Susan Parente PMP, PMI-ACP, PMI-RMP, CSM, CSPO, PSM I, CISSP, ITIL, RESILIA, CRISC, MS Eng. Mgmt. GLS Team- Practice Consultant for Agile Scrum and IT Practice, Senior Instructor Instructor, University of Virginia: Agile Project Mgmt. Cybersecurity Am I at risk…? PMINJ Chapter Symposium - 06 May 2019
21
Embed
PMINJ Chapter Symposium - 06 May 2019PMP, PMI-ACP, PMI-RMP, CSM, CSPO, PSM I, CISSP, ITIL, RESILIA, CRISC, MS Eng. Mgmt. GLS Team- Practice Consultant for Agile Scrum and IT Practice,
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
• Risk Management and Agile Consultant and Trainer • Master of Science (MSEM — Focus in Marketing of Technology) George Washington University • Bachelor’s in Mechanical Engineering (BS ME)
• Certifications:
Project Management Professional (PMPTM) — 2006
Project Risk Management Professional (PMI-RMPTM) — 2011
Certified Information Systems Security Professional (CISSP) — 2007
RESILIATM — 2006
CRISC — 2018
ITIL Foundations — 2006
Agile Certified Practitioner (PMI-ACPTM) — 2014
Certified Scrum Master (CSM) & CSPO — 2017 Professional Scrum Master I (PSM I) — 2017
Cybersecurity: Also known as information technology security
• Includes techniques to protect computers, networks, programs and data from unauthorized access or attacks on one’s computer or systems.
Cyber Attack: A attempt to cause damage or destruction to a computer system or network.
• Targets an individual or enterprise with the intent to disrupt, disable, destroy, or control a computer, its environment, or infrastructure, or to destroy the integrity of data or steal information.
A fraudulent practice of sending email masked as coming from a viable source, with the purpose of having individuals divulge personal information. Phishing is very commonly used and unfortunately it often works!
Social Engineering:
Deception by fraudulent parties to manipulate someone into sharing personal or confidential information (sensitive data)
Spyware/ Trojan Horse:
This is a malicious program which is packaged in what appears to be legitimate software. It runs in the background and spies on your computer system, or may delete files.
Viruses:
This is hidden in software. It infects ones computer & attempts to spread to all on your contact list.
You computer data is held ‘hostage’ and you are asked for payment to release it and regain access to your computer. (This is another great reason to backup your data!)
Worm:
One your computer is infected with it, it works on its own, and propagates by sending itself to other computers.
DoS (Denial of Service) Attack:
The goal of this is to hit a specific website or server until the volume of hits takes the system down.