SlideShare a Scribd company logo
WELCOME TO THE
HOMELAND SECURITY
WORKSHOP
Presented by the Hispanic Leadership Summit
• Kristina Rodriguez, Office of Homeland Security and Preparedness Intelligence
Analyst
• Krista Mazzeo, NJ Cybersecurity and Communications Integration Cell
• Moderator: Candice Marie Martinez
WHAT IS CYBERTERRORISM?
• “A premeditated, politically motivated attack against information, computer
systems, computer programs and data, which results in violence against non-
combatant targets by sub-national groups or clandestine agents,” according to the
Federal Bureau of Investigations.
MAJOR CYBERATTACKS WITHIN THE PAST
YEAR
• Oct. 21
• Twitter, NetFlix, Spotify, Amazon, Github -- DoS
• Yahoo! Security breach compromised more than 500 million users
• MedStar Health – ransomware
• $65 million of Bitcoin
• World Anti-Doping Agency
• Dec. 23 2015
• Ukraine power grid
• https://www.fireeye.com/cyber-map/threat-map.html
• http://map.norsecorp.com/#/
MALWARE TYPES
• Adware
• Botnets
• Ransomware
• Rootkits
• Worms
• Denial of Service
• Virus
• Man in the Middle
HOME NETWORK
WIRELESS REMOTE ACCESS
• loT
• Bluetooth
• Wi-Fi direct
• Windows desktop remote access
PROTECTION
• Change router password
• Turn off your Bluetooth
• Stay updated on Zero-Day Exploits
• Close your ports on all devices
• Change your passwords every few months
• http://www.checkingtools.com/ip_check

More Related Content

What's hot

What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Network Security in the Age of the Third Platform
Network Security in the Age of the Third PlatformNetwork Security in the Age of the Third Platform
Network Security in the Age of the Third Platform
Napier University
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
MarioTalavera10
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final pptRowshan begum
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
mpalaro
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 
Cyber war
Cyber warCyber war
Cyber war
Praveen
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
Richard Stiennon
 
Hacking
HackingHacking
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
North Texas Chapter of the ISSA
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
Rob Stevenson
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
Sara-Jayne Terp
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac
 
Burns Sheehan Security Event
Burns Sheehan Security EventBurns Sheehan Security Event
Burns Sheehan Security Event
Burns Sheehan
 

What's hot (20)

What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Network Security in the Age of the Third Platform
Network Security in the Age of the Third PlatformNetwork Security in the Age of the Third Platform
Network Security in the Age of the Third Platform
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final ppt
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Cyber war
Cyber warCyber war
Cyber war
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Hacking
HackingHacking
Hacking
 
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't EnoughNTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
 
Cyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could HappenCyber Security - Whats the Worst that Could Happen
Cyber Security - Whats the Worst that Could Happen
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Burns Sheehan Security Event
Burns Sheehan Security EventBurns Sheehan Security Event
Burns Sheehan Security Event
 

Viewers also liked

FaceBook Sponsored Stories PowerPoint Presentation
FaceBook Sponsored Stories PowerPoint PresentationFaceBook Sponsored Stories PowerPoint Presentation
FaceBook Sponsored Stories PowerPoint Presentation
Candice Martinez
 
Mass Media presentation project
Mass Media presentation projectMass Media presentation project
Mass Media presentation project
Candice Martinez
 
RIchard Diecidue Presents: Classic Summer Shirts
RIchard Diecidue Presents: Classic Summer ShirtsRIchard Diecidue Presents: Classic Summer Shirts
RIchard Diecidue Presents: Classic Summer Shirts
Richard Diecidue
 
Seminario 4
Seminario 4Seminario 4
RIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
RIchard Diecidue Presents: The Web Design Mistakes You Should AvoidRIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
RIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
Richard Diecidue
 
Historia clínica de prótesis parcial fija neyra
Historia clínica de prótesis parcial fija neyraHistoria clínica de prótesis parcial fija neyra
Historia clínica de prótesis parcial fija neyra
Isabel Neyra Neira
 
Domestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
Domestic Bedroom Furniture Market Report – UK 2016-2020 AnalysisDomestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
Domestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
MarketResearch.com
 
