Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

CyberMaryland Security

CyberSecurity - What it means for Maryland Business
by

Bill Anderson

on 22 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of CyberMaryland Security

Should I worry? Threats CyberSecurity is good business CyberSecurity Demystified Who needs CyberSecurity? URL Injectors rootkits viruses Trojans Spyware adware worms dialers keyloggers backdoors exploits Reputational impacts Damage to firm's brand
Negative publicity
Customer relationships
Suppliers
Employees
Invitation to Regulation Main cyber losses Intellectual property Corporate data Revenue Losses Fines & recovery efforts 2007 cyber attacks on Estonia Government websites
Political parties
News organizations
Communications firms
Banks Steps to Protect Yourself Identify important processes and info
Prioritize
Get professional IT Security support
Spend real money on real threats
Review periodically, top-down

Take it seriously, but be pragmatic Cryptography The Art and Science of Secret Communication Digital Signature Mathematical scheme for demonstrating the authenticity of a digital message or document Access Control The ability to selectively control who has access to given information or systems Confidentiality Confidentiality ensures information is not available to unauthorized recipients
Authentication A method of determining is a person is who they say they are
Encryption Encoding information so that it cannot be read by anyone without access to the key Bill Anderson, CEO
bill@oculislabs.com Impacts Personal Financial Reputation Strategic Security Tools Security Concepts Disk Encryption
Access Control
Firewall
VPNs
Audit
Anti-Virus
Intrusion Protection
Physical Crime has never been stopped, why would electronic crime be any different? Done right, Cybersecurity is a high value, high margin growth business with high barriers to entry Protect your screen too! Your security spending is wasted if anyone can just look over your shoulder Oculis Labs PrivateEye stops eavesdroppers Individuals Businesses Government Network Attacks Networks Types of Networks LAN WAN VAN Value Added Network.
These types of networks are
used as a means of communication
between two companies. For
example bank branches will use
VAN to communicate with each
other. VANs are not as popular as
they once were with companies now
favouring email as a means of
communication. Wide Area Network.
This type of network is
used to connect computers
over a large geographical
area. The internet is a type of
WAN.

Local Area Network.
This type of network is used to
connect computers together in
one building or on one site. These
are useful for places such as colleges,
universities and gaming events. Topologies Topologies are a physical way
of connecting devices together.
There are lots of different
types of topologies; star, ring,
bus etc. Bus Topology
A bus topology is where a number of
devices are connected together via a
communication line. The bus topology
is used as the backbone for WANs and
VANs.
Advantages - High data transmission
rate, quick to set up if you need a to
set a network up quickly
Disadvantages - Doesn't cope very well
when lots of data is transmitted at same
time, if the cable fails then the devices
have no way of communicating with
each other.
Star topology
In a star topology all of the
computers (nodes) are
connected via a central
controller hub. The nodes
cannot communicate directly
between them, which can be
seen as a disadvantage as it
can take longer for a message
to be passed through another
device before it gets the
recipitent. Also if the central
hub fails the whole server will
go down. However a star topology requires less cabling than other topologies therefore making it cheaper. Star topologies are used to connect LANs. Standards and Protocols Standards
802.2 - Local link control. This works by transferring data and is used in servers (LANs)
802.3- LAN wires used to connect things together with earth cables
802.5 - passes data through a token ring network. Not very reliable and rarely used in companies anymore.
802.11 -wireless. This is used practically everywhere. Protocols
TCP/IP - Uses an earth net to connect things like scanners and computers. Uses 4 layers to allow all network types to communicate together.
UDP - transfers data between computers using datagram protocols. This is often used in voice chat
Apple Talk - was primarily designed to connect MACs together. It never really took off though despite being an inexpensive LAN.
FDDI - Fibre Distrusting Data Interface. Uses a 2 ring connection method, mainly in WANs and VANs. FDDI is how fibre optic cables communicate. In order for devices within a network to communicate efficiently they each need to use a range of protocols. These protocols are all used for different purposes depending on what type of data is being sent and receieved, as you can see below. Network Card - there are two types of network cards: Ethernet and wireless. These cards allows the user to connect computers together.

Repeater - regenerates and amplifies signals so that the data being sent arrives at the destination in one piece as if a signal is sent over a large area the signal will degenerate so needs a boost.

Router - all data that is sent needs to arrive in the quickest time possible. A router ensures that the data gets to the intended destination via the quickest possible route. Routers are used within the home, businesses, offices etc.

Modem - a modem converts the signal that travels from a computer into something that the phone line can understand. They are fast, lightweight and small making them easy to transport if needed.

Wireless Access Point - these are used pretty much everywhere. It allows devices to connect to wireless networks like wi-fi and bluetooth. Functions Typical Services Directory Telecommunication File Directory services can control and manage
user accounts such as their logins and rights.
They also keep track of all of the names of
the machines so that they can pinpoint a
problem if something goes wrong within the
server.

Account Management - This is where all users
are given different accounts with different
priviligesdepending on whothey are, and what
role they have within the job/college. For
example the technicians will have all priviliges
but the students priviliges will be very limited.

Domain Control - All computers can be
grouped into different domains for the users
to log into, forexample at college the
students will log into the domain STULAN2003 .
A domain is controlled by a domain controller
and rather than be managed individually it can
me managed as a group, which saves a lot of time.

Communication- there are numerous different
ways of communication over the internet e.g. email and IM. Email is where you write a message and then send it electronically to the receipitent. They receieve it within a few minutes to their email inbox. With IM (instand messaging) the recipitent gets the message instantly, usually via a window popping up on screen for them to see straight away.
VOIP - Voice Over IP. This is similar to a telephone conversation only it is via the internet. You just need the other person to have the same VOIP software as you, such as ventrilo and them to have added you onto their contact list. Rather than using a phone number they use your IP address.
Remote Access - This is where the user can access work from a server whilst using another server If you store files onto a network this makes it a lot
easier for you to then access those files no matter
where you are. As they are stored onto a network
rather than a computer so long as you can log into
the network again on the computer you are using
you will be able to gain access to all of your files, as
they are saved onto a file server.
You can also transfer data and files between networks
via things like peer to peer. Examples of this would be
programs such as Limewire or torrent sites.
Hacking IP Spoofing Denial of Service Ping of Death Malware Eavesdropping DNS Poisoning Do you know what was in that cool little photoblogging app you installed Tuesday? It was a Trojan. Today, someone in Uzbekistan owns your network. Where will it send your data today? Malware Social Engineering Has it happened to you? 90% admit to looking at others displays 10% are lying... It's more than casual It can be professional Corporate and national espionage takes the path of least resistance. Serious opponents will find a way to get you to give them what they want You won't even know it happened Social media provide a wealth of information that can be used against you... Mobile Phones Consider how much important information you carry on your phone iPhones, Blackberries, other smartphones It may be everything that is important email contacts passwords schedule contracts business plans revenue forecast personal issues It can all be easily stolen from your phone Veterans administration
TD Ameritrade
fidelity
Visa
TJ Maxx
Choicepoint National Interests Diplomatic
Communications
Critical Infrastructure
Banking System
Legislative, Judicial & Executive
Military & Intelligence

Lasting Effects Employment
Financial
Safety
Health


Yes. Is all hope lost? No What should I do? Bill Anderson, CEO
bill@oculislabs.com
Full transcript