SlideShare a Scribd company logo
Cyber Security in
Prepared by Dr. Maurice Dawson, CSSLP, CGEIT, C|CISO
Agenda
Presenter Background
Your Motivation for this Session
Hyperconnectivity
Guidance
Products
Tools
Cyber Security Training
Personnel Hiring
Closer to Home
Speaker
Dr. Maurice (Mo) Dawson Jr.
Assistant Professor, Information Systems
Office: 228 Express Scripts Hall
Voice: TBA
Email: dawsonmau@umsl.edu
Work Experience
Assistant Professor of Information Systems, University of Missouri- St. Louis,
08/14 - Present
Fulbright Grantee, South Ural State University, Russia, 09/14 - 09/14
ABET CS Accreditation Consultant, Colorado State University - Global
Campus, 04/14-07/14
Assistant Professor of Management Information Systems, Alabama A&M
University, 08/11 - 05/14
Visiting Professor, The University of the Gambia, 03/14 - Present
Visiting Assistant Professor (Honorary) of Industrial and Systems
Engineering, The University of Tennessee, Knoxville & Space Institute, 02/14
- Present
Research Associate, Morgan State University, 08/10 - 08/11
Engineering Manager, Textron Systems - AAI Unmanned Air Systems (UAS)
Division, 01/10 - 08/11
Information Assurance Director, Future Research Corporation, 07/08 - 12/09
Senior Program Manager, Rockwell Collins - Government Systems Division,
Scout, Attack & Special Mission Solutions, 06/06 - 07/08
Senior Systems Engineer, Rockwell Collins - Government Systems Division,
Rotary Wing & Cryptographic Embedded Systems, 08/04 - 06/08
Information Assurance Engineer, British Aerospace Engineering (BAE)
Systems - Missile Defense Agency (MDA) Support, 05/04 - 08/04
Cryptographic Technician, United States Navy Reserves, 10/05 - 09/08
Senior Systems Analyst, Iowa National Guard, 01/00 - 10/05
Current Research
Dawson, M. (2015) Software Assurance Maturity Model: The Need for Secure Design Process
Management. Managing Software Process Evolution, How to handle process change?.
proposal accepted, in process
Dawson, M., & Leonard, B. (2015) Software and Supply Chain: Ensuring the Delivery of Secure
Systems. Encyclopedia of Global Supply Chain Management. proposal accepted, in process
Dawson, M., Wright, J., & Truesdale, J. (2015) Cyber Security: Designing Solutions for Mobile
Security & Health Information Technology. Encyclopedia of E-Health and Telemedicine.
proposal accepted, in process
Dawson, M., Wright, J., & Omar, M. (2015) Mobile Devices: The Case for Security Hardened
Systems. Handbook of Research on New Threats and Countermeasures in Digital Crime and
Cyber Terrorism. accepted for publication and forthcoming.
Leonard, B. & Dawson, M. (2015) Legal Issues: Security and Privacy with Mobile Devices.
Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber
Terrorism. accepted for publication and forthcoming.
Dawson, M., Leonard, B., & Rahim, E. (2014) Advances in Technology Project Management:
Review of Open Source Software Integration. Technology, Innovation, and Enterprise
Transformation. accepted for publication and forthcoming.
Dawson, M., Marwan, O., & Abramson, J. (2014) Understanding the Methods Behind Cyber
Terrorism. Encyclopedia of Information Science& Technology 3rd Edition. accepted for
publication and forthcoming
Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014) Open Source Software to Enhance
the STEM Learning Environment. Encyclopedia of Education and Technology. accepted for
publication and forthcoming
Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and
International Security on the Internet. Information Security in Diverse Computing
Environments. accepted for publication and forthcoming
Dawson, M. E., & Al Saeed, I. (2012). Use of Open Source Software and Virtualization in
Academia to Enhance Higher Education Everywhere. Cutting-edge Technologies in Higher
Education, 6, 283-313.
YOUR MOTIVATIONFOR THIS SESSION
Motivation
HYPERCONNECTIVITY
Introduction
Hyperconnectivity is a growing trend that is driving cyber security
experts to develop new security architectures for multiple platforms
such as mobile devices, laptops, and even wearable displays. The
futures of national and international security rely on complex
countermeasures to ensure that a proper security posture is
maintained during this state of hyperconnectivity. To protect these
systems from exploitation of vulnerabilities it is essential to
