Cyber Security and Government Contracts Florida SBDC at FGCU Helping Businesses Grow & Succeed State Designated as Florida’s Principal Provider of Business.

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
“Introduction” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
“Federal Grants” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
“Pricing” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
“Overview” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Training: Prepare to meet the Buyers July 22, Small Business Resources Presented by: M. Clyde Stoltzfus Director, Southeast Pennsylvania PTAC The.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
CYBER CRIME.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
“FAR” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider of Business.
“Reading Solicitations” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
“SBIR-STTR” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
“Subcontracting ” Florida SBDC at FGCU Helping Businesses Grow & Succeed “Doing Business with the Government” State Designated as Florida’s Principal Provider.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Safe Computing Practices. What is behind a cyber attack? 1.
Information Management System Ali Saeed Khan 29 th April, 2016.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
October 27, 2016 Main Line Association for Continuing Education
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Florida SBDC at FGCU Helping Businesses Grow & Succeed
FSBDC at Florida A&M University
Florida SBDC at FGCU Helping Businesses Grow & Succeed
Data Compromises: A Tax Practitioners “Nightmare”
Introduction to the Federal Defense Acquisition Regulation
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Counseling  Training  Information  Special Programs
Malware, Phishing and Network Policies
Cybercrime and Canadian Businesses
Anatomy of a Large Scale Attack
Business Compromise and Cyber Threat
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Florida SBDC at FGCU Helping Businesses Grow & Succeed
Presentation transcript:

Cyber Security and Government Contracts Florida SBDC at FGCU Helping Businesses Grow & Succeed State Designated as Florida’s Principal Provider of Business Assistance [§ , Fla. Stat.]

Helping Businesses Grow & Succeed Mission Statement We are a customer-driven organization of business professionals, dedicated to helping small businesses succeed, by enthusiastically providing creative solutions which exceed customer, employee, and stakeholder’s expectations.

Helping Businesses Grow & Succeed Statewide Infrastructure Our Network S tatewide network of 43 centers involving: State Universities Colleges Chambers of Commerce Economic Development Councils Federal, State & Local Government Agencies Additional outreach is provided at more than 50 outreach locations, utilizing resource partners such as chambers of commerce, economic development organizations, business incubators and lending institutions. Locations

Helping Businesses Grow & Succeed Accelerating Florida’s Economy Only statewide provider of entrepreneurial and emerging growth company services, playing a vital role in Florida’s economic development: Assisting entrepreneurs in every stage of the business cycle, from prospective entrepreneurs to mature businesses looking for growth opportunities and more; Working with firms in all industry sectors; Utilizing the expertise and resources of some of the best universities in Florida (Florida Gulf Coast University)and a professional staff of eleven business consultants; Accessing the resources of a national network of more than 5,000 SBDC professionals; and The FSBDCN is nationally accredited through the Association of SBDCs by Congressional mandate.

Helping Businesses Grow & Succeed FSBDC Services Consulting Personalized, confidential and provided at no cost Training Value-added from the basics to advanced topics Business Data & Information Current and expansive information for better decision-making

Helping Businesses Grow & Succeed 6 OBEJECTIVES Identify –References –Cyber Attacker (Operator, Groups) –Techniques (Methods) –Facts –Solutions

Helping Businesses Grow & Succeed 7 REFERENCES Federal Information Security Management Act 2002 (FISMA) Safety Act 2002 NIST Guidance under FISMA – Security Controls and Standards – Control of Unclassified Information

Helping Businesses Grow & Succeed 8 REFERENCES continued Federal IT Acquisition Reform Act (FITARA) Computer Fraud and Abuse Act DOD Instruction DFAR Unclassified Controls, Technical Information DFAR Clause Safeguarding of Unclassified Controlled Technical Information

Helping Businesses Grow & Succeed 9 REFERENCES continued GAO Report T Cyber Threats and Data Base Breaches Electronic Stored Communications Act

Helping Businesses Grow & Succeed 10 CYBER Operator Definition Cyber operator (attacker) who uses various methods to penetrate a computer or multiple computer systems without authorization –Uses a combination of methods –Actions are undiscovered for a long period of time

Helping Businesses Grow & Succeed 11 Techniques-Methods 1-BOT-Network Operators –Attacker (Operator) uses a network of compromised remotely controlled computers for various attacks aimed at overwhelming your computer system –Distributes phishing, malware, spam

Helping Businesses Grow & Succeed 12 Techniques continued 2-Criminal Groups –Operator uses a network for monetary gain and sells-buys compromised information at the underground market –Credit Cards, Personal Information

