Securing your hack-free work environment

Slides:



Advertisements
Similar presentations
Hacking for Beginners Become a hacker by taking four easy steps.
Advertisements

UNIT 20 The ex-hacker.
7 Effective Habits when using the Internet Philip O’Kane 1.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Internet Security Awareness Presenter: Royce Wilkerson.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
CYBER CRIME AND SECURITY TRENDS
Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security.
7 Information Security.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Lesson 2 Computer Security Incidents Taxonomy. Need an accepted taxonomy because... Provides a common frame of reference If no taxonomy, then we: Can’t.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
A user-friendly approach to grid security Bruce Beckles University of Cambridge Computing Service A user-friendly approach to grid security “Grid ‘security’?
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Security By Duncan Hall.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Technical Implementation: Security Risks
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Securing Information Systems
CYBERSECURITY SOLUTIONS
Social Engineering Dr. X.
Seminar On Ethical Hacking Submitted To: Submitted By:
Computer Security Incidents
Six Steps to Secure Access for Privileged Insiders and Vendors
Key words: Secure | Password | Character
Network Security Fundamentals
Common Methods Used to Commit Computer Crimes
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
I S P S loss Prevention.
Cyber Security & IT: What’s Next?
A user-friendly approach to grid security
Six Steps to Secure Access for Privileged Insiders and Vendors
Security in the Workplace: Information Assurance
Outline Introduction Characteristics of intrusion detection systems
Chapter 11 crime and security in the networked economy
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Risk of the Internet At Home
The Art of Deception.
Social Engineering No class today! Dr. X.
How to build a defense-in-depth
Information Security CIS 9002 Kannan Mohan Department of CIS
Introduction to Computers
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Computer Security Incidents
Chapter 1: The Need for Cybersecurity
LO1 - Know about aspects of cyber security
social Engineering and its importance during Security Audits
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Securing your hack-free work environment STARS CAMPUS SOLUTIONS STARSCAMPUS.COM

ASSUMPTION --- $40 Million Revenue Enterprise. I was addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. Kevin Mitnick

5 Major losses by hacking/vulnerability type Human Error $ 3,456,00 Hackers $ 5,920,000 Targeted Phishing $ 1,260,000 Extortion $4,330,000 Hacktivists $6,510,000 It is a fairly open secret that almost all systems can be hacked, somehow. It is a less spoken of secret that such hacking has actually gone quite mainstream. Dan Kaminsky

HUMAN ERROR Insecure / Lost Devices Secure ALL devices – including phones Enable REMOTE WIPE / MANAGEMENT/LOCATION Do NOT write down passwords! (Password manager like RoboForm) Two Factor Authentication (2FA) We need to do whatever we can to defend ourselves against hacking. Soren Skou

Hackers Attempt to Infiltrate your Internal Network Good and properly configured Firewall or Hosting Secure certificates on server (http://ssllabs.com/ssltest/) Patched Servers Patched devices Server Type Sponsored by Homeland Security & Carnegie Mellon: (http://www.kb.cert.org) Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business. Kevin Mitnick

Targeted phishing Attempt to get Doorway into your Network Often mimics known employees or relationship like a bank, a related service EXPECTATION is key here. Do you EXPECT to get a FILE/PDF/PHOTO/DOCUMENT etc? LOOK at the EMAIL ADDRESS source – not the return address. ALWAYS use an antivirus! Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against. Kevin Mitnick

EXTORTION Usually in INSIDE job Remove ALL former employee’s accounts/access Often, the person requires a RANSOM to reverse/prevent further damage to data I'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization. Kevin Mitnick

HACKTIVISTS This is again, a TARGETED type of event – usually via PHISHING HACKTIVISTS have an agenda to prove May want a Ransom May want to just cause financial damage Example: Wipe out student records at XYZ college because tuition is too high and my student loan is huge! Further, the next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. Dorothy Denning