Что такое findslide.org?

FindSlide.org - это сайт презентаций, докладов, шаблонов в формате PowerPoint.


Для правообладателей

Обратная связь

Email: Нажмите что бы посмотреть 

Яндекс.Метрика

Презентация на тему Global picture of modern threats in Cyber Security

Goals & Objectives The goal of this module is to provide an understanding of the variety and complexity of threats in the current enterprise IT environment. After completing this module, you should be able to understand:A
Module 1Global picture of modern threats in Cyber Security Goals & Objectives The goal of this module is to provide an Security Events, Attacks, and IncidentsThese figures are averages representing single organization’s security Types of Security IncidentsNearly half of security incidents in 2015 were the result of unauthorized access12/12/2016 Who is responsible for attacks?Sixty percent of all attackers are “insiders” - Cyber Risk FactorsWhat are the biggest risk factors from a cybersecurity incident?A Basic Security ConceptsSome security terms which we will be using throughout this Threat ActorsDisgruntled employee12/12/2016Hacker collectiveOrganized cyber crimeLone hackerCyber warfare Common Types of AttacksThese terms are commonly used to refer to standard types of attacks:12/12/2016 Understanding the Cyber Kill ChainThe cyber kill chain is a phase model of how attackers operate:12/12/2016 The Cybercrime Ecosystem12/12/2016
Слайды презентации

Слайд 2
Goals & Objectives
The goal of this module is

Goals & Objectives The goal of this module is to provide

to provide an understanding of the variety and complexity

of threats in the current enterprise IT environment.

After completing this module, you should be able to understand:
A high-level overview of recent major incidents and the worldwide modern threat landscape, based on data and figures from IBM’s X-Force Threat Research.
Additional use cases of related concepts such as organized cyber crime, cyber crime on demand, Advanced Persistent Threat attacks, and the Cyber Kill Chain approach.
The tools and techniques used by attacks, reviewing such concepts as Vulnerability, Exploit, and Remediation; DDOS, SQL Injection, Watering Hole attacks, Insider threat, and Zero Day attack.

Слайд 3 Security Events, Attacks, and Incidents
These figures are averages

Security Events, Attacks, and IncidentsThese figures are averages representing single organization’s

representing single organization’s security monitoring results. Every organization

is constantly under attack.


12/12/2016

Security event: An event on a system or network detected by a security monitoring device or security application.

Attack: A security event that has been identified by monitoring tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy systems or information.

Security incident: An attack or security event that has been reviewed by security analysts and deemed worthy of deeper investigation.


Слайд 4 Types of Security Incidents
Nearly half of security incidents

Types of Security IncidentsNearly half of security incidents in 2015 were the result of unauthorized access12/12/2016

in 2015 were the result of unauthorized access

12/12/2016


Слайд 5 Who is responsible for attacks?
Sixty percent of all

Who is responsible for attacks?Sixty percent of all attackers are “insiders”

attackers are “insiders” - and this number is increasing

12/12/2016
Security

measures must be able to address the insider threat – as well as protecting against malicious outsiders

Слайд 6 Cyber Risk Factors
What are the biggest risk factors

Cyber Risk FactorsWhat are the biggest risk factors from a cybersecurity

from a cybersecurity incident?
A recent survey of over 100

corporate disclosure documents shows us the risks:

reputational harm (83%)

civil litigation (60%)

regulatory enforcement (51%)

remediation costs (50%)

privacy law compliance (43%)


12/12/2016

Each of these factors can result in significant costs to an organization.


Слайд 7 Basic Security Concepts
Some security terms which we will

Basic Security ConceptsSome security terms which we will be using throughout

be using throughout this course



12/12/2016
Vulnerability
Any feature of a system

which can be used to perform unauthorized actions, or allows bad things to occur

Exploit

A tool, program or action which is used to take advantage of a vulnerability

Remediation

The work that needs to be done to correct a vulnerability or reduce the likelihood of a threat occurring

Asset

Anything we are trying to protect: information,
people, infrastructure, or systems

Threat

What we are trying to protect against -- the possibility that a certain type of negative event may occur

Risk

The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability


Слайд 8 Threat Actors
Disgruntled employee

12/12/2016
Hacker collective
Organized cyber crime
Lone hacker
Cyber warfare

Threat ActorsDisgruntled employee12/12/2016Hacker collectiveOrganized cyber crimeLone hackerCyber warfare

Слайд 9 Common Types of Attacks
These terms are commonly

Common Types of AttacksThese terms are commonly used to refer to standard types of attacks:12/12/2016

used to refer to standard types of attacks:

12/12/2016


Слайд 10 Understanding the Cyber Kill Chain
The cyber kill chain

Understanding the Cyber Kill ChainThe cyber kill chain is a phase model of how attackers operate:12/12/2016

is a phase model of how attackers operate:

12/12/2016


  • Имя файла: global-picture-of-modern-threats-in-cyber-security.pptx
  • Количество просмотров: 97
  • Количество скачиваний: 0