SlideShare a Scribd company logo
1 of 20
CYBER SECURITY
BRIEF
Marshall C. Frett Jr.
Owner & Network Engineer
www.transcendent-it.net
Objectives
 Cyber Security & Information
Assurance Triad
 Cyber threats/risks
 Vulnerabilities
 Countermeasures
 Safeguarding
 Promoting a culture of security
.
Fundamental Concepts of Information
Assurance
• Information Assurance CIA Triad
• Confidentiality (privacy)
• Integrity (quality, accuracy,
relevance)
• Availability (accessibility)
What you don’t know can hurt!!
4
Who & What is At Risk?
• U.S. Economy
• U.S. Defense
• Transportation Departments
• Medical Industry
• U.S. Government
• Telecommunications Industry
• Energy Sector
• U.S. Critical Infrastructure
• Personal devices -
Computers/Cable
TV/Phones/Games/tablets
.
Cyber Security Terms
 Asset – A computer, a server, an application, a database, etc.
 Vulnerability - A weakness that threatens the confidentiality, integrity,
or availability (CIA) of an asset.
 Risk – The probability of a threat exploiting a vulnerability.
 Threat – Something or someone that may result in harm to an asset.
Unintentional – Human errors like unsecure coding.
Intentional – Spyware, Adware, Spam, Phishing
 Exploit – A tool or technique that takes advantage of a vulnerability.
.
6
Security Threat Categories
 Insider threats (intentional) - most common, difficult to recognize
• Includes sabotage and unauthorized disclosure of information
 Social Engineering (mostly unintentional) - multiple techniques
are used to gain information from authorized employees in hopes of
using that info to carry out an attack
 Dumpster Diving & Phishing - Personnel are often not aware of
the value of information they have access to
 Network & Computer System Exploitation & Attacks - Hacking
Social Engineering
• Being fooled into giving someone access when the person has no
business having the information.
Dumpster Diving and Phishing
 Dumpster Diving - rummaging through company’s garbage for
discarded documents
 Phishing - usually takes place through fraudulent emails requesting
users to disclose personal or financial information. The e-mail
appears to come from a legitimate organization ( like Bank of
America or PayPal)
Phishing E-mail Example
8/14/2016 10
Personal PC Attacks
11
Botnets
A network of hijacked computers that are controlled remotely—typically
to launch spam or spyware. Also called software robots. Botnets are
linked to a range of malicious activity, including identity theft and spam.
12
Adware
• Adware, or advertising-supported software, is any software package which
automatically renders advertisements in order to generate revenue for its author. The
advertisements may be in the user interface of the software or on a screen presented
to the user during the installation process.
13
Spyware
Spyware is software that aids in gathering information about a person or organization without
their knowledge and that may send such information to another entity without the consumer's
consent, or that asserts control over a computer without the consumer's knowledge. Spyware"
is mostly classified into four types: system monitors, trojans, adware, and tracking cookies.
14
Spam
Electronic spamming is the use of electronic messaging systems to send
unsolicited messages (spam), especially advertising, as well as sending
messages repeatedly on the same site.
15
Cyber Attacks
• How to Recognize a Cyber Attack
 Signs indicating a computer system is under attack may include:
 Unusually sluggish or non-responsive applications.
 Unexpected changes in system behavior.
 Persistent pop-up messages.
 Missing or corrupt data.
• How to Prevent a Cyber Attack
 Use plug-ins to block ads (Ad-Block Plus).
 Use PGP for sender verification and encryption with e-mail.
 Ensure anti-virus is turned on.
Company Network Attacks
17
Types of Network Attacks
 DOD (Denial of Service): an attack on system availability, total
consumption of system resources
 Hack: to exploit a vulnerability to gain unauthorized access to the
system
 Backdoor: An access method that bypasses the normal security of the
system
 Memory issues: Memory is not erased before given to another program
 Escalation of privileges: user exploits vulnerability to gain
unauthorized access
 Default settings: most OS ship with simplest configuration, security
disabled
How to defend a Network
Policies & Procedures (P & P)
 Acceptable use policy – specifies what actions users may perform while using
company computers andor assets
 Employees sign an array of other policies upon being hired
 Personnel controls - need to know, separation of duties (Accounting vs.
Human Resources vs. Creatives Dept. etc.)
 Hiring and termination practices - background checks, orientation, exit
interviews, escorting procedures, etc.
 Technical Network Safeguards – anti-virus, Intrusion Detection Systems
(IDS), Encrypted e-mail system, etc.
 Security minded Practices – HIPAA and other compliance standards
Information handling practices
Cyber Security Briefing

More Related Content

What's hot

2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Cyber Security Infotech
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 

