Top Banner
10

ICTSA v2

Feb 09, 2017

Download

Documents

Donald Tabone
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ICTSA v2
Page 2: ICTSA v2
Page 3: ICTSA v2

• "With only 10 million of the 500 million connections, we are able to build a map of the world solely from our own personal connections..”

• Note relative "darkness" of China, due to blocks on Facebook, and former Soviet Union countries, where other social networking sites predominate.

Page 4: ICTSA v2

23%

50%

Sources include Deloitte poll, NTT Security, PandaLabs, Q3 2016 report

Page 5: ICTSA v2

• 60.1%

• 11.7%

Source: Imperva Incapsula’s latest Global DDoS Threat Landscape Report, Q2 2016

Page 6: ICTSA v2

Source Volume 20, Microsoft Security Intelligence Report, 2H 2015

• Attackers employ online services that are local to a specific geographic region.

Page 7: ICTSA v2

“stunning breach of global internet stability”.

Things (October saw) “ a movement caused by the heft of a few billion chickens coming home to roost in the shape of Mirai, the botnet behind a couple of truly staggering DDoS (Distributed Denial of Service) attacks on journalist Brian Krebs and DNS provider Dyn.”

Source: IoT chickens come home to roost, Sophos Naked Security

Page 8: ICTSA v2

• Be vigilant when choosing with whom to entrust your data

• Pay particular attention to bogus websites intended to steal personal information

• If it’s too good to be true, then it probably is

• When in doubt, seek out a professional

Security Testing

• Distrust public WiFi networks

• Watch what Apps you install – especially the permissions they request• Don’t go for convenience vs. privacy & security

• Change default passwords of devices (like CCTVs, routers etc.)

TH

E B

AS

ICS

Identify IoT devices

• Non traditional endpoints w/ an IP

• Manage your systems’ IPs

Isolate Systems

• Network segregation through VLANS

• Apply Layer3 security policies

Limit Internet Access

• Reduce ability to reach the internet

• Limit infections of other devices

Page 9: ICTSA v2

• As employers seek to combat the growing threat of cybercrime and avert mass disruption to public and private lives.

• Instead, they are being tempted to exacerbate cybercrime, rather than prevent it.

• https://academy.kaspersky.com/talentlab/

Source: Kaspersky Lab Raises Alarm Over Critical Cybersecurity Skills Shortage, Says Youth can Bridge Gap - if Industry Lets it

Page 10: ICTSA v2

THE BASICS

Source footprints research http://phys.org/news/2016-10-anonymous-web-thinkmuch.html#jCp

That’s it! Thank you