Profiling Hackers The Psychology of Cybercrime

Transcriber: Mariolina Sanfilippo
Reviewer: Eunice Tan

My name is Mark T. Hofmann,
and I’m a crime and intelligence analyst

or what most of you would
most likely call “a criminal profiler.”

If you think of cybercrime,
you may have something like this in mind.

On television, it always makes
these fancy sounds,

(Computer beeps)

and you see the kid with a hoodie
in front of a laptop,

with green text on the screen.

Well, reality is different.

And on television, you never
really get to see the face.

Hackers are always presented
like this or from behind,

but you never really see the face.

Today, I would like to unmask
the face of hackers, so to say.

I would like to talk about
the profiles and motives of hackers.

I would like to talk about
psychological manipulation,

about social engineering techniques
they are using to attack us,

and what we can do
to become a human firewall.

As a profiler,
I am interested in behavior.

I analyze behavior,

and I try to identify the motives
and the psychology behind that behavior.

Because with everything we do,
we show something of who we are;

with every decision we make,
we show something of who we are.

And also, hackers make
a series of decisions:

They are choosing targets,
they are choosing methods,

pretty often they make phone calls,

they write text messages,
they write phishing mails.

And with everything they do,
or fail to do,

they not only leave digital traces
but also traces of their personality.

And very often, the analysis of language
is a key element in profiling hackers.

Let me give you an example
with the word “behavior” itself.

A person from the United States,

an American, would most likely write
the word “behavior” like this,

a person from the UK would more likely
spell the word “behavior” like this,

[BEHAVIOUR]

and an idiot might spell
the word “behavior” like this.

So based on the word someone is using,
based on the analysis of language,

I can try to make a probability statement
about an unknown offender.

Yes, cybercriminals are hard to catch,

but in many cases, they are not
as invisible as they might think.

[BEHAVIAR]

[>90%]

So what can a profiler tell you
about cybercrime?

Well, quite a lot.

More than 90 percent of all cyberattacks
or cybersecurity breaches

are caused by human error.

So humans, people, are the weakest link
in the cybersecurity chain.

Let me be very clear about this:

Cybercrime is not
just a technical problem.

It’s a psychological problem,
it’s a people’s problem,

it’s clearly a management problem.

Computers are the weapons,

but the perpetrators
and also the victims are humans.

Any door is only as secure

as the person who is holding
the key or the passwords.

So you can have the best fancy
high-security door in the world.

If I manipulate you
to give me the key, it’s useless.

You can have the best fancy high-security
firewall system in the world.

If I manipulate you to give me
the passwords, it’s useless.

“Amateurs hack systems,
professionals hack people.”

This is a quote by security expert
Bruce Schneier, and he is damn right.

So what can we say
about the profiles of hackers?

Who are the people behind the attacks?

Well, pretty often,
cybercrime doesn’t look like this.

It looks more like this.

Law enforcement professionals
and intelligence professionals

and security professionals
like to use the term “crime as a service.”

So pretty often, cybercriminals work
in company-like structures.

They have something like a supply chain,

they have something
like quality management,

and sometimes they even have
customer support.

So if you or your company gets attacked,

it may not come from a kid
in front of a laptop, with a hoodie.

It may come from
a call center-like structure

anywhere in the world, like this.

But of course, there are some
individual hackers -

we call them “black hat hackers.”

So the ones with the black hats,
these are of course the bad guys.

According to the current state of science,

what can we say about
the profiles of black hat hackers?

We can say this:

Most of them - some studies say
more than 90 percent - are male.

Around about 80 percent
are under 30 years old.

[Male
Under 30]

The majority of them,
around about 60 percent,

started at a very young age -
between 10 and 15 years old.

They have above average intelligence,
they are pretty often well educated,

and 90 percent do not have
a low socioeconomical status.

So they are young, they are intelligent,
and they are pretty often well educated.

Why the hell do they do what they do?

The main motives in descending order
are money - financial gain -

espionage,

and fun - ideology or simply trolling.

[Motives]

Well, so they do it mostly for money.

If I look at this list of motives,
I’m a little bit skeptical.

Because as we just learned,

they are young, they are intelligent,
they are well educated,

and they do not necessarily come from
difficult or broken home environments.

So if they want to make money,

why don’t they just work for Google
or any other Silicon Valley company?

They could make
a ton of money in a legal way.

So why are they committing crimes?
Why do they make money that way?

Another psychological motive
comes into play

which is called thrill-seeking,

or in psychology
we sometimes like to call this

“challenge to beat the system.”