understand current and future threats to include the laws that drive
their need to be secured. Examined within this presentation are the
potential security related threats with the use of social media,
mobile devices, virtual worlds, augmented reality, and mixed reality.
Further reviewed are some examples of the complex attacks that could
interrupt human-robot interaction, children-computer interaction,
mobile computing, social networks, and more through human
centered issues in security design.
System of Systems Concept
Information Assurance Defined
Information Assurance (lA) is defined as the practice of
protecting and defending information and information
systems by ensuring their availability, integrity,
authentication, confidentiality and non repudiation. This
definition also encompasses disaster recovery, physical
security, cryptography, application security, and business
continuity of operations.
Cyber Terrorism
Cyber terrorism is on the rise
and is constantly affecting
millions every day. These
malicious attacks can affect
one single person to entire
government entities.
These attacks can be done with
a few lines of code or large
complex programs that have
the ability to target specific
hardware.
As the United States
government has stated, an act
of cyber terrorism is an act of
war; it is imperative that we
explore this new method of
terrorism and how it can be
mitigated to an acceptable risk.
Recent Events
Cyber security has become a matter of
national, international, economic, and
societal importance that affects multiple
nations (Walker, 2012).
ln Estonia and Georgia there were direct
attacks on government cyber
infrastructure (Beidleman, 2009). The
attacks in Estonia rendered the
government's infrastructure useless.
The government and other associated
entities heavily relied upon this e-
government infrastructure. These
attacks help lead to the development of
cyber defense organizations that drive
laws and policies within Europe.
Laws and Policies to Combat
Terrorism
The USA PATRIOT was signed into law by President George W.
Bush in 2001 after September 11, 200 I (Bullock, Haddow,
Coppola, & Yeletaysi, 2009). This act was created in response
to the event of 9/11 which provided government agencies
increased abilities. These increased abilities provided the
government rights to search various communications such as
email, telephone records, medical records, and more of those
who were thoughts of terrorist acts (Bullock, Haddow,
Coppola, & Yeletaysi, 2009).
Stuxnet Worm
During the fall of 20 l 0 many headlines declared
that Stuxnet was the game-changer in terms of
cyber warfare (Denning, 2012). This malicious
worm was complex and designed to target only a
specific system. This worm had the ability to detect
location, system type, and more. And this worm
only attacked the system if it met specific
parameters that were designed in the code.
Stuxnet tampered directly with software in a
programmable logic controller (PLC) that controlled
the centrifuges at Natanz. This tampering ultimately
caused a disruption in the Iranian nuclear program.
SCADA Systems
The Department of Homeland Security (DHS) is
concerned with cyber attacks on infrastructure such as
supervisory control and data acquisition (SCADA)
systems. SCADA systems are the systems that
autonomously monitor and adjust switching among
other processes within critical infrastructures such as
nuclear plants, and power grids. DHS is worried about
these systems as they are unmanned frequently and
remotely accessed. As they are remotely accessed,
this could allow anyone to take control of assets to
critical infrastructure remotely.
There has been increasing mandates and directives to
ensure any system deployed meets stringent
requirements. As the Stuxnet worm has become a
reality, future attacks could be malicious code directly
targeting specific locations of critical infrastructure.
Measuring Success & Loss
Virus in Bash Script
Example Copy Script in Bash
Vulnerabilities & Threats
Malware to Hack into
Smartphones
Legitimate Applications that Can
Be Used to Retrieve Information
Presently, there is valid spy software available for various
smartphones. An example of this is FlexiSpy, a legitimate commercial
spyware program that cost over $300 (United States Computer
Emergency Readiness Team, 2010). FlexiSpy can:
