TEDxRotterdam2011 Mikko Hypponen

Get Started. It's Free
or sign up with your email address
Rocket clouds
TEDxRotterdam2011 Mikko Hypponen by Mind Map: TEDxRotterdam2011 Mikko Hypponen

1. Lead­ing cyber crime fighter

1.1. Profile on TEDxRotterdam site

1.2. @MikkoHypponen

1.3. mikko.hypponen.com

2. intro

2.1. one of the top 50 most important people on the web

2.2. works for a finnish cyber security company

2.3. biggest invention

2.3.1. the internet

2.3.2. true global thing

2.3.3. shapes our future

2.3.4. reflection of real world

2.3.4.1. crime

2.3.4.2. troubke

2.4. threats for web

2.4.1. privacy

2.4.2. sensorship

2.4.3. cybercrime

3. change

3.1. big problem

3.2. future of wbe is at stake

3.3. how to figth these

3.3.1. New node

3.4. 3 enemies

3.4.1. cyber crime gangs

3.4.2. hacktivist

3.4.3. nation states

4. cyber crime gangs

4.1. doing attacks to make money

4.2. good motive

4.3. make viruses

4.4. how?

4.4.1. criminals can be everywhere on the web

4.4.2. iframe.biz

4.4.2.1. buy access to infected computers

4.4.2.2. sell infected home/business computers

4.4.2.2.1. for the scam

4.4.3. write virusses and earn money

4.5. most active countries in cybercrime

4.5.1. russia

4.5.2. ukrain

4.5.3. kazachstan

4.6. what

4.6.1. keyloggers

4.6.1.1. is in infected computers

4.6.1.2. logs all info

4.6.1.3. interesting: online shopping

4.6.1.3.1. name

4.6.1.3.2. address

4.6.1.3.3. logging creditcard info

5. hacktivism

5.1. social activism

5.2. attacks

5.2.1. took down

5.2.1.1. visa

5.2.1.2. sony

5.2.1.3. wikileaks

5.3. who are they?

5.3.1. members of non organization

5.4. intelligence gathering of social networks

5.5. example how Anonymous relatiates

5.5.1. a CEO started to infiltrate the non organization (HP US Federal)

5.5.1.1. took research public (Forbes)

5.5.1.2. just before he took ity public

5.5.1.2.1. all his sites, servers, socialmedia weer hcked

5.6. Anonymous

5.6.1. everyone is a member of ananonymous

5.6.1.1. it's a non-organization

5.6.2. we are a legion

5.6.3. invited a 30 year old activist

5.6.4. why are you attacking Sony?

5.6.5. he did it for

5.6.5.1. fun

5.6.5.2. laughs

5.6.6. they are bored

5.6.7. how to turn that

6. nation states

6.1. espionnage

6.1.1. spying

6.1.1.1. online

6.1.1.2. info is data

6.2. goverments spying on own citizens

6.3. example Iran

6.3.1. dissidents in iran use SSl services as gmail

6.3.1.1. so goverment cant read

6.3.2. iran hacked diginotar digital certificates

6.3.2.1. so they cab fake SSL

6.3.2.2. and read email from dissidents

6.4. example

6.4.1. everything is run by compters

6.4.2. Siemens S700 PLC

6.4.3. stocknet

6.5. virus from pc to systemservers

6.6. cyber attacks can go in loss of life

7. wrap

7.1. computers dont work always

7.2. cybercrime

7.2.1. international cybercrime police force

7.3. defend the internet

7.3.1. because the internet has no borders

8. questions

8.1. what do advocate?

8.1.1. a world wide internet police

8.1.2. focus on real problem

8.1.3. organized global criminal gangs

8.2. apple devces are the save?

8.2.1. yes they are

8.2.2. due to market share

8.2.3. windows xp

8.2.3.1. biggest system

8.2.3.2. least secure

8.2.4. will involve into android

8.2.4.1. most commonly used OS

8.3. anonymous will blow up facebook?

8.3.1. will probabky not succees

9. cyberwar

9.1. less bloody than real war