19

Cyber Security Trends for 2016

Embed Size (px)

Citation preview

Page 6: Cyber Security Trends for 2016

Initial Exploit Typically Using Angler Toolkit

RansomwarePayload

User Clicks an Email Link or Malvertising

MaliciousInfrastructure

Page 8: Cyber Security Trends for 2016

Request of Ransom

Encryption of Files

C&C Comm. & Asymmetric Key

Exchange

Infection Vector

Page 16: Cyber Security Trends for 2016

Off-network/RoamingOn-network

Email security

Endpoint antivirus

OpenDNS network layer security service

Firewall

Training, policy and response plan

Patch Management