Listen to actual phone calls as they happen;
Secretly read Short Message Service (SMS) texts, call logs, and
emails;
Listen to the phone surroundings (use as remote bugging device);
View phone GPS location;
Forward all email events to another inbox;
Remotely control all phone functions via SMS;
Accept or reject communication based on predetermined lists; and
Evade detection during operation (United States Computer
Emergency Readiness Team,2010).
Internet Stalking
The increase of the social networking trend can be based on the security
features of for every user. Internet stalking can be noted by a threat
from an outside source that harms or conflicts harm to a piece of
information or person. These threats can international or nation
depending on where the organization or user is geographically located.
With internet stalking being noted more often in today's society; it is
also presumed that people are also becoming more vulnerable to
attacks from internet insecurity. Insecure internet can be looked at
based on what the user currently is using in terms of connectivity but
can always be looked at as a threat to any customer.
When international threats are aimed at consumers, it can be perceived
as a threat that is directed to the nation based that it is from outside the
country. These circumstances can be legal or illegal based on the source
of the threat. Many users see these types of threats as being identified
as acts of terror based that many users do not know much information
about the types of threats that are visible.
Internet Stalking
Certification & Accreditation
GUIDANCE
NIST Special Pubs
NIST Publications
PRODUCTS
CESG Ubuntu Report
Linux Distros
Linux Distro Timeline
Common Criteria
Security Technical Implementation
Guides (STIGs) and the NSA Guides
TOOLS
BlackBuntu
BackTrack Linux
Kali Linux Offensive Security
Special Features Available in
Kali
Over the months of development, we occasionally add cool new features to Kali
and document them on our blogs. The following list attempts to gather some of
Automating Kali Linux deployment via Unattended PXE installations
Kali Linux ISO of doom, the perfect hardware backdoor.
Customizing and bending Kali Linux to your will using Kali Linux live build recipes.
Mastering Kali Linux tool sets with Kali Metapackages.
Kali Linux in the cloud Kali Amazon EC2 images available.
Kali Linux LUKS Full Disk Encryption (FDE).
Nuking your Kali Linux hard disk with the Kali LUKS nuke option.
Kali Linux running on Android through Linux Deploy.
Kali Linux accessibility features, adding support for blind and visually impaired
users.
Kali Linux on a Raspberry Pi and a bunch of other interesting ARM devices.
Kali Linux Live USB persistence with LUKS encryption.
Click http://www.kali.org/official-documentation/ for further information
Fern WiFi Cracker
Burp Suite Test Web
Applications
HydraGTK Brute Force
Password Cracker
John the Ripper
Maltego
Metasploit: Penetration Testing
Software
Zenmap GUI for Nmap
Zed Attack Proxy (ZAP)
SQL Map
SourceForge
Big Data Wonders: 8 'Free'Data
Visualisation & Analysis Tools
1. OpenRefine http://openrefine.org/
2. R Project for Statistical Computing http://www.r-
project.org/
3. Google Fusion Tables
https://support.google.com/fusiontables/answer/2571232
4. Exhibit http://simile-widgets.org/exhibit/
5. JavaScript InfoVis Toolkit http://philogb.github.io/jit/
6. Protovis http://mbostock.github.io/protovis/
7. OpenLayers http://openlayers.org/
8. Gephi https://gephi.github.io/
Virtual Box
VMware
VMware
CYBER SECURITY TRAINING
Cyber Security Education,
Training and Awareness
Click
http://iase.disa.
mil/eta/index.ht
ml for online
training
Order Cyber Security Products
Click
http://iase.disa.mil/eta/
downloads/pdf/product
s_order_form.pdf to go
to order form
IA Courseware Institutions
NSA & DHS CAE
DoD 8570
PERSONNEL - HIRING
(ISC)2 Hiring Guide
(ISC)² Global InformationSecurity
Workforce Study
CLOSER TO HOME
Analytics
Anonymous Hacked Multiple Sites
Actually Stole From U.S. Companies
Solar power
technology
Nuclear power plant
technology
Inside information
on U.S. business
strategy
Data enabling the
Chinese to outwit
U.S. regulators
US Navy Sailor Hacked Government
Computers, Released Secret Records
Secret US Embassy Cables
Secret US Embassy Cables
AnyQuestions
Twitter Google Scholar Research Gate Academia.edu - Selected Works

