2016 to 2021
-
Upload
gregory-mccardle -
Category
Technology
-
view
66 -
download
2
Transcript of 2016 to 2021
![Page 1: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/1.jpg)
CYBER CRIMESTHE NEXT FIVE YEARS
INTRODUCTION:
GREGORY MCCARDLE
IT SECURITY
![Page 2: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/2.jpg)
EXPERT ANALYSIS PREDICTIONS WITHIN 5 YEARS
• The world’s cyber attacks vectors will grow at alarming magnitude between 2016 to 2021
• Projects $1 Trillion will be spent globally on Cybersecurity.
• Cyber crimes predicted to cost the world $6 Trillion.
![Page 3: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/3.jpg)
EMERGING TRENDS
Ransomware:
• Encryption methodology exploits through vulnerabilities.
• Gameover Zeus (GOZ) CryptoLocker
Advance Persistent Threats:
• The challenging of firewalls and anti-malware being pass by targeting
employees through social engineering and Phishing technique.
• Theft of data and proprietary information.
![Page 4: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/4.jpg)
EMERGING TRENDS
Exploit Tools for hackers are easily ready and available to include
online training. Example: Kali Linux
• Information Gathering-56
• Wireless Attacks-33
• Sniffing and Spoofing-32
• Hardware Hacking tool-6
• Forensic-23
![Page 5: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/5.jpg)
KALI LINUX (AKA) BACKTRACK
Friend and Foe
Kali Linux has a total of 13 tools listing with a total of 329 sub-tools embedded.
• Hackers can use Kali to measure and test the strength of your strength, gather information, exploit open vulnerable ports, etc.
• IT Security Professionals can take advantage of tools like Kali.
Examples:• Use Kali Nmap to identify the risk to our open ports.• Use Kali reverse engineering tool to identify the source of an attacks.
![Page 6: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/6.jpg)
MAIN MOTIVATION
![Page 7: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/7.jpg)
HOW DO IT SECURITY PROFESSIONALS BECOME MORE RESILIENT?
Ensuring It Security is is the essential forefront to all projects,
processes, and lifecycle in our environment.
• Inventory Maintenance
• Implementation of security controls
• Testing Security Controls
• Identify Risk levels (High, Moderate, Low)
• Risk Mitigation
• Continuous Monitoring
• Plan of Action and Milestone (POAM)
![Page 8: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/8.jpg)
A POWERFUL CRIME FIGHTING WEAPON
Training is an important factor:
• Policy and Procedures (Top Down Approach).
• Management Buy-In.
• Acceptable User Policy (AUP).
![Page 9: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/9.jpg)
SOLUTIONS
• Backup Data
• Patch Cycle Tuesday, other scheduled patching as needed.
• Understanding Anti-Virus Software, Update definitions.
![Page 10: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/10.jpg)
SOLUTIONS
Password Protection
• Password policy
• Password frequency
• Passphrase vs. Passwords
![Page 11: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/11.jpg)
SOLUTIONS
Network Monitoring
• SEIM Tools
• Intrusion Detection and Prevention Systems
• Demilitarized Zone (DMZ)
![Page 12: 2016 to 2021](https://reader034.fdocuments.us/reader034/viewer/2022051405/587adba11a28ab542b8b54a5/html5/thumbnails/12.jpg)
THANK YOU FOR YOUR TIME