Centre for Cyber Security Defence and Economic Crime Prevention Skills - Cyber and Economic Crime :: Cyber and Economic Crime
top border

                                 

Centre for Cyber Security Defence and Economic Crime Prevention Skills




| Home | Courses | Qualifications | Offices | Email | Downloads | Consulting | Academy |


cybersecuritywide

Group Sites

| Jasper Global Corporation | Jasper International Academy | Jasper E-Learning Academy | Centre for Cyber and Economic Crime | Centre for Management Leadership and Business Skills | Centre for Investment Securities and Economic Development Skills | Partner Approved Centres | Research | Consultancy Services |


Cyber Security Defence and Economic Crime Prevention Skills

It’s Not Just About Cyber Security | There Are A Number of Other Factors Involved

With the substantial global growth in Cyber Security issues and its associated Cyber Crime, the Centre for Cyber Security Defence and Economic Crime Prevention Skills was setup specifically to help organisations fight and defend against this significant assult. The 2014 report by the Association of Fraud Examiners estimated that the potential projected global loss is nearly $3.7 trillion, and by 2017 it will have doubled.

The 2016 Internet Organised Crime Threat Assessment (IOCTA) reports a continuing and increasing acceleration of the security trends observed in previous assessments. The additional increase in volume, scope and financial damage combined with the asymmetric risk that characterises cybercrime has reached such a level that in some EU countries cybercrime may have surpassed traditional crime in terms of reporting. Some attacks, such as ransomware, which the previous report attributed to an increase in the aggressiveness of cybercrime, have become the norm, overshadowing traditional malware threats such as banking Trojans.

Download the report here, click F – Research and Updates

The idea that cyber security can be managed and solved by IT specialists alone is as far from the truth as is possible. Understanding how IT departments function quickly makes you realise that the size of the task in protecting the business is not just a technology and network issue, the problem sits as a company wide and whole workforce initiative.

Awareness training for employees in cyber security is difficult if not impossible. It’s draining on time and resources, and all too often, it’s ineffectively targeted. There’s an imbalance between our security-minded priorities and those of the rest of the company, basically we have massive disconnect silo mentality. In an ideal world, management and workers would be guardians and protectors of our data and business intelligence.

Systems’ thinking is a management discipline that concerns an understanding of a system by examining the linkages and interactions between the components that comprise the entirety of that defined system. In defeating a plague we first need to understand the system. To solve our cyber security threats we need to understand the systemic threats, and then we can target our resources and training appropriately.


News Update

Loading Quotes...


Jasper International Academy’s specialists for the Cyber & Economic Crime Sectors are dynamic and skilled IT network technicians, criminologists, counter-fraud and anti-money laundering experts with extensive international experience.

The TWO MAIN AREAS involved in Corporate and Personal PROLIFIC SECURITY VULNERABILITY:

The Technology, the EASY PART:

With the right hardware, software, encryption and penetration testing most systems can be made secure.

The Human Factor, the CHALLENGE:

This is the high risk area, most organisations spend millions on the technology hardware, software, network forensics and monitoring systems but completely overlook that the main vulnerabilities and back-doors sit on the desktops of most of the day to day technology operations of the workforce.

For example spear-phishing emails often result in drive-by downloads, a silent malware download that takes place in the background without the user’s knowledge. Drive-by downloads are enabled by vulnerabilities in user applications like browsers or browser plug-ins, in Java applications, Adobe Acrobat and many others.

pillars

THREE Pillars in DEFEATING this GLOBAL ONSLAUGHT:

  • Threat Analysis
  • Understanding the Enemy
  • Mounting Your Countermeasures Effectively
pillars

THREE Pillars for its SUCCESS

  • Defend | The principle of implementing security measures to strengthen a network or system to make it more robust against attack. In a commercial context, this normally refers to cyber security analysts developing an understanding of the threats to their networks, and then devising and implementing measures to proactively combat, or defend, against those threats. It also requires organisational recognition that the cyber challenges facing the company are not only the remit of the IT or ICT department, and in not dealing with this systemic oversight increases substantially the threat to the company
  • Deter | Cyberspace is only one sphere in which we must defend our interests and organisational sovereignty.
  • Develop | Sets out how you will acquire and strengthen the tools and capabilities that your organisation needs to protect itself from the cyber threat.

Cyber Security Defence and Economic Crime Prevention


Click to open more information on services
PolicyModel

Click image to enlarge

Crime Prevention

Prevention strategies, policies and threat intelligence are the first line of defence and offer the most cost-effective method of controlling crime within an entity.

Risk management is crucial to fraud control as it guides the development of an effective fraud control plan.

