Cyber Warfare and Importance of Cyber Awareness

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Threats to I.T Internet security By Cameron Mundy.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
IT security By Tilly Gerlack.
Summer,
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
 Introduction to Computing  Computer Programming  Terrorisom.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Training of Information Security for Common Users Dr. Francisco Eduardo Rivera FAA SALT Conference, February 18, 2004.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Computer Security By Duncan Hall.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
The Current State of Cyber Security and How to Defend Your Data.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
October 28, 2015 Cyber Security Awareness Update.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Proactive Incident Response
Social Engineering Dr. X.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
International Conflict & Cyber Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Instructor Materials Chapter 7 Network Security
Security Risk Profiles – Tips and Tricks
Secure Software Confidentiality Integrity Data Security Authentication
Compliance with hardening standards
Information Security 101 Richard Davis, Rob Laltrello.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Presented by Security Management Partners Waltham, MA
Forensics Week 11.
Teaching Computing to GCSE
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Unit 1.6 Systems security Lesson 3
I have many checklists: how do I get started with cyber security?
Risk of the Internet At Home
Social Engineering No class today! Dr. X.
Learning Link Scotland
Keeping your data, money & reputation safe
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Business Compromise and Cyber Threat
Computer Security By: Muhammed Anwar.
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Cyber Warfare and Importance of Cyber Awareness Lydia Ray

About me! Associate professor at CSU Ph.D in sensor network security from LSU Computer forensic training and certification by AccessData FTK and EnCase GPEN certification on Ethical Hacking by SANS Institute

Topics Cyber warfare The vulnerabilities and the weakest link Cybersecurity Awareness

Topics Cyber warfare The vulnerabilities and the weakest link Cybersecurity Awareness

What is Cyber Warfare? “Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption”

WikiLeaks email hack is likely a cyber warfare!

NSA Chief on DNC Email hack NSA Chief: WikiLeaks Hacks of Democrats' Emails Were a "Conscious Effort by a Nation-State" NSA Chief on DNC Email Hack

Stuxnet: Another Alleged Cyber Warfare Allegedly, Stuxnet was created by US and Israel.

Some Possible Attack Scenarios Any critical infrastructure can be targeted US power grid Airlines Hospitals Waterworks Valves of dams Banks

How Likely is an Attack?

The Tricky Situation Difficult to trace the attack origins Difficult to take any action: legal system is behind technology growth

Topics Cyber warfare The vulnerabilities and the weakest link Cybersecurity Awareness

Two Easiest Ways of Hacking Tricking a human user to give up important information or install backdoor Through insecure sensors connected to the Internet Top 5 Cyber Attacks Malware Phishing attack Password attack Denial of service Man in the middle Difficulty Increasing

How Difficult to Trick a Human User Social Engineering Source: http://www.vox.com/policy-and-politics/2016/10/28/13456368/how-john-podesta-email-got-hacked

The Weakest Leak Humans are the weakest link in cybersecurity chain. We (society) did not plan, create, and disseminate education about cyberspace quickly enough to match the increased use of cyberspace.

Social Engineering Attacks Which website is fake?

Spear Phishing A very targeted SE attack!

Mobile and Ubiquitous Sensing Devices Use of cellphones and IoT devices has increased significantly Simple techniques to hack these devices are available

Mobile Phone Security Issues Social engineering Third party apps Unsecured wifi hotspot https://youtu.be/lFo49yL06Qg

IoT Security Issues Sensors have limited resources Many IoT devices use simple processors and OSs Sophisticated, resource-expensive security approaches are not possible Regular update and patch management not in place

Topics Cyber warfare The vulnerabilities and the weakest link Cybersecurity Awareness

“Cybersecurity is about people” “There are numerous controls IT professionals can implement to safeguard electronic information from unauthorized users. But it's the authorized end users that possess the IDs and passwords to access that data giving them the ability to print it, share it, alter it or delete it. If they are careless with or choose weak passwords, casually discard confidential printed reports in the trash, prop open doors to secured areas, fail to scan new files for viruses, or leave back-ups of data unsecured, then that information remains at risk.” - Katherine Ludwig SANS Security Essentials Invest on people as much as on tools

Cybersecurity Awareness Be aware about the consequences of careless cyber behavior Build a culture of safe cyber behavior Invest on people rather than tools “It is the heavy users of digital devices who are usually the least knowledgeable and aware of cyber security issues and prevention.” -B. Kim

A Few Important Areas

Questions