More Related Content

What's hot

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Cyber crime
Cyber crimeCyber crime
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
jumanne rajabu
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
codefortomorrow
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
Rahul Nayan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
Thanuja Seneviratne
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 

What's hot (20)

Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project ProposalChris Young
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
Lucideus Tech
 
Millennials at Work: The Keys to Employee Development Through the Life Cycle
Millennials at Work: The Keys to Employee Development Through the Life CycleMillennials at Work: The Keys to Employee Development Through the Life Cycle
Millennials at Work: The Keys to Employee Development Through the Life Cycle
Jumpstart:HR
 

Viewers also liked (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Millennials at Work: The Keys to Employee Development Through the Life Cycle
Millennials at Work: The Keys to Employee Development Through the Life CycleMillennials at Work: The Keys to Employee Development Through the Life Cycle
Millennials at Work: The Keys to Employee Development Through the Life Cycle
 

Similar to NACCTFO Cyber Security Presentation 2014 New Orleans

MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
Maurice Dawson
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review deleyoboy7
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
randyburney60861
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
AASTHA76
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Maurice Dawson
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
CSCJournals
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
Lillian Ekwosi-Egbulem
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
charisellington63520
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
karishmakittu
 
E04 05 2841
E04 05 2841E04 05 2841
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
Insikt Intelligence
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
festockton
 

Similar to NACCTFO Cyber Security Presentation 2014 New Orleans (20)

MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Comparative review dele
Comparative review deleComparative review dele
Comparative review dele
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
Cyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docxCyber Security and Terrorism Research Article2Cybe.docx
Cyber Security and Terrorism Research Article2Cybe.docx
 
C018131821
C018131821C018131821
C018131821
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 

More from Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Maurice Dawson
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Maurice Dawson
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
Maurice Dawson
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Maurice Dawson
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Maurice Dawson
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
Maurice Dawson
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
Maurice Dawson
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
Maurice Dawson
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
Maurice Dawson
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
Maurice Dawson
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
Maurice Dawson
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
Maurice Dawson
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
Maurice Dawson
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
Maurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
Maurice Dawson
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Maurice Dawson
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
Maurice Dawson
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
Maurice Dawson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Maurice Dawson
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson
 