Fracturas de mandibula archivo definitivo
Fracturas de mandibula   archivo definitivoFracturas de mandibula   archivo definitivo
Fracturas de mandibula archivo definitivo
César Cuadros Serrano
 

Viewers also liked (8)

FaceBook Sponsored Stories PowerPoint Presentation
FaceBook Sponsored Stories PowerPoint PresentationFaceBook Sponsored Stories PowerPoint Presentation
FaceBook Sponsored Stories PowerPoint Presentation
 
Mass Media presentation project
Mass Media presentation projectMass Media presentation project
Mass Media presentation project
 
RIchard Diecidue Presents: Classic Summer Shirts
RIchard Diecidue Presents: Classic Summer ShirtsRIchard Diecidue Presents: Classic Summer Shirts
RIchard Diecidue Presents: Classic Summer Shirts
 
Seminario 4
Seminario 4Seminario 4
Seminario 4
 
RIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
RIchard Diecidue Presents: The Web Design Mistakes You Should AvoidRIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
RIchard Diecidue Presents: The Web Design Mistakes You Should Avoid
 
Historia clínica de prótesis parcial fija neyra
Historia clínica de prótesis parcial fija neyraHistoria clínica de prótesis parcial fija neyra
Historia clínica de prótesis parcial fija neyra
 
Domestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
Domestic Bedroom Furniture Market Report – UK 2016-2020 AnalysisDomestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
Domestic Bedroom Furniture Market Report – UK 2016-2020 Analysis
 
Fracturas de mandibula archivo definitivo
Fracturas de mandibula   archivo definitivoFracturas de mandibula   archivo definitivo
Fracturas de mandibula archivo definitivo
 

Similar to Homeland Security workshop

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
Career Communications Group
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
C3 Cyber
C3 CyberC3 Cyber
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Combating Cyber Threats: Cyber Thread Information Program
Combating Cyber Threats: Cyber Thread Information ProgramCombating Cyber Threats: Cyber Thread Information Program
Combating Cyber Threats: Cyber Thread Information Program
amirrullohacmad
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
Brian T. O'Hara CISA, CISM, CRISC, CCSP, CISSP
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
NormShield, Inc.
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factorViktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
OWASP Kyiv
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
Ahmed Tememe
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
Online
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
Naushad CEH, CHFI, MTA, ITIL
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 

Similar to Homeland Security workshop (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Brooks18
Brooks18Brooks18
Brooks18
 
English presentation
English presentationEnglish presentation
English presentation
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Combating Cyber Threats: Cyber Thread Information Program
Combating Cyber Threats: Cyber Thread Information ProgramCombating Cyber Threats: Cyber Thread Information Program
Combating Cyber Threats: Cyber Thread Information Program
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factorViktor Zhora - Cyber and Geopolitics: Ukrainian factor
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 

Recently uploaded

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 

Recently uploaded (13)

Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 

Homeland Security workshop

  • 1. WELCOME TO THE HOMELAND SECURITY WORKSHOP Presented by the Hispanic Leadership Summit
  • 2. • Kristina Rodriguez, Office of Homeland Security and Preparedness Intelligence Analyst • Krista Mazzeo, NJ Cybersecurity and Communications Integration Cell • Moderator: Candice Marie Martinez
  • 3. WHAT IS CYBERTERRORISM? • “A premeditated, politically motivated attack against information, computer systems, computer programs and data, which results in violence against non- combatant targets by sub-national groups or clandestine agents,” according to the Federal Bureau of Investigations.
  • 4. MAJOR CYBERATTACKS WITHIN THE PAST YEAR • Oct. 21 • Twitter, NetFlix, Spotify, Amazon, Github -- DoS • Yahoo! Security breach compromised more than 500 million users • MedStar Health – ransomware • $65 million of Bitcoin • World Anti-Doping Agency • Dec. 23 2015 • Ukraine power grid
  • 6. MALWARE TYPES • Adware • Botnets • Ransomware • Rootkits • Worms • Denial of Service • Virus • Man in the Middle
  • 8. WIRELESS REMOTE ACCESS • loT • Bluetooth • Wi-Fi direct • Windows desktop remote access
  • 9. PROTECTION • Change router password • Turn off your Bluetooth • Stay updated on Zero-Day Exploits • Close your ports on all devices • Change your passwords every few months • http://www.checkingtools.com/ip_check