Presentation is loading. Please wait.

Presentation is loading. Please wait.

How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.

Similar presentations


Presentation on theme: "How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell."— Presentation transcript:

1 How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell FM&T

2 May 2008BEF How many of you? –Have a Computer at Home –Travel with a Laptop –High Speed Internet at Home –Have wireless networks at Home –Connect to wireless networks on Travel –Connect to the Internet in Hotels –Children with game consoles connected to the Internet or use any of the above How Secure are YOU?

3 May 2008BEF New Headlines –TJX losing 2.4 million records –Two charged for allegedly stealing trade secrets –Pfizer investigates data lost –Stolen Johns Hopkins Hospital computer holds patient data –Gap stolen laptop loses information on 800,000 present and past employees –Monster.com users target of phishing and ransom schemes –3com agrees to a buy-in by Huawei worth 2.2 billion –Mass web attacks confounds Law Enforcement and Researchers Then you may not be as secure as you think!

4 May 2008BEF WHO/WHERE is the Threat Information obtained from www.sans.org

5 May 2008BEF Request for Information –Unsolicited inquiries – Direct or Indirect Acquisition of Technology –Attempts to gain access to sensitive technologies Solicitation of Marketing Services –Foreign individuals with technical backgrounds offering services Targeting of US personal abroad –Requesting access sensitive facilities or personal information Targeting at Conventions –Provides access to all of the above What is the Threat.

6 May 2008BEF Exploitation of Relationships –Partnership through joint ventures and research Suspicious Internet Activity –Exploitation of computing resources Other –Luggage searches –Unauthorized access to portable computing devices –Extensive questioning What is the Threat.

7 May 2008BEF Let’s see what could potential happen to anyone of us. Killing_with_Keyboards KCP.pps How Secure Are You?

8 May 2008BEF How will it happen. Data complied from Anti-Phishing (www.antiphishing.org)

9 May 2008BEF How will it happen.

10 May 2008BEF How will it happen.

11 May 2008BEF Any Username or Password is accepted here. How will it happen.

12 May 2008BEF How will it happen.

13 May 2008BEF How will it happen.

14 May 2008BEF Let’s see what could potentially happen to anyone of us. Without a trace.doc TTN_October_'06 10-17-06.doc How Secure Are YOU?

15 May 2008BEF When will it happen You tell me. Here are my thoughts: –Globalization of business –Use of front companies –Enhancing the efficiency of command, control, communication, and intelligence will be a priority –The shift to government sponsorship –Increase in the number of incidents –Increase in suspicious internet activity – just one Your guess is as good as mine, however, I will say sooner that later.

16 May 2008BEF


Download ppt "How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell."

Similar presentations


Ads by Google