What is the Cybersecurity plan for tomorrow?

Samvel Gevorgyan
Samvel GevorgyanCEO at CYBER GATES
CYBERSECURITY
challenges
Copyright 2016 © CYBER GATES
Samvel Gevorgyan
CEO, CYBER GATES
MSc Cyber Security
Cybersecurity components
CIA model
 Confidentiality: Keep secret from those not authorized,
 Integrity: Prevent unauthorized tampering,
 Availability: Ensure authorized parties can access the
data.
 Identification: Who I claim to be (e.g. username,
digital cert),
 Authentication: How I prove it (password, signature),
 Authorization: What is that person allowed to do e.g.
role-based security.
WWW.CYBERGATES.ORG
IAA model
Cybersecurity elements
Resources
 People
 Process
 Technology
 Policies and procedures
 Roles and responsibilities
 Risk management
WWW.CYBERGATES.ORG
Governance
Cybersecurity statistics
statistics around the Worldwide
Data breaches, by the dollar
 $21,155: The average cost of a data breach, per day
 $7.7 million: The average annualized cost to detect, respond to, and mitigate
a breach globally.
Malware and attack trends, by percentage
 66%: The proportion of a survey of professionals who identified phishing and
social engineering as top threats
 20%: The scope of confirmed data breaches involving social engineering at one
large telecom company.
Cybersecurity spend: Follow the money
 $75.4 billion: The estimated worldwide spending on cybersecurity in 2015
 $19 billion: The proposed federal cybersecurity budget for 2016.
WWW.CYBERGATES.ORG
Source: https://techbeacon.com/resources/cybersecurity-2016-trend-report-ubm-ponemon-study
Web security attack statistics
Over 4K hacked websites since 2011.
Top attacks
 Jan 2011 (379)
 Jul 2012 (364)
 Feb 2013 (275)
 Feb 2014 (359)
 Apr 2015 (129)
 Dec 2016 (188)
Attacks around the Worldwide
 Over 1 Billion active websites (NetCraft reports)
 Over 1 Million hacked websites / year (Zone-H reports)
WWW.CYBERGATES.ORG
Attacks in Armenia
Target websites of mass attacks
Top 5 categories
 Websites that use same CMS (WordPress,
Joomla, etc.)
 Websites built by the same developer(s)
 Websites that use same technology,
library or certain component
 Websites hosted by the same Hosting
Provider
 Websites of agencies/companies working in
the same industry
WWW.CYBERGATES.ORG
Target websites of targeted attacks
Top 5 categories
 Online banks and financial institutions
 Cloud services (dropbox, Gmail, iCloud,
etc.)
 Government agencies, hospitals
 Hosting and Internet Service Providers
(ISP)
 Small outdated websites that are easy to
hack
WWW.CYBERGATES.ORG
Cybersecurity threads
Common threads
 Information Leakages
 SQL Injection
 Password bruteforce
attacks
 Phishing
 Social Engineering
 SPAM
 Malicious softwares
 Blacklists
 Botnets
 DoS/DDoS attacks
 Ransomware
WWW.CYBERGATES.ORG
Information Leakages
 The revelation of the 1 billion accounts
hack could have implications for the $4.8
billion sale of Yahoo to Verizon, which
has yet to close
 Around 167 million LinkedIn accounts are
now for sale
 Armenian telecom (vivacell, armentel,
orange) databases are free to download
 Armenian online banking system codes has
been stolen by an employee
WWW.CYBERGATES.ORG
SQL Injection
 Smart homes can open the doors to
unauthorized people
 98% of Stolen Medical Records due to
Hacking
 Hackers use SQL
Injection attacks
against banks
WWW.CYBERGATES.ORG
Image source: http://www.asianmirror.lk/news/item/16544-commercial-bank-of-ceylon-hacked
Password bruteforce attacks
 Hackers target websites or IoT devices
with weak or default passwords
 Authentication systems with no limits for
login attempts
WWW.CYBERGATES.ORG
Social Engineering & Phishing
Phishing is a Social Engineering technique to steal
confidential information about the victim such as user login
credentials, credit card information, etc. through the use of
fake login page.
Why social engineering?
- Hacking a human is
much easier than hacking
a business
- Attackers prey on your
human weakness
WWW.CYBERGATES.ORG
SPAM
WWW.CYBERGATES.ORG
 Corporate emails used in forums and
social networks
 Corporate emails found in leaked sources
 Email addresses found using dictionary
based bruteforce attacks
Malicious software
WWW.CYBERGATES.ORG
 Cloacking: malicious code in a webpage
displays porn for certain IP addresses
 Malicious code redirects to a malicious
website asking to update your system or
displays an advertisement
 Malicious software steals credentials
 Malicious software spreads within your
corporate network
Blacklists
WWW.CYBERGATES.ORG
 Realtime Blackhole Lists (RBL's)
-Centralized databases to prevent SPAM
 Google backlist
-Site loses nearly 95% of its organic
traffic
-Modern web browsers display warning
message when someone open your website
Botnets
WWW.CYBERGATES.ORG
 Your infected machine becomes a proxy
server, spreads adwares or used for
DoS/DDoS attacks
 Make sure your device firmware does not
have an in-build backdoor
 Make sure you have already changed your
device default password
Denial-of-service attack
WWW.CYBERGATES.ORG
 CloudFlare protects you from web-based
denial-of-service attacks
 BBC became the target of 602 Gbps DDoS
attack
 DDoS attack that disrupted internet was
largest of its kind in history: Dyn
published on Wednesday, Mirai was the
“primary source of malicious attack
traffic”
Ransomware
WWW.CYBERGATES.ORG
 A malicious software encrypts your files.
You must pay to recover them.
 Tens of thousands of variants of over 40
ransomware families including Locky,
CryptoWall, TeslaCrypt, and Cerber.
Plan A: fixing the problem
Reactive approaches
 Computer Emergency Response Team (CERT)
E-mail notifications about an incident
Online support (SIP calls)
 Support
 Investigation (Digital Forensics)
 Consultancy
WWW.CYBERGATES.ORG
Plan B: avoiding the problem
Proactive approaches
 Testing
Network/Host Vulnerability Assessment
Penetration Testing
Source Code Auditing
 Protecting (WebShark, PinCat)
 Training
Corporate trainings
University programs
WWW.CYBERGATES.ORG
Swiss Army Knife to help you
defend against hackers
WWW.CYBERGATES.ORG
CYBER GATES
 Corporate website
www.cybergates.org
 Company profile on Twitter
www.twitter.com/CyberGatesLLC
 Company fan page on Facebook
www.facebook.com/Cyber.Gates.page
 Company profile on LinkedIn
www.linkedin.com/company/CyberGates-LLC
 Company channel on Vimeo
www.vimeo.com/CyberGates
 Company channel on YouTube
www.youtube.com/TheCyberGates
Contacts
1 of 22

