3. Threats using social engineering
EMAIL IS THE No 1 THREAT VECTOR
225B e mails per day
90% THREATS START BY E MAIL
99% OF HACKERS RELY ON USERS TO RUN
MALICIOUS CODE
IMPACTS:
MALWARE INFECTION / COMPROMISED ACCOUNTS / LOSS OF DATA
Source: Proofpoint
UNCLASSIFIED
7. Spoofing E mail addresses
The tools necessary to spoof email addresses are surprisingly easy to get. All you need is a
working SMTP server (aka, a server that can send email), and the right mailing software.
UNCLASSIFIED
9. People are targets
must let them know they are targets
must let them know criminal TTP’s
people make defence work
UNCLASSIFIED
10. Brunel University London
Video of the threat……..
Tactics, Techniques, and Procedures…..(TTP’s)
Youtube Video: An Anatomy of an Attack
WE ARE A TARGET
UNCLASSIFIED
20. Cyber Attacks – The Adversary
Not Just Security – It’s Defence
UNCLASSIFIED
Editor's Notes
The video you are about to see is footage of a computer being infected with ransomware followed by extortion based on the publication of compromised confidential company information.