Presentation is loading. Please wait.

Presentation is loading. Please wait.

Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.

Similar presentations


Presentation on theme: "Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch."— Presentation transcript:

1

2

3 Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day

4

5 Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day

6 Website hacked by Anonymous
Puckett & Faraj Rep. Marine accused of 24 civilian deaths in Haditha, Iraq 2005 Website hacked by Anonymous Feb 2012 Hacked Gmail

7 Hacked Website

8 Default Accounts & Passwords
80% of data breaches involve stolen, weak, default or easily guessable passwords … and the list goes on …

9 Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day

10 Dated Software & Patch Exploits
Number of CVEs exploited in 2015 by the CVE publication date Common Vulnerabilities and Exposures (CVEs) as named by Verizon 2016 Data Breach Investigations Report Includes dated software exploits, and patches

11 Some Methods Phishing Database & Password Exploits
Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch Exploits Advanced Persistent Threat & Zero-Day

12 Adv. Persistent Threats & Zero-Day
Zero-Day Exploit Multiple attack vectors continuously over time Not just one attack one time Include several complex phases Any exploit plus continuous access Software vulnerability, unknown Exploited by hackers, before developers are aware Once known, “zero days” to patch, fix, and protect All exploits were once zero-day exploits May Zero-day attack against US Dept. of Labor website via Internet Explorer 8 vulnerability April 2014 Heartbleed, a zero-day vulnerability in the Transport Layer Security protocol, was published

13 Top Best Practices User training & awareness
Segregate data & privileges Password management Update patches and software Security hardware & software Removable media policy Data destruction policy Periodic pen testing Encrypt data Monitoring

14 Password Management Create strong passwords Change often
Min. 12 characters Phrase Change often Remove defaults Hardware & software Remove old employee accounts Don’t keep “password” files or folders Don’t share passwords Don’t reuse passwords

15 Encryption Whole disk Encryption BIOS password A phrase works well
Encrypt thumb drives Encrypt data in transit to cloud Encrypt Backups

16 What is the #1 source of data compromise ?

17 What is the #1 source?

18 Comments & Questions Steven Konecny | CFE, CIRA, CEH, CRISC
(916) (213) Let’s Take Flight


Download ppt "Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch."

Similar presentations


Ads by Google