Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Introduction to
CybersecurityPRESENTED BYSTEWART HOLLEYORANGE L IEN DATA
Workshop Objectives
Malware and Breaches
Cyber Attacks
Prevention Methods
What is Cyberspace?
Networks
Devices
Software
Processes
What is Cybersecurity?
Prevents Attacks
Prevents Disruption
Controls Access
Protects Against
Code Injection
3 Types of Hackers
• Good Guys
• Companies/Government
• ProtectWhite Hat
• Malicious
• Trolls
• RevengeGray Hat
• Malicious
• Financial / Political Gain
• CalculatedBlack Hat
Malware
Malicious Intrusive DisruptiveObtain
Information
Worms
Bandwidth Consumption
Stops Anti-Malware
Turns Off Safe Mode
Blocks Updates
Viruses
Corrupts Files
Slows Systems
Takes Over Systems
Spyware
Collects Information
Redirects Browsers
Changes System Settings
Trojans
Crashes Computers
Deletes Files
Corrupts Data
Keystroke Logging
Cybersecurity Breaches
Controlled System
Unauthorized Access
Unauthorized System
Uncontrolled System
Phishing
Email• Link
• Attachment• Instructions
• Warning
Phone• Straight to VM• Instructions
Text• Link• Attachment• Instructions
Password Attacks
Cracking• Finds Passwords In Systems
•Many Kinds of Cracking
Brute Force•Quickly Detected•Multiple Attempts
Spray•One Password•Multiple Accounts•Undetectable By User
Identity Theft
Virtual•Social Media
•Take Over Accounts•Open Online Accounts
Physical• Impersonation•Phone• In-Person
Hybrid•Phone and Email•Passwords•Social Media
Protections
Firewalls
Virtual Private
Networks
Anti-VirusAnti-Spyware
Updates
Protections
Secure Messaging
Multi-Factor Authentication
No Public WiFiSecure Mobile
Devices
Unsecure communications is the starting point for over 60% of cyberfraud in the real state industry.
Questions?
What hackers think they look like
What hackers actually look like
Thank You!Stewart Holley
All Images From Pexels.com