Recommended

Can you predict who will win the US election? by
Can you predict who will win the US election?Can you predict who will win the US election?
Can you predict who will win the US election?Samvel Gevorgyan
9.1K views14 slides
Websecurity fundamentals for beginners by
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
380 views18 slides
Information Security Management System in the Banking Sector by
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
2.3K views22 slides
Content Management System Security by
Content Management System SecurityContent Management System Security
Content Management System SecuritySamvel Gevorgyan
1.1K views16 slides
Protecting Against Web Threats by
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
244 views18 slides
Security Awareness Training from KnowBe4 by
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
1.8K views11 slides

More Related Content

What's hot

Practical risk management for the multi cloud by
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
64 views61 slides
Topsec email security 2016 by
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
2.2K views42 slides
Cyber attacks in 2021 by
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021redteamacademypromo
98 views10 slides
Automated Ransomware Response.pdf by
Automated Ransomware Response.pdfAutomated Ransomware Response.pdf
Automated Ransomware Response.pdfSecuraa
15 views2 slides
Digital Threat Landscape by
Digital Threat LandscapeDigital Threat Landscape
Digital Threat LandscapeQuick Heal Technologies Ltd.
1K views9 slides
Email Security Threats: IT Manager's Eyes Only by
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
9.2K views42 slides

What's hot(20)

