FBI Wanted List for cyber Criminals
Computer security is concerned with:
Risk management
recognition, consequences, and assessment of risk to a computers assets
What percentage of employees steal data?
57%
How often does identity theft happen?
every 2 seconds
whats a hacker
someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure
unsecured computer
extremely easy to breach, especially by a seasoned hacker. Many times these computers are connected to the Internet, so they receive emails with malicious attachments like viruses, worms, and malware.
What is the average time to identify a computer breach?
207 days for a company to identify
how many reports of identity theft did FTC receive
11 million
What percentage of Americans have never checked to see if their data was breached?
64%
What percentage of funds that are stolen are not recoverable?
68%
Most common type of threats
-most common is use of stolen cards then followed by ransomware and phishing
Hacker facts
3 things hackers look for
types of hackers
How do you keep hackers out
firewalls
proxy server
communications in or out of an intranet pass through a special security computer
“default-deny”
firewall rule set in that the only network connections that are permitted are the ones that have been explicitly allowed
“default-allow”
rule set in that all traffic is allowed unless it has been specifically blocked
Worms
Trojan horses
-seems harmless and possibly interesting at first until it is executed.
-
Denial-of-service attack (DOS)
attacks target entire networks making them unavailable to users
causes:
-loss of revenue
- have to get an IT team costs money
- spending and wasting valuable time trying to fix it
- lose customer trust
What should a workplace policy consist of?