So they like the feeling
of being cleverer than the FBI.

Never underestimate the role
of ego, challenge and thrill-seeking

in cybercrime,

and I’m not just talking theory.

I met hackers myself,
I did my own research,

and one of my subjects told me this:

“I analyze people.

In the end, human hacking works
the same way that computer hacking works.

You always look for vulnerabilities
and try to exploit them.”

So they are social engineers analyzing us.

They are analyzing
our psychological weak points,

and they try to attack,

they try to exploit
our psychological weak points.

But what are our
psychological weak points?

What are the psychological
manipulation techniques?

What are some of the social
engineering techniques?

I want to show you a little illusion.

For this illusion, I just need a silk,
and I put this silk in my hand.

Then I can show my hand empty,
and the silk magically turns into an egg.

As I can see, you’re not that amazed.

And you’re right, it’s not that clever -

it’s just a plastic egg
with a hole inside it.

But I want to use this to teach you
a lesson about the art of misdirection.

So the fake egg goes in my left pocket,
and the hankie goes in my right pocket.

And then I was fiddling around
with my right pocket,

and I tried to direct
your attention to the silk

while I secretly got out
the fake egg with my other hand.

Then I told you I put the silk in my hand,

but in fact I carefully put the silk
inside the fake egg.

Then, of course, I can show my hand empty,
and then it magically turns into an egg.

Well, not that spectacular,
but as I just told you,

I’m going to teach you a lesson
about the art of misdirection.

Explain this.

(Egg cracks and drops)

As I just told you, this will be a lesson
about the art of misdirection.

Well, what did just happen?

I created an illusion inside an illusion.

So basically, I fooled you
while explaining how you have been fooled,

and this way, I totally eliminated
your critical thinking.

In the first round,
you all watched closely,

and you tried to see the secret behind it.

But in the second round, you relaxed.

I told you, “Relax -
now I show you how it’s done,”

and this way, I eliminated
your critical thinking.

Again, I fooled you while explaining
how you have been fooled,

and this is what hackers do all the time.

They hack you while telling you
that you have been hacked,

and this way, they totally eliminate
your critical thinking.

Pretty often, phishing mails
and short messages start like this:

“We have detected some
unusual activity on your account.”

And of course, now you need to click here
to verify your credit card information.

Or “Your Amazon account has been locked.

There is some suspicious
or criminal activity.

You need to click here
to regain access to your account.”

Or “Your account was used
to buy a $250 gift card.

If you want to cancel the order
and confirm your credit card information,

click here.”

So they tell you
that you have been hacked.

In fact, you haven’t been hacked.

But when you click on these links,
you will be hacked.

Now, you might say, “Well, I’m smart.
I won’t click on these links.”

Well, I’m not sure.

If you’re distracted or if you just made
an Amazon order the day before,

I’m not sure if you wouldn’t
click on these links.

But even if just two people out of 100,
just two percent, click on these links,

well, it’s enough.

If I send 100 mails, two people
are going to click on these links.

And this is a very low estimate;
it will be way more.

And of course, it’s always urgent -
you need to do it right now.

Hackers never say, “Take your time.”

You always need to do something now;

otherwise, there will be a huge damage
and it will have a huge negative impact.

You need to do something now
without thinking about it.

Let me give you another example
of how social engineers and how hackers

try to exploit our
psychological weak points.

They are using the so-called
“sympathy principle.”

They exploit our tendency
to trust and to like people.

Imagine you are in the subway on your way
to work and it’s a rainy Monday morning.

It’s going to be a very,
very long and boring day.

But suddenly, she gets on the train,
and you are getting nervous.

You would love to approach her,
you would love to talk to her,

but you don’t really have
the guts to do so.

But then suddenly,
she stands right next to you.

This would be your chance to talk to her,
but still you don’t really do it.

You pretend to read something
on your smartphone, but you don’t do it.

She stands so close to you
that she is almost touching you,

which is almost a little bit weird.

And then suddenly, she gets off the train.

What did just happen?
Is she a pickpocket or something?

Then you reach inside your pocket,
and inside your pocket,

you find a little USB flash drive
with a heart on it.

What might be on there?
A phone number? Pictures?

Now, be honest:

Could you stand the curiosity

of not plugging this
into your company’s computer

to see what’s on there?

Well, probably not.

And this may be the beginning
of a negative butterfly effect unfolding

and a very serious cyberattack.