What's hot (20)

Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Network security
Network securityNetwork security
Network security
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Information security
Information securityInformation security
Information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
презентация1
презентация1презентация1
презентация1
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similar to Cyber Security Briefing

Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptssuser6c59cb
 
Information security
 Information security Information security
Information securityJin Castor
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptxOffice_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptxssuserd1e24b
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 
Information security
Information securityInformation security
Information securityIshaRana14
 

Similar to Cyber Security Briefing (20)

Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Information security
 Information security Information security
Information security
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptxOffice_Cypersecurity_Basic_Training_Decmeber2022.pptx
Office_Cypersecurity_Basic_Training_Decmeber2022.pptx
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Information security
Information securityInformation security
Information security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 

Cyber Security Briefing

  • 1. CYBER SECURITY BRIEF Marshall C. Frett Jr. Owner & Network Engineer www.transcendent-it.net
  • 2. Objectives  Cyber Security & Information Assurance Triad  Cyber threats/risks  Vulnerabilities  Countermeasures  Safeguarding  Promoting a culture of security .
  • 3. Fundamental Concepts of Information Assurance • Information Assurance CIA Triad • Confidentiality (privacy) • Integrity (quality, accuracy, relevance) • Availability (accessibility)
  • 4. What you don’t know can hurt!! 4
  • 5. Who & What is At Risk? • U.S. Economy • U.S. Defense • Transportation Departments • Medical Industry • U.S. Government • Telecommunications Industry • Energy Sector • U.S. Critical Infrastructure • Personal devices - Computers/Cable TV/Phones/Games/tablets .
  • 6. Cyber Security Terms  Asset – A computer, a server, an application, a database, etc.  Vulnerability - A weakness that threatens the confidentiality, integrity, or availability (CIA) of an asset.  Risk – The probability of a threat exploiting a vulnerability.  Threat – Something or someone that may result in harm to an asset. Unintentional – Human errors like unsecure coding. Intentional – Spyware, Adware, Spam, Phishing  Exploit – A tool or technique that takes advantage of a vulnerability. . 6
  • 7. Security Threat Categories  Insider threats (intentional) - most common, difficult to recognize • Includes sabotage and unauthorized disclosure of information  Social Engineering (mostly unintentional) - multiple techniques are used to gain information from authorized employees in hopes of using that info to carry out an attack  Dumpster Diving & Phishing - Personnel are often not aware of the value of information they have access to  Network & Computer System Exploitation & Attacks - Hacking
  • 8. Social Engineering • Being fooled into giving someone access when the person has no business having the information.
  • 9. Dumpster Diving and Phishing  Dumpster Diving - rummaging through company’s garbage for discarded documents  Phishing - usually takes place through fraudulent emails requesting users to disclose personal or financial information. The e-mail appears to come from a legitimate organization ( like Bank of America or PayPal)
  • 12. Botnets A network of hijacked computers that are controlled remotely—typically to launch spam or spyware. Also called software robots. Botnets are linked to a range of malicious activity, including identity theft and spam. 12
  • 13. Adware • Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. 13
  • 14. Spyware Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. Spyware" is mostly classified into four types: system monitors, trojans, adware, and tracking cookies. 14
  • 15. Spam Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. 15
  • 16. Cyber Attacks • How to Recognize a Cyber Attack  Signs indicating a computer system is under attack may include:  Unusually sluggish or non-responsive applications.  Unexpected changes in system behavior.  Persistent pop-up messages.  Missing or corrupt data. • How to Prevent a Cyber Attack  Use plug-ins to block ads (Ad-Block Plus).  Use PGP for sender verification and encryption with e-mail.  Ensure anti-virus is turned on.
  • 18. Types of Network Attacks  DOD (Denial of Service): an attack on system availability, total consumption of system resources  Hack: to exploit a vulnerability to gain unauthorized access to the system  Backdoor: An access method that bypasses the normal security of the system  Memory issues: Memory is not erased before given to another program  Escalation of privileges: user exploits vulnerability to gain unauthorized access  Default settings: most OS ship with simplest configuration, security disabled
  • 19. How to defend a Network Policies & Procedures (P & P)  Acceptable use policy – specifies what actions users may perform while using company computers andor assets  Employees sign an array of other policies upon being hired  Personnel controls - need to know, separation of duties (Accounting vs. Human Resources vs. Creatives Dept. etc.)  Hiring and termination practices - background checks, orientation, exit interviews, escorting procedures, etc.  Technical Network Safeguards – anti-virus, Intrusion Detection Systems (IDS), Encrypted e-mail system, etc.  Security minded Practices – HIPAA and other compliance standards Information handling practices