Practical risk management for the multi cloud by Ulf Mattsson
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson64 views
Topsec email security 2016 by Nathan CAVRIL
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL2.2K views
Automated Ransomware Response.pdf by Securaa
Automated Ransomware Response.pdfAutomated Ransomware Response.pdf
Automated Ransomware Response.pdf
Securaa 15 views
Email Security Threats: IT Manager's Eyes Only by Topsec Technology
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
Topsec Technology 9.2K views
Current Emerging Threats by dnomura
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
dnomura383 views
Proofpoint Q3 - 2017 Email Fraud Threat Report by Proofpoint
Proofpoint Q3 - 2017 Email Fraud Threat ReportProofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint Q3 - 2017 Email Fraud Threat Report
Proofpoint2K views
The Top Three 2021 Cyber Threats by Sai Huda
The Top Three 2021 Cyber ThreatsThe Top Three 2021 Cyber Threats
The Top Three 2021 Cyber Threats
Sai Huda84 views
Proofpoint Understanding Email Fraud in 2018 by Proofpoint
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
Proofpoint10.5K views
Strategies to Combat New, Innovative Cyber Threats - 2017 by PaladionNetworks01
Strategies to Combat New, Innovative Cyber Threats - 2017Strategies to Combat New, Innovative Cyber Threats - 2017
Strategies to Combat New, Innovative Cyber Threats - 2017
PaladionNetworks01920 views
Centrify rethink security brochure by Mark Gibson
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
Mark Gibson121 views
Patches Arrren't Just for Pirates by webnowires
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
webnowires42 views
Cyber Security Threats in the Financial Sector by Farook Al-Jibouri
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
Farook Al-Jibouri1.1K views
Cloud computing's notorious nine- by Nikki Alexander
Cloud computing's  notorious nine-Cloud computing's  notorious nine-
Cloud computing's notorious nine-
Nikki Alexander476 views
Enabling a Zero Trust strategy for SMS by Paul Walsh
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
Paul Walsh245 views
What's Hot In IT - Cybersecurity by Row Murray
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
Row Murray562 views
Stop Hackers with Integrated CASB & IDaaS Security by CloudLock
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
CloudLock433 views

Viewers also liked

BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN by
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
24.2K views88 slides
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011 by
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
3K views6 slides
Nagorno-karabakh clashes - four-day war in cyberspace by
Nagorno-karabakh clashes - four-day war in cyberspaceNagorno-karabakh clashes - four-day war in cyberspace
Nagorno-karabakh clashes - four-day war in cyberspaceSamvel Gevorgyan
9.7K views5 slides
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում by
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքումԲախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքումSamvel Gevorgyan
407 views9 slides
MAPY by
MAPYMAPY
MAPYSamvel Gevorgyan
1.2K views14 slides
Five Ways to Improve Yandex.Taxi Service by
Five Ways to Improve Yandex.Taxi ServiceFive Ways to Improve Yandex.Taxi Service
Five Ways to Improve Yandex.Taxi ServiceSamvel Gevorgyan
551 views6 slides

Viewers also liked(6)

BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN by Samvel Gevorgyan
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
Samvel Gevorgyan24.2K views
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011 by Samvel Gevorgyan
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
Samvel Gevorgyan3K views
Nagorno-karabakh clashes - four-day war in cyberspace by Samvel Gevorgyan
Nagorno-karabakh clashes - four-day war in cyberspaceNagorno-karabakh clashes - four-day war in cyberspace
Nagorno-karabakh clashes - four-day war in cyberspace
Samvel Gevorgyan9.7K views
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում by Samvel Gevorgyan
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքումԲախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
Բախումներ Լեռնային Ղարաբաղում. Քառօրյա պատերազմը կիբեռ տարածքում
Samvel Gevorgyan407 views
Five Ways to Improve Yandex.Taxi Service by Samvel Gevorgyan
Five Ways to Improve Yandex.Taxi ServiceFive Ways to Improve Yandex.Taxi Service
Five Ways to Improve Yandex.Taxi Service
Samvel Gevorgyan551 views

Similar to What is the Cybersecurity plan for tomorrow?