I’ll tell you a little secret
from the intelligence world:

Female spies are bloody good,
and it’s partly because of sexism.

Spying, crime and hacking -
this is seen as a man’s job.

And this is why women are by far the best,
because they are unsuspicious.

If someone looks nice or sympathetic,

it’s really hard to see this person
as a potential threat.

So you don’t see the evil
if someone has a face like an angel.

But yes, female agents are,
without any doubt,

the best in the world.

There’s a good friend of mine,
a German ex-intelligence official,

and he also confirms

that more and more women
are used in industrial espionage.

So not just hackers try to spy on you,

but also secret agents
from intelligence agencies

from foreign countries.

So some of these
best-trained agents in the world

may wait for you at the hotel bar,
with the face of an angel.

This is Silk Road.

For a very long time,

this has been the largest online
drug-dealing marketplace on the darknet.

And this is the man behind Silk Road.

Excuse me, but he looks like a character
from High School Musical.

I just want to make a point here:

Many criminals and spies
are very successful

because they don’t look like criminals
or they don’t look like spies.

He looks pretty sympathetic -

he’s not a hacker, but anyway -

many criminals and many spies

look pretty unsuspicious
and pretty sympathetic.

So they are using their appearance.

They are using our tendency
to like and to trust them against us.

[AUTHORITY]

The time is running and ticktocking away,
but I want to give you one last example

of how hackers try to exploit
our psychological vulnerabilities:

the authority principle.

We are much more influenceable
when we consider someone an authority.

And many companies
use this principle all the time.

This is the Doctor’s Best TV commercial.

They just combined
all the authorities’ stereotypes

in one TV spot.

As you can see, it’s an elderly man
with glasses, and he wears a tie,

and he looks like a medical doctor,
and he does some kind of experiment,

and it plays in a scientific lab,

and everything in this picture,

and also the brand -
it’s called “Doctor’s Best.”

So they just combined
all the authority symbols

to convince us to pay much more
for toothbrushes.

And people do it.

And cybercriminals do the same principle,
the same persuasion technique,

all the time.

So they are using
authority symbols, logos, brands

and names of institutions
or government agencies

to convince us

that they are the authorities
and that this is a real mail.

So they send emails from the FBI
or the Bank of America or the IRS,

and they exploit,

they use our tendency
to trust experts and to trust authorities.

So what did you learn, hopefully?

[SYMPATHY MISDIRECTION AUTHORITY]

Cybercrime is a psychological problem:

More than 90 percent of cyberattacks
are caused by human error.

Cybercriminals, hackers, social engineers
play with human emotions.

They play them like a piano.

They know what buttons to push
to get a certain reaction.

So what can we do?

What can we do to become a human firewall?

Well, the cyberdefense strategy
of many companies

could be described like this:

“Team I Don’t Care,”
“I hope it won’t hit us,”

and “I think we are too small”
or “We are not interesting enough.”

Well, guess what? You’re wrong.

There are two types of companies:

Companies that have been attacked,
and companies that will be attacked.

This is not a cyberdefense strategy;

this is naive.

The key is awareness.

A talk like this,
a speech like this, a workshop

can definitely help
to prevent crimes from happening.

Awareness alone can be a key element
in the prevention of cybercrime.

If someone calls you and asks you
for your password on the phone,

I’m not sure if you are going
to give it at this point.

If you get an email from Amazon

that your account has been hacked
and you need to click on this link,

I’m not sure if you are going
to click on this link.

If you find a USB flash drive
on the ground,

I’m not sure if you are going to plug it
into your computer out of curiosity.

And if you get an email
by the FBI or the IRS,

I’m not sure if you will transfer
the money or click on these links.

So awareness alone
can help to prevent cybercrime.

My name is Mark T. Hofmann,
I’m a profiler and speaker,

and I thank you.

Stay safe, and thank you
for your undivided attention.

