Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

AMLC

Sgt Paul Bucknall

Cyber Awareness

Intro

Cyber space?

Why?

In Defence, cyberspace is the interdependent network of information technology infrastructures, (including the Internet, telecommunications networks, computer systems, as well as embedded processors and controllers), and the data therein within the information environment.

Objectives

  • Describe Cyberspace and the nature of our dependency on it

  • Understand how threats from Cyberspace might affect information systems

  • Comprehend common threats to RAF personnel in the Cyber domain

  • Explain personal and equipment security measures to protect against a Cyber attack

How dependent are we?

Dependency

Carbon?

Copycats?

How dependent are we?

Dependency

  • Planning/C2
  • Intelligence
  • Maintenance
  • Communications
  • Simulators
  • Logistics
  • Administration
  • Pay

Frequency

Threats

https://threatmap.checkpoint.com/

Threats

  • Nation States

  • Terrorists

  • Criminals

  • Hackers/Hacktivists

  • Insiders (Intentional/unintentional

Threats

“MI5 Internet analysts discovered AL-QAEDA operatives had been monitoring the sites (Facebook & Twitter etc) to gather details of British Troops that could be used to launch terror attacks.” “Many thousands of service members had posted personal details on those websites. It can enable them to plot an attack as never before. Not only on targets in the field; but against the families of those Soldiers”

Biggest Threat?

Threats

Social Engineering

  • Phishing/Smishing

  • Fake Emails

  • Social networking

(fake profiles)

  • Baiting CD/USB

  • Telephone

SPOC-SPAM

Specifics

Threats

  • Viruses

  • Worms

  • Spyware

  • Ransomeware

  • Botnets

  • Trojon Horse

EEFI

Essential Elements of Friendly Information

EEFI''s

EEFI are defined as “items of critical exploitable information, concerning friendly dispositions, intentions, capabilities, morale, knowledge and potential vulnerabilities that, if compromised, could threaten the success of friendly forces”

story 1

Personal

  • Children’s details

  • NI Number

  • Passwords

  • Banking Details

  • Make/model of 1st Car?

  • First Pet Name?

Work

  • VIP Movements

  • Equipment Capabilities

  • Service Numbers

  • Operations

  • Plans

  • Security Measures

Meta data

story 2

Free Wifi???

story 3

Virtual Private Networks

Staying Safe

Passwords

Passwords

Dependents

Dependents

Cyber safe guidance

Summary

  • THINK before tweeting / posting / sharing information online

  • Use trusted WiFi connections

  • Use strong passwords and always log out (of apps and websites)

  • Secure Social Network Site privacy settings

  • Be vigilant when using the internet

  • Assume EVERYTHING has or can be compromised

Websites

Learn more about creating dynamic, engaging presentations with Prezi