Today's malware aint what you think by
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you thinkNathan Winters
2.1K views87 slides
Cyber Security by
Cyber SecurityCyber Security
Cyber SecurityJamshidRaqi
211 views45 slides
What Makes Web Applications Desirable For Hackers by
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersJaime Manteiga
56 views19 slides
Five Network Security Threats And How To Protect Your Business Wp101112 by
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
345 views4 slides
5 network-security-threats by
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
1.2K views4 slides
E security and payment 2013-1 by
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
692 views153 slides

Similar to What is the Cybersecurity plan for tomorrow?(20)

Today's malware aint what you think by Nathan Winters
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
Nathan Winters2.1K views
What Makes Web Applications Desirable For Hackers by Jaime Manteiga
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
Jaime Manteiga56 views
Five Network Security Threats And How To Protect Your Business Wp101112 by Erik Ginalick
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick345 views
5 network-security-threats by ReadWrite
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite1.2K views
A Guide to Internet Security For Businesses- Business.com by Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com483 views
Top 5 Cybersecurity Threats in Retail Industry by Seqrite
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite795 views
Malware Problem Analysis Paper.pdfMalware Problem Analysis Paper by Sarah Jimenez
Malware Problem Analysis Paper.pdfMalware Problem Analysis PaperMalware Problem Analysis Paper.pdfMalware Problem Analysis Paper
Malware Problem Analysis Paper.pdfMalware Problem Analysis Paper
Sarah Jimenez2 views
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx by arnoldmeredith47041
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
Countering Cyber Threats By Monitoring “Normal” Website Behavior by EMC
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
EMC1.9K views
8 Types of Cyber Attacks That Can Bother CISOs in 2020 by SecPod Technologies
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Security in e-commerce by SensePost
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost1.5K views
Cyber Crime and Security by Md Nishad
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad8.7K views

Recently uploaded

Chapter 3b- Process Communication (1) (1)(1) (1).pptx by
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptxayeshabaig2004
5 views30 slides
Organic Shopping in Google Analytics 4.pdf by
Organic Shopping in Google Analytics 4.pdfOrganic Shopping in Google Analytics 4.pdf
Organic Shopping in Google Analytics 4.pdfGA4 Tutorials
11 views13 slides
Short Story Assignment by Kelly Nguyen by
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyenkellynguyen01
19 views17 slides
MOSORE_BRESCIA by
MOSORE_BRESCIAMOSORE_BRESCIA
MOSORE_BRESCIAFederico Karagulian
5 views8 slides
TGP 2.docx by
TGP 2.docxTGP 2.docx
TGP 2.docxsandi636490
10 views8 slides
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M... by
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...DataScienceConferenc1
5 views11 slides

Recently uploaded(20)