(Applause)

抄写员:Mariolina Sanfilippo
审稿人:Eunice Tan

我的名字是 Mark T. Hofmann
,我是一名犯罪和情报分析师,

或者你们
大多数人最有可能称之为“犯罪剖析师”。

如果您想到网络犯罪,
您可能会想到这样的事情。

在电视上,它总是发出
这些花哨的声音,

(电脑哔哔声

)你会看到一个穿着连帽衫的孩子
站在笔记本电脑前,

屏幕上显示着绿色文字。

好吧,现实是不同的。

在电视上,你永远无法
真正看到这张脸。

黑客总是
这样或从背后出现,

但你永远看不到脸。

今天,我想
揭开黑客的面纱,可以这么说。

我想谈谈
黑客的概况和动机。

我想谈谈
心理操纵,

关于
他们用来攻击我们的社会工程技术,

以及我们可以做些什么
来成为人类防火墙。

作为剖析师,
我对行为感兴趣。

我分析行为,

并试图找出
行为背后的动机和心理。

因为我们所做的每一件事
都展示了我们是谁;

我们做出的每一个决定,
都展示了我们是谁。

而且,黑客会做出
一系列决定:

他们正在选择目标,
他们正在选择方法,

他们经常打电话,

他们写短信,
他们写网络钓鱼邮件。

他们所做
或未做的每一件事

,不仅留下了数字痕迹
,还留下了他们个性的痕迹。

通常,语言分析
是剖析黑客的关键要素。

让我举一个
“行为”这个词本身的例子。

一个美国人,

一个美国人,最有可能这样写
“行为”这个词,

一个来自英国的人更有可能这样
拼写“行为”这个词,

[BEHAVIOUR]

,一个白痴可能会拼写“行为”
这个词 行为”这样的。

因此,基于某人使用的词,
基于对语言的分析,

我可以尝试对未知罪犯做出概率陈述

是的,网络犯罪分子很难被抓到,

但在许多情况下,他们并不
像他们想象的那样隐形。

[行为]

[>90%]

那么分析器能告诉你
什么关于网络犯罪的信息?

嗯,很多。

超过 90% 的网络攻击
或网络安全漏洞

是由人为错误造成的。

所以人,人,是
网络安全链中最薄弱的一环。

让我非常清楚这一点:

网络犯罪
不仅仅是一个技术问题。

这是一个心理问题,
这是一个人的问题,

这显然是一个管理问题。

计算机是武器,

但肇事者
和受害者都是人类。

任何门的安全

都取决于
持有钥匙或密码的人。

因此,您可以拥有世界上最好的
高档安全门。

如果我操纵你
给我钥匙,那也没用。

您可以拥有世界上最好的花哨的高安全
防火墙系统。

如果我操纵你给
我密码,那也没用。

“业余爱好者破解系统,
专业人士破解人。”

这是安全专家
布鲁斯·施奈尔(Bruce Schneier)的名言,他是对的。

那么我们能
对黑客的档案说些什么呢?

袭击的幕后黑手是谁?

嗯,很多时候,
网络犯罪看起来不像这样。

它看起来更像这样。

执法专业人士
、情报专业人士

和安全专业人士
喜欢使用“犯罪即服务”一词。

因此,网络犯罪分子经常
在类似公司的结构中工作。

他们有供应链之类的东西,

他们有
质量管理之类的东西

,有时他们甚至有
客户支持。

因此,如果您或您的公司受到攻击,

它可能不是来自
一个穿着连帽衫的笔记本电脑前的孩子。

它可能来自世界任何地方
的类似呼叫中心的结构

,就像这样。

但当然,也有一些
个人黑客——

我们称他们为“黑帽黑客”。

所以那些戴着黑帽子
的人,当然是坏人。

根据目前的科学状况,

我们可以
对黑帽黑客的概况说些什么?

我们可以这样说:

他们中的大多数——一些研究表明
超过 90%——是男性。

大约 80%
的人年龄在 30 岁以下。

[男性
30 岁以下]

他们中的大多数,
大约 60%,

开始于非常年轻的年龄 -
10 到 15 岁之间。

他们的智力高于平均水平,
他们通常受过良好的教育,

而且 90% 的
社会经济地位不低。

所以他们很年轻,他们很聪明,
而且他们经常受过良好的教育。

为什么他们做他们所做的事?

按降序排列的主要动机
是金钱 - 经济利益 -

间谍活动,

以及乐趣 - 意识形态或只是拖钓。

[动机]

嗯,所以他们这样做主要是为了钱。

如果我看一下这份动机清单,
我会有点怀疑。

因为正如我们刚刚了解到的

,他们年轻、聪明、
受过良好教育,

而且他们不一定来自
困难或破碎的家庭环境。

所以如果他们想赚钱,

为什么不为谷歌
或任何其他硅谷公司工作呢?

他们可以通过
合法的方式赚很多钱。

那么他们为什么要犯罪呢?
他们为什么这样赚钱?