Helping Businesses Grow & Succeed 13 Techniques continued 3-Insiders –Operator may be a disgruntled person within an organization, or untrained employee whose position allows them access to the computer systems that can result in significant damage to the company or organization –NSA-Edward Snowdon

Helping Businesses Grow & Succeed 14 Techniques continued 4-Nations –Operator engages in a cyber-attacks for espionage or economic gain –North Korea- Sony –Taliban-Flash Drives

Helping Businesses Grow & Succeed 15 Techniques continued 5-Terrorists –Operator attacks critical infrastructure with the aim of incapacitating the facility –Iran National-NY Dam

Helping Businesses Grow & Succeed 16 Techniques continued 6-Ransomware –Operator attacks and immobilizes the computer system, requests payment to restore the system to normal operations –2016 Hospital network-Washington DC

Helping Businesses Grow & Succeed 17 Techniques continued 7-Cross-Site Scripting –Operator utilizes third party resources to run scrip’s in a victim’s web browser –Take screen shots of the user activity

Helping Businesses Grow & Succeed 18 Techniques continued 8-Malware –Operator utilizes viruses and worms to infect the user’s computer –Get your information!

Helping Businesses Grow & Succeed 19 Techniques continued 9-Phishing and Spear Phishing –Operator uses social engineering techniques that create realistic looking s, to entice the user to click on a link or visit a web site where the user enters confidential information –Your credit card was compromised!

Helping Businesses Grow & Succeed 20 Techniques continued 10-Spamming –Operator sends advertising products – contains malware

Helping Businesses Grow & Succeed 21 Techniques continued 11-Spoofing –Operator creates a fake web site that mimics a real well-know web site, with the intention of enticing the computer user to enter confidential information –Adobe (Computer pop-up)

Helping Businesses Grow & Succeed 22 Techniques continued 12-SQL Injection –Operator obtains unauthorized access to a database for the purpose of capturing sensitive information within the database –Target (customer credit cards numbers)

Helping Businesses Grow & Succeed 23 Techniques continued 13-War Driving –Operator physically searches (drives through the neighborhood) for unsecured networks to exploit information –Hotels, Starbucks

Helping Businesses Grow & Succeed 24 Techniques continued 14-Zero Day –Operator utilizes a security hole previously unknown and creates code exploiting the vulnerability of the software –Microsoft

Helping Businesses Grow & Succeed 25 Facts Cyber attacks on companies and government have increased 48% globally over the past year

Helping Businesses Grow & Succeed 26 Facts continued Cyber Attacks in the US (Reported) –64% current and former employees (insiders), business competition –11% Oil and Gas –9% Aerospace and Defense –8% Technology –8% Telecommunications 100% Total

Helping Businesses Grow & Succeed 27 Facts continued Federal Government –67,000 Cyber incidents (2014) –27,624 involved personal identification –VA had 1.2 Million malware attacks (2015) –OPM 22.1 Million Government employees and contractors –GAO identified Healthcare.gov lacks cyber protection

Helping Businesses Grow & Succeed 28 Facts continued Cyber breach SC Department of Revenue –8.2 GB of data (not encrypted) –3.5 Million SC tax payers –1.9 Million depends –700,000 businesses –3.3 Million bank accounts –5,000 expired credit cards

Helping Businesses Grow & Succeed 29 Facts continued Phishing –23% of recipients open the –11% of recipients open the attachment

Helping Businesses Grow & Succeed 30 Solutions Cyber Solutions –Meet with your ISP (Internet Service Provider), discuss Cyber Security –Change passwords every 30 days –Back up files, (Hard Drive, Cloud) –Encrypt Data –Company Cyber Security Policy –Company Cyber Response Plan

Helping Businesses Grow & Succeed 31 Solutions Continued Cyber Solutions –Cyber Security Training-Employees –2 Level Digital Authorization and Access –On board and Off board employees (Change, Deny Password Access) – and Internet Etiquette –Digital Assets (Where, Who, How) –Mobile Security-Notebooks, Cell phones –Cyber Insurance

Helping Businesses Grow & Succeed 32 Solutions Continued Cyber Solutions –Physical Security (office access and computer access, remove passwords next to the computer-laptop) –Backup/Disaster Recovery/Business Continuity Plan –Software Patch updates –Malware updates

Helping Businesses Grow & Succeed Q & A Daniel Telep Jr. Procurement Analyst Florida Gulf Coast University College of Business fsbdcswfl.org