Chapter 3b- Process Communication (1) (1)(1) (1).pptx by ayeshabaig2004
Chapter 3b- Process Communication (1) (1)(1) (1).pptxChapter 3b- Process Communication (1) (1)(1) (1).pptx
Chapter 3b- Process Communication (1) (1)(1) (1).pptx
ayeshabaig20045 views
Organic Shopping in Google Analytics 4.pdf by GA4 Tutorials
Organic Shopping in Google Analytics 4.pdfOrganic Shopping in Google Analytics 4.pdf
Organic Shopping in Google Analytics 4.pdf
GA4 Tutorials11 views
Short Story Assignment by Kelly Nguyen by kellynguyen01
Short Story Assignment by Kelly NguyenShort Story Assignment by Kelly Nguyen
Short Story Assignment by Kelly Nguyen
kellynguyen0119 views
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M... by DataScienceConferenc1
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
[DSC Europe 23] Milos Grubjesic Empowering Business with Pepsico s Advanced M...
Survey on Factuality in LLM's.pptx by NeethaSherra1
Survey on Factuality in LLM's.pptxSurvey on Factuality in LLM's.pptx
Survey on Factuality in LLM's.pptx
NeethaSherra15 views
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation by DataScienceConferenc1
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
[DSC Europe 23] Spela Poklukar & Tea Brasanac - Retrieval Augmented Generation
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdf by vikas12611618
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdfVikas 500 BIG DATA TECHNOLOGIES LAB.pdf
Vikas 500 BIG DATA TECHNOLOGIES LAB.pdf
vikas126116188 views
Cross-network in Google Analytics 4.pdf by GA4 Tutorials
Cross-network in Google Analytics 4.pdfCross-network in Google Analytics 4.pdf
Cross-network in Google Analytics 4.pdf
GA4 Tutorials6 views
Ukraine Infographic_22NOV2023_v2.pdf by AnastosiyaGurin
Ukraine Infographic_22NOV2023_v2.pdfUkraine Infographic_22NOV2023_v2.pdf
Ukraine Infographic_22NOV2023_v2.pdf
AnastosiyaGurin1.3K views
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx by DataScienceConferenc1
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx
[DSC Europe 23] Zsolt Feleki - Machine Translation should we trust it.pptx
SUPER STORE SQL PROJECT.pptx by khan888620
SUPER STORE SQL PROJECT.pptxSUPER STORE SQL PROJECT.pptx
SUPER STORE SQL PROJECT.pptx
khan88862012 views
3196 The Case of The East River by ErickANDRADE90
3196 The Case of The East River3196 The Case of The East River
3196 The Case of The East River
ErickANDRADE9011 views
Advanced_Recommendation_Systems_Presentation.pptx by neeharikasingh29
Advanced_Recommendation_Systems_Presentation.pptxAdvanced_Recommendation_Systems_Presentation.pptx
Advanced_Recommendation_Systems_Presentation.pptx
CRIJ4385_Death Penalty_F23.pptx by yvettemm100
CRIJ4385_Death Penalty_F23.pptxCRIJ4385_Death Penalty_F23.pptx
CRIJ4385_Death Penalty_F23.pptx
yvettemm1006 views

What is the Cybersecurity plan for tomorrow?

