90 likes | 205 Vues
Join 1st Lt Alex Roosma from the USAF on March 6, 2014, for an insightful overview of cybersecurity. This training symposium covers real-world cyber attacks, hacker methodologies, and essential protective measures for individuals and organizations. Gain insights into high-profile breaches such as Adobe and Target, explore hacker motivations, and learn about various attack vectors including phishing and social engineering. Equip yourself with the knowledge and resources to secure personal identifiable information and maintain cybersecurity awareness.
E N D
Cyber Security AMSC FM Training Symposium Alex Roosma, 1st Lt, USAF 6 March 2014
Overview • Real-world cyber attacks • Hacker methodology • How to protect yourself and others • Resources • Questions
Real-World Examples • Recent High Profile Breaches: • Adobe user passwords • Target • US Dept of Energy • LivingSocial • Snowden Leaks • New York Times • AHMC Hospitals Breach
Hacker Motivations • Motivations for network attacks: • Money – Selling financial, personal or corporate information • Fame – Kevin Mitnick • Ideology – Edward Snowden, Anonymous
Attack Vectors • Social Engineering • Fraudulent Website • Phishing • Malicious Code • Insider Threat
How to protect yourself and others • Be aware of attack vectors • Phishing • Social Engineering • Email Attachment Malware • Websites (just because you can get to a site at work doesn’t guarantee its safety) • Secure your password • Not guessable from your social media profile • Employ a password manager • Secure Personal Identifiable Information (PII) • Keep data at rest encrypted • Encrypt email messages or use AMRDEC SAFE: https://safe.amrdec.army.mil/safe/
Resources • http://www.staysafeonline.org/ • http://www.getnetwise.org/ • http://www.onguardonline.gov/ • http://www.ikeepsafe.org/