You're about to create your best presentation ever

Cybersecurity Presentation Outline Template

Create your presentation by reusing one of our great community templates.

Cybersecurity Presentation

Transcript: Cybersecurity: Stepping towards Change Cybersecurity Today The cybersecurity caucus was created in Sept 2008. Legislation passed to create a cybersecurity division under the DHS According to Symantec, between 2015 and 2017, the U.S. was the country most affected by targeted cyber attacks with 303 known large-scale attacks. Minimal Public Awareness National National Cybersecurity Protection Advancement Act of 2015 Cybersecurity Information Sharing Act (CISA) Computer Fraud and Abuse Act Gramm-Leach-Bliley Act (GLBA) Stored Communications Act CLOUD Act CALEA(Digital Telephony Act) Existing Federal Acts Existing Laws Resources for approved software on Homeland Security webpage Microsoft started offering malware protection after incidents (wannacry) Stepping towards free Anti-virus software Existing Measures Education + free resources + educated Lawmakers Required Changes Consortium of School Networking DFS- Cybersecurity Regulation (NYCRR 500)-requires organizations to maintain a cybersecurity program that protects consumer data New York Statewide California California's Consumer Privacy Act and Infromation Privacy:Connected Devices Act Precedence Division of Cyber Laws Cyberlaws come under 3 main realms: (1) Computer Fraud (2) Threat against government and national security (3) Privacy Act We have chosen to study more into threats against US and government security Created in 1980s when email was still new was meant at the time to apply specifically to email Continues to this day without modifications apt to developing technology allows government access to our personal content under ISP Example: an opened email that is over 60 days old is accessible to the govt. Storage Communications Act Storage Communications Act No standardized methods of communication or education on cybersecurity protocols Homeland security provides lists of accessible resources and software, but no educational info NY state ITS dept provides some information and classes for youth in the state Lawmakers, public, tech users, are not updated on security measures as technology grows Little Education and Resources Lack of Tech Education Case Study Notorious Cases in recent US History Equifax cyber-attack in 2017 Wannacry ransomware cyber-attack in 2017 Malicious hacker stole personal data of consumers including government identification and credit information Equifax kept it quiet with attack took place over few months 150 million users affected... Equifax Demanded bitcoin currency in ransom Self-spread without even need to click Allowed a remote hacker to hijack computers running on unpatched Microsoft Windows operating system https://thehackernews.com/2017/05/how-to-wannacry-ransomware.html Affected about 200,000 Windows PCs across 150 countries Wannacry Interviews Professional Opinions Two Critical Parts to enabling a solution and change: Legal: Why such laws exist against personal security? How can cyberlaws change? Users/ Educators: what kind of protocols are in place? What resources we have access to? Found that it is possible to change such laws if Congress wanted could happen in the matter of days Contention behind change has to do with different understandings of the Constitution -- Fourth Amendment Systems have been built off the Storage Communications Act change can cause unemployment can cause loss of ISP protection court cases could lose critical evidence Lawyers are not required to have a tech understanding or education Lawyer and Professor from Columbia Law Lawmakers Annual educational trainings about computer safety tested this learning via fake email Applications/software is auto-updated by the Cybersecurity team List of applications/webpages that are prohibited from access Prohibited port access to any computer/laptop Preventative antivirus and security software is systemized Sr Cybersecurity Analyst in ConEdison Tech Users/ Educators Campaign Promises Cybersecurity and Politics The 2020 campaign officers are being trained by DHS (two factor authentication and encrypted messaging Rep.Sheila Jackson Lee from TX has been pushing for several new legislations recently this bill introduced to create a standard for IoT devices CISPA( Cyber Intelligence Sharing and Protection Act CISPA Act a proposed law, which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. Talking point for candidates Future Work ! Improvements and Suggestions Better basic cybersecurity education National Campaigns regarding cyber safety Introduce thorough legislation to meet current technological standards Education Awareness Legislation

Argument Outline Template

Transcript: Body Body Argument Essay Introduction A) Persuasive intro B) Discuss the issue - give a history of the issue with the traditional positions involved - the side you’re not arguing for first. C) A very clear point of your thesis. (localized issue has a more known about knowledge from your a - It will be something you will care about. Doesn’t mean you have to care about the topic at first hand. Use Amusing Anecdote At The End of the Argument Doesn’t have to go through all of it for each issue Just know where you stand Be mindful of it being coherent and sequenced with its evidence. Win your audience by persuasion, start at the bottom up If your aim is to be righteous then start w/strong arguments then add in stories You’re Arguing That It Is Superior To Do It That Way Superior to a yes or no. Has to Have Other People's Issues Notes Audience: Those that will agree with me. Why Being a Buddhist in a Westernized Country in the new world isn’t all that cracked up to be? Why Buddhist Feel like a Minority in a Western Country? An anticipatory refutation is to anticipate the best argument - Make them come to the microphone without legs Rationalize your weakest point in your argument. where you feel most vulnerable. There will be a point in your argument where you will be counter attacked and the worst you can let happen is being unaware of it. For most, end the paper with some kind of call to action Other Argument Topics Evidence Comes in a Hierarchy of Evidence (some evidence is better than others) Present it in a way that it is coherent and persuasive 1. Scientific evidence 2. Accepted fact 3. Expert testimonial 4. “I Witness” traditions, cultural mores 5. Gossip “heard…” Presentation of Evidence - not a simple matter Evidence changes in its valuation over time. Its not the same throughout all time Back it up with current evidence. Apprehend and demonstrate ie. 1800 “i witness” testimony ie. 2014 “i witness” won’t get you a conviction but DNA Arguing Template Conclusion

