90 likes | 200 Views
Cyber Security. AMSC FM Training Symposium. Alex Roosma, 1st Lt, USAF 6 March 2014. Overview. Real-world cyber attacks Hacker methodology How to protect yourself and others Resources Questions. Real-World Examples. Recent High Profile Breaches: Adobe user passwords Target
E N D
Cyber Security AMSC FM Training Symposium Alex Roosma, 1st Lt, USAF 6 March 2014
Overview • Real-world cyber attacks • Hacker methodology • How to protect yourself and others • Resources • Questions
Real-World Examples • Recent High Profile Breaches: • Adobe user passwords • Target • US Dept of Energy • LivingSocial • Snowden Leaks • New York Times • AHMC Hospitals Breach
Hacker Motivations • Motivations for network attacks: • Money – Selling financial, personal or corporate information • Fame – Kevin Mitnick • Ideology – Edward Snowden, Anonymous
Attack Vectors • Social Engineering • Fraudulent Website • Phishing • Malicious Code • Insider Threat
How to protect yourself and others • Be aware of attack vectors • Phishing • Social Engineering • Email Attachment Malware • Websites (just because you can get to a site at work doesn’t guarantee its safety) • Secure your password • Not guessable from your social media profile • Employ a password manager • Secure Personal Identifiable Information (PII) • Keep data at rest encrypted • Encrypt email messages or use AMRDEC SAFE: https://safe.amrdec.army.mil/safe/
Resources • http://www.staysafeonline.org/ • http://www.getnetwise.org/ • http://www.onguardonline.gov/ • http://www.ikeepsafe.org/