'

How to Avoid Becoming Your Own Worst Enemy

Понравилась презентация – покажи это...





Слайд 0

How to Avoid Becoming Your Own Worst Enemy Presented by David Savlowitz


Слайд 1

Have You Been Hacked?


Слайд 2

If not, You Will Be


Слайд 3

Why?


Слайд 4


Слайд 5

Typical Hacker Representations


Слайд 6

Typical Hacker Representations Dade (From Hackers 1995)


Слайд 7

Typical Hacker Representations David (From WarGames 1983)


Слайд 8

Hackers in Reality Gary McKinnon Kevin Mitnick


Слайд 9

What techniques do hackers use?


Слайд 10

Hacking Techniques Distributed Denial of Service (DDOS) Physical Attack Social Engineering (Phishing) Custom Exploit Development


Слайд 11

The most popular technique Social Engineering (Phishing) Attempting to acquire sensitive information by posing as a trusted entity


Слайд 12

Phishing Example


Слайд 13

The Deadliest Cyber Security Sins Having a weak password or none at all Not updating frequently Ignoring the truth that you are a target of cyber crime Thinking your security is perfect Sharing your personal information online Leaving your devices unlocked when unattended Not backing up your data frequently Opening emails from a sender you do not recognize Clicking unfamiliar links Disabling your anti-virus software Disabling you firewall Writing down your password


Слайд 14

What is the risk?


Слайд 15

Leading effects of security errors Financial loss Loss of property Mental and or physical illness Death


Слайд 16

Lessons Learned You are at risk Hackers have numerous techniques but it only takes one to destroy you When in doubt ask a professional


Слайд 17

Thank You!


Слайд 18

References Blackhat [Motion picture]. (2015). United States: Forward Pass. Hackers [Motion picture]. (1995). United States: United Artists. Kennedy, D., & Couric, K. (2014, January 1). TrustedSec CEO David Kennedy on The Katie Show. Retrieved March 25, 2015, from https://vimeo.com/77102165 Security Awareness Blog. (2013, January 9). Retrieved April 17, 2015, from http://www.securingthehuman.org/blog/2013/01/09/free-security-awareness-poster-you-are-a-target Seger, L. (2012). Creating the myth. In Signs of Life in the USA (7th ed., p. 386). Boston: Bedford/St. Martin's. WarGames [Motion picture]. (1983). United artists ; Sherwood productions.


Слайд 19

Images Retrieved From http://www.securingthehuman.org http://www.mewan.net http://www.indiegrits.com http://serialeifilmy.tv http://www.thegomarketingteam.com http://img.thesun.co.uk https://b1u31c3.wordpress.com/


×

HTML:





Ссылка: