For this assignment, please visit one of the below sites and find a talk that
describes an attack / hack. Be sure that the presenter offers a “defense” to their attack /
hack. The video must be no older than five years. Watch it and then provide a brief
- What was the attack targeting (I.E. Operating System, Application, Database, IoT etc.).
2.Did the attack have to take place locally or remotely. If it can only be carried out locally, why is that?
- Provide the conference and relative date (Month / Year) of the presentation.
- Describe the method or countermeasure to this attack.
- In your own words, what insight to network / system defense did you gain from this presentation as a
Provide your answers in a brief executive summary (No more than three paragraphs and one page single
Load hoodlums are getting increasingly vital about how they strike. A flourishing bootleg market keeps load hoodlums in business to the hindrance of the worldwide economy. Payload wrongdoing isn't new and has been around for quite a long time as history recorded looters assaulting shippers on exchanging streets to privateers holding onto ships adrift and to scoundrels on horseback ransacking stage mentors. Freight wrongdoing has been developing alongside innovation headway and payload transportation strategies where trucks have been supplanted with horse-drawn carriages. The payload criminal syndicates have composed into universal wrongdoing and today freight wrongdoing is a global issue influencing shoppers and organizations the same. As of now because of worldwide economy, crude materials for assembling and sourcing frequently happen in various piece of the world. The completed item might be warehoused and expended in another and load can be taken anytime inside the store network. Load hoodlums are getting proficient and work in exceptionally sorted out gatherings, focusing on explicit things and utilizing individuals who are pro to bring an alternate arrangement of criminal aptitudes to the gathering. Take for instance proficient payload hoodlums, whose bases of tasks are truck yards, center points for business cargo cargoes, air terminals and ocean ports. While different hoodlums target money and important things, these experts make of with different merchandise. Load criminal utilized complex activities with efficient chains of command of administration. They utilize pros who can complete various assignments and duties including thieves and specialists or wall that help arrange the taken products. Typically the wall work intimately with drivers in moving the taken cargoes into the bootleg market to be scattered. Once in a while outside workers are utilized to move the cargoes and work with drivers in moving the taken cargoes from the docks or trucks. In fencing, cargoes are brought from another gathering who is in unlawful ownership of those cargoes. The cargoes taken will be arranged through wall for neighborhood showcase and now and again the cargoes are removed from the nation in a brief timeframe to abstain from being identified by the Police. These expert syndicated posses as a rule utilize a pro who is a specialist at thwarting the counter burglary locks and GPS framework on truck and trailers all together the seize the truck. Payload lawbreakers as a rule heist entire truck heap of load of which the normal cargo on a trailer can be esteemed up to two or three million dollars relying upon the kind of cargoes. There are numerous cases particularly cargoes of gadgets items being captured from Malaysia and found operating at a profit showcase abroad the following day. This is the manner by which proficient and modern system that the expert load crooks have today. Worldwide financial emergency has expanded the overall interest for bootleg market products. Palmer (2010) uncovered that in the United States, it is assessed there are $30 billion worth of cargoes are taken every year and for the most part load lawbreakers are modern and efficient. Palmer (2010) uncovered that the lawbreakers are frequently selected from the United States yet prepared by Cuban wrongdoing syndicates and afterward conveyed to Florida to execute their activities. The taken cargoes from the United States is brought to ports and sent out in sea compartments to nations, for example, Paraguay, Venezuela, Colombia, Brazil, Argentina, the Dominican Republic, and Costa Rica. From that point, they are sold through bootleg market appropriation channels. Armada Owner, Sam Rizzitelli uncovered that there are scopes of new freight wrongdoing strategies are being sent to assist criminal with having better control and along these lines alleviate the dangers of the violations they are attempting to carry out (Sean Kilcarr, 2013). Rizzitelli clarified that these new strategies fall into three classes: data fraud, imaginary pickups and misled loads/fake bearers. The hoodlums are extremely innovative and change their strategies to grow better approaches to pull off cargoes as opposed to submit straight robbery where burdens are physically taken from parking areas or terminals and gambling getting spotted and conceivably be engaged with a rapid pursue. The load lawbreakers are attempting to be increasingly key about carrying out the wrongdoing so they can more readily pinpoint and take explicit sorts of payload. These vital sorts of wrongdoings are because of the mix of numerous variables where progressively complex innovation being utilized with more prominent access to data inside the coordinations business and the association of more middle people all through the production network. This enables freight crooks to be in better control of the planning and area of a robbery. By and large, getting the ideal cargoes and gave them over to the lawbreakers is simpler than chasing it down and take them. Crooks are getting progressively inventive in utilizing the web to pull off freight wrongdoing all through the production network (Bill, 2010). Freight hoodlums are utilizing the web to follow shipments, book transportation with genuine air bearer and on the other hand set up counterfeit transportation activities that will mastermind load pick-ups for authentic shippers and forwarders. These criminal called a genuine harbor trucking organization whose drivers have the accreditations to get the holder at the marine terminal and convey it to a non-descript distribution center area. Another ploy is for lawbreakers to publicize on-line as a trucking organization. Invested individuals on these load or go-betweens whose standard engine bearer is inaccessible for a specific activity will procure the hoax activity. The transient administrator may hold the load prisoner and request a huge entirety of cash to discharge it, or the criminal may sell the product. The FBI uncovered that freight wrongdoing is a multi-billion dollar criminal venture in the U.S. furthermore, this association has arrangement seven teams situated around the nation to battle this issue. In the Memphis district the robbery team detailed that there is a normal of one load wrongdoing daily in the year from January 2011 to September 2011 and they have recuperated more than USD$1.5 million in taken cargoes and vehicles (Conrade, 2012). A portion of these syndicates are composed to the point that every part has their very own strength, from the break-in master who can take an apparatus in seconds to proficient drivers, observation specialists and the folks who realize how to crush the particular gadgets that lock trailers. Conrad (2012) concurred that criminals regularly ransack distribution centers on a Friday night and when the wrongdoing is found and provided details regarding Monday morning, the taken products may as of now be on a store rack or sold on the web. Load wrongdoing is refined and is turning into a sorted out big business. 2.8 Cargo Security Preventive Measures The fear monger assaults on September 11, 2001 had enormous effect on universal exchange approach and this episode have changed the scene of security around the world. USA was the principal nation to acquaint load security activities with forestall payload robbery and screen the freight going into USA. European Union and other global associations likewise started to take preventive measures and built up new security programs so as to verified payload development crosswise over fringes. A portion of the projects executed are Custom Trade Partnership against Terrorism (CTPAT), Authorized Economic Operator (AEO) and numerous different activities. The United States Custom and Border Protection (US CBP) accepted that global exchange must cooperate in exchange assistance. The expectation of United States Custom Border Protection inside the inventory network security program is to start the CTPAT which was acquainted with secure worldwide stock chains with exacting estimates taken so as to ensure all the cargoes entering United States. The United States government presented CTPAT as a deliberate program between the position and the organizations to verify the freight entering the nation. After the execution of CTPAT, the European Union additionally presented a comparative program named Authorized Economic Operator (AEO) which is like CTPAT to guarantee the security and assistance of transportation inside the inventory network in European nations. US CBP has likewise presented a data preparing and sending framework called the Automated Manifest System (AMS) which is a multi secluded freight stock control and discharge notice framework for ocean, air and rail bearers. The principle point of the framework is to interconnect however many gatherings in supply chains as could be expected under the circumstances including the US CBP and different experts so as to make information identified with freight progressively available and to advance urgent data in regards to shipments through this one of a kind framework between the players. The Container Security Initiative (CSI) is rather than CTPAT, oceanic activities executed in 2002 by US CBP and its point is to encourage holder developments in ocean traffic and to guarantee security. The fundamental thought of the Container Security Initiative is to move aversion, control and examination outside of United States fringes. By executing control measure at the port of takeoff, high hazard holders could be indentified before entering the United States of America (USA). CSI officials together with power officials from the reciprocally contracted nations will review holders that are being moved from the port being referred to USA. World Customs Organization (WCO) goes about as the autonomous universal and bury administrative association all through the world managing customs matter and they have built up the accompanying benchmarks, rule and collaboration, for example, – worldwide models; – improvement and harmonization of customs systems around the world; – exchange production network security; – the assistance of universal exchange; – the upgrade of customs implementation and consistence exercises; – hostile to forging and security initiativ>GET ANSWER