A fraud policy statement assists employees to understand what fraud is, their organization’s attitude to fraud, and what to do if they suspect fraud is being perpetrated.

Cyber and economic crime is the scourge of the modern internet age where the quest to satisfy consumer and business demand for convenience through instant online transactions has also created new opportunities for unprecedented criminal activity as evidenced by news headlines on almost a daily basis.

The Jasper International Academy Centre for Cyber Security Defence and Economic Crime was established to provide qualifications, training and consultancy to organisations in order to give employees across organisations the skills and knowledge to minimize exposure to external and internal criminal activity.

The concepts of cyber-crime and financial crime share an unsavoury connection. Cybercrime basically refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the ‘target’. Cyber-crime is often understood to involve the behaviours of ‘hackers’ and those who wish to do some kind of malice or harm by such a motive, and thus not necessarily for financial gain. This gives a narrow framework of explanation, but when we set this concept against financial crime, the issue suddenly explodes and runs along many pathways to connect with fraud and other financial crime in some form or another. Many so-called ‘traditional’ types of frauds are still committed, but with new cyber-tools of crime to do so.

Then, of course, is the fusion of the two of these concepts, whereby criminals will use hoax, impersonation and other con methods to deceive and make gains from victims with the interchange of computer use, in business and home environments, such as obtaining private data and bank details.

Hence there is an inevitable growth and overlap between Cyber-crime and financial crime such as a growth in fraud and money laundering.

Qualifications and training offered by the Jasper International Academy Centre for Cyber Security Defence and Economic Crime covers a wide range of subjects ranging from awareness at a basic level suitable for all employees to the more technical skill needed to properly protect the organisation from cyber-attack.

Consultancy assignments range from advising on prevention techniques and technology to deep investigations into criminal activity perpetrated within or against the organisation.


There are Six Specific Areas of Specialization we Focus Upon:


strategiespoliciesB

Click image to enlarge

strategiespoliciesB

Click image to enlarge

1 | Cyber Security Defence and Economic Crime Prevention Strategies and Policies:

Financial losses to business due to fraud are significant. The 2014 report by the Association of Fraud Examiners estimates that the potential projected global loss is nearly $3.7 trillion. The median loss to fraud in their survey was $145,000 with 22% of cases involving losses of $1 million.

Prevention and detection are crucial to reducing this loss. Every organization should have a strategy, policy and plan in place as preventing fraud is much easier than recovering your losses after a fraud has been committed.

Threat Intelligence

Everybody in the security world knows the term “threat intelligence.” At this point, even some non-security people have started talking about it.

But it’s still very poorly understood.

Raw data and information is often mislabeled as intelligence, and the process and motives for producing threat intelligence are often misconstrued.

Although most people believe they intuitively understand the concept, it pays to work from a precise definition of threat intelligence.

Threat intelligence is the output of analysis based on identification, collection, and the enhancement of relevant data and information.

Raw data and information do not constitute intelligence. Equally, analyzed data and information will only qualify as intelligence if the result is directly attributable to business goals.

A well planned and executed threat intelligence initiative including training has the potential to provide enormous benefit to your organisation.

Many people believe threat intelligence is primarily about identifying attacks before they happen. In reality, it’s much more about raising your organisation’s security profile against all incoming attacks.

Different types of threat actors select targets in very different ways. As a rule, the more specific their targeting process, the harder it will be to collect threat intelligence at the pre-planning stage.

While threat intelligence can add value at every stage of the prevention chain, it’s typically in the form of malicious IP/domain/hash lists and post investigative attack analyses.

It’s not just about incident response. In order to add maximum value, threat intelligence should be made available across all security functions.

Without context, threat intelligence quickly becomes unmanageable. Ensure the provision your threat analysts have the tools they need to operate effectively.

As an organization you can then start to understand the enemy external and within and impliment your countermeasures in combating any identified threats

The Jasper International Academy offers a suite of courses that focus on developing effective cyber security and fraud prevention strategies and robust cyber security and fraud prevention policies to minimise the risk of fraud in your organisation.

arrowupEconomic Crime Prevention Strategies and Policies: Click on the courses and qualifications links above to find out more.
fraudmodel

Click image to enlarge

2 | Cyber Security Defence and Technology:

There are only two types of companies: those that have been hacked and those that will be – FBI Director Robert Mueller. Managing and minimizing the risks affecting digital assets and information must be a core business objective.

Two Requirements

  • Security Management Operating Platform: A Complete, Simple, & Affordable Security Management platform is required, one for small as well as large organisations and which provides a way for organisations with limited security staff and budget to address complex compliance and threat management needs. With all of the essential security controls built-in, and continuous threat intelligence updates.
  • Personnel Development: Unfortunately, most organisational structures create natural silos that inhibit the integration of security strategy. The resulting gaps between legal, finance, facility management, operations, HR, and IT practices can leave even the most savvy organization vulnerable.

