Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Next Generation of Cyber Security

Northern Essex Community College Information Security Final Project!

Stephen O'Meara

on 10 December 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Next Generation of Cyber Security

Information Security
and Awareness
Why is Information
Security Important?
If there is a weakness in an IT security system, the system can be easily compromised.
A company's confidential business plans, financial results, and personal files of employee's being leaked to the media through a hack in a system can cause an organization to lose the markets confidence and drop its share value by compromising its users personal data.
This is increasingly important because business/individuals are now exposed to a wider variety of threats and vulnerabilities such as; malicious spy software, Denial Service Attack, and other sophisticated malware.
Hackers in today
's Society
Do NOT think

you are exempt
from the hackers
cause were NOT
Hackers today do things from stealing our credit cards from popular retailers, medial records, and hording mass information about anyone they can because it's valuable.
By: Stephen O'Meara
Chinese hackers have stolen medical records for 4.5 million patients, according to a regulatory filing from Community Health Systems, a publicly-traded company that runs 206 hospitals in 29 states.
Gail Sullivan from the Washington post says "
JPMorgan Chase Hacking Affects 76 Million Households
JPMorgan Security Fails
JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers’ credit card details and potentially includes more sensitive data.
The bad news is hackers have stolen the contact information for 76 million households—that's nearly 65% of all US households!—and 7 million small businesses: names, addresses, phone numbers, and email addresses. This makes this latest data breach one of the biggest in history.
Targets Security Fails
Up to 40 million credit and debit cards and personal data for up to 70 million customers were stolen from a 207kb malicious program sold on the black market.
BlackPOS, the program “is a specialized piece of malware designed to be installed on point-of-sale (POS) devices and record all data from credit and debit cards swiped through the infected system.”
Home Depot Security Fails
Approximately 53 million email addresses and 56 million credit card accounts were compromised in an April cyberattack on Home Depot Inc
Hackers targeted 7,500 self-checkout systems because those terminals were clearly identified in the company’s computer database which gave them a way in.
Home Depot’s breach is expected to cost the company $62 million
Secret Weapon Against Hacks:
This is an example of a :
Black-Hat Hacker
Someone violating computer or Internet security maliciously or for illegal personal gain.
The reason the computer security field
is actively looking and paying so high for
hackers is because we now need someone who can stop these bad guy hackers.
-------------------Damage Assessment-------------
What are we doing today to stop this?
Big corporations are planning to upgrade and enhance their security by using multifactor authentication.
Including something you know, something you have, and something you are.
There only quick defense to this is to add several more layers of security as of now.
Companies are now hiring 'White-Hat' hackers to expose weaknesses.
Companies hiring 'White-Hat hackers to expose weaknesses!'
"Even with all the elaborate security systems companies are adopting, it often still isn’t enough. That’s why more companies are seeking another perspective, and hiring white hat hackers. You need to think like the attacker if you are ever going to outsmart them.”
Rioux says..
College Students
Carnegie Melon university is training the next generation of cybersecurity experts to fight off the bad guys by teaching them to think the same way.
"Carnegie Mellon’s students are so good at exploiting those vulnerabilities … that the NSA enlisted them to create a game that teaches hacking skills to high-school-aged students — and paid for the job."
Summary of the presentation:
Click here
Lastly, What can we do as individuals to protect ourselves?
Lets take a closer look!
1.) Setup a Two-Factor authentication with your accounts.
Apple, Twitter, Dropbox, Microsoft and Google all use two-factor authentication. Set these up for extra security.
2.)Change your passwords frequently and make them long.
3.)Keep your system, or mobile device updated at all times
4.)Always be EMAIL cautious.

5.)Be careful what you click and download. Verify the url to see if the link is trusted.
"Why Is Information Security Important?" Why Is Information Security Important? N.p., n.d. Web. 10 Dec. 2014.

Smith, Chris. "Expert Who First Revealed Massive Target Hack Tells Us How It Happened." BGR. N.p., 16 Jan. 2014. Web. 09 Dec. 2014.

Soergel, Andrew. "53 Million Email Addresses Stolen in Home Depot Hack." US News. U.S.News & World Report, 7 Nov. 2014. Web. 10 Dec. 2014.

Steve Weisman, Special to USA TODAY. "Coming Soon: Another Major Retailer Hacked." USA Today. Gannett, 27 Sept. 2014. Web. 09 Dec. 2014.

Lieber, Ron. "A Two-Step Plan to Stop Hackers." The New York Times. The New York Times, 08 Aug. 2014. Web. 10 Dec. 2014.

Hauser, Kathryn. "Companies Hiring 'White Hat' Hackers To Expose Weaknesses." CBS Boston. N.p., 20 Oct. 2014. Web. 10 Dec. 2014.

"Secret Weapon against Hacking: College Students." PBS. PBS, 26 Oct. 2014. Web. 10 Dec. 2014.
Full transcript