另一个心理
动机开始发挥作用

,称为寻求刺激,

或者在心理学中
我们有时喜欢称之为

“挑战系统”。

所以他们喜欢
比联邦调查局更聪明的感觉。

永远不要
低估自我、挑战和寻求刺激

在网络犯罪中的作用

,我不只是在谈论理论。

我自己遇到了黑客,
我做了自己的研究,我

的一个科目告诉我:

“我分析人。

最后,人类黑客的
工作方式与计算机黑客的工作方式相同。

你总是在寻找漏洞
并试图利用它们。”

所以他们是分析我们的社会工程师。

他们正在分析
我们的心理弱点

,他们试图攻击,

他们试图利用
我们的心理弱点。

但是我们的
心理弱点是什么?

心理
操纵技巧有哪些?

社会
工程技术有哪些?

我想给你看一个小错觉。

为了这个幻境,我只需要一根丝绸
,我把这丝绸放在了手中。

然后我可以把手空空
,丝绸神奇地变成了一个鸡蛋。

如我所见,你并不感到惊讶。

你是对的,它没那么聪明——

它只是一个
里面有洞的塑料蛋。

但我想用这个来教你
关于误导艺术的一课。

所以假鸡蛋在我左边的口袋里
,手帕在我的右边口袋里。

然后我在
右口袋里摆弄着,

试图将
你的注意力引到丝绸上,

同时
我用另一只手偷偷取出假鸡蛋。

然后我告诉你我把丝绸放在了手上,

但实际上我是小心翼翼地将丝绸
放在假鸡蛋里面的。

然后,当然,我可以让我的手空着,
然后它神奇地变成了一个鸡蛋。

好吧,没那么壮观,
但正如我刚刚告诉你的,

我要教你一堂
关于误导艺术的课。

解释一下。

(鸡蛋裂开和掉落)

正如我刚才告诉你的,这将是
关于误导艺术的一课。

那么,刚刚发生了什么?

我在幻象中创造了一个幻象。

所以基本上,我
在解释你是如何被愚弄的时候愚弄了你

,这样我就完全消除了
你的批判性思维。

第一轮,
大家都在密切关注

,努力探寻背后的秘密。

但在第二轮,你放松了。

我告诉你,“放松——
现在我向你展示它是如何完成的”

,这样我就消除了
你的批判性思维。

再一次,我在
解释你是如何被愚弄的时候愚弄了你

,这就是黑客一直在做的事情。

他们在告诉
您您已被黑客入侵的同时攻击您

,这样,他们就完全消除了
您的批判性思维。

通常,网络钓鱼邮件
和短信的开头是这样的:

“我们检测
到您的帐户有一些异常活动。”

当然,现在您需要单击此处
来验证您的信用卡信息。

或“您的亚马逊帐户已被锁定。

有一些可疑
或犯罪活动。

您需要单击
此处重新获得对您帐户的访问权限。”

或“您的帐户
用于购买 250 美元的礼品卡。

如果您想取消订单
并确认您的信用卡信息,

请单击此处。”

所以他们
告诉你你被黑了。

事实上,你并没有被黑客入侵。

但是,当您单击这些链接时,
您将被黑客入侵。

现在,你可能会说,“好吧,我很聪明。
我不会点击这些链接。”

好吧,我不确定。

如果您分心,或者您
前一天刚在亚马逊下订单,

我不确定您是否不会
点击这些链接。

但是,即使 100 人中只有两个人,
只有 2%,点击这些链接

,也足够了。

如果我发送 100 封邮件,有两个
人会点击这些链接。

这是一个非常低的估计;
会更多。

当然,这总是很紧急的——
你需要现在就去做。

黑客从不说“慢慢来”。

你现在总是需要做点什么;

否则,将会造成巨大的破坏
,并产生巨大的负面影响。

您现在需要做某事
而不考虑它。

让我再举一个例子
,说明社会工程师和黑客如何

试图利用我们的
心理弱点。

他们正在使用所谓的
“同情原则”。

他们利用我们
信任和喜欢别人的倾向。

想象一下,你在上班路上的地铁里
,这是一个下雨的星期一早上。

这将是非常、
非常漫长和无聊的一天。

但突然间,她上了火车
,你开始紧张了。

你很想接近她,
你很想和她说话,

但你真的
没有勇气这样做。

但突然间,
她就站在你旁边。

这将是您与她交谈的机会,
但您仍然没有真正这样做。

你假装在智能手机上读了一些东西
,但你没有这样做。

她站得离你很近,
几乎要碰到你,

这几乎有点奇怪。

然后突然,她下了火车。

刚刚发生了什么?
她是扒手还是什么?

