Escolar Documentos
Profissional Documentos
Cultura Documentos
Cybercrime in Uganda
are you prepared?
The extent of the problem, and way forward Mustapha B. Mugisa, CFE, CHFI, CISA, MBA
Founder & CEO, Summit Consulting Ltd.
www.summitcl.com Forensic. Advisory. Fraud.
Perspective
How much do you estimate is the risk of cyber crime to Uganda today?
Image credit, ACFE.com
Cybercrime and espionage are the top two challenges to USA national security today and in the future,
President Barak Obama, March 2013.
Why care?
Cyber crime vectors Computer related offenses Content related offenses Copyright related offenses Attack on security (CIA) is denial
www.summitcl.com Forensic. Advisory. Fraud.
Why care?
Internet photo.
The problem is huge for Africa, and Uganda. Not even mechanisms exists to quantify it!
www.summitcl.com Forensic. Advisory. Fraud.
Why care?
Why care?
http://w ww.obse rver.ug/i ndex.php ?option= com_con tent&vie w=article &id=245 89:ugandarevenueauthority -hackersjailed-12years
Forensic. Advisory. Fraud.
www.summitcl.com
www.summitcl.com
investigations; Facebook identify theft, Bank fraud; Hacking into computer Systems esp on-line banking; and intellectual property theft
Forensic. Advisory. Fraud.
www.summitcl.com
www.summitcl.com
Recommended solutions
Are you getting value for money from your pen tests?
www.summitcl.com Forensic. Advisory. Fraud.
Laws are in place, can you use them? Uganda Cyber Laws are three currently: 1. Computer Misuse Act, 2011 2. Electronic Transactions Act, 2011 3. Electronic Signatures Act, 2011
Forensic. Advisory. Fraud
For 96% of staff --- they must become Certified Secure Computer User (CSCU).
www.summitcl.com Forensic. Advisory. Fraud.
For your 4% of staff --- they must attain Certified Ethical Hacker (CEH); Computer Hacking Forensic Investigator (CHFI); Certified Fraud Examiner (CFE) and Licensed Pen Tester (LPT).
www.summitcl.com
www.eccouncil.org
www.summitcl.com
Litigation Support
Social Networking posts Blog Postings Removal Articles Removal website Removal
Tracing suspected websites, blogs, forums abusers Getting information of people behind websites, blogs, forums Removal Actions for such websites
Reduction in rankings of defaming content by positive SEO Reduction in rankings of defaming content by proprietary methods Increasing Positive content with right SEO techniques Forensic. Advisory. Fraud.
Regulatory Intelligence
We can set up a lab to create, use and manage cyber weaponry for uplifting CIRT system Ugandas set up national security.
www.summitcl.com
Next steps
You should 1. Sponsor staff for training in ethical hacking, digital forensics and CSCU 2. Require all staff using computers to be CSCU, to avoid data leakage and ensure accountability 3. Set a forensic services fund and we train all law enforcement as a PPPs something's are better centralized 4. Coopt private sector players to advise on key implementations e.g. CIRT, CWDS (cyber weaponry & defense system) etc
www.summitcl.com Forensic. Advisory. Fraud.
Next steps
SCL productivity solutions Unified secure messaging system ERP Incident reporting and whistleblowing system E-Learning platform for in-house training
Call us today
www.summitcl.com Forensic. Advisory. Fraud.
Q&A
We take pride in doing the right thing, rather than what is right for the profitability of SCL.
Thank you!
www.summitcl.com