Cyber Security AMSC FM Training Symposium Alex Roosma, 1st Lt, USAF

Slides:



Advertisements
Similar presentations
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Advertisements

National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Social media threats. Warning! May contain mild peril.
Cyber Attack Scenario Overview Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
… and why you should care. Sarah Harvey {CrySP, Information Retrieval} group University of Waterloo
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Securing your Business for 2014, Leveraging Lessons of 2013 OC Chapter.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
CCT355H5 F Presentation: Phishing November Jennifer Li.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
 Introduction to Computing  Computer Programming  Terrorisom.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
September 19, 2016 Steve Konecny CFE, CIRA, CEH, CRISC Hands on Hacking.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Social Engineering Dr. X.
There Will be Attacks – Improve Your Defenses
Hotspot Shield Protect Your Online Identity
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Information Security.
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Cyber Security By: Pratik Gandhi.
Cyber Security Awareness Workshop
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security.
Jon Peppler, Menlo Security Channels
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cybersecurity Awareness
IT Security awareness Training.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Social Engineering No class today! Dr. X.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Strong Security for Your Weak Link:
Network Intrusion Responder Program
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
There Will be Attacks – Improve Your Defenses
Security Essentials for Small Businesses
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
David J. Carter, CISO Commonwealth Office of Technology
Introduction to Systems Security
Computer Security.
Protecting Your Company’s Most Valuable Asset
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Bethesda Cybersecurity Club
Information Security – Sep 18
Information Protection
Spear Phishing Awareness
Online Computer Security Tips For Parents
Information Protection
Presentation transcript:

Cyber Security AMSC FM Training Symposium Alex Roosma, 1st Lt, USAF Land of Lincoln (LoL) Chapter of the American Society of Military Comptrollers (ASMC) half-day Financial Management Training Symposium on Thursday, 6 March 2014, at the Scott Club, Scott AFB, IL from 0730 to 1215 Alex Roosma, 1st Lt, USAF 6 March 2014

Overview Real-world cyber attacks Hacker methodology How to protect yourself and others Resources Questions Cyber security is a vastly expansive field that touches just about everything we do from waking up to our cell phone to checking email at work to falling asleep to Netflix at night. We’ll cover just a glimpse of how cyber can and does affect our daily work lives.

Real-World Examples Recent High Profile Breaches: Adobe user passwords Target US Dept of Energy LivingSocial Snowden Leaks New York Times AHMC Hospitals Breach Cyber attacks are a reality today, it is easy to perform a Google search and see many results and these stories are becoming very common in the news headlines, almost regularly. Here are some of the recent and REPORTED high profile network attacks representing various forms of attacks. Potential attacks include our SCADA or ICS (Industrial Control System) networks which can yield some very kinetic results. Specifics: Adobe – 150 million account credentials Target – Millions of credit cards and associated PINs US Dept of Energy – AHMC Hospitals Breach – In October 2013, more than 729,000 patients were put in jeopardy when two unencrypted laptops were stolen from California-based AHMC hospitals. Private patient information, including patient names, Social Security numbers and diagnostic and procedure codes, was compromised in the theft, affecting six major health institutions overall. Living Social – Encrypted password theft New York Times – Chinese hackers were able to access any computer on the Time’s network for 4 months

Hacker Motivations Motivations for network attacks: Money – Selling financial, personal or corporate information Fame – Kevin Mitnick Ideology – Edward Snowden, Anonymous Money – selling credit cards on the black market [dollar signs and something representing personal info] Fame – Kevin Mitnick [Hollywood star and news headline] Ideology – Edward Snowden, Anonymous aka Hacktivism [Anonymous mask] Mitnick served five years in prison—four and a half years pre-trial and eight months in solitary confinement—because, according to Mitnick, law enforcement officials convinced a judge that he had the ability to "start a nuclear war by whistling into a pay phone",[9] meaning that law enforcement told the judge that he could somehow dial into the NORAD modem via a payphone from prison and communicate with the modem by whistling to launch nuclear missiles.[10] He was released on January 21, 2000. During his supervised release, which ended on January 21, 2003, he was initially forbidden to use any communications technology other than a landline telephone.dward Snowden or WikiLeaks

Attack Vectors Social Engineering Fraudulent Website Phishing Malicious Code Insider Threat There are many ways to get into a computer network. Nothing is safe unless it is unplugged.

Reconnaissance Scanning Exploit Keeping Access Covering Tracks Anatomy of an Attack Reconnaissance Scanning Exploit Keeping Access Covering Tracks

How to protect yourself and others Be aware of attack vectors Phishing Social Engineering Email Attachment Malware Websites (just because you can get to a site at work doesn’t guarantee its safety) Secure your password Not guessable from your social media profile Employ a password manager Secure Personal Identifiable Information (PII) Keep data at rest encrypted Encrypt email messages or use AMRDEC SAFE: https://safe.amrdec.army.mil/safe/ Be aware that you are a target at home as well as at the office as a member working for the government. Through social media, it is very easy to identify who works where and what information they might be privy to. SAFE is designed to provide AMRDEC and its customers an alternative way to send files other than email. SAFE supports file sizes up to 2GB.

Resources http://www.staysafeonline.org/ http://www.getnetwise.org/ http://www.onguardonline.gov/ http://www.ikeepsafe.org/ For those of you with children, these sites give you great ideas of how to explain security and online safety to them, in addition to providing practical implementation advice.

Questions ?