Inside Asian Gaming
INSIDE ASIAN GAMING APRIL 2018 30 needs in mind and supported by the technology, not just driven by the technology.” Making the threat far more difficult to deal with is the ever- changing nature of cyber-attacks, with hackers becoming increasingly astute and technologically savvy. There is also a vast array of potential sources of risk driven by a variety of motivations. “I tend to break them into four different groups,” says Jackson. “State sponsored attackers largely conduct an intrusion or theft of data for intelligence gathering purposes. Often this will be highly focused, such as a targeted attack to obtain intelligence on an individual of interest to them. “Then there’s organized crime who are increasingly leveraging cyber criminals. Their motivation to conduct these types of intrusions is mostly financial and they seek to profit on data which they steal. For example, they may seek to resell it, or utilize insider knowledge to profit on the markets. Of course, there are also hackers operating alone, but the more sophisticated threats are coming from organized groups “There are ‘hacktivists’ who conduct intrusions (or steal data from the inside) to promote a social or political agenda. “Finally, there are malicious insiders – people who work there internally and want to find ways to damage the company or steal data to profit in other ways. “I would say many of the fraud schemes that happened years ago, before the advent of modern technology, have just evolved over the years to take advantage of advances in computer systems. Not that much has changed, they have just tailored attacks using social engineering techniques to trick employees FEATURE IN FOCUS “Much of the time, companies and organizations do this in reverse order. They buy some expensive cyber security tools and then build the security policies around them, leaving the overall governance with gaps. That’s not the way things should go. It should be the other way around.” into inadvertently allowing access to systems or into facilitating fraud schemes. “It’s a never-ending battle of wits. When I worked in the banking world, adversaries would constantly attack the online banking systems. We would detect those attacks and would build defenses, then they would realize those attacks weren’t working so they would try different methods. That would mean we’d have to reverse
Made with FlippingBook
RkJQdWJsaXNoZXIy OTIyNjk=