THREATS TO YOUR DATA SECURITY What are we talking about today 1 WHAT ARE THE THREATS 2 WHERE DO THREATS COME FROM 3 4 WHAT CAN BE DONE WHO ARE THE TARGETS What are the threats Cybersecurity the Internet Malware and Internal Threats ID: 582489
Download Presentation The PPT/PDF document "PROTECTING YOUR DATA" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
PROTECTING YOUR DATA
THREATS TO YOUR DATA SECURITYSlide2
What are we talking about today?
1
WHAT ARE THE THREATS?
2
WHERE DO THREATS COME FROM?
3
4
WHAT CAN BE DONE?
WHO ARE THE TARGETS?Slide3
What are the threats?
Cybersecurity, the Internet, Malware, and Internal ThreatsSlide4
Cybersecurity
P
rotecting
information systems from unauthorized or criminal accessSlide5
The Internet
2.5 Quintillion (18 zeros) bytes of data added daily
90% created in the last two years
The
early “Internet” - sharing and innovation over security and protectionThe
Creeper System – “I’m the creeper, catch me if you can!”
Systems connected to the network should be considered to be unsecured Slide6
What are the threats?
Malware
Social Engineering Hacks
Internal Attackers
Combinations of these
1
2
3
4Slide7
Malware
Computer programs targeted at disrupting service, gaining access, or destroying/stealing data.
Adware
Virus
Worm
Spyware / Trojan
RansomwareSlide8
Adware
Threat Level: Annoyance
Adware generally consists of pop-up ads that appear after installing a separate piece of software.Slide9
Virus
Threat Level: Annoyance to Serious Issue
Viruses affect the host system and spread to other users.Slide10
Worm
Threat Level:
Serious
Issue
The “ILOVEYOU” worm of 2000 cost an estimated 5.5 billion in damages. 10% of all Internet connected computers were infected.
Worms replicate themselves to other systems where they destroy information as they go.Slide11
Spyware / Trojan Horse
Threat Level:
Dangerous
Spyware is a malicious software that spies on you and tracks your internet activities. It helps the hacker to gather information about the victim’s system.Slide12
Ransomware
Threat Level:
Critical
Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.Slide13
Ransomware
How does it work?
Installation of the software
Phone home
Digital keys created
Encryption of data
ExtortionSlide14
Ransomware
The infamous
Cryptolocker
and
Locky
are examples of ransomware. Slide15
Malware
On average
25% of mail is for work purposes
14% is of critical importance
13% is personal non-work related48% is SPAM, junk, potentially malware, and/or a phishing attack
The shape of emailSlide16
Phishing
Phishing, Spear Phishing, and Whale Hunting
Phishing threats are email attacks that politely ask for private information while posing as a different sender.Slide17
IoT Botnet Attack
Rise of the machines
"We have a Botnet army ready to take down your site. You have 48 hours to pay us 1200$. Merry Xmas!”
Botnet armies are network connected devices that can be focused on taking down another network device somewhere else.Slide18
Security Hardware and Software
Backdoors
Commercially available hardware
Juniper firewalls
Chinese components with manufacturing “flaw”Slide19
The Internal T
hreat
Physical security is everything
User
education
Give access to only what is required to get the job doneSlide20
Where do threats come from?
Who creates them and why would they do such a thing?Slide21
Where do these threats come from?
Geographically: Russia, China, Iran, and North Korea
Virus – a program written to execute with malicious intent.
Written
by programmers:
As a challengeOut of dislike for Microsoft, Apple, or some other company
To serve (the hacker brand of) justice!Criminal gain / profitResearchSlide22
Who are the targets and why?
Who is vulnerable to security threats?Slide23
Who are the targets?
Groups of targets
include:
Hospitals
Businesses with a strong Internet presence Large retailers (Home Depot, Target, TJX, Office Max, etc.)
Federal Agencies Small Businesses
Everyone has data that is valuable to the hackers in one way or another.
As security measures for larger companies improve and become more complex,
small businesses
and home users are being targeted more and more.Slide24
What can be done?
How can I protect my data from threats?Slide25
What can be done?
Layered security
Comprehensive, Encompassing solution
Cloud
based email scanning
Firewall
Security Logging / event management
Web filteringAntivirus
Backup, backup, and more backup
Educate your usersSlide26
QuestionsSlide27
Thank You
NetCenergy