2016 to 2021

12
CYBER CRIMES THE NEXT FIVE YEARS INTRODUCTION: GREGORY MCCARDLE IT SECURITY

Upload: gregory-mccardle

Post on 23-Jan-2018

64 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: 2016 to 2021

CYBER CRIMESTHE NEXT FIVE YEARS

INTRODUCTION:

GREGORY MCCARDLE

IT SECURITY

Page 2: 2016 to 2021

EXPERT ANALYSIS PREDICTIONS WITHIN 5 YEARS

• The world’s cyber attacks vectors will grow at alarming magnitude between 2016 to 2021

• Projects $1 Trillion will be spent globally on Cybersecurity.

• Cyber crimes predicted to cost the world $6 Trillion.

Page 3: 2016 to 2021

EMERGING TRENDS

Ransomware:

• Encryption methodology exploits through vulnerabilities.

• Gameover Zeus (GOZ) CryptoLocker

Advance Persistent Threats:

• The challenging of firewalls and anti-malware being pass by targeting

employees through social engineering and Phishing technique.

• Theft of data and proprietary information.

Page 4: 2016 to 2021

EMERGING TRENDS

Exploit Tools for hackers are easily ready and available to include

online training. Example: Kali Linux

• Information Gathering-56

• Wireless Attacks-33

• Sniffing and Spoofing-32

• Hardware Hacking tool-6

• Forensic-23

Page 5: 2016 to 2021

KALI LINUX (AKA) BACKTRACK

Friend and Foe

Kali Linux has a total of 13 tools listing with a total of 329 sub-tools embedded.

• Hackers can use Kali to measure and test the strength of your strength, gather information, exploit open vulnerable ports, etc.

• IT Security Professionals can take advantage of tools like Kali.

Examples:• Use Kali Nmap to identify the risk to our open ports.• Use Kali reverse engineering tool to identify the source of an attacks.

Page 6: 2016 to 2021

MAIN MOTIVATION

Page 7: 2016 to 2021

HOW DO IT SECURITY PROFESSIONALS BECOME MORE RESILIENT?

Ensuring It Security is is the essential forefront to all projects,

processes, and lifecycle in our environment.

• Inventory Maintenance

• Implementation of security controls

• Testing Security Controls

• Identify Risk levels (High, Moderate, Low)

• Risk Mitigation

• Continuous Monitoring

• Plan of Action and Milestone (POAM)

Page 8: 2016 to 2021

A POWERFUL CRIME FIGHTING WEAPON

Training is an important factor:

• Policy and Procedures (Top Down Approach).

• Management Buy-In.

• Acceptable User Policy (AUP).

Page 9: 2016 to 2021

SOLUTIONS

• Backup Data

• Patch Cycle Tuesday, other scheduled patching as needed.

• Understanding Anti-Virus Software, Update definitions.

Page 10: 2016 to 2021

SOLUTIONS

Password Protection

• Password policy

• Password frequency

• Passphrase vs. Passwords

Page 11: 2016 to 2021

SOLUTIONS

Network Monitoring

• SEIM Tools

• Intrusion Detection and Prevention Systems

• Demilitarized Zone (DMZ)

Page 12: 2016 to 2021

THANK YOU FOR YOUR TIME