1 / 16

How Secure are YOU?

How Secure are YOU?. Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell FM&T. How Secure are YOU?. How many of you? Have a Computer at Home Travel with a Laptop High Speed Internet at Home

Télécharger la présentation

How Secure are YOU?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell FM&T

  2. How Secure are YOU? • How many of you? • Have a Computer at Home • Travel with a Laptop • High Speed Internet at Home • Have wireless networks at Home • Connect to wireless networks on Travel • Connect to the Internet in Hotels • Children with game consoles connected to the Internet or use any of the above BEF

  3. Then you may not be as secure as you think! • New Headlines • TJX losing 2.4 million records • Two charged for allegedly stealing trade secrets • Pfizer investigates data lost • Stolen Johns Hopkins Hospital computer holds patient data • Gap stolen laptop loses information on 800,000 present and past employees • Monster.com users target of phishing and ransom schemes • 3com agrees to a buy-in by Huawei worth 2.2 billion • Mass web attacks confounds Law Enforcement and Researchers BEF

  4. WHO/WHERE is the Threat Information obtained from www.sans.org BEF

  5. What is the Threat. • Request for Information • Unsolicited inquiries – Direct or Indirect • Acquisition of Technology • Attempts to gain access to sensitive technologies • Solicitation of Marketing Services • Foreign individuals with technical backgrounds offering services • Targeting of US personal abroad • Requesting access sensitive facilities or personal information • Targeting at Conventions • Provides access to all of the above BEF

  6. What is the Threat. • Exploitation of Relationships • Partnership through joint ventures and research • Suspicious Internet Activity • Exploitation of computing resources • Other • Luggage searches • Unauthorized access to portable computing devices • Extensive questioning BEF

  7. How Secure Are You? • Let’s see what could potential happen to anyone of us. • Killing_with_Keyboards KCP.pps BEF

  8. How will it happen. Data complied from Anti-Phishing (www.antiphishing.org) BEF

  9. How will it happen. BEF

  10. How will it happen. BEF

  11. How will it happen. Any Username or Password is accepted here. BEF

  12. How will it happen. BEF

  13. How will it happen. BEF

  14. Let’s see what could potentially happen to anyone of us. Without a trace.doc TTN_October_'06 10-17-06.doc How Secure Are YOU? BEF

  15. When will it happen • You tell me. • Here are my thoughts: • Globalization of business • Use of front companies • Enhancing the efficiency of command, control, communication, and intelligence will be a priority • The shift to government sponsorship • Increase in the number of incidents • Increase in suspicious internet activity – just one • Your guess is as good as mine, however, I will say sooner that later. BEF

  16. BEF

More Related