SlideShare a Scribd company logo
1 of 1
Download to read offline
Copyright © 2016 Global 1 Research & Development, Ltd. ALL Rights Reserved
Cyber Attack Phase Progression
1 2 3 4
 Disrupt Business  Identity Theft
 Prevent Access
 “Target” Network
Penetration
 Access
Credentials
 Steal Data
 Data Breach
 Destroy Data
 Wipe TB HDDs
 Next Phase…
 Imbed Malware:
 ICS
 SCADA Devices
 PLCs
 Virus
 Worm
 DDoS Attacks
 IP Address
 Malware
 Bad Actor
Nation States
Develop
e-Warfare Engine
 DIRECT Theft
 Wire Transfers
 INDIRECT Theft
 Sell Info Dark Web
 Damage / Destroy
Computers
 Terrorist Tactics…
 Damage / Destroy
 Generators
 Power Grids
 Industrial Plants
 Power Dams
1980s-1990s 1990s-2000s 2000s-2010s 2010s-20n0s
Cumulative Effect Summs Efforts Needed To Prevent Damage to Information & Systems

More Related Content

What's hot

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime'sMar Soriano
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all timePRESENTATIONSFORESL
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Microsoft
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security BasitShah18
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismGanesh DNP
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 

What's hot (20)

Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018Cybersecurity threats you should know about in 2018
Cybersecurity threats you should know about in 2018
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Cyber crime and security
Cyber crime and security Cyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 

More from William Kiss

North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3William Kiss
 
The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1William Kiss
 
Common Areas of Data Breach
Common Areas of Data BreachCommon Areas of Data Breach
Common Areas of Data BreachWilliam Kiss
 
Your Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointYour Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointWilliam Kiss
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsWilliam Kiss
 
Cyber Security Weakest Links
Cyber Security Weakest LinksCyber Security Weakest Links
Cyber Security Weakest LinksWilliam Kiss
 

More from William Kiss (8)

North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3
 
The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1
 
Common Areas of Data Breach
Common Areas of Data BreachCommon Areas of Data Breach
Common Areas of Data Breach
 
Ali
AliAli
Ali
 
Your Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointYour Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting Point
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
 
Cyber Security Weakest Links
Cyber Security Weakest LinksCyber Security Weakest Links
Cyber Security Weakest Links
 
4 A's BillKiss
4 A's BillKiss4 A's BillKiss
4 A's BillKiss
 

Cyber Attack Phase Progression

  • 1. Copyright © 2016 Global 1 Research & Development, Ltd. ALL Rights Reserved Cyber Attack Phase Progression 1 2 3 4  Disrupt Business  Identity Theft  Prevent Access  “Target” Network Penetration  Access Credentials  Steal Data  Data Breach  Destroy Data  Wipe TB HDDs  Next Phase…  Imbed Malware:  ICS  SCADA Devices  PLCs  Virus  Worm  DDoS Attacks  IP Address  Malware  Bad Actor Nation States Develop e-Warfare Engine  DIRECT Theft  Wire Transfers  INDIRECT Theft  Sell Info Dark Web  Damage / Destroy Computers  Terrorist Tactics…  Damage / Destroy  Generators  Power Grids  Industrial Plants  Power Dams 1980s-1990s 1990s-2000s 2000s-2010s 2010s-20n0s Cumulative Effect Summs Efforts Needed To Prevent Damage to Information & Systems