• Cybersecurity is Safety
  • Leading Threats
  • Security Awareness Primer PowerPoint Presentation




    Download 7,53 Mb.
    bet1/6
    Sana13.05.2024
    Hajmi7,53 Mb.
    #228915
      1   2   3   4   5   6
    Bog'liq
    USG Security Awareness Primer
    Bolalarning maktabga psixologik tayyorgarligi, Zokirov Dasturlash xx, Роль компьютера в жизни современного человека, Шахсий компютернинг асосий компонентларилот, Kompyuterni tashkil etilishining mantiqiy asoslari, 40 IELTS Listening Tests - Section 3 (with answers), Murodali, 4-deadline, Deadline 3(21-30), Zbekiston respublikasi axborot texnologiyalari va kommunikatsiya, 1 амалий машгулотга топширик, 2 амалий машгулотга топширик, 1-mavzu Qattiq jismlarda diffuziya xodisasi, round-up-0, 5G security

    Cybersecurity Primer

    Information Security Awareness

    Importance of Cybersecurity

    • The internet allows an attacker to work from anywhere on the planet.
    • Risks caused by poor security knowledge and practice:
      • Identity Theft
      • Monetary Theft
      • Legal Ramifications (for yourself and your organization)
      • Sanctions or termination if policies are not followed
    • According to the SANS Institute, the top vectors for vulnerabilities available to a cyber criminal are:
      • Web Browser
      • IM Clients
      • Web Applications
      • Excessive User Rights

    Cybersecurity is Safety

    Security: We must protect our computers and data in the same way that we secure the doors to our homes.

    Safety: We must behave in ways that protect us against risks and threats that come with technology.

    User Awareness


    Cyber-Criminals
    Cracker:
    Computer-savvy
    programmer creates
    attack software
    Script Kiddies:
    Unsophisticated computer users who know how to
    execute programs
    Hacker Bulletin Board
    SQL Injection
    Buffer overflow
    Password Crackers
    Password Dictionaries

    Successful attacks!


    Crazyman broke into …
    CoolCat penetrated…
    Criminals: Create & sell bots -> generate spam
    Sell credit card numbers, etc…
    System Administrators
    Some scripts appear useful
    to manage networks…
    Malware package earns $1K-2K
    1 M Email addresses earn $8
    10,000 PCs earn $1000
    Posts to
    Downloads
    Posts to
    Reports

    Leading Threats

    • Viruses
    • Worms
    • Trojan Horses / Logic Bombs
    • Social Engineering
    • Rootkits
    • Botnets / Zombies

    Viruses

    • A virus attaches itself to a program, file, or disk.
    • When the program is executed, the virus activates and replicates itself.
    • The virus may be benign or malignant but executes its payload at some point (often upon contact).
      • Viruses can cause computer crashes and loss of data.
    • In order to recover or prevent virus attacks:
      • Avoid potentially unreliable websites/emails.
      • System Restore.
      • Re-install operating system.
      • Use and maintain anti-virus software.

    Program
    A
    Extra Code
    Program
    B
    infects

    Download 7,53 Mb.
      1   2   3   4   5   6




    Download 7,53 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Security Awareness Primer PowerPoint Presentation

    Download 7,53 Mb.