/
PROTECTING YOUR DATA PROTECTING YOUR DATA

PROTECTING YOUR DATA - PowerPoint Presentation

phoebe-click
phoebe-click . @phoebe-click
Follow
394 views
Uploaded On 2017-08-27

PROTECTING YOUR DATA - PPT Presentation

THREATS TO YOUR DATA SECURITY What are we talking about today 1 WHAT ARE THE THREATS 2 WHERE DO THREATS COME FROM 3 4 WHAT CAN BE DONE WHO ARE THE TARGETS What are the threats Cybersecurity the Internet Malware and Internal Threats ID: 582489

security threats data internet threats security internet data ransomware malware threat phishing level information access system targets connected network

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "PROTECTING YOUR DATA" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

PROTECTING YOUR DATA

THREATS TO YOUR DATA SECURITYSlide2

What are we talking about today?

1

WHAT ARE THE THREATS?

2

WHERE DO THREATS COME FROM?

3

4

WHAT CAN BE DONE?

WHO ARE THE TARGETS?Slide3

What are the threats?

Cybersecurity, the Internet, Malware, and Internal ThreatsSlide4

Cybersecurity

P

rotecting

information systems from unauthorized or criminal accessSlide5

The Internet

2.5 Quintillion (18 zeros) bytes of data added daily

90% created in the last two years

The

early “Internet” - sharing and innovation over security and protectionThe

Creeper System – “I’m the creeper, catch me if you can!”

Systems connected to the network should be considered to be unsecured Slide6

What are the threats?

Malware

Social Engineering Hacks

Internal Attackers

Combinations of these

1

2

3

4Slide7

Malware

Computer programs targeted at disrupting service, gaining access, or destroying/stealing data.

Adware

Virus

Worm

Spyware / Trojan

RansomwareSlide8

Adware

Threat Level: Annoyance

Adware generally consists of pop-up ads that appear after installing a separate piece of software.Slide9

Virus

Threat Level: Annoyance to Serious Issue

Viruses affect the host system and spread to other users.Slide10

Worm

Threat Level:

Serious

Issue

The “ILOVEYOU” worm of 2000 cost an estimated 5.5 billion in damages. 10% of all Internet connected computers were infected.

Worms replicate themselves to other systems where they destroy information as they go.Slide11

Spyware / Trojan Horse

Threat Level:

Dangerous

Spyware is a malicious software that spies on you and tracks your internet activities. It helps the hacker to gather information about the victim’s system.Slide12

Ransomware

Threat Level:

Critical

Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.Slide13

Ransomware

How does it work?

Installation of the software

Phone home

Digital keys created

Encryption of data

ExtortionSlide14

Ransomware

The infamous

Cryptolocker

and

Locky

are examples of ransomware. Slide15

Malware

On average

25% of mail is for work purposes

14% is of critical importance

13% is personal non-work related48% is SPAM, junk, potentially malware, and/or a phishing attack

The shape of emailSlide16

Phishing

Phishing, Spear Phishing, and Whale Hunting

Phishing threats are email attacks that politely ask for private information while posing as a different sender.Slide17

IoT Botnet Attack

Rise of the machines

"We have a Botnet army ready to take down your site. You have 48 hours to pay us 1200$. Merry Xmas!”

Botnet armies are network connected devices that can be focused on taking down another network device somewhere else.Slide18

Security Hardware and Software

Backdoors

Commercially available hardware

Juniper firewalls

Chinese components with manufacturing “flaw”Slide19

The Internal T

hreat

Physical security is everything

User

education

Give access to only what is required to get the job doneSlide20

Where do threats come from?

Who creates them and why would they do such a thing?Slide21

Where do these threats come from?

Geographically: Russia, China, Iran, and North Korea

Virus – a program written to execute with malicious intent.

Written

by programmers:

As a challengeOut of dislike for Microsoft, Apple, or some other company

To serve (the hacker brand of) justice!Criminal gain / profitResearchSlide22

Who are the targets and why?

Who is vulnerable to security threats?Slide23

Who are the targets?

Groups of targets

include:

Hospitals

Businesses with a strong Internet presence Large retailers (Home Depot, Target, TJX, Office Max, etc.)

Federal Agencies Small Businesses

Everyone has data that is valuable to the hackers in one way or another.

As security measures for larger companies improve and become more complex,

small businesses

and home users are being targeted more and more.Slide24

What can be done?

How can I protect my data from threats?Slide25

What can be done?

Layered security

Comprehensive, Encompassing solution

Cloud

based email scanning

Firewall

Security Logging / event management

Web filteringAntivirus

Backup, backup, and more backup

Educate your usersSlide26

QuestionsSlide27

Thank You

NetCenergy