Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

1_3_Cyber_Defense_Principle.pptx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité

Consultez-les par la suite

1 sur 26 Publicité
Publicité

Plus De Contenu Connexe

Plus récents (20)

Publicité

1_3_Cyber_Defense_Principle.pptx

  1. 1. Cyber Defense Principles
  2. 2. CYBERSECURITY is everyone’s responsibility.
  3. 3. THE INTERNET Desktop Computer Owned by few people. Telecom companies began serving internet thru their telephone lines. Super Computers Only owned by big companies and universities. Smart Devices Owned by almost everyone. Each of devices are now capable of accessing the internet. 3
  4. 4. INTERNET OF THINGS EVERY “THING ” CONNECTED. 4
  5. 5. What you can do? Anything What can you find… Everything Who is in there? Everyone INTERNET OF THINGS
  6. 6. INTERNET OF THINGS WHATIS THE PRICE? SECURITY EXTORTION MALWARES IDENTITY THEFT ESPIONAGE
  7. 7. INTERNET OF THINGS WHATIS THE PRICE? Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks In the article of (2019), researchers Khandelwal from Zimperium security flaw have discovered a in M365 Folding Electric Scooter by Xiaomi. lock Attackers the scooter can remotely in the mid-traffic and /or deploy can full take without a malware that control of the the user machine knowledge. Reference: Swati Khandelwal, The Hacker News
  8. 8. DEEP WEB A huge part of The Internet you don’t normally See. SURFACE WEB Anything that can be search on Google, Yahoo, etc. The darker part of Deep web that contains Illegal activities. DARK WEB Retrieved from: https://blog.dashburst.com /
  9. 9. Our Goal is providing order The 3 key areasof Cyber Security that needs to be protected. A Availability Information must be accessible when and where it is needed. C Confidentiality Information must not be exposed or accessed by any unauthorized individual. I Integrity Information must be consistent and correct unless an authorized change was made. 10
  10. 10. 11 • Being paranoid. • Thinking on the other side. • Continuous learning. • Providing awareness. • Practicing what you preach. MINDSET
  11. 11. CYBERDEFENSING <PHISHING> A social engineering technique used by cybercriminals to fool computer users to disclose personal information or installing a malware to your system. Usually in a form of website or emails with attachments. Image taken from:Cloudfront.net MASS-SCALE PHISHING Cyber criminalsuse wide-rangeattacks that aren’t highly targeted. Image taken from:asstatic.com WHALING Same as spear phish, butit targets high profileperson such asCEOs, CFOsetc. Image takenfrom:yottaweb.net SPEAR PHISHING Targets a specific individual, seekingunauthorized access to sensitive information.
  12. 12. <PHISHING> PHISHING WEBSITE LEGIT WEBSITE Banks will never ask these information toyou. 12 CYBERDEFENSING
  13. 13. Poor email and grammar composition. <PHISHING> PHISHING EMAIL PHISHING SMS CYBERDEFENSING 13
  14. 14. CYBERDEFENSING <PHISHING> LEGIT WEBSITE PHISHING WEBSITE 14
  15. 15. CYBERDEFENSI NG <PHISHING> Phish targeting IOS Phones 15
  16. 16. CYBERDEFENSING <PHISHING> 16
  17. 17. 18 What y ou share can also be used ag ainst y ou.
  18. 18. POSTING YOUR TANTRUMS Hate post will not solve anything. But it will have an impact your personal image on cyber space and real life. CYBERDEFENSING 19
  19. 19. CHECK-IN AND LOCATION ON POST Not only does your status information tell somebody where you currently are, it also tells them where you aren’t. This information can be just as dangerous in the hands of criminals. 20 CYBERDEFENSING
  20. 20. PASSWORD SHARING You don’t need to share your account password to your partner. Relationships should be trust- centric. CYBERDEFENSING 20
  21. 21. PUTTING MIDDLE NAME Your Mother’s maiden name is being used as part of verification on financial institutions. This can be very prone to identity theft. CYBERDEFENSING 21
  22. 22. PUTTING MOBILE PHONES Accounts can be searched thru mobile number. A clear way of saying that everyone you like or not can reach you thru SMS. CYBERDEFENSING 22
  23. 23. TREATING SOCIAL MEDIA AS A DIARY The more information you provide, the higher chance of you being victimized. CYBERDEFENSING 23
  24. 24. CYBERDEFENSING ofget the fesume, son. Let's just take a look at what you have posted on you-r fac.ebook instead. Reference: http://careerandhumanresources.blogcommunity.com
  25. 25. 27 ESTABLISH YOUR PERIMETER DEFENSE

×