際際滷

際際滷Share a Scribd company logo
ICTSA v2
ICTSA v2
 "With only 10 million of the 500 million connections, we are able to
build a map of the world solely from our own personal connections..
 Note relative "darkness" of China, due to blocks on Facebook, and
former Soviet Union countries, where other social networking sites
predominate.
23%
50%
Sources include Deloitte poll, NTT Security, PandaLabs, Q3 2016 report
 60.1%
 11.7%
Source: Imperva Incapsulas latest Global DDoS Threat Landscape Report, Q2 2016
Source Volume 20, Microsoft Security Intelligence Report, 2H 2015
 Attackers employ
online services that
are local to a specific
geographic region.
stunning breach of
global internet stability.
Things (October saw)  a movement caused by the heft of a few
billion chickens coming home to roost in the shape
of Mirai, the botnet behind a couple of truly staggering
DDoS (Distributed Denial of Service) attacks on journalist
Brian Krebs and DNS provider Dyn.
Source: IoT chickens come home to roost, Sophos Naked Security
 Be vigilant when choosing with whom to entrust your data
 Pay particular attention to bogus websites intended to steal personal information
 If its too good to be true, then it probably is
 When in doubt, seek out a professional
SecurityTesting
 Distrust publicWiFi networks
 Watch what Apps you install  especially the permissions they request
 Dont go for convenience vs. privacy & security
 Change default passwords of devices (like CCTVs, routers etc.)
THEBASICS Identify IoT devices
 Non traditional endpoints
w/ an IP
 Manage your systems IPs
Isolate Systems
 Network segregation
throughVLANS
 Apply Layer3 security
policies
Limit Internet Access
 Reduce ability to reach the
internet
 Limit infections of other
devices
 As employers seek to combat the growing threat of cybercrime and
avert mass disruption to public and private lives.
 Instead, they are being tempted to exacerbate cybercrime, rather than
prevent it.
 https://academy.kaspersky.com/talentlab/
Source: Kaspersky Lab Raises Alarm Over Critical Cybersecurity Skills Shortage, Says Youth can Bridge Gap - if Industry Lets it
THE BASICS
Source footprints research http://phys.org/news/2016-10-anonymous-web-thinkmuch.html#jCp
Thats it!Thank you

More Related Content

What's hot (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
Maurice Dawson
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
Richard Stiennon
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
North Texas Chapter of the ISSA
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
Mangesh Gunjal
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
Null hyderabad - October Newsbytes
Null hyderabad - October NewsbytesNull hyderabad - October Newsbytes
Null hyderabad - October Newsbytes
n|u - The Open Security Community
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networks
Abaram Network Solutions
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
Mubarak Al Hadadi
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
NewsBytes - Nullhyd
NewsBytes - Nullhyd NewsBytes - Nullhyd
NewsBytes - Nullhyd
n|u - The Open Security Community
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
axnv
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
Maurice Dawson
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
Richard Stiennon
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
Mangesh Gunjal
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
bl26ehre
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Hiren Selani
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson
One of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networksOne of the most destructive botnets can now spread to nearby Wi-Fi networks
One of the most destructive botnets can now spread to nearby Wi-Fi networks
Abaram Network Solutions
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Yanis Mendez
Cyber crime
Cyber crimeCyber crime
Cyber crime
rishith23
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
Mubarak Al Hadadi
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
Arindam Sarkar
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
axnv
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo

Similar to ICTSA v2 (20)

Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
JamesDempsey1
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
William Slater III
Building the silver lining seminar slides
Building the silver lining   seminar slidesBuilding the silver lining   seminar slides
Building the silver lining seminar slides
Exponential_e
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
RedZone Technologies
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
Weaponizing Intelligence: Interdiction in Todays Threat Landscape
Weaponizing Intelligence:  Interdiction in Todays Threat LandscapeWeaponizing Intelligence:  Interdiction in Todays Threat Landscape
Weaponizing Intelligence: Interdiction in Todays Threat Landscape
Priyanka Aash
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNet
kingsBSD
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
San Diego Continuing Education
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart BangladeshBDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Bangladesh Network Operators Group
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attack
yennhi2812
This Time, Its Personal: Why Security and the IoT Is Different
This Time, Its Personal: Why Security and the IoT Is DifferentThis Time, Its Personal: Why Security and the IoT Is Different
This Time, Its Personal: Why Security and the IoT Is Different
Justin Grammens
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
JamesDempsey1
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
William Slater III
Building the silver lining seminar slides
Building the silver lining   seminar slidesBuilding the silver lining   seminar slides
Building the silver lining seminar slides
Exponential_e
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
Takeshi Takahashi
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
Weaponizing Intelligence: Interdiction in Todays Threat Landscape
Weaponizing Intelligence:  Interdiction in Todays Threat LandscapeWeaponizing Intelligence:  Interdiction in Todays Threat Landscape
Weaponizing Intelligence: Interdiction in Todays Threat Landscape
Priyanka Aash
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNet
kingsBSD
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart BangladeshBDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Bangladesh Network Operators Group
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attack
yennhi2812
This Time, Its Personal: Why Security and the IoT Is Different
This Time, Its Personal: Why Security and the IoT Is DifferentThis Time, Its Personal: Why Security and the IoT Is Different
This Time, Its Personal: Why Security and the IoT Is Different
Justin Grammens
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka

More from Donald Tabone (8)

Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
Donald Tabone
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
Donald Tabone
ELPUB_2015
ELPUB_2015ELPUB_2015
ELPUB_2015
Donald Tabone
MARM State of Security v2
MARM State of Security v2MARM State of Security v2
MARM State of Security v2
Donald Tabone
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
Donald Tabone
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone
Manning Information Security Strategy
Manning Information Security StrategyManning Information Security Strategy
Manning Information Security Strategy
Donald Tabone
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
Donald Tabone
MARM State of Security v2
MARM State of Security v2MARM State of Security v2
MARM State of Security v2
Donald Tabone
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
Donald Tabone

ICTSA v2

  • 3. "With only 10 million of the 500 million connections, we are able to build a map of the world solely from our own personal connections.. Note relative "darkness" of China, due to blocks on Facebook, and former Soviet Union countries, where other social networking sites predominate.
  • 4. 23% 50% Sources include Deloitte poll, NTT Security, PandaLabs, Q3 2016 report
  • 5. 60.1% 11.7% Source: Imperva Incapsulas latest Global DDoS Threat Landscape Report, Q2 2016
  • 6. Source Volume 20, Microsoft Security Intelligence Report, 2H 2015 Attackers employ online services that are local to a specific geographic region.
  • 7. stunning breach of global internet stability. Things (October saw) a movement caused by the heft of a few billion chickens coming home to roost in the shape of Mirai, the botnet behind a couple of truly staggering DDoS (Distributed Denial of Service) attacks on journalist Brian Krebs and DNS provider Dyn. Source: IoT chickens come home to roost, Sophos Naked Security
  • 8. Be vigilant when choosing with whom to entrust your data Pay particular attention to bogus websites intended to steal personal information If its too good to be true, then it probably is When in doubt, seek out a professional SecurityTesting Distrust publicWiFi networks Watch what Apps you install especially the permissions they request Dont go for convenience vs. privacy & security Change default passwords of devices (like CCTVs, routers etc.) THEBASICS Identify IoT devices Non traditional endpoints w/ an IP Manage your systems IPs Isolate Systems Network segregation throughVLANS Apply Layer3 security policies Limit Internet Access Reduce ability to reach the internet Limit infections of other devices
  • 9. As employers seek to combat the growing threat of cybercrime and avert mass disruption to public and private lives. Instead, they are being tempted to exacerbate cybercrime, rather than prevent it. https://academy.kaspersky.com/talentlab/ Source: Kaspersky Lab Raises Alarm Over Critical Cybersecurity Skills Shortage, Says Youth can Bridge Gap - if Industry Lets it
  • 10. THE BASICS Source footprints research http://phys.org/news/2016-10-anonymous-web-thinkmuch.html#jCp Thats it!Thank you