Introduction to Cybersecurity - FACE...

Preview:

Citation preview

Introduction to

CybersecurityPRESENTED BYSTEWART HOLLEYORANGE L IEN DATA

Workshop Objectives

Malware and Breaches

Cyber Attacks

Prevention Methods

What is Cyberspace?

Networks

Devices

Software

Processes

What is Cybersecurity?

Prevents Attacks

Prevents Disruption

Controls Access

Protects Against

Code Injection

3 Types of Hackers

• Good Guys

• Companies/Government

• ProtectWhite Hat

• Malicious

• Trolls

• RevengeGray Hat

• Malicious

• Financial / Political Gain

• CalculatedBlack Hat

Malware

Malicious Intrusive DisruptiveObtain

Information

Worms

Bandwidth Consumption

Stops Anti-Malware

Turns Off Safe Mode

Blocks Updates

Viruses

Corrupts Files

Slows Systems

Takes Over Systems

Spyware

Collects Information

Redirects Browsers

Changes System Settings

Trojans

Crashes Computers

Deletes Files

Corrupts Data

Keystroke Logging

Cybersecurity Breaches

Controlled System

Unauthorized Access

Unauthorized System

Uncontrolled System

Phishing

Email• Link

• Attachment• Instructions

• Warning

Phone• Straight to VM• Instructions

Text• Link• Attachment• Instructions

Password Attacks

Cracking• Finds Passwords In Systems

•Many Kinds of Cracking

Brute Force•Quickly Detected•Multiple Attempts

Spray•One Password•Multiple Accounts•Undetectable By User

Identity Theft

Virtual•Social Media

•Take Over Accounts•Open Online Accounts

Physical• Impersonation•Phone• In-Person

Hybrid•Phone and Email•Passwords•Social Media

Protections

Firewalls

Virtual Private

Networks

Anti-VirusAnti-Spyware

Updates

Protections

Secure Messaging

Multi-Factor Authentication

No Public WiFiSecure Mobile

Devices

Unsecure communications is the starting point for over 60% of cyberfraud in the real state industry.

Questions?

What hackers think they look like

What hackers actually look like

Thank You!Stewart Holley

All Images From Pexels.com

Recommended