Вы находитесь на странице: 1из 9

End-User Security Training

Beginners Guide to Keeping Your Information and


Computer Safe

Kelly Handerhan, Instructor


COURSE OUTLINE
1. What Is Cybersecurity?
2. Personally Identifiable information (PII)
3. Social Engineering
4. Emails, Links, and Attachments
5. Basics of Online Security
6. Computer Best Practices
7. Network Security
8. Physical Security
9. Mobile Device Security
10. Something went wrong…now what?
Section 1: What is Cybersecurity and Why Do We Care?

INTRODUCTION
• What is it? Cybersecurity is the term for all the processes and
practices we implement to protect networks, computers,
applications, and data from attacks on the C-I-A triad
(Confidentiality, Integrity, and Availability)
• Why Do We Care?
• Estimates upwards of 250 BILLION dollars of loss associated
with Cyber Crime (McAfee estimates almost one trillion.)
• Every year, the Director of National Intelligence publishes an
unclassified "Worldwide Threat Assessment." The year 2015
report was published listing "Cyber" is the first (and greatest)
threat listed.
Section 1: What is Cybersecurity and Why Do We Care?

KNOW YOUR ENEMY?


• Who commits cyber crimes? Cyber criminals
• Organized Crime
• Traditional mafia is outsourcing cybercrime to Freelance Criminals---
Billions of dollars at stake
• Terrorists
• ISIS attacks on military sites
• Pose threats to national security secrets, but also the existing
infrastructure
• Foreign Nations
• Stuxnet, Sony attacks
• Insiders
• Estimated 1.2 Billion in losses
• Hacktivists
• Anonymous
• Common Thieves
• Why did you rob the bank? That’s where the money is
Section 1: What is Cybersecurity and Why Do We Care?

PROTECTING YOUR C-I-A, ALSO KNOWN


AS “COVERING YOUR ASSETS!”

• Confidentiality: Prevent unauthorized disclosure of information


• Integrity: Prevent unauthorized modification of information or files
• Availability: Ensuring timely access to resources
Section 1: What is Cybersecurity and Why Do We Care?

CONFIDENTIALITY
• Protecting the privacy of information
• Keep sensitive information off the network, if
possible.
• Encrypt sensitive information
• Protect access to your system
• Don’t share sensitive information
• Password protection
Section 1: What is Cybersecurity and Why Do We Care?

INTEGRITY
• Preventing Unauthorized Modification of Information
• Emails
• Data
• Digital Downloads
• Log/Audit files
• Reliability/Trustworthiness of information
• Hijacked websites
• Email with modified content
• Corrupted files
Section 1: What is Cybersecurity and Why Do We Care?

AVAILABILITY
• Denial of Service Attacks and Distributed Denial of Service Attacks
• Expect the Unexpected
• Beware of Natural/Manmade disasters

Image courtesy of: http://archive.networknewz.com/networknewz-


10-20030924TheDistributedDenialofServiceAttack.html
Section 1: What is Cybersecurity and Why Do We Care?

SUMMARY
• Cybersecurity is everyone’s concern
• Help your organization:
• Reduce loss
• Protect customer information
• Prevent Fraud
• Lose Man-hours
• Think: C-I-A

Вам также может понравиться