October 28, 2015 Cyber Security Awareness Update.

Slides:



Advertisements
Similar presentations
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Viruses & Destructive Programs
7 Information Security.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
7 Information Security.
Hurdles in implementation of cyber security in India.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
CONTROLLING INFORMATION SYSTEMS
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Cyber Insurance Risk Transfer Alternatives
Cyber Warfare and Importance of Cyber Awareness
Louisiana State University
Cybersecurity - What’s Next? June 2017
2016 Data Breach Investigations Report
3.6 Fundamentals of cyber security
National Cyber Security Month
E-commerce Application Security
Cyber Security Awareness Workshop
CHAPTER 4 Information Security.
Cybersecurity Awareness
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Data Privacy and Breaches
Network Intrusion Responder Program
Curating an Effective Security Culture
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Prepared By : Binay Tiwari
The Global Challenges of Cybersecurity and Digital Terrorism
Information Security Awareness
Las Positas College Flex Day
Strategic threat assessment
Privacy, Security, and Ethics
Presentation transcript:

October 28, 2015 Cyber Security Awareness Update

2 NATIONAL CYBER SECURITY AWARENESS MONTH Stop. Think. Connect

National Cyber Security Awareness Month –Every October Sponsors –Department of Homeland Security –National Cyber Security Alliance –Multi-State Information Sharing and Analysis Center Goals –Engage and educate the public and private sector –Raise awareness about cyber security –Increase resiliency of the nation in the event of a cyber incident 3

Common Terminology Malware = malicious software –Virus, trojan, worm, spyware, ransomware –“zero day” = no known patch (fix) for the malware/attack Security Incident –Event that compromises the confidentiality, integrity, or availability of an information asset Data Breach –Incident that resulted in confirmed disclosure to an unauthorized party 4

5 DISTRICT CYBER SECURITY TRAINING You are the Target

WHY HACKING EXISTS TypeMotives Cyber Criminal (monetary) ID theft, credit card info, extortion (ransomware, DDoS), click-jacking, Point-of-Sales, ATM skimmers Hacktivists Political, ideological, religious, social reasons (Ashley Madison, WikiLeaks, Eric Snowden) Nation State National offense/defense, espionage, sabotage, intellectual property, counterintelligence Cyberwar/Cyber Terrorism Large-scale disruption/destruction of critical systems (Smart Grid, nuclear, water/wastewater, banking, military) 6

CYBER CRIME EXAMPLES 7

2015 DATA BREACH INVESTIGATION REPORT 8 * Verizon 2015 Data Breach Investigations Report

ATTACKS ON SCADA SYSTEMS Springfield, Illinois –Network breach allowed attackers remote access –Hackers controlled a water pump and burned it out Attack lasted 2-3 months before an operator noticed a “glitch” –Stole credentials Televent (maker of SCADA software) –Network breach allowed malware install –Customer files affected –Project information stolen (OASyS – remote admin tool) –Televent manages 60% if total hydrocarbon movements in North American and Latin American pipelines Australian Wastewater Plant (Maroochy Water Services) –SCADA system attacked for 3 months with a laptop, proprietary radio, and homemade cable –140 sewage pumping stations compromised –Sewage spilled into waterways and canals 9

10 EVWD Security Activity Malware and Web Filter Statistics

RECENT MALWARE ACTIVITY 11

RECENT MALWARE ACTIVITY 12

WEB FILTER 13

SUMMARY OF OTHER TOPICS – is our most common vector for malware Social Engineering and Phishing s –Mobile Devices Privacy, rogue apps, security practices –Tips and Resources Managing Passwords Securing Your Home Network 14

Questions