Cyber Crimes: The next five years.

12
CYBER CRIMES THE NEXT FIVE YEARS INTRODUCTION: GREGORY MCCARDLE IT SECURITY

Transcript of Cyber Crimes: The next five years.

Page 1: Cyber Crimes: The next five years.

CYBER CRIMESTHE NEXT FIVE YEARS

INTRODUCTION:GREGORY MCCARDLEIT SECURITY

Page 2: Cyber Crimes: The next five years.

EXPERT ANALYSIS PREDICTIONS WITHIN 5 YEARS• The world’s cyber attacks vectors will grow at alarming

magnitude between 2016 to 2021

• Projects $1 Trillion will be spent globally on Cybersecurity.

• Cyber crimes predicted to cost the world $6 Trillion.

Page 3: Cyber Crimes: The next five years.

EMERGING TRENDS

Ransomware:• Encryption methodology exploits through vulnerabilities.• Gameover Zeus (GOZ) CryptoLocker

Advance Persistent Threats:• The challenging of firewalls and anti-malware being pass by targeting

employees through social engineering and Phishing technique.• Theft of data and proprietary information.

Page 4: Cyber Crimes: The next five years.

EMERGING TRENDS

Exploit Tools for hackers are easily ready and available to include online training. Example: Kali Linux

• Information Gathering-56• Wireless Attacks-33• Sniffing and Spoofing-32• Hardware Hacking tool-6• Forensic-23

Page 5: Cyber Crimes: The next five years.

KALI LINUX (AKA) BACKTRACKFriend and Foe

Kali Linux has a total of 13 tools listing with a total of 329 sub-tools embedded.

• Hackers can use Kali to measure and test the strength of your strength, gather information, exploit open vulnerable ports, etc.

• IT Security Professionals can take advantage of tools like Kali. Examples:• Use Kali Nmap to identify the risk to our open ports.• Use Kali reverse engineering tool to identify the source of an attacks.

Page 6: Cyber Crimes: The next five years.

MAIN MOTIVATION

Page 7: Cyber Crimes: The next five years.

HOW DO IT SECURITY PROFESSIONALS BECOME MORE RESILIENT?Ensuring It Security is is the essential forefront to all projects, processes, and lifecycle in our environment.

• Inventory Maintenance• Implementation of security controls• Testing Security Controls• Identify Risk levels (High, Moderate, Low)• Risk Mitigation• Continuous Monitoring• Plan of Action and Milestone (POAM)

Page 8: Cyber Crimes: The next five years.

A POWERFUL CRIME FIGHTING WEAPON

Training is an important factor:• Policy and Procedures (Top Down Approach).• Management Buy-In.• Acceptable User Policy (AUP).

Page 9: Cyber Crimes: The next five years.

SOLUTIONS

• Backup Data• Patch Cycle Tuesday, other scheduled patching as needed.• Understanding Anti-Virus Software, Update definitions.

Page 10: Cyber Crimes: The next five years.

SOLUTIONS

Password Protection• Password policy• Password frequency• Passphrase vs. Passwords

Page 11: Cyber Crimes: The next five years.

SOLUTIONS

Network Monitoring• SEIM Tools• Intrusion Detection and Prevention Systems• Demilitarized Zone (DMZ)

Page 12: Cyber Crimes: The next five years.

THANK YOU FOR YOUR TIME