Download - Cyber Crimes: The next five years
![Page 1: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/1.jpg)
CYBER CRIMESTHE NEXT FIVE YEARS
INTRODUCTION:GREGORY MCCARDLEIT SECURITY
![Page 2: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/2.jpg)
EXPERT ANALYSIS PREDICTIONS WITHIN 5 YEARS• The world’s cyber attacks vectors will grow at alarming
magnitude between 2016 to 2021
• Projects $1 Trillion will be spent globally on Cybersecurity.
• Cyber crimes predicted to cost the world $6 Trillion.
![Page 3: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/3.jpg)
EMERGING TRENDS
Ransomware:• Encryption methodology exploits through vulnerabilities.• Gameover Zeus (GOZ) CryptoLocker
Advance Persistent Threats:• The challenging of firewalls and anti-malware being pass by targeting
employees through social engineering and Phishing technique.• Theft of data and proprietary information.
![Page 4: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/4.jpg)
EMERGING TRENDS
Exploit Tools for hackers are easily ready and available to include online training. Example: Kali Linux
• Information Gathering-56• Wireless Attacks-33• Sniffing and Spoofing-32• Hardware Hacking tool-6• Forensic-23
![Page 5: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/5.jpg)
KALI LINUX (AKA) BACKTRACKFriend and Foe
Kali Linux has a total of 13 tools listing with a total of 329 sub-tools embedded.
• Hackers can use Kali to measure and test the strength of your strength, gather information, exploit open vulnerable ports, etc.
• IT Security Professionals can take advantage of tools like Kali. Examples:• Use Kali Nmap to identify the risk to our open ports.• Use Kali reverse engineering tool to identify the source of an attacks.
![Page 6: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/6.jpg)
MAIN MOTIVATION
![Page 7: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/7.jpg)
HOW DO IT SECURITY PROFESSIONALS BECOME MORE RESILIENT?Ensuring It Security is is the essential forefront to all projects, processes, and lifecycle in our environment.
• Inventory Maintenance• Implementation of security controls• Testing Security Controls• Identify Risk levels (High, Moderate, Low)• Risk Mitigation• Continuous Monitoring• Plan of Action and Milestone (POAM)
![Page 8: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/8.jpg)
A POWERFUL CRIME FIGHTING WEAPON
Training is an important factor:• Policy and Procedures (Top Down Approach).• Management Buy-In.• Acceptable User Policy (AUP).
![Page 9: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/9.jpg)
SOLUTIONS
• Backup Data• Patch Cycle Tuesday, other scheduled patching as needed.• Understanding Anti-Virus Software, Update definitions.
![Page 10: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/10.jpg)
SOLUTIONS
Password Protection• Password policy• Password frequency• Passphrase vs. Passwords
![Page 11: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/11.jpg)
SOLUTIONS
Network Monitoring• SEIM Tools• Intrusion Detection and Prevention Systems• Demilitarized Zone (DMZ)
![Page 12: Cyber Crimes: The next five years](https://reader036.vdocuments.us/reader036/viewer/2022062522/58a1e24c1a28ab531e8b4625/html5/thumbnails/12.jpg)
THANK YOU FOR YOUR TIME