
CYBERATTACKS AND CYBERSECURITY
Presentation
•
Other
•
University
•
Hard
Roberto Santana
Used 5+ times
FREE Resource
20 Slides • 6 Questions
1
CYBERATTACKS AND CYBERSECURITY
keeponlearning
2
Inget-inget duyu..
yuk jawab..
3
Multiple Choice
The term_________ describes the standards or codes of behavior expected of an individual by a group to which the individual belongs.
morals
ethics
virtues
integrity
4
Multiple Choice
____________ is/are one’s personal beliefs about what is right and wrong.
virtues and vices
ethics
morals
code of ethics
5
Multiple Choice
Laws provide a complete guide to ethical behavior. True or False?
true
false
6
Open Ended
The moral corruption of people in power has been given the name ...........
7
Multiple Choice
According to the Ethics Resource Center, which of the following is the most commonly observed form of employee misconduct?
Lying to employees
Abusive behavior
Inappropriate social networking
Misuse of company time
8
Multiple Choice
A statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
Integrity statement
code of ethics
mission statement
vision statement
9
A zero-day exploit
is a cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.
It takes advantage of security flaws that enable unauthorized users to gain access to a computer system or to download sensitive user data
10
complex trade-offs when making decisions regarding IT security
How much effort and money should be spent to safeguard against computer crime? (In other words, how safe is safe enough?
What should be done if recommended computer security safeguards make conducting business more difficult for customers and employees, resulting in lost sales and increased costs?
If a firm is a victim of a cybercrime, should it pursue prosecution of the criminals at all costs, maintain a low profile to avoid the negative publicity, inform affected customers, or take some other action?
11
WELL..THIS IS TOO BAD
While one would hope that the discoverer of a zero-day vulnerability would immediately inform the original software manufacturer so that a fix can be created for the problem, unfortunately this is often not the case. In some cases, this knowledge is sold on the black market to hackers, cyberterrorists, governments, or large organizations that may then use it to launch their own cyberattacks. Information about one zero-day vulnerability in Apple’s iOS was reportedly sold for $500,000.
12
13
a recent survey of more than 10,000 IT professionals around the world revealed the following:
58 percent of global companies have an overall security strategy
54 percent have a chief information security officer (CISO) in charge of security
53 percent have employee security awareness and training programs
14
a recent survey of more than 10,000 IT professionals around the world revealed the following:
52 percent have security standards for third parties
49 percent conduct threat assessments
48 percent actively monitor and analyze security intelligence
15
What caused a dramatic increase in the number, variety, and severity of security incidents are...
Increasing computing complexity,
expanding and changing systems,
an increase in the prevalence of bring your own device (BYOD) policies,
a growing reliance on software with known vulnerabilities,
and the increasing sophistication of those who would do harm
16
Increasing Complexity Increases Vulnerability
Computing environments have become enormously complex. Cloud computing, networks, computers, mobile devices, virtualization, operating systems, applications, websites, switches, routers, and gateways are interconnected and driven by hundreds of millions of
lines of code.
The number of possible entry points to a network expands continually as more devices are added, increasing the possibility of security breaches.
17
Expanding and Changing Systems Introduce New Risks
Business has moved from an era of stand-alone computers, in which critical data were stored on an isolated mainframe computer in a locked room, to an era in which personal computers and mobile devices connect to networks with millions of other computers, all capable of sharing information.
it is increasingly difficult for IT organizations to keep up with the pace of technological change, successfully perform an ongoing assessment of new security risks, and implement approaches for dealing with them
18
Increasing Prevalence of BYOD Policies
Bring your own device (BYOD) is a business policy that permits, and in some cases
encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.
However, this practice raises many potential security issues as it is highly likely that such devices are also used for nonwork activity (browsing websites, shopping, visiting social networks, blogging, etc.) that exposes them to malware much more frequently than a device used strictly for business purposes
19
Increasing Prevalence of BYOD Policies
many users do not password protect their laptops, tablets, and smartphones or set the timeout to automatically lock the device after a few minutes of not being used. All these create an environment ripe for potential security problems.
It is worth noting that employees also have concerns with BYOD policies, primarily related to privacy
Most people place a high priority on keeping any prying eyes, including those of their employer, from looking at the personal photos, text messages, and email stored on their personal mobile devices
20
Growing Reliance on Commercial Software with Known Vulnerabilities
In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability.
Often this attack is due to poor system design or implementation.
Once the vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem
Any delay in installing a patch exposes the user to a potential security breach
21
Increasing Sophistication of Those Who Would Do Harm
Previously, the stereotype of a computer troublemaker was that of an introverted “geek” working on his or her own and motivated by the desire to gain some degree of notoriety
While such individuals still exist, it is not this stereotyped individual who is the biggest threat to IT security
Today’s computer menace is much better organized and may be part of an organized group (for example, Anonymous, Chaos Computer Club, Lizard Squad, TeslaTeam, and hacker teams sponsored by national governments) that has an agenda and targets specific organizations and websites.
22
23
Types of Exploits
There are numerous types of computer attacks, with new varieties being invented all the time.
24
explain...
Ransomware
viruses
worms
trojan horse
blended threat
spam
DDoS attacks
25
explain...
Advanced Persistent Threat
Phishing
Smishing
Vishing
Cyberespionage
Cyberterrorism
26
Assignment Just 4 U
Explain how an organization respond to cyberattack. Turn in your written explanation on Google Classroom
CYBERATTACKS AND CYBERSECURITY
keeponlearning
Show answer
Auto Play
Slide 1 / 26
SLIDE
Similar Resources on Wayground
20 questions
4TH QUARTER_FILIPINO (KINDER 2)
Presentation
•
KG
20 questions
Stroop Effect Quiz 2
Presentation
•
KG - University
19 questions
Philippine Health Situation
Presentation
•
University
19 questions
Unit 2 Semester 2 Week 11 Summative
Presentation
•
University
24 questions
Credit & Debt Management
Presentation
•
University
21 questions
ATIN2_PART4_S26
Presentation
•
University
21 questions
IN ON AT prepositions of place
Presentation
•
University
21 questions
AMDM Fermi Lesson
Presentation
•
KG - University
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Other
15 questions
LGBTQ Trivia
Quiz
•
University
36 questions
8th Grade US History STAAR Review
Quiz
•
KG - University
25 questions
5th Grade Science STAAR Review
Quiz
•
KG - University
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
20 questions
5_Review_TEACHER
Quiz
•
University
10 questions
Applications of Quadratic Functions
Quiz
•
10th Grade - University
10 questions
Add & Subtract Mixed Numbers with Like Denominators
Quiz
•
KG - University
20 questions
Block Buster Movies
Quiz
•
10th Grade - Professi...