Cybersecurity 101 - Cybercrime - Dark Web - Hacking - a film by Dinis Guarda
Автор: Citiesabc
Загружено: 20 нояб. 2020 г.
Просмотров: 917 просмотров
Cybersecurity 101
a film by Dinis Guarda
openbusinesscouncil.org/summit
citiesabc.com
Cybercrime global costs will exceed $6 Trillion In 2021
AS YOU READ THIS THOUSANDS OF HACKERS are getting in businesses & governments ICT systems
FROM VIRTUAL BANK HEISTS TO SEMI-OPEN ATTACKS FROM NATION-STATES the last couple of years has been rough on IT security
There is a hacker attack every 39 seconds.
300,000 new malware is created every day.
Multi-factor authentication and encryption are the biggest hacker obstacles.
You can become an American citizen for $6,000.
The average cost of data for big corporations breaches is $150 million+
TOP 5 POPULAR CYBERSECURITY
CRIMES
1. PHISHING SCAMS.
2. IDENTITY THEFT SCAMS.
3. ONLINE HARASSMENT.
4. CYBERSTALKING .
5. INVASION OF PRIVACY.
TOP 5 OF WORLD LARGEST CYBERATTACKS
1. Alteryx data leak 123 million households.
2. Equifax: financial data crisis management.
3. Adult Friend Finder exposed.
4. Marriott hotels: privacy of 500 million customers compromised.
5. Yahoo:Theft of more than one billion passwords.
LACK OF PREPARATION &
CYBERSECURITY
STRATEGY WILL HAVE DEVASTATING EFFECTS ON THE INTEGRITY & SURVIVAL OF BUSINESSES & GOVERNMENTS
CYBER-THREATS IS A REFLECTION OF LACK OF PREPARATION - WEAKNESSES An accurate vision of digital and behavioral gaps is crucial for a consistent business and organisation
cyber-resilience.
CYBERSECURITY BASICS:
Antivirus and anti-malware.
Malware, or malicious software.
Ransomware.
Adware. Spyware.
Hacker.
Phishing. Data breach.
Dark web.
Malware, adware Trojans, viruses, ransomware + other computer software with malicious intent can and are infecting your system and ruin your life & businesses + organisations
are 1st target.
Malware + web-based attacks continue to be the most expensive cybersecurity issues The cost of Ransomware (21%) and Malicious insider (15%) attacks types have grown
The dark web is a small subset of the deep web, which is part of the internet that is not found using search engines.
That includes many websites that require users to log in with an username and password, and the deep web is estimated to be about 400 to 500 times larger than the common internet.
The dark web is a subset of the deep web that is intentionally hidden, requiring a specific browser—Tor—to access
There are generally 10-types of Hackers:
1. White Hat Hackers;
2. Black Hat Hackers;
3. Gray Hat Hackers;
4. Script Kiddies
5. Green Hat Hackers
6. Blue Hat Hackers
7. Red Hat Hackers
8. State/Nation Sponsored Hackers
9. Hacktivist
10. Malicious Insider or Whistleblower
White Hat Hackers: the ones authorized or certified hackers who work for the government and organizations by performing penetration testing and identifying loopholes in their cybersecurity.
There are over 715,000 cybersecurity experts employed in the US alone
HackerOne for example represents a community of over 300,000 white hackers
How Can You Identify Cybersecurity issues such as Malware Infections on Your business, organisation PC, Mac, or Mobile?
obvious signs of malware infection is the increased presence of ads, banners, pop-ups, spam, alerts, and other unwanted communications
Any notable increase in these ads or pop ups is a clear indication that malware has infected your computer.
You may even be alerted to the presence of malware with an announcement to that effect: Your System Has Been Hijacked.
If security were all that mattered, computers and IT systems would never be turned on, let alone hooked into a network with literally millions of potential intruders
INFORMATION + DATA SECURITY
IS THE FAST GROWING
component of businesses organizations’ competitive strategy
The direct collection, management, and interpretation of business information, data, IP or the retention of day-to-day business intelligence processing is becoming the biggest asset for businesses and governments
“Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.”
Chris Pirillo
5 MOST EFFICIENT
CYBER DEFENDERS:
1. Preparation - Anticipation
2. Culture - Education
3. Detection - test
4. Reaction - action
5. Resilience - persistence
IN THE USA THE FBI IS THE LEAD FEDERAL AGENCY FOR INVESTIGATING CYBER ATTACKS AND INTRUSIONS
IN EUROPE THE LEAD FEDERAL AGENCY FOR INVESTIGATING CYBERCRIME IS JOINT CYBERCRIME ACTION TASKFORCE (J-CAT) IN INTERPOL
The CYBERSECURITY MARKET is continuing its stratospheric growth and hurtling towards the trillion dollar mark
“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
Stephane Nappo
LEADERS NEED TO NURTURE A CYBERSECURITY CULTURE
message of influence because security is a culture and you need the business to take place and be part of that security culture.
HOW READY IS YOUR BUSINESS FOR A CYBERSECURITY
HACKING?
A FILM BY Dinis guarda
PRODUCED BY
openbusinesscouncil.org/summit
created by openbusinesscouncil.org
citiesabc.com

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: