2. INTRODUCTION
• Business alignment-Security should support the business and
not interfere with company objectives.
• Security awareness-The security of humans and the internal
marketing/PR of information security.
• Security spending is estimated to exceed $75 Billion dollars in
2016. There is a broad range of security products to choose
from.
(Sleiman, 2017)
3. CURRENT CHALLENGES
• Millions of Americans have been victimized with their privacy
violated and their identities stolen.
• Standard antivirus signature engines are losing their
effectiveness against the volumes of new threats.
• Cyber crime is a growing business and the cyber criminal can
even take over an entire country like they did in Estonia in
Spring of 2007.
• Any important information online like social security numbers,
credit cards, addresses, etc.., you will be attacked.
• (Pinedo, 2009).
4. COMMON AND CURRENT REAL WORLD
EXAMPLES OF SOCIAL ENGINEERING
• Phishing-is the most common type of attack. The characteristics is to
find personal information like names, addresses, and social security
numbers.
• Pretexting-is when attackers focus on creating a good pretext so they
can steal their victims personal information.
• Baiting-this is when the promise of an item or good that the hackers use
to lure their victims.
• Quid Pro Quo-this is when a promise is made to get a benefit in
exchange for information.
• Tailgating (Piggybacking)-This is a type of an attack that involves
someone who lacks the proper authentication following an employee
into a restricted area.
5. CURRENT SOLUTIONS
• Compliance is needed-Can store data properly to implement good
security practices on their own.
• Need to have the minimum cyber security standards to reduce the
cyber crimes.
• The NCA report has reported that they are working closer with law-
enforcement to arrest the criminals (Warwick, 2016).
• Companies can protect themselves with the three pillars:
• Well established ISMS.
• An examination of the Business costs and impact of the types of breaches
that affects the corporation.
• A well-established business continuity framework to help deal with the
unforeseen events.
6. IMPLICATIONS OF CHRISTIAN LEADERS
• Romans 12:2 says in NLT, “Don’t copy the behavior and
customs of this world, but let God transform you into a new
person by changing the way you think. Then you will learn how
God’s will for you, which good and pleasing and perfect.”
• Christians that are wise will decide which worldly behavior is
off-limits to them. It’s not just about refusing to conform to
the world, it’s also to be planted in our way of thinking. Only
the Holy Spirit renews, reeducates, and redirects our mind to be
transformed.
7. REFERENCES
• Bisson, D. (2015). 5 Social Engineering Attacks to Watch For. Retrieved from
https://www.tripwire.com/state-of-security/security-awareness/5-social-
engineering-attacks-to-watch-out-for/
• Holy Bible: New Living Translation. Wheaton, Ill: Tyndale House Publishers,
2004
• Krausz, M., Walker, J., and Ely, C. (2013). The Cost of Information Security
Breaches and Cyber Crime. UK. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=11&sid=64d1fb39-
ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzLWxpdm
U%3d#AN=838705&db=e000xna
• Pinedo, J. (2009). Convention 2009: Protect your Business against Cyber
Crimes. Retrieved from
8. REFERENCES
• Sleiman, C. (2017). Business Today: Combat Cyber Crime in 2017.
Issue 219. p.1-3. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=10&sid=64d1fb
39-ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL
WxpdmU%3d#AN=121239313&db=bwh
• Warwick, A. (2014). National Cyber Crime Unit Appeals to business to
fight cyber criminals. Retrieved from
http://ezproxy.swu.edu:2065/eds/detail/detail?vid=12&sid=64d1fb
39-ffe3-4e2e-9a96-
d84453af78bf%40sessionmgr102&hid=104&bdata=JnNpdGU9ZWRzL
WxpdmU%3d#AN=96519716&db=b9h