SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Zombie Apocalypse
Survival instructions

     Alys Kowalik
Identify your Zombies
• Generic
   – Slowest moving, likely to shuffle
   – Move in large groups (hordes)
• Voodoo/Dark magic
   – Can move at fluctuating speeds
   – Reacted from dead
   – More vulnerable to Rot from Ruin
• Viral
   – Most dangerous type of zombie
   – Capable of speed
   – Result of virus or biological weapon, so often contagious
Gather your equipment
•   Weapons: ad hoc where necessary
•   Food: preferably canned, and bottled water
•   First aid kit: including prescriptions
•   Camping gear: all-weather
•   Clothes: layers, water-proofs, hiking shoes
•   Entertainment: non-battery-dependant.
    Playing cards, jigsaws, books
Move to safety
• Secure and heavily-fortified: ex-military base
  or similar
• Own power supply (e.g. generator)
• Remote: away from large centres of
  population and not easy to find or sign-posted
• Capable of receiving radio signal (in case
  authorities assume control and send
  instructions)
Wait it out
• Once you have established a secure position,
  wait for government assistance.
• You may need to defend your position, or use
  aggressive tactics against zombies when on
  supply runs.
• Remain calm.

Weitere ähnliche Inhalte

Was ist angesagt?

Bull Sharks
Bull SharksBull Sharks
Bull Sharks
Duurup
 

Was ist angesagt? (20)

Science of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis MethodologyScience of Security: Cyber Ecosystem Attack Analysis Methodology
Science of Security: Cyber Ecosystem Attack Analysis Methodology
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)2021 五月 Veeam 多雲解決方案 (完整版本)
2021 五月 Veeam 多雲解決方案 (完整版本)
 
Bull Sharks
Bull SharksBull Sharks
Bull Sharks
 
Conspiracy theories presentation
Conspiracy theories presentationConspiracy theories presentation
Conspiracy theories presentation
 
Personal Security In High Risk Areas
Personal Security In High Risk AreasPersonal Security In High Risk Areas
Personal Security In High Risk Areas
 
Sigma and YARA Rules
Sigma and YARA RulesSigma and YARA Rules
Sigma and YARA Rules
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Comment analyser une machine linux compromise
Comment analyser une machine linux compromiseComment analyser une machine linux compromise
Comment analyser une machine linux compromise
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Tactical Convoy Operations
Tactical Convoy OperationsTactical Convoy Operations
Tactical Convoy Operations
 
IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.IBM-QRadar-Corporate-Online-Training.
IBM-QRadar-Corporate-Online-Training.
 
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
MW_Arch Fastest_way_to_hunt_on_Windows_v1.01
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Cyber security
Cyber securityCyber security
Cyber security
 
Northcom basic briefing
Northcom basic briefingNorthcom basic briefing
Northcom basic briefing
 
Making Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management TogetherMaking Log Data Useful: SIEM and Log Management Together
Making Log Data Useful: SIEM and Log Management Together
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 

Zombie apocalypse powerpoint

  • 2. Identify your Zombies • Generic – Slowest moving, likely to shuffle – Move in large groups (hordes) • Voodoo/Dark magic – Can move at fluctuating speeds – Reacted from dead – More vulnerable to Rot from Ruin • Viral – Most dangerous type of zombie – Capable of speed – Result of virus or biological weapon, so often contagious
  • 3. Gather your equipment • Weapons: ad hoc where necessary • Food: preferably canned, and bottled water • First aid kit: including prescriptions • Camping gear: all-weather • Clothes: layers, water-proofs, hiking shoes • Entertainment: non-battery-dependant. Playing cards, jigsaws, books
  • 4. Move to safety • Secure and heavily-fortified: ex-military base or similar • Own power supply (e.g. generator) • Remote: away from large centres of population and not easy to find or sign-posted • Capable of receiving radio signal (in case authorities assume control and send instructions)
  • 5. Wait it out • Once you have established a secure position, wait for government assistance. • You may need to defend your position, or use aggressive tactics against zombies when on supply runs. • Remain calm.