1. The document discusses various IT security considerations and evaluations, including data requirements, defense in depth limitations, multi-factor authentication, password entropy, types of attacks, and risk factors.
2. It also covers topics like the trade-off between usefulness and security of data, how traditional security is failing due to factors like BYOD, and new approaches like IT operational analytics that can detect sophisticated threats.
3. Emerging issues are also examined, such as ransomware, the internet of things, and how security models must adapt to new technologies like cloud computing.
MITM = Man in the Middle, (L2TP) Layer Two Tunneling Protocol
You CAN remove the Ransomware. You WILL NOT be able to unencrypt the files without the key.
Ransoms are paid about 40% of the time.
Medstar Hospital in Baltimore.
(APTs) Advanced Persistent Threat
A prominent hacker (Chris Roberts) was arrested by the FBI after he made a United Airlines Flight “climb” and move “sideways” after infiltrating its in-flight entertainment system.