The Jasper International Academy course and qualification offer will go some way to minimising your risk of being hacked.

arrowupCyber Security and Technology: Click on the courses and qualifications links above to find out more.
Computer-Forensics1

Click image to enlarge

3 | Computer and Network Forensics:

Investigative Forensics

The aftermath of a cyber attack can be devastating for an organization, particularly a small business without the resources to properly investigate the origins of the attack and put safeguards in place to prevent it happening again.

Cyber crime leaves an electronic footprint that is not always visible to the average employee or indeed IT technician.

Penetration Testing and Ethical Hacking

The job of an ethical hacker is to do ‘penetration testing’ for companies. This means they adopt the role of a real hacker and use the same tools that real hackers use to try and break into a company’s computer systems, to identify vulnerabilities. The ethical hacker then tells the company what they have found, so that it can fix the vulnerabilities before a real hacker discovers and exploits them.

The Jasper International Academy courses and qualifications provide practical training in applications, network and system forensics that will help you to identify the origins of any attack and take counter measures.

arrowupComputer and Network Forensics: Click on the courses and qualifications links above to find out more.
FraudTriangle

Click image to enlarge

4 | Economic Crime:

The concepts of cyber-crime and financial crime share an unsavoury connection. Cyber-crime basically refers to any crime that involves a computer and a network.

The computer may have been used in the commission of a crime, or it may be the ‘target’. Cyber-crime is often understood to involve the behaviours of ‘hackers’ and those who wish to do some kind of malice or harm by such a motive, and thus not necessarily for financial gain.

This gives a narrow framework of explanation, but when we set this concept against financial crime, the issue suddenly explodes and runs along many pathways to connect with fraud and other financial crime in some form or another.

Many so-called ‘traditional’ types of frauds are still committed, but with new cyber-tools of crime to do so.

The Jasper International Academy courses and qualifications examine the processes fraudsters use and training your staff can minimize damage to your business.

arrowupEconomic Crime: Click on the courses and qualifications links above to find out more.
competitionlaw

Click image to enlarge

5 | Competition Law

Competition law is a law that promotes or seeks to maintain market competition by regulating anti-competitive conduct by companies. Competition law is implemented through public and private enforcement.

Hard core cartel prosecution is a priority policy objective for the OECD.

• Cartels and Anti-Competitive Behaviour
• Abuse of Dominant Position

Hard core cartels (when firms agree not to compete with one another) are the most serious violations of competition law.

They injure customers by raising and controlling prices and restricting supply, thus making goods and services completely unavailable to some purchasers and unnecessarily expensive for others.

The categories of conduct most often defined as hard core cartels are:

  • Price Fixing
  • Output Restrictions
  • Market Allocation
  • Bid Rigging (the submission of collusive tenders)
  • Prime Contractor Model that Favours Large Companies

Increasingly, prohibition against hard core cartels is now also considered to be an indispensable part of a domestic competition law. Abuse of Dominant Position, a firm’s ability to raise its prices is usually constrained by competitors and the possibility that its customers can switch to alternative sources of supply. When these constraints are weak, or when there is a prime contractor model in place a firm is said to have market power and if the market power is great enough, to be in a position of dominance or monopoly (the precise terminology differs according to the jurisdiction).

Jasper International Academy is pleased to offer a small unique range of highly specialised training courses to help prevent this kind of behaviour, while mere possession of monopoly power does not in itself constitute violation of competition laws, the abuse of such power – particularly if it is used to weaken competition further by excluding rivals, forcing sub-contractor dependence – calls for intervention from the competition authorities.

arrowupCompetition Law: Click on the course and qualifications links above to find out more.

Jasper International Academy Cyber and Economic Crime Qualifications Framework

Qualifications: Click on the course and qualifications links above to find out more.

The scale of cyber-criminal activity represents a major challenge to law enforcement agencies. Cyber-crime is more profitable than the global trade in marijuana, cocaine and heroin combined.

Email UsPhone Us


Jasper International Academy – An Institute for Cyber and Economic Crime Prevention


Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not typically initiated by “random hackers” but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

Spear phishing is an email that appears to be from an individual or business that you know. But it isn’t. It’s from the same criminal hackers who want your credit card and bank account numbers, passwords, and the financial information on your PC.

The sheer number and scale of the operations of spear phishing has some in the intelligence community in awe of the systematic approach being employed to steal some of the most sensitive information across multiple sectors, including government, defense, financial, and cutting edge technology interests.





top border top border
Skip to toolbar
bottom footer