More from Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

NACCTFO Cyber Security Presentation 2014 New Orleans

  • 1. Cyber Security in Prepared by Dr. Maurice Dawson, CSSLP, CGEIT, C|CISO
  • 2. Agenda Presenter Background Your Motivation for this Session Hyperconnectivity Guidance Products Tools Cyber Security Training Personnel Hiring Closer to Home
  • 3. Speaker Dr. Maurice (Mo) Dawson Jr. Assistant Professor, Information Systems Office: 228 Express Scripts Hall Voice: TBA Email: dawsonmau@umsl.edu
  • 4. Work Experience Assistant Professor of Information Systems, University of Missouri- St. Louis, 08/14 - Present Fulbright Grantee, South Ural State University, Russia, 09/14 - 09/14 ABET CS Accreditation Consultant, Colorado State University - Global Campus, 04/14-07/14 Assistant Professor of Management Information Systems, Alabama A&M University, 08/11 - 05/14 Visiting Professor, The University of the Gambia, 03/14 - Present Visiting Assistant Professor (Honorary) of Industrial and Systems Engineering, The University of Tennessee, Knoxville & Space Institute, 02/14 - Present Research Associate, Morgan State University, 08/10 - 08/11 Engineering Manager, Textron Systems - AAI Unmanned Air Systems (UAS) Division, 01/10 - 08/11 Information Assurance Director, Future Research Corporation, 07/08 - 12/09 Senior Program Manager, Rockwell Collins - Government Systems Division, Scout, Attack & Special Mission Solutions, 06/06 - 07/08 Senior Systems Engineer, Rockwell Collins - Government Systems Division, Rotary Wing & Cryptographic Embedded Systems, 08/04 - 06/08 Information Assurance Engineer, British Aerospace Engineering (BAE) Systems - Missile Defense Agency (MDA) Support, 05/04 - 08/04 Cryptographic Technician, United States Navy Reserves, 10/05 - 09/08 Senior Systems Analyst, Iowa National Guard, 01/00 - 10/05
  • 5. Current Research Dawson, M. (2015) Software Assurance Maturity Model: The Need for Secure Design Process Management. Managing Software Process Evolution, How to handle process change?. proposal accepted, in process Dawson, M., & Leonard, B. (2015) Software and Supply Chain: Ensuring the Delivery of Secure Systems. Encyclopedia of Global Supply Chain Management. proposal accepted, in process Dawson, M., Wright, J., & Truesdale, J. (2015) Cyber Security: Designing Solutions for Mobile Security & Health Information Technology. Encyclopedia of E-Health and Telemedicine. proposal accepted, in process Dawson, M., Wright, J., & Omar, M. (2015) Mobile Devices: The Case for Security Hardened Systems. Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism. accepted for publication and forthcoming. Leonard, B. & Dawson, M. (2015) Legal Issues: Security and Privacy with Mobile Devices. Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism. accepted for publication and forthcoming. Dawson, M., Leonard, B., & Rahim, E. (2014) Advances in Technology Project Management: Review of Open Source Software Integration. Technology, Innovation, and Enterprise Transformation. accepted for publication and forthcoming. Dawson, M., Marwan, O., & Abramson, J. (2014) Understanding the Methods Behind Cyber Terrorism. Encyclopedia of Information Science& Technology 3rd Edition. accepted for publication and forthcoming Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014) Open Source Software to Enhance the STEM Learning Environment. Encyclopedia of Education and Technology. accepted for publication and forthcoming Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International Security on the Internet. Information Security in Diverse Computing Environments. accepted for publication and forthcoming Dawson, M. E., & Al Saeed, I. (2012). Use of Open Source Software and Virtualization in Academia to Enhance Higher Education Everywhere. Cutting-edge Technologies in Higher Education, 6, 283-313.
  • 9. Introduction Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this presentation are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and more through human centered issues in security design.
  • 10. System of Systems Concept
  • 11. Information Assurance Defined Information Assurance (lA) is defined as the practice of protecting and defending information and information systems by ensuring their availability, integrity, authentication, confidentiality and non repudiation. This definition also encompasses disaster recovery, physical security, cryptography, application security, and business continuity of operations.
  • 12. Cyber Terrorism Cyber terrorism is on the rise and is constantly affecting millions every day. These malicious attacks can affect one single person to entire government entities. These attacks can be done with a few lines of code or large complex programs that have the ability to target specific hardware. As the United States government has stated, an act of cyber terrorism is an act of war; it is imperative that we explore this new method of terrorism and how it can be mitigated to an acceptable risk.
  • 13. Recent Events Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). ln Estonia and Georgia there were direct attacks on government cyber infrastructure (Beidleman, 2009). The attacks in Estonia rendered the government's infrastructure useless. The government and other associated entities heavily relied upon this e- government infrastructure. These attacks help lead to the development of cyber defense organizations that drive laws and policies within Europe.
  • 14. Laws and Policies to Combat Terrorism The USA PATRIOT was signed into law by President George W. Bush in 2001 after September 11, 200 I (Bullock, Haddow, Coppola, & Yeletaysi, 2009). This act was created in response to the event of 9/11 which provided government agencies increased abilities. These increased abilities provided the government rights to search various communications such as email, telephone records, medical records, and more of those who were thoughts of terrorist acts (Bullock, Haddow, Coppola, & Yeletaysi, 2009).
