Threat and Mitigation

2
Threat AND Mitigation Second to None! U.S. Army Cyber Command Second Army Army Cyber Command will recruit, develop and retain qualified personnel to grow Cyber Professionals as the cornerstone of the Army Cyber Force. “While some people may think cyber is all about technology, people are the center of all we do.” Lt. Gen. Rhett Hernandez Commanding General, Army Cyber Command For More Information www.arcyber.army.mil Cyber Warriors Needed What is the Threat? From Hactivists to Nation-States, these threats continue to attempt to penetrate our networks everyday. Cyberspace threats are growing, evolving, and sophisticated. Cyberspace crime is the largest threat to individuals. Loss of intellectual property is a significant National security risk to our information and technological advantage. Loss of operational security information puts units, soldiers, and families at risk. How Can Leaders Help? Cyberspace threats and mitigation of those threats is commander’s business. Know and mitigate the risks. Recognize Cyberspace as a contested Operational Domain. Ensure strong 2/3/6 integration in your unit formations. Respect the Threat...It’s Not Random. Enforce compliance with basic standards and discipline. Information Assurance is not a given & remediation is expensive.

description

The cyber threat to our Army and Nation is pervasive and most often target, human behavior through social engineering. The best mitigation measure for this risk is to increase cyber awareness by educating our Soldiers, Family Members, Government Civilians, and Contractors. HQDA has directed Army Antiterrorism Quarterly Theme Cyber Threat Awareness (2Q/FY13). For more information on Cyber Security, visit http://www.staysafeonline.org/stay-safe-online/

Transcript of Threat and Mitigation

Page 1: Threat and Mitigation

ThreatAND

Mitigation

Second to None!

U.S. Army Cyber CommandSecond Army

Army Cyber Command will recruit, develop and retain qualified personnel

to grow Cyber Professionals as the cornerstone of the Army Cyber Force.

“While some people may think cyber is all about technology, people are the center of all we do.”

Lt. Gen. Rhett HernandezCommanding General, Army Cyber Command

For More Information www.arcyber.army.mil

Cyber Warriors NeededWhat is the Threat?♦ From Hactivists to Nation-States, these

threats continue to attempt to penetrate our networks everyday.

♦ Cyberspace threats are growing, evolving, and sophisticated.

♦ Cyberspace crime is the largest threat to individuals.

♦ Loss of intellectual property is a significant National security risk to our information and technological advantage.

♦ Loss of operational security information puts units, soldiers, and families at risk.

How Can Leaders Help?∗ Cyberspace threats and mitigation of

those threats is commander’s business. Know and mitigate the risks.

∗ Recognize Cyberspace as a contested Operational Domain.

∗ Ensure strong 2/3/6 integration in your unit formations.

∗ Respect the Threat...It’s Not Random.

∗ Enforce compliance with basic standards and discipline. Information Assurance is not a given & remediation is expensive.

Page 2: Threat and Mitigation

U.S. Army Cyber Command

Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a partto play in ensuring Army networks stay secure and our national assets are protected.

What is Malware?♦ Malicious software delivered through email

and the internet.

♦ Performs unauthorized actions on the computer.

♦ Examples of malware are:

∗ Viruses

∗ Worms

∗ Trojan horses

∗ Dishonest Adware

What is Phishing?♦ Email messages from apparent legitimate

people or institutions targeting users.

♦ Email messages may contain malicious attachments (.pdf, .doc, .xls, .jpg).

♦ Phishing is used to trick users into divulging Personally Identifiable Information (PII) such as:

∗ Passwords, SSNs, DoB

∗ Credit Card numbers

∗ PINs, Addresses

∗ Spyware

∗ Scareware

∗ Crimeware

∗ Most Rootkits

What Should I Know? What Should I Protect? What Should I Do at Home?Do not Store Passwords on your Computer

♦ Easy access to usernames and can result in identity theft, loss of money and revealing personal information about friends and family.

Protect Physical Access to Devices

♦ The data on the computer is just as valuable as the hardware.

♦ Physical access makes it easy to circumvent security measures.

Protect your Personally Identifiable Information (PII).

♦ Limit PII on the Internet and social networking sites.

♦ PII can be used for social engineering attacks and identity theft.

♦ Military members as well as families and friends should not discuss or post any information related to unit locations, assigned duties, work schedules, or deployment information.

Update Your Computer Software

♦ Newer software has security enhancements.

♦ Harder for hackers to gain unauthorized access.

♦ Look for software that:

∗ Checks automatically for software updates.

∗ Includes anti-virus, anti-spyware, anti-phishing, safe browsing and firewall capabilities.

Choose Privacy Settings on Social Networking Sites that Provide the Greatest Security.

♦ Limit information shared with the social networking community.

♦ Limit who can view your profile.

♦ Limit who can add you to their network.