然后你把手伸进你的口袋里
,在你的口袋里,

你找到了一个小小的 U 盘,上面
有一颗心。

那里可能有什么?
电话号码? 图片?

现在,说实话:

你能忍受

不把它
插入你公司的

电脑看看里面有什么的好奇心吗?

好吧,可能不是。

这可能
是负面蝴蝶效应

和非常严重的网络攻击的开始。

我告诉你一个
情报界的小秘密:

女间谍非常好
,部分是因为性别歧视。

间谍、犯罪和黑客攻击——
这被视为男人的工作。

这就是为什么女性是迄今为止最好的,
因为她们毫不怀疑。

如果某人看起来不错或很有同情心,

那么很难将此人
视为潜在威胁。

因此,
如果某人的脸像天使,您就看不到邪恶。

但是,是的,毫无疑问,女性特工是

世界上最好的。

我的一个好朋友,
一位德国前情报官员

,他也

证实越来越多的女性
被用于从事工业间谍活动。

因此,不仅黑客试图监视您,

还有
来自外国情报机构的秘密特工

因此
,世界上一些训练有素的特工

可能会在酒店酒吧等着你
,面容天使。

这就是丝绸之路。

很长一段时间以来,

这一直是暗网上最大的
在线毒品交易市场。

这就是丝绸之路背后的人。

打扰一下,但他看起来像
高中音乐剧中的角色。

我只想在这里说明一点:

许多罪犯和间谍
非常成功,

因为他们看起来不像罪犯
或看起来不像间谍。

他看起来很有同情心——

他不是黑客,但无论如何——

许多罪犯和许多间谍

看起来都很不可疑,
而且很有同情心。

所以他们正在利用他们的外表。

他们正在利用我们
喜欢和信任他们的倾向来反对我们。

[

权威] 时间在流逝,滴答作响,
但我想给你最后一个例子

,说明黑客如何试图利用
我们的心理弱点

:权威原则。

当我们认为某人是权威时,我们更有影响力。

许多公司一直在
使用这个原则。

这是医生最好的电视广告。

他们只是在一个电视广告中结合了
所有当局的刻板印象

如你所见,这是一个
戴眼镜的老人,他打着领带

,他看起来像个医生
,他在做某种实验

,它在科学实验室里播放,

以及这张照片中的一切,

还有 品牌 -
它被称为“Doctor’s Best”。

所以他们只是结合了
所有的权威符号

来说服我们为牙刷支付更多
的钱。

人们这样做。

网络犯罪分子一直在做同样的原则
,同样的说服

技巧。

所以他们使用机构或政府机构的
权威符号、标志、品牌

和名称

来说服

我们他们是权威
,这是一封真正的邮件。

所以他们从联邦调查局
、美国银行或国税局发送电子邮件,

他们利用我们
信任专家和信任当局的倾向。

那么,希望你学到了什么?

[同情误导权威]

网络犯罪是一个心理问题:

超过 90% 的网络攻击
是由人为错误引起的。

网络犯罪分子、黑客、社会工程师
玩弄人类情感。

他们像钢琴一样弹奏它们。

他们知道要按什么按钮
来获得某种反应。

所以,我们能做些什么?

我们能做些什么来成为人类的防火墙?

嗯,很多公司的网络防御策略

可以这样描述:

“我不在乎的团队”,
“我希望它不会打击我们”

,“我认为我们太小了”
或“我们不够有趣” 。”

好吧,你猜怎么着? 你错了。

有两种类型的

公司:受到攻击
的公司和将受到攻击的公司。

这不是网络防御策略;

这太天真了。

关键是意识。

这样
的演讲,这样的演讲,研讨会

绝对可以
帮助防止犯罪的发生。

仅提高意识就可以成为
预防网络犯罪的关键因素。

如果有人打电话给你并
在电话上询问你的密码,

我不确定你是否会
在这一点上给它。

如果您收到来自亚马逊的电子邮件,

表明您的帐户已被黑客入侵,
并且您需要单击此链接,

我不确定您是否
要单击此链接。

如果你在地上找到一个 USB 闪存驱动器

我不确定你是否会出于好奇将其
插入计算机。

如果您收到
FBI 或 IRS 的电子邮件,

我不确定您是否会
转帐或点击这些链接。

因此,仅凭意识就
可以帮助预防网络犯罪。

我的名字是 Mark T. Hofmann,
我是一名分析员和演讲者

,谢谢你。

保持安全,
感谢您的全神贯注。

(掌声)