERS HAVE BEEN VICTIMS OF CYBERCRIME doposI • 0000s BY 2011 THIS NUMBER HAD INCREASED 13 PERCENT TO 0000018 - 0000018 - 0000018 - O000018 - 000o {73%5 OF AMERICANS HAVE BEEN 00000si 11.6 MILLION} VICTIMS OF CYBERCRIME (WORLD'S 3RD HIGHEST AVG) ONLY .0019%. OF CYBERCRIMES WERE CONVICTED IN THE US IN 201O THESE CRIMINALS TEND TO WORK FROM FOREIGN COUNTRIES MAKING THEM DIFFICULT TO IDENTIFY AND HARDER TO CONVICT IF CAUGHT. WHO ARE THEY? AGELESS SOCIETY GENDER TEARS OLD YEARS 43 UNDER 25 29 OLD YEARS OLD 11 76 WORK IN PACKS CYBER CRIMINALS WORK IN GROUPS 50 AS PART OF LARGER ORGANIZATIONS 40 25%. ACTIVE CYBER CRIMINAL GROUPS HAVE OPERATED FOR 6 MONTHS OR LESS 50% CYBER CRIMINAL GROUPS HAVE 6 OR MORE MEMBERS OL O LOCATED IN EUROPE 28% of global attack traffic APAC more than 49% of global attack traffic INDONESIA NORTH+ SOUTH AMERICA highest in APAC with 14% 19% of global attack traffic W HIGHLY ORGANIZED HOSTING PROVIDERS ARE KEY TO SUCCESS OF CYBERCRIMINnALS UNDERGROUND CHAT ROOMS, WEB PORTALS + MARKETPLACES WHO NEED SERVERS TO STORE FOR HIRING HACKERS, BUYING INVITATION-ONLY, HELP-WANTED ILLEGAL CODE, MALWARE + FULL-FLEDGED BUSINESSES MALWARE + OTHER ILLEGAL PORTALS SPECIFICALLY FOR STOLEN DATA. MOST OF THESE WITH EXECS, MIDDLE MANAGERS AND WORKERS INFORMATION ARE SUPPORTING CYBER CRIMINALS EXIST MOST PROVIDERS ARE IN RUSSIA AND THESE "BUSINESsSEs" ORIGINATING FROM RUSSIA CHINA WE CAN'T STOP THEM FROM ATTEMPTING THEIR CRIMES BUT WE CAN STOP THEM FROM GETTING OUR IDENTITIES AND AND PRECIOUS INFORMATION ONLINE FIGHT BACK SALWAYS ACAUTION NEVER IF BUYING MERCHANDISE OR MAKING A PAYMENT ONLINE, ENSURE IT IS A BE WARY OF PROVIDING NEVER PROVIDE UNKNOWN CREDIT CARD INFORMATION PROSPECTIVE EMPLOYERS WITH REPUTABLE, SECURE SOURCE. THROUGH EMAIL. YOUR SOCIAL SECURITY NUMBER. TRACK YOUR ONLINE CREDIT TRANSACTIONS OF TEN FOR BE CAUTIOUS WHEN DEALING NEVER GIVE YOUR CREDIT CARD # OVER THE PHONE UNLESS YOU MADE THE CALL TO A KNOWN BUSINES. WITH INDIVIDUALS FROM FRAUDULENT ACTIVITY. OUTSIDE YOUR COUNTRY. NEVER OPEN OR RESPOND TO SPAM EMAILS. SHRED, DOn'T THROW BE CAUTIOUS WHEN MONEY IS REQUIRED UP FRONT FOR AWAY ANY BANK OR CREDIT CARD STATEMENTS. ANY JOB LEAD. SOURCES www.javelinstrategy.com/news/1314/92/ldentity-Fraud-Rose-13-Percent-in-2011-According-to-New-Javelin-Strategy- Research-Report/d.pressRoomDetail www.now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrimeReport/2012_Norton_Cybercrime_ Report_Master_FINAL_050912 pdf www.symantec.com/about/news/release/articlejsp?prid=20100908_01 www.ic3.gov/media/annualreport/2010_IC3Report.pdf www.baesystemsdetica.com/uploads/resources/ORGANISED_CRIME_IN_THE_D IGITAL_AGE_EXECUTIVE_ JUMIO SUMMARY_FINAL_MARCH_2012.pdf www.akamai.com/dl/whitepapers/akamai_soti_q311.pdf?curl=/dl/whitepapers/akamai_soti_q311.pdf&solcheck=1& www.fortinet.com/sites/default/files/whitepapers/Cybercrime_Report.pdf OD00 000 BIDDOO 000 - 150000 - 1500000 - 1500O Sud00. 50000-15000 14-18

Profile of a Cyber Criminal

shared by jenconway on Feb 21
2,136 views
3 shares
0 comments
Profile of a Cyber Criminal and How Consumers Can Protect Themselves from Identity Theft and Online Fraud

Publisher

Jumio

Designer

ogmog

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size