Threat and Mitigation
Upcoming SlideShare
Loading in...5
×
 

Threat and Mitigation

on

  • 448 views

The cyber threat to our Army and Nation is pervasive and most often target, human behavior through social engineering. The best mitigation measure for this risk is to increase cyber awareness by ...

The cyber threat to our Army and Nation is pervasive and most often target, human behavior through social engineering. The best mitigation measure for this risk is to increase cyber awareness by educating our Soldiers, Family Members, Government Civilians, and Contractors. HQDA has directed Army Antiterrorism Quarterly Theme Cyber Threat Awareness (2Q/FY13). For more information on Cyber Security, visit http://www.staysafeonline.org/stay-safe-online/

Statistics

Views

Total Views
448
Views on SlideShare
448
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Threat and Mitigation Threat and Mitigation Presentation Transcript

  • What is the Threat? Cyber Warriors Needed♦ From Hactivists to Nation-States, these threats continue to attempt to penetrate Army Cyber Command will recruit, develop and retain qualified personnel Threat AND our networks everyday. to grow Cyber Professionals as the♦ Cyberspace threats are growing, evolving, cornerstone of the Army Cyber Force. Mitigation and sophisticated.♦ Cyberspace crime is the largest threat to individuals.♦ Loss of intellectual property is a significant National security risk to our information and technological advantage. U.S. Army Cyber Command♦ Loss of operational security information Second Army puts units, soldiers, and families at risk. How Can Leaders Help?∗ Cyberspace threats and mitigation of those threats is commander’s business. Know and mitigate the risks.∗ Recognize Cyberspace as a contested Operational Domain. “While some people may think cyber is all about technology, people are the center of∗ Ensure strong 2/3/6 integration in your all we do.” unit formations. Lt. Gen. Rhett Hernandez Commanding General, Army Cyber Command∗ Respect the Threat...It’s Not Random.∗ Enforce compliance with basic standards For More Information and discipline. Information Assurance is www.arcyber.army.mil Second to None! not a given & remediation is expensive.
  • U.S. Army Cyber Command What Should I Know? What Should I Protect? What Should I Do at Home?What is Malware? Do not Store Passwords on your Computer Update Your Computer Software♦ Malicious software delivered through email ♦ Easy access to usernames and can result in ♦ Newer software has security enhancements. and the internet. identity theft, loss of money and revealing ♦ Harder for hackers to gain unauthorized♦ Performs unauthorized actions on the personal information about friends and family. access. computer. ♦ Look for software that:♦ Examples of malware are: Protect Physical Access to Devices ∗ Viruses ∗ Spyware ∗ Checks automatically for software ♦ The data on the computer is just as valuable as the hardware. updates. ∗ Worms ∗ Scareware ∗ Includes anti-virus, anti-spyware, anti- ∗ Trojan horses ∗ Crimeware ♦ Physical access makes it easy to circumvent security measures. phishing, safe browsing and firewall ∗ Dishonest Adware ∗ Most Rootkits capabilities.What is Phishing? Protect your Personally Identifiable Information (PII). Choose Privacy Settings on Social♦ Email messages from apparent legitimate Networking Sites that Provide the Greatest people or institutions targeting users. ♦ Limit PII on the Internet and social Security. networking sites.♦ Email messages may contain malicious ♦ Limit information shared with the social attachments (.pdf, .doc, .xls, .jpg). ♦ PII can be used for social engineering networking community.♦ Phishing is used to trick users into divulging attacks and identity theft. ♦ Limit who can view your profile. Personally Identifiable Information (PII) such ♦ Military members as well as families and as: ♦ Limit who can add you to their network. friends should not discuss or post any ∗ Passwords, SSNs, DoB information related to unit locations, assigned duties, work schedules, or ∗ Credit Card numbers deployment information. ∗ PINs, Addresses Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a part to play in ensuring Army networks stay secure and our national assets are protected.