Download presentation
Presentation is loading. Please wait.
Published byTabitha Baker Modified over 6 years ago
3
Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
5
Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
6
Website hacked by Anonymous
Puckett & Faraj Rep. Marine accused of 24 civilian deaths in Haditha, Iraq 2005 Website hacked by Anonymous Feb 2012 Hacked Gmail
7
Hacked Website
8
Default Accounts & Passwords
80% of data breaches involve stolen, weak, default or easily guessable passwords … and the list goes on …
9
Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
10
Dated Software & Patch Exploits
Number of CVEs exploited in 2015 by the CVE publication date Common Vulnerabilities and Exposures (CVEs) as named by Verizon 2016 Data Breach Investigations Report Includes dated software exploits, and patches
11
Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day
12
Adv. Persistent Threats & Zero-Day
Zero-Day Exploit Multiple attack vectors continuously over time Not just one attack one time Include several complex phases Any exploit plus continuous access Software vulnerability, unknown Exploited by hackers, before developers are aware Once known, “zero days” to patch, fix, and protect All exploits were once zero-day exploits May Zero-day attack against US Dept. of Labor website via Internet Explorer 8 vulnerability April 2014 Heartbleed, a zero-day vulnerability in the Transport Layer Security protocol, was published
13
Top Best Practices User training & awareness
Segregate data & privileges Password management Update patches and software Security hardware & software Removable media policy Data destruction policy Periodic pen testing Encrypt data Monitoring
14
Password Management Create strong passwords Change often
Min. 12 characters Phrase Change often Remove defaults Hardware & software Remove old employee accounts Don’t keep “password” files or folders Don’t share passwords Don’t reuse passwords
15
Encryption Whole disk Encryption BIOS password A phrase works well
Encrypt thumb drives Encrypt data in transit to cloud Encrypt Backups
16
What is the #1 source of data compromise ?
17
What is the #1 source?
18
Comments & Questions Steven Konecny | CFE, CIRA, CEH, CRISC
(916) (213) Let’s Take Flight
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.