Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive...

Post on 16-Jan-2016

216 views 0 download

Transcript of Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive...

Slide 1 of 12

Cybersecurity

o Threats Risks Vulnerabilitieso 6 Environments

o Competitive Environmento Technological Environment

o Cyber riskso Infrastructure o Mobile devices

o Asymetricalo Drones

Slide 2 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Slide 3 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Slide 4 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Slide 5 of 12

CybersecurityTop trends Mobile everything Data breaches

Effecting top brands New gTLDs

AAA to Zippo

Government data breaches

Malware Social Media

hacking Spear Phishing

Web Server errors

Slide 6 of 12

CybersecurityTop trends Mobile everything Data breaches

Effecting top brands New gTLDs Government data breaches

Malware Social Media hacking

Spear Phishing Web Server errors

Slide 7 of 12

CybersecurityTop trends Mobile everything Data breaches Malware Viruses, worms, Trojan horses, spyware

etc. Android Apple

Social Media hacking Spear Phishing

Web Server errors

Slide 8 of 12

CybersecurityTop trends Mobile everything Data breaches Malware Social Media hacking

Spear Phishing Watering Hole

Web Server errors

Slide 9 of 12

Future Threats, Risks and Vulnerabilities - Infrastructure

Risks “the industrial control

systems governing the operations of utilities, from water storage and purification to nuclear power reactors, pose a growing risk to national security and Canada’s economic and societal well-being. ”

Slide 10 of 12

Social – Cultural Environment

Risks Household devices and appliances

with IP addresses In condos and apts were there is a

centrally wired structure Houses in micro-communities (gated

communities or prestigious developments) where there is wired or bluetooth connectivity

Slide 11 of 12

Mobile web access Marketing and business

Future Threats, Risks and Vulnerabilities

Tim Richardson

School of MarketingSeneca Collegetim.richardson@senecacollege.ca

University of Toronto,

CCIT Program, MississaugaandDept. of Management, Scarboroughrichardson@utsc.utoronto.ca

www.witiger.comhttp://people.senecac.on.ca/tim.richardson/powerpoints/