Executive Director and Endowed Chair

Slides:



Advertisements
Similar presentations
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
Advertisements

Its a new digital world with new digital dangers….
7 Effective Habits when using the Internet Philip O’Kane 1.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
 Awesome Stuff Cyber Security Tyler Hoover Auburn University.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
March 21, 2012 John Vigouroux CEO M86 Security (acquired by Trustwave)
INTRODUCTION & QUESTIONS.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
Cybersecurity Test Review Introduction to Digital Technology.
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Mark Ryan Professor of Computer Security 25 November 2009
Cyber Issues for Design Professionals
IBM 2015 Cyber Security Intelligence Index
IBM 2016 Cyber Security Intelligence Index
Bitdefender Antivirus Support
Network Security Fundamentals
CYBER SECURITY...
Cyber Security & IT: What’s Next?
Cisco 2017 Security Annual Report
Unit 32 – Networked Systems Security
بهترین راهکار را انتخاب کنید...
Cybersecurity Awareness
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Authentication by Passwords
Week 7 Securing Information Systems
Executive Director and Endowed Chair
Internet Worm propagation
CompTIA Security+ Study Guide (SY0-501)
Malware March 26, 2018.
Internet Security Threat Status
Cyber Security Research: Applied and Basic Combined*
The Internet of Unsecure Things
Challenge-Response Authentication
Cyber Security Research: Applied and Basic Combined*
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
1:53:58 AM.
Malware CJ
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
CSCD 303 Essential Computer Security Fall 2018
Security Hardening through Awareness August 2018
Networking for Home and Small Businesses – Chapter 8
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Strategic threat assessment
Challenge-Response Authentication
Networking for Home and Small Businesses – Chapter 8
Information Protection
Networking for Home and Small Businesses – Chapter 8
Cyber Security Research: Applied and Basic Combined*
World-Leading Research with Real-World Impact!
Threat Landscape Update
Information Protection
Presentation transcript:

Executive Director and Endowed Chair CS 5323 Malware Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 11 ravi.utsa@gmail.com www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact!

Industry Reports Symantec Internet Security Threat Report AT&T Cybersecurity Insights Report Cisco Annual Security Report Dell Security Annual Threat Report Google Android Security Annual Report IBM X-Force Cyber Security Intelligence Index Report McAfee Labs Threat Predictions Report Verizon Data Breach Investigation Report …… © Ravi Sandhu World-Leading Research with Real-World Impact! 2

Symantec Internet Security Threat Report 2016 (for 2015) A new zero-day vulnerability was discovered on average each week (total 54) Doubled from 2014 Over half a billion personal records were stolen or lost Companies choosing not to report the number of records lost increased by 85 percent Major security vulnerabilities in 75% of popular websites 15% of legitimate websites have critical vulnerabilities Spear-phishing targeting employees increased 55% 43% of all attacks targeted at small businesses Ransomware increased 35% moved beyond PCs to smart phones, Mac, and Linux systems Symantec blocked 100 million fake tech support scams first reported in 2010 © Ravi Sandhu World-Leading Research with Real-World Impact! 3

Symantec Internet Security Threat Report 2016 (for 2015) Big numbers Pages 8 and 9 of report © Ravi Sandhu World-Leading Research with Real-World Impact! 4

Malware Classic Malware Trojan Horse (1971) Logic Bomb Virus (1985) Worm Modern Crimeware Rootkit Exploit Zero-Day Keylogger Drive by Adware Spyware Ransomware Phishing Spam DDOS Botnet © Ravi Sandhu World-Leading Research with Real-World Impact! 5

Malware Delivery Trigger Target Self- Propagating Planted By Attacker Inadvertent By User Local Condition External Command Host External Damage Exfiltrate Virus Worm © Ravi Sandhu World-Leading Research with Real-World Impact! 6