PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Hacker Zombie Computer Reflectors Target.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 a crime committed on a computer network, esp. the Internet.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Network System Security - Task 2. Russell Johnston.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Chapter 40 Internet Security.
Securing Information Systems
What they are and how to protect against them
Malware and Computer Maintenance
Intro to Malware Attacks
Network Security Fundamentals
3.6 Fundamentals of cyber security
CYBER SECURITY...
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Backdoor Attacks.
Lecture 5. Security Threats
Cyber Security & IT: What’s Next?
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Computer Technology Notes 5
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
Privacy, Security, and Ethics
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY

What are we talking about today? 1 WHAT ARE THE THREATS? 2 WHERE DO THREATS COME FROM? 34 WHAT CAN BE DONE? WHO ARE THE TARGETS?

What are the threats? Cybersecurity, the Internet, Malware, and Internal Threats

CONFIDENTIAL 4 Cybersecurity Protecting information systems from unauthorized or criminal access

CONFIDENTIAL 5 The Internet 2.5 Quintillion (18 zeros) bytes of data added daily 90% created in the last two years The early “Internet” - sharing and innovation over security and protection The Creeper System – “I’m the creeper, catch me if you can!” Systems connected to the network should be considered to be unsecured

CONFIDENTIAL 6 What are the threats? Malware Social Engineering Hacks Internal Attackers Combinations of these 1234

CONFIDENTIAL 7 Malware Computer programs targeted at disrupting service, gaining access, or destroying/stealing data. Adware Virus Worm Spyware / Trojan Ransomware

CONFIDENTIAL 8 Adware Threat Level: Annoyance Adware generally consists of pop-up ads that appear after installing a separate piece of software.

CONFIDENTIAL 9 Virus Threat Level: Annoyance to Serious Issue Viruses affect the host system and spread to other users.

CONFIDENTIAL 10 Worm Threat Level: Serious Issue The “ILOVEYOU” worm of 2000 cost an estimated 5.5 billion in damages. 10% of all Internet connected computers were infected. Worms replicate themselves to other systems where they destroy information as they go.

CONFIDENTIAL 11 Spyware / Trojan Horse Threat Level: Dangerous Spyware is a malicious software that spies on you and tracks your internet activities. It helps the hacker to gather information about the victim’s system.

CONFIDENTIAL 12 Ransomware Threat Level: Critical Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.

CONFIDENTIAL 13 Ransomware How does it work? Installation of the software Phone home Digital keys created Encryption of data Extortion

CONFIDENTIAL 14 Ransomware The infamous Cryptolocker and Locky are examples of ransomware.

CONFIDENTIAL 15 Malware On average 25% of mail is for work purposes 14% is of critical importance 13% is personal non-work related 48% is SPAM, junk, potentially malware, and/or a phishing attack The shape of

CONFIDENTIAL 16 Phishing Phishing, Spear Phishing, and Whale Hunting Phishing threats are attacks that politely ask for private information while posing as a different sender.

CONFIDENTIAL 17 IoT Botnet Attack Rise of the machines "We have a Botnet army ready to take down your site. You have 48 hours to pay us 1200$. Merry Xmas!” Botnet armies are network connected devices that can be focused on taking down another network device somewhere else.

CONFIDENTIAL 18 Security Hardware and Software Backdoors Commercially available hardware Juniper firewalls Chinese components with manufacturing “flaw”

CONFIDENTIAL 19 The Internal Threat Physical security is everything User education Give access to only what is required to get the job done

Where do threats come from? Who creates them and why would they do such a thing?

CONFIDENTIAL 21 Where do these threats come from? Geographically: Russia, China, Iran, and North Korea Virus – a program written to execute with malicious intent. Written by programmers: As a challenge Out of dislike for Microsoft, Apple, or some other company To serve (the hacker brand of) justice! Criminal gain / profit Research

Who are the targets and why? Who is vulnerable to security threats?

CONFIDENTIAL 23 Who are the targets? Groups of targets include: Hospitals Businesses with a strong Internet presence Large retailers (Home Depot, Target, TJX, Office Max, etc.) Federal Agencies Small Businesses Everyone has data that is valuable to the hackers in one way or another. As security measures for larger companies improve and become more complex, small businesses and home users are being targeted more and more.

What can be done? How can I protect my data from threats?

CONFIDENTIAL 25 What can be done? Layered security Comprehensive, Encompassing solution Cloud based scanning Firewall Security Logging / event management Web filtering Antivirus Backup, backup, and more backup Educate your users

Questions

Thank You NetCenergy