Cyber Security & IT: What’s Next?

Slides:



Advertisements
Similar presentations
7 Effective Habits when using the Internet Philip O’Kane 1.
Advertisements

Pirating Cyber Style. What is Ransomware? History CryptoLocker BlackHole Exploit Kit.
Trojan Horse Program Presented by : Lori Agrawal.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Viruses & Destructive Programs
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crimes.
Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
INTRODUCTION & QUESTIONS.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Viruses & Destructive Programs
What they are and how to protect against them
Ransomware 12:00 Juwan harris.
Executive Director and Endowed Chair
Social Media Attacks.
Intro to Malware Attacks
Identity theft vector of the electronic age
CYBER SECURITY...
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Cyber Crime What’s all the fuss about?
Cyber Security Awareness Workshop
Cyber Security By: Pratik Gandhi.
Trends in Ransomware Distribution
Phishing is a form of social engineering that attempts to steal sensitive information.
Encryption Ransomware
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Call AVG Antivirus Support | Fix Your PC
IT Security awareness Training.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Ransomware: What is it, How to avoid it and How to protect your data
Cyber Security Why You Should Care.
Social Engineering No class today! Dr. X.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Internet Security Threat Status
WannaCry Ransomware Overview
HOW DO I KEEP MY COMPUTER SAFE?
Mitigating Ransomware
Information Systems for Health:
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Information Security – Sep 18
The Internet: Encryption & Public Keys
CSCD 434 Spring 2019 Lecture 10 Attacks for Profit Ransomeware 1.
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Cyber Security & IT: What’s Next? Ransomware and its effects

Heather Stratford CEO of IT Training Solutions - An International Cyber Security Business.  Has 15 years of experience in Leadership and Business Development Worked in All areas of Business - Fortune 500 to Start-ups Entrepreneur - started and taken over national companies Gravitated to Technology because she saw a need that she could fill Lectures around the country

Why IT and Cyber Security? Top Growth Areas for the next decade Use your analytical and communications skills to solve real problems Job security Help fight against Organized Crime – CSI move over

Why? Cyber Security This is your generation’s form of Organized Crime. U.S. Department of Justice: Ransomware attacks are now averaging 4,000 reported attacks per day. Up 400 percent since

Growing Need for Cyber Security

Low Cost to Enter, Successful, Hard to Trace The Perfect Crime Motivation Payments Digital Version of Extortion Plays on Fear and Embarrassment A Very Lucrative way to make money Average Payment for an Individual Ransomware Victim: $300 Average Payment for a Business Ransomware Victim: $10,000 Low Cost to Enter, Successful, Hard to Trace

FBI Statistics FBI estimates 1 billion in cyber-extorted money in 2016 2015 – 753,684 Ransomware attacks totaling $24M in paid ransom. 2016 – First quarter – $210M in paid ransom. Loss estimates: For a large enterprise : $861,000 For a small business : $86,500

What is Ransomware?

How Does Ransomware Work? User usually opens a file, usually via phishing email, IM, social media or by visiting a malicious site. A pop up window opens, usually looking like an official site or from a person they recognize. The user’s files are encrypted with an AES-256. A randomly generated one-time key. This creates an individual encryption key for each file.

Actual Ransomware Screens

How do Cyber Criminals Attack? Email. The number one point for attack is attacking a single computer that is attached to a larger network. The Criminal hopes they can make the attachment or link look legitimate and start the infection.

Phishing - Who is it from?

Phishing – Who is it to?

Phishing – Identifying Information?

Phishing – Reason for Contact?

Phishing – Fake Links

How do Cyber Criminals Attack? 2. Exploit Kits. Malicious Ads on popular websites are used to push exploit kits to unsecure machines. Exploit Kits are malicious toolkits that spread malware by exploiting security holes found in software applications that are already running on an employees computer. For example Adobe Reader

How do Cyber Criminals Attack? 3. Free Pirated Software. When a company or private individual does not pay for the license on their software they run the risk of infecting from the pirated software site or downloaded file.

Ransomware History 1989: First known Ransomware was AIDS Trojan 2005: Extortionate Ransomware became prominent in May, 2005. 2006: By mid-2006, worms such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes.

Ransomware History

How Do I Know if I’m Infected? Ransomware will hit your system and it will take one of three forms Encryption Ransomware LockScreen Ransomware MasterBoot Record (MBR) Ransomware

Lock Screen Ransomware This type of ransomware presents a full screen image that will not allow other windows to open. The screen will demand payment and give instruction for transferring money.

CryptoLocker CryptoLocker is a type of ransomware that rakes in 30 million every 100 days. It has infected thousands of machines This has been mostly targeted to PCs. But there are now Mac reports of Ransomware. And reports on mobile devices as well Education organizations are the most attacked organizations

Bitcoin is a form of digital currency, created and held electronically Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bought and sold at bitcoin “exchangers” Used by hackers because it is untraceable Today 1 bitcoin = $638.98 USD

Sources http://www.coindesk.com/information/what-is-bitcoin/ http://www.isaca.org/pages/2016-cybersecurity-snapshot.aspx https://cybersecurity.isaca.org  Kaspersky - Cyber Security - Ransomware - Webinar, August 2016 http://blogs.getcertifiedgetahead.com/ransomware/ https://www.fbi.gov/news/stories/incidents-of-ransomware-on- the-rise Kaspersky - Tech Junction - Ransomware Training, Mark Villinski, September 2016