  • 1. CYBERSECURITY challenges Copyright 2016 © CYBER GATES Samvel Gevorgyan CEO, CYBER GATES MSc Cyber Security
  • 2. Cybersecurity components CIA model  Confidentiality: Keep secret from those not authorized,  Integrity: Prevent unauthorized tampering,  Availability: Ensure authorized parties can access the data.  Identification: Who I claim to be (e.g. username, digital cert),  Authentication: How I prove it (password, signature),  Authorization: What is that person allowed to do e.g. role-based security. WWW.CYBERGATES.ORG IAA model
  • 3. Cybersecurity elements Resources  People  Process  Technology  Policies and procedures  Roles and responsibilities  Risk management WWW.CYBERGATES.ORG Governance
  • 4. Cybersecurity statistics statistics around the Worldwide Data breaches, by the dollar  $21,155: The average cost of a data breach, per day  $7.7 million: The average annualized cost to detect, respond to, and mitigate a breach globally. Malware and attack trends, by percentage  66%: The proportion of a survey of professionals who identified phishing and social engineering as top threats  20%: The scope of confirmed data breaches involving social engineering at one large telecom company. Cybersecurity spend: Follow the money  $75.4 billion: The estimated worldwide spending on cybersecurity in 2015  $19 billion: The proposed federal cybersecurity budget for 2016. WWW.CYBERGATES.ORG Source: https://techbeacon.com/resources/cybersecurity-2016-trend-report-ubm-ponemon-study
  • 5. Web security attack statistics Over 4K hacked websites since 2011. Top attacks  Jan 2011 (379)  Jul 2012 (364)  Feb 2013 (275)  Feb 2014 (359)  Apr 2015 (129)  Dec 2016 (188) Attacks around the Worldwide  Over 1 Billion active websites (NetCraft reports)  Over 1 Million hacked websites / year (Zone-H reports) WWW.CYBERGATES.ORG Attacks in Armenia
  • 6. Target websites of mass attacks Top 5 categories  Websites that use same CMS (WordPress, Joomla, etc.)  Websites built by the same developer(s)  Websites that use same technology, library or certain component  Websites hosted by the same Hosting Provider  Websites of agencies/companies working in the same industry WWW.CYBERGATES.ORG
  • 7. Target websites of targeted attacks Top 5 categories  Online banks and financial institutions  Cloud services (dropbox, Gmail, iCloud, etc.)  Government agencies, hospitals  Hosting and Internet Service Providers (ISP)  Small outdated websites that are easy to hack WWW.CYBERGATES.ORG
  • 8. Cybersecurity threads Common threads  Information Leakages  SQL Injection  Password bruteforce attacks  Phishing  Social Engineering  SPAM  Malicious softwares  Blacklists  Botnets  DoS/DDoS attacks  Ransomware WWW.CYBERGATES.ORG
  • 9. Information Leakages  The revelation of the 1 billion accounts hack could have implications for the $4.8 billion sale of Yahoo to Verizon, which has yet to close  Around 167 million LinkedIn accounts are now for sale  Armenian telecom (vivacell, armentel, orange) databases are free to download  Armenian online banking system codes has been stolen by an employee WWW.CYBERGATES.ORG
  • 10. SQL Injection  Smart homes can open the doors to unauthorized people  98% of Stolen Medical Records due to Hacking  Hackers use SQL Injection attacks against banks WWW.CYBERGATES.ORG Image source: http://www.asianmirror.lk/news/item/16544-commercial-bank-of-ceylon-hacked
  • 11. Password bruteforce attacks  Hackers target websites or IoT devices with weak or default passwords  Authentication systems with no limits for login attempts WWW.CYBERGATES.ORG
  • 12. Social Engineering & Phishing Phishing is a Social Engineering technique to steal confidential information about the victim such as user login credentials, credit card information, etc. through the use of fake login page. Why social engineering? - Hacking a human is much easier than hacking a business - Attackers prey on your human weakness WWW.CYBERGATES.ORG
  • 13. SPAM WWW.CYBERGATES.ORG  Corporate emails used in forums and social networks  Corporate emails found in leaked sources  Email addresses found using dictionary based bruteforce attacks
  • 14. Malicious software WWW.CYBERGATES.ORG  Cloacking: malicious code in a webpage displays porn for certain IP addresses  Malicious code redirects to a malicious website asking to update your system or displays an advertisement  Malicious software steals credentials  Malicious software spreads within your corporate network
  • 15. Blacklists WWW.CYBERGATES.ORG  Realtime Blackhole Lists (RBL's) -Centralized databases to prevent SPAM  Google backlist -Site loses nearly 95% of its organic traffic -Modern web browsers display warning message when someone open your website
  • 16. Botnets WWW.CYBERGATES.ORG  Your infected machine becomes a proxy server, spreads adwares or used for DoS/DDoS attacks  Make sure your device firmware does not have an in-build backdoor  Make sure you have already changed your device default password
  • 17. Denial-of-service attack WWW.CYBERGATES.ORG  CloudFlare protects you from web-based denial-of-service attacks  BBC became the target of 602 Gbps DDoS attack  DDoS attack that disrupted internet was largest of its kind in history: Dyn published on Wednesday, Mirai was the “primary source of malicious attack traffic”
  • 18. Ransomware WWW.CYBERGATES.ORG  A malicious software encrypts your files. You must pay to recover them.  Tens of thousands of variants of over 40 ransomware families including Locky, CryptoWall, TeslaCrypt, and Cerber.
  • 19. Plan A: fixing the problem Reactive approaches  Computer Emergency Response Team (CERT) E-mail notifications about an incident Online support (SIP calls)  Support  Investigation (Digital Forensics)  Consultancy WWW.CYBERGATES.ORG
  • 20. Plan B: avoiding the problem Proactive approaches  Testing Network/Host Vulnerability Assessment Penetration Testing Source Code Auditing  Protecting (WebShark, PinCat)  Training Corporate trainings University programs WWW.CYBERGATES.ORG
  • 21. Swiss Army Knife to help you defend against hackers WWW.CYBERGATES.ORG
  • 22. CYBER GATES  Corporate website www.cybergates.org  Company profile on Twitter www.twitter.com/CyberGatesLLC  Company fan page on Facebook www.facebook.com/Cyber.Gates.page  Company profile on LinkedIn www.linkedin.com/company/CyberGates-LLC  Company channel on Vimeo www.vimeo.com/CyberGates  Company channel on YouTube www.youtube.com/TheCyberGates Contacts