Description
Cybercrime is a growing threat to society. Cybercriminals operate from anywhere to attack critical business infrastructure. The question addressed in this course will not be whether your body will be attacked but how to respond effectively to these attacks.
Who is this training for ?
For whom ?Business or IS managers, general management, IT departments, IS security experts, lawyers.
Prerequisites
Training objectives
Training program
- Cybercrime in the news
- Scams against the president? FOVI (False International Transfer Order).
- Social engineering, Spear Phishing.
- Theft of sensitive data, network intrusion of all kinds: what's the news? The darknet, malware, bots/botnets, ransomware.
- Bank card violations, skimming, the darknet.
- Technical issues - Anticipate well
- Management of traces, evidence and recordings.
- How to detect and then characterize
- ).
- Internal best practices: IDS probe, analysis and correlation of events (SIEM).
- The fight against cybercrime
- OCLCTIC, BEFTI, DGSI, Gendarmerie Nationale/C3N: everyone has their own skills.
- The SDLC and cybercrime investigators (ICC).
- Report all abnormal event: PHAROS, signal-spam, CERT.
- LPM, Vital Importance Operators, good practices and requirements on SIIV.
- Specialized service offers, the role of ANSSI, qualified service providers.
- Legal issues - Understanding the risks
- Duality of legal liability: the principles of criminal and civil liability.
- Cybercrimes in France and internationally: what repressive mechanism? Definitions/case law on "theft" or leak of data, fraudulent attack and maintenance in an IS/Network.
- Definitions/case law on cyber harassment, happy slapping, e-reputation, damage to image on the Web.
- Cybercrime: what legal means?
- Means of investigation and control of public authorities: LCEN, LOPPSI 2, Military Programming Law.
- Management of evidence: legality, admissibility, difference in criminal/civil procedure, collection of proof on the Web.
- Means of cryptology: dual-use goods, legal regime.
- Illustrations/case: hacking of a hospital's IS a defibrillator, attack on an IS by an administrator.
- Illustrations/case: Jérôme Kerviel affair, cyberattack on Swift banking messaging.