|
Security Awareness Primer PowerPoint Presentation
|
bet | 1/6 | Sana | 13.05.2024 | Hajmi | 7,53 Mb. | | #228915 |
Bog'liq USG Security Awareness Primer Cybersecurity Primer Importance of Cybersecurity - The internet allows an attacker to work from anywhere on the planet.
- Risks caused by poor security knowledge and practice:
- Identity Theft
- Monetary Theft
- Legal Ramifications (for yourself and your organization)
- Sanctions or termination if policies are not followed
- According to the SANS Institute, the top vectors for vulnerabilities available to a cyber criminal are:
- Web Browser
- IM Clients
- Web Applications
- Excessive User Rights
Security: We must protect our computers and data in the same way that we secure the doors to our homes. Safety: We must behave in ways that protect us against risks and threats that come with technology. User Awareness
Cyber-Criminals
Cracker:
Computer-savvy
programmer creates
attack software
Script Kiddies:
Unsophisticated computer users who know how to
execute programs
Hacker Bulletin Board
SQL Injection
Buffer overflow
Password Crackers
Password Dictionaries
Successful attacks!
Crazyman broke into …
CoolCat penetrated…
Criminals: Create & sell bots -> generate spam
Sell credit card numbers, etc…
System Administrators
Some scripts appear useful
to manage networks…
Malware package earns $1K-2K
1 M Email addresses earn $8
10,000 PCs earn $1000
Posts to
Downloads
Posts to
Reports
Leading Threats - Viruses
- Worms
- Trojan Horses / Logic Bombs
- Social Engineering
- Rootkits
- Botnets / Zombies
Viruses - A virus attaches itself to a program, file, or disk.
- When the program is executed, the virus activates and replicates itself.
- The virus may be benign or malignant but executes its payload at some point (often upon contact).
- Viruses can cause computer crashes and loss of data.
- In order to recover or prevent virus attacks:
- Avoid potentially unreliable websites/emails.
- System Restore.
- Re-install operating system.
- Use and maintain anti-virus software.
Program
A
Extra Code
Program
B
infects
|
| |