Team Members
Cole Bassett
Mark Cary
Michael Meehan
Alexandria Phillip
CYBER SECURITY
VIDEO
https://www.youtube.com/watch?feature=player_detailpage&v=E
8zandvQvUc
INFOGRAPHIC
AGENDA
Threats
• Vulnerabilites
• Vulnerable Areas
Defense
• Recent Attacks
• Protection
THREATS
VULNERABILITIES
Have 3 elements:
• a system susceptibility or flaw
• attacker access to the flaw
• and attacker capability to
exploit the flaw.
• A malicious attempt to
make a server or a
network resource
unavailable to users,
usually by temporarily
interrupting or
suspending the
services of a host
connected to the
Internet.
DENIAL OF SERVICE (DOS)
• An unauthorized person
gaining physical access
to your computer or
part of your computer,
then installing devices
to compromise security
DIRECT ACCESS
• Act of surreptitiously
listening to a private
conversation, typically
between hosts on a
network.
EAVESDROPPING
• A software tool
designed to take
advantage of a flaw in a
computer system.
EXPLOITS
• Act of exploiting a bug,
design flaw or
configuration oversight
in an operating system
or software application
to gain elevated access
to resources that are
normally protected
from an application or
user.
PRIVILEGE ESCALATION
• A situation where the
authenticity of a
signature is being
challenged.
REPUDIATION
• Is a method of
bypassing normal
authentication, securing
unauthorized remote
access to a computer,
obtaining access to
plaintext, etc., while
attempting to remain
undetected
• Can be default
passwords
BACKDOORS
• Psychological
manipulation of people
into performing actions
or divulging
confidential
information.
SOCIAL ENGINEERING
• Malware program
containing malicious
code that, when
executed, carries out
actions determined by
the nature of the
Trojan, typically
causing loss or theft of
data, and possible
system harm.
TROJANS
• A situation in which
one person or program
successfully
masquerades as
another by falsifying
data and thereby
gaining an illegitimate
advantage.
SPOOFING
• Intentional
modification of
products in a way
that would make
them harmful to the
consumer.
TAMPERING
CYBER SECURITY IS VULNERABLE IN
THE FOLLOWING AREAS:
• Financial Systems
• Consumer Devices
• Government
• Large Corporations
• In-store payment
systems
• ATMs
• Websites accepting or
storing credit cards
numbers and bank
account information
FINANCIAL SYSTEMS
• Smartphones
• Tablets
• Laptops
• Bluetooth
CONSUMER DEVICES
• Military installations
• Traffic lights controls
• Intelligence agency
communications
GOVERNMENT
• Sony Pictures
Entertainment
• J.P. Morgan Chase
• Target
LARGE CORPORATIONS
DEFENSE
LARGEST CYBER ATTACKS IN
HISTORY
1. Logic Bomb, 1982- CIA blew up portion of Russian gas
pipeline
2. Titan Rain, 2004- China infiltrates computer networks (NASA,
Lockeed, SNL)
3. Moonlight Maze, 1988- Russian attacked US military systems
4. Epsilon, 2011- hackers infiltrate financial systems, estimated
cost upward to 4 Billion dollars
5. Estonian Cyberwar, 2007- Pro-Kremlin group penetrates
Estonian govt. facilities rendering them useless
(Source: List25.com)
2014 ATTACKS
• January/ Target, Neiman Marcus, Michaels, Yahoo
• April/ Aaron Brothers, AT&T
• May/ ebay, Public works
• June/ Feedly (communications), Evernote,
P.F.Changs
• August/ US Investigations, CHS, UPS, Defense
Industries
• September/ Home Depot, Google, Apple, Goodwill,
US Transportation Command Contractors
• October/ JP Morgan, DQ, Snapsave
(Source: Heritage.org)
 Sensitive information
 Important files
WHAT ARE YOU PROTECTING?
Hackers Employees with access
WHERE IS THE SAFEST PLACE TO KEEP
EXTREMELY SENSITIVE DATA?
• O _ _ _ _ _ _
• Backup Software
• -> CD/DVD's,
External Hard
Drives, FTP's
• Online Backup Services
• -> Stored on offsite
data center
BACKUP DATA
+ Pros
 Access
 Advanced security
- Cons
 Need internet access
 Monthly fee
 Security breach
+ Pros
 1 time fee
- Cons
 Physical damage
 Hardware failure
 Theft
 70% of attacks are
through the internet
 Antivirus
 Firewall
 Patch
 Other 30% is through
LANS & WLANS
 Traffic filtering
 User accounts
 Data encryption
THREAT PREVENTION
https://www.youtube.com/watch?v=sYvGYHEryxw
PHYSICAL SECURITY
 Authorized personnel
 Offices
 Server room
 Network equipited facilities
CITATION
http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-
companies-in-2014
http://list25.com/25-biggest-cyber-attacks-in-history/5/
http://data-backup-software-review.toptenreviews.com/online-vs-
software-the-pros-and-cons-of-your-data-backup-location.html
http://www.wimp.com/howencryption/
Business Data Communications & Networking 11th Edition Fitzgerald &
Dennis

Cyber security