Cybersecurity Presentation

Transcript: Task 2 7. 4. Titles: Strong Password Tips Introducation of Password management Password manager Types of Password manager Features of Password manager Helpfull Techniques on password management Common Password managers Password Breaking Future authentication methods What is Burp Suite? Burp Suite is a web application testing tool used to test for vulnerabilities in web applications. What are some tools that Burp Suite has? Some tools that Burp Suite has include the Proxy, Repeater, Intruder, Scanner, and Extender. How can Burp Suite be used for penetration testing? Burp Suite can be used for penetration testing by identifying vulnerabilities in web applications and exploiting them to gain access to sensitive information. 7. 1. Intruder: This is used to run a set of values through an input point. The values are run and the output is observed for success/failure. What is BurpSuite? 6. Burp Suite is a software security application used for penetration testing of web applications. Both a free and a paid version of the software are available. The software is developed by the company PortSwigger. 3. What is the difference between Burp Proxy and Burp Repeater? The main difference between Burp Proxy and Burp Repeater is that Proxy is used to intercept requests and responses, while Repeater is used to resend individual requests. What is the difference between Burp Scanner and Burp Intruder? The main difference between Burp Scanner and Burp Intruder is that Scanner is used to automatically scan web applications for vulnerabilities, while Intruder is used for manual testing of web applications. Proxy: This tools lets the user see and modify the contents of requests and responses while they are in transit. 5. BurpSuite SKILLS Learning resource: The Web Security Academy (https://portswigger.net/web-security) PortSwigger Youtube channel https://www.youtube.com/c/PortSwiggerTV/videos 7. Abdulrahman Albaadi The tools offered by BurpSuite are: There are many usefull tools in BurpSuite, They are indispensable among professional web app security researchers and bug bounty hunters. Some of these tools: Proxy Intruder Repeater Decoder Scanner Is Burp Suite available on Windows? Yes, Burp Suite is available on Windows. What is the difference between Burp Suite Community and Professional Editions? The main difference between Burp Suite Community and Professional Editions is that the Professional Edition has additional features such as advanced scanning capabilities and support for collaboration. INTERESTS Thanks 7. 2. 8. How can you use Burp Suite to test for SQL injection vulnerabilities? You can use Burp Suite to test for SQL injection vulnerabilities by sending specially crafted SQL queries to the web application and observing the response. What is the difference between passive and active scanning in Burp Suite? Passive scanning in Burp Suite involves observing traffic without modifying it while active scanning involves modifying traffic to identify vulnerabilities.

Cybersecurity Presentation

Transcript: Japanese Cybersecurity Policy What is the government's role? Introduction Basic Cybersecurity Act Japanese Government's Role in Cybersecurity Article 15: Requires the state to promote awareness of the importance of cybersecurity Government needs to provide necessary information, advice and other necessary measures to private business operators and educational and research institutions to protect the intellectual property information held by them Article 14: Requires the state to take necessary measures such as developing basic standards to be followed, providing drills, training and promoting information sharing and other voluntary efforts What is the private sector's view? Japan: 55% US: 80% Japan: 27% US: 78% Cost: 63% Investment: 18% How much do they invest in cybersecurity? 1. Not a requirement to ensure cybersecurity Government don't have the power to impose any mandatory obligations on private business operators to ensure cybersecurity. Why isn't it working ? 2. Not a requirement to report any cyberattacks There is no law or regulation that requires a private business to report any cyberattacks. No penalty is imposed on it in the event of a failure to make such report. Challenges Challenge 1. The government cannot make the regulation legally binding 2. Not all businesses are aware of the importance of cybersecurity Areas for growth • Promote importance of cybersecurity to the senior executives • Create a culture that investment in cybersecurity is a norm • Increase amount of information-sharing platforms that are government entities • Both government and private sectors can benefit • Increase amount of money invested in R&D for cybersecurity Recommendation Raise awareness of cybersecurity in Japan, explain the cyberthreat landscape and best practices 1. Make business executives aware Describe potential risks from business strategy and risk management perspectives by using simple, easy-to-digest terms. Example: Government conducting programs for businesses executives NYSE analyzes companies cybersecurity during the M&A process Low cybersecurity = lower price 1. Need more Information Sharing and Analysis Centers (ISACs) Japan has 6 ISACs (Auto ISAC, NCC/ Communication ISAC, Financial Services ISAC, Information Technology ISAC, Electricity ISAC, and ICT ISAC) US has 23 ISACs 2. Information Sharing To strengthen cybersecurity, sharing information between public and private sectors and across different sectors in various forms of communication is necessary 2. Create more cross-sector industry forums Japan: 48 companies are working to increase cybersecurity capacity Japanese government should invest more into R&D for cybersecurity 3. Investment in R&D The U.S. government has traditionally been effective in using R&D funding to stimulate innovation and has established effective ways of technology expansion. The Japanese government needs to be more committed to its domestic cybersecurity industry and can learn how to do so by studying the U.S. experience. Become part of government official or lawyer to change the Basic Cyber Act What can YOU do? Work for a company and inform the importance of investing in cybersecurity Vote for government officials who are aware of the importance of cybersecurity Questions? Thank you! Reference

Now you can make any subject more engaging and memorable