Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security & IT: What’s Next?

Similar presentations


Presentation on theme: "Cyber Security & IT: What’s Next?"— Presentation transcript:

1 Cyber Security & IT: What’s Next?
Ransomware and its effects

2 Heather Stratford CEO of IT Training Solutions - An International Cyber Security Business.  Has 15 years of experience in Leadership and Business Development Worked in All areas of Business - Fortune 500 to Start-ups Entrepreneur - started and taken over national companies Gravitated to Technology because she saw a need that she could fill Lectures around the country

3 Why IT and Cyber Security?
Top Growth Areas for the next decade Use your analytical and communications skills to solve real problems Job security Help fight against Organized Crime – CSI move over

4 Why? Cyber Security This is your generation’s form of Organized Crime.
U.S. Department of Justice: Ransomware attacks are now averaging 4,000 reported attacks per day. Up 400 percent since

5 Growing Need for Cyber Security

6 Low Cost to Enter, Successful, Hard to Trace
The Perfect Crime Motivation Payments Digital Version of Extortion Plays on Fear and Embarrassment A Very Lucrative way to make money Average Payment for an Individual Ransomware Victim: $300 Average Payment for a Business Ransomware Victim: $10,000 Low Cost to Enter, Successful, Hard to Trace

7 FBI Statistics FBI estimates 1 billion in cyber-extorted money in 2016
2015 – 753,684 Ransomware attacks totaling $24M in paid ransom. 2016 – First quarter – $210M in paid ransom. Loss estimates: For a large enterprise : $861,000 For a small business : $86,500

8

9 What is Ransomware?

10 How Does Ransomware Work?
User usually opens a file, usually via phishing , IM, social media or by visiting a malicious site. A pop up window opens, usually looking like an official site or from a person they recognize. The user’s files are encrypted with an AES-256. A randomly generated one-time key. This creates an individual encryption key for each file.

11 Actual Ransomware Screens

12 How do Cyber Criminals Attack?
. The number one point for attack is attacking a single computer that is attached to a larger network. The Criminal hopes they can make the attachment or link look legitimate and start the infection.

13 Phishing - Who is it from?

14 Phishing – Who is it to?

15 Phishing – Identifying Information?

16 Phishing – Reason for Contact?

17 Phishing – Fake Links

18 How do Cyber Criminals Attack?
2. Exploit Kits. Malicious Ads on popular websites are used to push exploit kits to unsecure machines. Exploit Kits are malicious toolkits that spread malware by exploiting security holes found in software applications that are already running on an employees computer. For example Adobe Reader

19 How do Cyber Criminals Attack?
3. Free Pirated Software. When a company or private individual does not pay for the license on their software they run the risk of infecting from the pirated software site or downloaded file.

20 Ransomware History 1989: First known Ransomware was AIDS Trojan
2005: Extortionate Ransomware became prominent in May, 2005. 2006: By mid-2006, worms such as Gpcode, TROJ.RANSOM.A, Archiveus, Krotten, Cryzip, and MayArchive began utilizing more sophisticated RSA encryption schemes, with ever-increasing key-sizes.

21 Ransomware History

22 How Do I Know if I’m Infected?
Ransomware will hit your system and it will take one of three forms Encryption Ransomware LockScreen Ransomware MasterBoot Record (MBR) Ransomware

23 Lock Screen Ransomware
This type of ransomware presents a full screen image that will not allow other windows to open. The screen will demand payment and give instruction for transferring money.

24 CryptoLocker CryptoLocker is a type of ransomware that rakes in 30 million every 100 days. It has infected thousands of machines This has been mostly targeted to PCs. But there are now Mac reports of Ransomware. And reports on mobile devices as well Education organizations are the most attacked organizations

25 Bitcoin is a form of digital currency, created and held electronically
Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bought and sold at bitcoin “exchangers” Used by hackers because it is untraceable Today 1 bitcoin = $ USD

26 Sources http://www.coindesk.com/information/what-is-bitcoin/
Kaspersky - Cyber Security - Ransomware - Webinar, August 2016 the-rise Kaspersky - Tech Junction - Ransomware Training, Mark Villinski, September 2016


Download ppt "Cyber Security & IT: What’s Next?"

Similar presentations


Ads by Google