Internet Security Threat Status

Slides:



Advertisements
Similar presentations
7 Effective Habits when using the Internet Philip O’Kane 1.
Advertisements

TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Viruses & Destructive Programs
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
INTRODUCTION & QUESTIONS.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
IBM 2015 Cyber Security Intelligence Index 2014, eventful year Major vulnerabilities were found lurking in well- known applications, many of which had.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Mark Ryan Professor of Computer Security 25 November 2009
Cyber Issues for Design Professionals
IBM 2015 Cyber Security Intelligence Index
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
IBM 2016 Cyber Security Intelligence Index
Executive Director and Endowed Chair
Network Security Fundamentals
Various Types of Malware
Cyber Security & IT: What’s Next?
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cisco 2017 Security Annual Report
Jon Peppler, Menlo Security Channels
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
بهترین راهکار را انتخاب کنید...
Cybersecurity Awareness
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Week 7 Securing Information Systems
Internet Worm propagation
Malware March 26, 2018.
Cyber Security Research: Applied and Basic Combined*
The Internet of Unsecure Things
Challenge-Response Authentication
Cyber Security Research: Applied and Basic Combined*
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
1:53:58 AM.
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
CSCD 303 Essential Computer Security Fall 2018
Cybercrime and Canadian Businesses
Security Hardening through Awareness August 2018
Executive Director and Endowed Chair
Institute for Cyber Security Overview
Challenge-Response Authentication
Information Security – Sep 18
Information Protection
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Security Trends and Threats Affecting Innovations in Technology
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Threat Landscape Update
Information Protection
Presentation transcript:

Internet Security Threat Status CS 5323 Internet Security Threat Status Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 13 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Industry Reports Symantec Internet Security Threat Report AT&T Cybersecurity Insights Report Cisco Annual Security Report Dell Security Annual Threat Report Google Android Security Annual Report IBM X-Force Cyber Security Intelligence Index Report McAfee Labs Threat Predictions Report Verizon Data Breach Investigation Report …… © Ravi Sandhu World-Leading Research with Real-World Impact! 2

Symantec Internet Security Threat Report 2017 (for 2016) Targeted attacks: Subversion/sabotage come to the fore A notable shift towards more overt activity, with a decline in some covert activity Financial heists: Cyber attackers chase the big scores Go for the bank, not for the bank customer Living off the land Making use of resources at hand rather than malware/exploits Resurgence of email as favored attack channel 1 in 131 emails were malicious, the highest rate in 5 years Ransomware with escalating demands Average ransom in 2016 rose to $1,077, up from $294 in 2015 New frontiers: IoT and cloud move into the spotlight Security blind spot © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Symantec Internet Security Threat Report 2016 (for 2015) A new zero-day vulnerability was discovered on average each week (total 54) Doubled from 2014 Over half a billion personal records were stolen or lost Companies choosing not to report the number of records lost increased by 85 percent Major security vulnerabilities in 75% of popular websites 15% of legitimate websites have critical vulnerabilities Spear-phishing targeting employees increased 55% 43% of all attacks targeted at small businesses Ransomware increased 35% Moved beyond PCs to smart phones, Mac, and Linux systems Symantec blocked 100 million fake tech support scams First reported in 2010 © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Symantec Internet Security Threat Report 2017 (for 2016) Big numbers Pages 10-12 of report © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Malware Classic Malware Trojan Horse (1971) Logic Bomb Virus (1985) Worm Modern Crimeware Rootkit Exploit Zero-Day Keylogger Drive by Adware Spyware Ransomware Phishing Spam DDOS Botnet © Ravi Sandhu World-Leading Research with Real-World Impact! 6

Malware Delivery Trigger Target Self- Propagating Planted By Attacker Inadvertent By User Local Condition External Command Host External Damage Exfiltrate Virus Worm © Ravi Sandhu World-Leading Research with Real-World Impact! 7