Threat and Mitigation
-
Upload
noel-waterman -
Category
Documents
-
view
494 -
download
0
description
Transcript of Threat and Mitigation
ThreatAND
Mitigation
Second to None!
U.S. Army Cyber CommandSecond Army
Army Cyber Command will recruit, develop and retain qualified personnel
to grow Cyber Professionals as the cornerstone of the Army Cyber Force.
“While some people may think cyber is all about technology, people are the center of all we do.”
Lt. Gen. Rhett HernandezCommanding General, Army Cyber Command
For More Information www.arcyber.army.mil
Cyber Warriors NeededWhat is the Threat?♦ From Hactivists to Nation-States, these
threats continue to attempt to penetrate our networks everyday.
♦ Cyberspace threats are growing, evolving, and sophisticated.
♦ Cyberspace crime is the largest threat to individuals.
♦ Loss of intellectual property is a significant National security risk to our information and technological advantage.
♦ Loss of operational security information puts units, soldiers, and families at risk.
How Can Leaders Help?∗ Cyberspace threats and mitigation of
those threats is commander’s business. Know and mitigate the risks.
∗ Recognize Cyberspace as a contested Operational Domain.
∗ Ensure strong 2/3/6 integration in your unit formations.
∗ Respect the Threat...It’s Not Random.
∗ Enforce compliance with basic standards and discipline. Information Assurance is not a given & remediation is expensive.
U.S. Army Cyber Command
Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a partto play in ensuring Army networks stay secure and our national assets are protected.
What is Malware?♦ Malicious software delivered through email
and the internet.
♦ Performs unauthorized actions on the computer.
♦ Examples of malware are:
∗ Viruses
∗ Worms
∗ Trojan horses
∗ Dishonest Adware
What is Phishing?♦ Email messages from apparent legitimate
people or institutions targeting users.
♦ Email messages may contain malicious attachments (.pdf, .doc, .xls, .jpg).
♦ Phishing is used to trick users into divulging Personally Identifiable Information (PII) such as:
∗ Passwords, SSNs, DoB
∗ Credit Card numbers
∗ PINs, Addresses
∗ Spyware
∗ Scareware
∗ Crimeware
∗ Most Rootkits
What Should I Know? What Should I Protect? What Should I Do at Home?Do not Store Passwords on your Computer
♦ Easy access to usernames and can result in identity theft, loss of money and revealing personal information about friends and family.
Protect Physical Access to Devices
♦ The data on the computer is just as valuable as the hardware.
♦ Physical access makes it easy to circumvent security measures.
Protect your Personally Identifiable Information (PII).
♦ Limit PII on the Internet and social networking sites.
♦ PII can be used for social engineering attacks and identity theft.
♦ Military members as well as families and friends should not discuss or post any information related to unit locations, assigned duties, work schedules, or deployment information.
Update Your Computer Software
♦ Newer software has security enhancements.
♦ Harder for hackers to gain unauthorized access.
♦ Look for software that:
∗ Checks automatically for software updates.
∗ Includes anti-virus, anti-spyware, anti-phishing, safe browsing and firewall capabilities.
Choose Privacy Settings on Social Networking Sites that Provide the Greatest Security.
♦ Limit information shared with the social networking community.
♦ Limit who can view your profile.
♦ Limit who can add you to their network.