100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Guestlectures Digital Organization $6.50   Add to cart

Summary

Summary Guestlectures Digital Organization

2 reviews
 205 views  13 purchases
  • Course
  • Institution
  • Book

all guest lectures including lecture notes supplemented with slides and reference to the theory: Ometa, kpmg, aisec, bol.com, delaware, H13 guest speaker on this subject

Preview 3 out of 28  pages

  • Yes
  • December 12, 2018
  • 28
  • 2018/2019
  • Summary

2  reviews

review-writer-avatar

By: elisabethdeploey • 5 year ago

review-writer-avatar

By: eline_dupont • 5 year ago

avatar-seller
KPMG: cyber security
- Post-GDPR era & e-privacy
- Ransomware
If you get this on your computer, your computer is encrypted and have to pay to get
your files back
→ it has been around for a while
Ex: geranger (apple)
- Focus on mobile devices
→ USB die lijkt op een USB, maar geen USB is → hackt via het zoeken naar
wachtwoorden (probeert er heel heel heel veel)
→ wordt niet tegengehouden
- Crypto-exchanges & crypto-jackers: blockchain
There is a lot of money in this sector: these sites get hacked often
- Internet of (Insecure) Things (IoT)
Everything that you put in a powersocket will go online these days
→ why? Benefit of the vendor
→ attack vector: a watter kettle that you can turn on with your smartphone:
The waterkettle is an attack vector, if someone is outside your house he can hack you,
because the waterkettle is leaking your wifi password
→ unable to turn off my #IoT oven ever since the network went down (tweet)
→ MIRAI: biggest attack ever; gigantic amount of devices (no computers: but ovens,
tv’s, kettles,…)
- Better central regulations from supervisory authorities
- So will it happen to you?
Databases get leaked: everyone can find your password
Have I been compromised?
→ haveibeenpwned.com → is my password known?
- The threat actors
» Hacktivism: inspired by ideology
» Organised crime:
» The insider: intentional or unintentional
» The state sponsored: espionage and sabotage

, 2 ways to hack:
1. Classical hacking:
» Demo: Wifi Hack: if you want to connect my wifi you need a password
→ example: hot spot on iPhone:
Intercept: computer that says hey I want to connect → intercept it when it
gives the password
- You have to look for wifinetworks
- I want to concentrate on one specific wifi: monitoring traffic on that
network: we need a specific part of the conversation: when the
computer wants to connect → wait until someone new comes or
when someone wants to reconnect
- YOU DON’T NEED TO BE CLOSE → you can do it from anywhere
2. Hacking anno 2018:
- Humanfactor: they try to convince the user to do something stupid
- How?
 Red Teaming:
Macro’s: ‘enable content’ → in macro’s you can find
interesting stuff, but also malware
 USB keys: print logo on usb-stick, if you want to hide
macro’s: end op doc or m → if you don’t trost them
DON’T ENABLE CONTENT
The documents on this USB are infected.
 Demo Rubber Ducky: usb plaatsen in een computer in
bedrijf
 Fake wifi’s: login,ww,… sometimes with facebook
→ everything gets registered
→ page looks authentic
→ if there’s a lock: it’s secured
Cyber threat study in Belgium
80% of the companies were infected.


Why can’t we fix this?
Software is always made by humans.

, AISEC

Present in different countries and work with 9000+ partners

→ create cross-cultural understanding:



How AIESEC used to work in its early days

There was every six months a fair: trying to match (hey I have a job: do you have an
exchange?)

→ you could only be accepted twice a year




Match things could be matched throughout the whole year: but it was not efficient:

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller studentam1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $6.50. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77988 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$6.50  13x  sold
  • (2)
  Add to cart