Introduction to Cybersecurity - FACE...
Transcript of Introduction to Cybersecurity - FACE...
![Page 1: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/1.jpg)
Introduction to
CybersecurityPRESENTED BYSTEWART HOLLEYORANGE L IEN DATA
![Page 2: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/2.jpg)
Workshop Objectives
Malware and Breaches
Cyber Attacks
Prevention Methods
![Page 3: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/3.jpg)
What is Cyberspace?
Networks
Devices
Software
Processes
![Page 4: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/4.jpg)
What is Cybersecurity?
Prevents Attacks
Prevents Disruption
Controls Access
Protects Against
Code Injection
![Page 5: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/5.jpg)
3 Types of Hackers
• Good Guys
• Companies/Government
• ProtectWhite Hat
• Malicious
• Trolls
• RevengeGray Hat
• Malicious
• Financial / Political Gain
• CalculatedBlack Hat
![Page 6: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/6.jpg)
Malware
Malicious Intrusive DisruptiveObtain
Information
![Page 7: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/7.jpg)
Worms
Bandwidth Consumption
Stops Anti-Malware
Turns Off Safe Mode
Blocks Updates
![Page 8: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/8.jpg)
Viruses
Corrupts Files
Slows Systems
Takes Over Systems
![Page 9: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/9.jpg)
Spyware
Collects Information
Redirects Browsers
Changes System Settings
![Page 10: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/10.jpg)
Trojans
Crashes Computers
Deletes Files
Corrupts Data
Keystroke Logging
![Page 11: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/11.jpg)
Cybersecurity Breaches
Controlled System
Unauthorized Access
Unauthorized System
Uncontrolled System
![Page 12: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/12.jpg)
Phishing
Email• Link
• Attachment• Instructions
• Warning
Phone• Straight to VM• Instructions
Text• Link• Attachment• Instructions
![Page 13: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/13.jpg)
Password Attacks
Cracking• Finds Passwords In Systems
•Many Kinds of Cracking
Brute Force•Quickly Detected•Multiple Attempts
Spray•One Password•Multiple Accounts•Undetectable By User
![Page 14: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/14.jpg)
Identity Theft
Virtual•Social Media
•Take Over Accounts•Open Online Accounts
Physical• Impersonation•Phone• In-Person
Hybrid•Phone and Email•Passwords•Social Media
![Page 15: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/15.jpg)
Protections
Firewalls
Virtual Private
Networks
Anti-VirusAnti-Spyware
Updates
![Page 16: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/16.jpg)
Protections
Secure Messaging
Multi-Factor Authentication
No Public WiFiSecure Mobile
Devices
Unsecure communications is the starting point for over 60% of cyberfraud in the real state industry.
![Page 17: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/17.jpg)
Questions?
What hackers think they look like
What hackers actually look like
![Page 18: Introduction to Cybersecurity - FACE Onlineface-online.org/wp-content/uploads/PACE-Intro_to_Cybersecurity.pdf · Malware Turns Off Safe Mode Blocks Updates. Viruses Corrupts Files](https://reader033.fdocuments.us/reader033/viewer/2022053020/5f83619a52675210f87d6b95/html5/thumbnails/18.jpg)
Thank You!Stewart Holley
All Images From Pexels.com