Cyber Security Trends for 2016

Preview:

Citation preview

Initial Exploit Typically Using Angler Toolkit

RansomwarePayload

User Clicks an Email Link or Malvertising

MaliciousInfrastructure

Request of Ransom

Encryption of Files

C&C Comm. & Asymmetric Key

Exchange

Infection Vector

Off-network/RoamingOn-network

Email security

Endpoint antivirus

OpenDNS network layer security service

Firewall

Training, policy and response plan

Patch Management

Recommended