際際滷

際際滷Share a Scribd company logo
ICTSA v2
ICTSA v2
 "With only 10 million of the 500 million connections, we are able to
build a map of the world solely from our own personal connections..
 Note relative "darkness" of China, due to blocks on Facebook, and
former Soviet Union countries, where other social networking sites
predominate.
23%
50%
Sources include Deloitte poll, NTT Security, PandaLabs, Q3 2016 report
 60.1%
 11.7%
Source: Imperva Incapsulas latest Global DDoS Threat Landscape Report, Q2 2016
Source Volume 20, Microsoft Security Intelligence Report, 2H 2015
 Attackers employ
online services that
are local to a specific
geographic region.
stunning breach of
global internet stability.
Things (October saw)  a movement caused by the heft of a few
billion chickens coming home to roost in the shape
of Mirai, the botnet behind a couple of truly staggering
DDoS (Distributed Denial of Service) attacks on journalist
Brian Krebs and DNS provider Dyn.
Source: IoT chickens come home to roost, Sophos Naked Security
 Be vigilant when choosing with whom to entrust your data
 Pay particular attention to bogus websites intended to steal personal information
 If its too good to be true, then it probably is
 When in doubt, seek out a professional
SecurityTesting
 Distrust publicWiFi networks
 Watch what Apps you install  especially the permissions they request
 Dont go for convenience vs. privacy & security
 Change default passwords of devices (like CCTVs, routers etc.)
THEBASICS Identify IoT devices
 Non traditional endpoints
w/ an IP
 Manage your systems IPs
Isolate Systems
 Network segregation
throughVLANS
 Apply Layer3 security
policies
Limit Internet Access
 Reduce ability to reach the
internet
 Limit infections of other
devices
 As employers seek to combat the growing threat of cybercrime and
avert mass disruption to public and private lives.
 Instead, they are being tempted to exacerbate cybercrime, rather than
prevent it.
 https://academy.kaspersky.com/talentlab/
Source: Kaspersky Lab Raises Alarm Over Critical Cybersecurity Skills Shortage, Says Youth can Bridge Gap - if Industry Lets it
THE BASICS
Source footprints research http://phys.org/news/2016-10-anonymous-web-thinkmuch.html#jCp
Thats it!Thank you

More Related Content

ICTSA v2

  • 3. "With only 10 million of the 500 million connections, we are able to build a map of the world solely from our own personal connections.. Note relative "darkness" of China, due to blocks on Facebook, and former Soviet Union countries, where other social networking sites predominate.
  • 4. 23% 50% Sources include Deloitte poll, NTT Security, PandaLabs, Q3 2016 report
  • 5. 60.1% 11.7% Source: Imperva Incapsulas latest Global DDoS Threat Landscape Report, Q2 2016
  • 6. Source Volume 20, Microsoft Security Intelligence Report, 2H 2015 Attackers employ online services that are local to a specific geographic region.
  • 7. stunning breach of global internet stability. Things (October saw) a movement caused by the heft of a few billion chickens coming home to roost in the shape of Mirai, the botnet behind a couple of truly staggering DDoS (Distributed Denial of Service) attacks on journalist Brian Krebs and DNS provider Dyn. Source: IoT chickens come home to roost, Sophos Naked Security
  • 8. Be vigilant when choosing with whom to entrust your data Pay particular attention to bogus websites intended to steal personal information If its too good to be true, then it probably is When in doubt, seek out a professional SecurityTesting Distrust publicWiFi networks Watch what Apps you install especially the permissions they request Dont go for convenience vs. privacy & security Change default passwords of devices (like CCTVs, routers etc.) THEBASICS Identify IoT devices Non traditional endpoints w/ an IP Manage your systems IPs Isolate Systems Network segregation throughVLANS Apply Layer3 security policies Limit Internet Access Reduce ability to reach the internet Limit infections of other devices
  • 9. As employers seek to combat the growing threat of cybercrime and avert mass disruption to public and private lives. Instead, they are being tempted to exacerbate cybercrime, rather than prevent it. https://academy.kaspersky.com/talentlab/ Source: Kaspersky Lab Raises Alarm Over Critical Cybersecurity Skills Shortage, Says Youth can Bridge Gap - if Industry Lets it
  • 10. THE BASICS Source footprints research http://phys.org/news/2016-10-anonymous-web-thinkmuch.html#jCp Thats it!Thank you