Looking to the Future MIS 689 Cyber Warfare Capstone.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Springfield Technical Community College Security Awareness Training.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
HEALTHCARE BREACHES Andrew Kuebler MIS 534 April 15, 2015.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
New Data Regulation Law 201 CMR TJX Video.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protecting Sensitive Information PA Turnpike Commission.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
AUGUST 25, 2015 Cyber Insurance:
Florida Information Protection Act of 2014 (FIPA).
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
SPH Information Security Update September 10, 2010.
Preventing a Sensitive Data Loss: Laptops Marc Scarborough.
Update on Privacy Issues at USU October 10, 2013.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
INTRODUCTION & QUESTIONS.
Protecting Your Assets By Preventing Identity Theft 1.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Safe Computing Practices. What is behind a cyber attack? 1.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Chapter 8 Data Privacy. Data Collection IP addresses Visited urls Anonymized? If so, supposed to prevent personal identification Europe considers IP address.
Increasing electronic product life and reliability The Future of Data Breach Risk Management “Response and Recovery” Especially Prepared for:
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Protecting Your Assets By Preventing Identity Theft
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
E&O Risk Management: Meeting the Challenge of Change
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Protection of CONSUMER information
Mr. Roeshink – Financial Operations
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Find The Best Yahoo customer service number
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Data Protection Scenarios
Digital $$ Quiz Test your knowledge.
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Ransomware and Data breaches in public libraries
Protecting Your Company’s Most Valuable Asset
DATA LOSS PREVENTION Mr. Collins Oduor.
Figure 1. Number of Records Breached
Las Positas College Flex Day
HIPAA & PHI TRAINING & AWARENESS
General Data Protection Regulation Q & A Session
Tom Murphy Chief Information Security Officer
DATA BREACHES 6 4 , 9 3 There were…
Mohammed V University, ENSIAS
School of Medicine Orientation Information Security Training
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

Looking to the Future MIS 689 Cyber Warfare Capstone

Figure 1. Number of Records Breached Some Facts Data breaches since 2005 reported by Federal Trade Commission (FTC) (Clearinghouse, 2019). # of records Breached: 11.5B+; # of data breaches: 9K+ Major Data Breaches Yahoo! : 3.5B user accounts FriendFinder : 412M user accounts MySpace : 360M passwords Figure 1. Number of Records Breached

Data Breach Types by Causes Payment Card Fraud (CARD): Fraud involving debit and credit cards that is not accomplished via hacking. For example, skimming devices at point-of-service terminals. Hacking or Malware (HACK): Hacked by outside party or infected by malware Insider (INSD): Insider (someone with legitimate access intentionally breaches information – such as an employee, contractor or customer) Physical Loss (PHYS): Includes paper documents that are lost, discarded or stolen (non electronic) Portable Device (PORT): Lost, discarded or stolen laptop, PDA, smartphone, memory stick, CDs, hard drive, data tape, etc. Stationary Device (STAT): Stationary computer loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility) Unintended Disclosure (DISC): Unintended disclosure (not involving hacking, intentional breach or physical loss – for example: sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax) Unknown (UNKN) Figure 2. The Percentage of Different Types of Data Breached in each Year Key Observation: Hacking or Malware is the main cause of data breach in recent years. Dark Web is a valuable source of cyber intelligence (Du et al., 2018)

Targeted Organizations BSF: Businesses - Financial and Insurance Services BSO: Businesses - Other BSR: Businesses - Retail/Merchant - Including Online Retail EDU: Educational Institutions GOV: Government & Military MED: Healthcare, Medical Providers & Medical Insurance Services NGO: Nonprofits Figure 3. The Percentage of Different Types of Organization Targeted Key Observation: Since 2010, Internet/IT (e.g., Yahoo; as Other Businesses) and major Retail/Merchant (e.g., Target) firms are the major targets.

Looking to the Future (for Cybersecurity) Cybersecurity  Continued and escalated concerns for governments, industry, and individuals Increasingly complex geopolitical landscape  Russian, Chinese, Iranian IoTs for homes (e.g., smart homes) and industry (e.g., autonomous vehicles, SCADA)  increasing mobile vulnerabilities Big data  “big data breaches” AI & Cybersecurity  for better or for worse Needing a social-technical solution  from engineering to analytics; from protective to proactive; a governments-industry-individual partnership

Congratulations on completing your Cyber Warfare Capstone course and MS in Cybersecurity degree! Best with your career as a Cyber Warrior for the good of the world!