  • 15. Stuxnet Worm During the fall of 20 l 0 many headlines declared that Stuxnet was the game-changer in terms of cyber warfare (Denning, 2012). This malicious worm was complex and designed to target only a specific system. This worm had the ability to detect location, system type, and more. And this worm only attacked the system if it met specific parameters that were designed in the code. Stuxnet tampered directly with software in a programmable logic controller (PLC) that controlled the centrifuges at Natanz. This tampering ultimately caused a disruption in the Iranian nuclear program.
  • 16. SCADA Systems The Department of Homeland Security (DHS) is concerned with cyber attacks on infrastructure such as supervisory control and data acquisition (SCADA) systems. SCADA systems are the systems that autonomously monitor and adjust switching among other processes within critical infrastructures such as nuclear plants, and power grids. DHS is worried about these systems as they are unmanned frequently and remotely accessed. As they are remotely accessed, this could allow anyone to take control of assets to critical infrastructure remotely. There has been increasing mandates and directives to ensure any system deployed meets stringent requirements. As the Stuxnet worm has become a reality, future attacks could be malicious code directly targeting specific locations of critical infrastructure.
  • 18. Virus in Bash Script
  • 21. Malware to Hack into Smartphones
  • 22. Legitimate Applications that Can Be Used to Retrieve Information Presently, there is valid spy software available for various smartphones. An example of this is FlexiSpy, a legitimate commercial spyware program that cost over $300 (United States Computer Emergency Readiness Team, 2010). FlexiSpy can: Listen to actual phone calls as they happen; Secretly read Short Message Service (SMS) texts, call logs, and emails; Listen to the phone surroundings (use as remote bugging device); View phone GPS location; Forward all email events to another inbox; Remotely control all phone functions via SMS; Accept or reject communication based on predetermined lists; and Evade detection during operation (United States Computer Emergency Readiness Team,2010).
  • 23. Internet Stalking The increase of the social networking trend can be based on the security features of for every user. Internet stalking can be noted by a threat from an outside source that harms or conflicts harm to a piece of information or person. These threats can international or nation depending on where the organization or user is geographically located. With internet stalking being noted more often in today's society; it is also presumed that people are also becoming more vulnerable to attacks from internet insecurity. Insecure internet can be looked at based on what the user currently is using in terms of connectivity but can always be looked at as a threat to any customer. When international threats are aimed at consumers, it can be perceived as a threat that is directed to the nation based that it is from outside the country. These circumstances can be legal or illegal based on the source of the threat. Many users see these types of threats as being identified as acts of terror based that many users do not know much information about the types of threats that are visible.
  • 34. Security Technical Implementation Guides (STIGs) and the NSA Guides
  • 35. TOOLS
  • 39. Special Features Available in Kali Over the months of development, we occasionally add cool new features to Kali and document them on our blogs. The following list attempts to gather some of Automating Kali Linux deployment via Unattended PXE installations Kali Linux ISO of doom, the perfect hardware backdoor. Customizing and bending Kali Linux to your will using Kali Linux live build recipes. Mastering Kali Linux tool sets with Kali Metapackages. Kali Linux in the cloud Kali Amazon EC2 images available. Kali Linux LUKS Full Disk Encryption (FDE). Nuking your Kali Linux hard disk with the Kali LUKS nuke option. Kali Linux running on Android through Linux Deploy. Kali Linux accessibility features, adding support for blind and visually impaired users. Kali Linux on a Raspberry Pi and a bunch of other interesting ARM devices. Kali Linux Live USB persistence with LUKS encryption. Click http://www.kali.org/official-documentation/ for further information
  • 41. Burp Suite Test Web Applications
  • 50. Big Data Wonders: 8 'Free'Data Visualisation & Analysis Tools 1. OpenRefine http://openrefine.org/ 2. R Project for Statistical Computing http://www.r- project.org/ 3. Google Fusion Tables https://support.google.com/fusiontables/answer/2571232 4. Exhibit http://simile-widgets.org/exhibit/ 5. JavaScript InfoVis Toolkit http://philogb.github.io/jit/ 6. Protovis http://mbostock.github.io/protovis/ 7. OpenLayers http://openlayers.org/ 8. Gephi https://gephi.github.io/
  • 55. Cyber Security Education, Training and Awareness Click http://iase.disa. mil/eta/index.ht ml for online training
  • 56. Order Cyber Security Products Click http://iase.disa.mil/eta/ downloads/pdf/product s_order_form.pdf to go to order form
  • 58. NSA & DHS CAE
  • 66. Actually Stole From U.S. Companies Solar power technology Nuclear power plant technology Inside information on U.S. business strategy Data enabling the Chinese to outwit U.S. regulators
  • 67. US Navy Sailor Hacked Government Computers, Released Secret Records
  • 70. AnyQuestions Twitter Google Scholar Research Gate Academia.edu - Selected Works