SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
What is the Threat?                          Cyber Warriors Needed
♦   From Hactivists to Nation-States, these
    threats continue to attempt to penetrate
                                                    Army Cyber Command will recruit,
                                                  develop and retain qualified personnel               Threat
                                                                                                           AND
    our networks everyday.                          to grow Cyber Professionals as the
♦   Cyberspace threats are growing, evolving,      cornerstone of the Army Cyber Force.

                                                                                                    Mitigation
    and sophisticated.
♦   Cyberspace crime is the largest threat to
    individuals.
♦   Loss of intellectual property is a
    significant National security risk to our
    information and technological advantage.
                                                                                                  U.S. Army Cyber Command
♦   Loss of operational security information                                                             Second Army
    puts units, soldiers, and families at risk.

        How Can Leaders Help?
∗   Cyberspace threats and mitigation of
    those threats is commander’s business.
    Know and mitigate the risks.
∗   Recognize Cyberspace as a contested
    Operational Domain.                           “While some people may think cyber is all
                                                  about technology, people are the center of
∗   Ensure strong 2/3/6 integration in your       all we do.”
    unit formations.                                                   Lt. Gen. Rhett Hernandez
                                                       Commanding General, Army Cyber Command
∗   Respect the Threat...It’s Not Random.
∗   Enforce compliance with basic standards              For More Information
    and discipline. Information Assurance is
                                                         www.arcyber.army.mil                       Second to None!
    not a given & remediation is expensive.
U.S. Army Cyber Command
         What Should I Know?                              What Should I Protect?                        What Should I Do at Home?
What is Malware?                                   Do not Store Passwords on your Computer          Update Your Computer Software
♦ Malicious software delivered through email       ♦ Easy access to usernames and can result in     ♦ Newer software has security enhancements.
  and the internet.                                  identity theft, loss of money and revealing
                                                                                                    ♦ Harder for hackers to gain unauthorized
♦ Performs unauthorized actions on the               personal information about friends and
                                                     family.                                          access.
  computer.
                                                                                                    ♦ Look for software that:
♦ Examples of malware are:                         Protect Physical Access to Devices
     ∗ Viruses                 ∗ Spyware                                                                 ∗ Checks automatically for software
                                                   ♦ The data on the computer is just as valuable
                                                     as the hardware.                                      updates.
     ∗ Worms                   ∗ Scareware
                                                                                                         ∗ Includes anti-virus, anti-spyware, anti-
     ∗ Trojan horses           ∗ Crimeware         ♦ Physical access makes it easy to circumvent
                                                     security measures.                                    phishing, safe browsing and firewall
     ∗ Dishonest Adware        ∗ Most Rootkits                                                             capabilities.
What is Phishing?                                  Protect your Personally Identifiable
                                                   Information (PII).                               Choose Privacy Settings on Social
♦ Email messages from apparent legitimate                                                           Networking Sites that Provide the Greatest
  people or institutions targeting users.          ♦ Limit PII on the Internet and social           Security.
                                                     networking sites.
♦ Email messages may contain malicious                                                              ♦ Limit information shared with the social
  attachments (.pdf, .doc, .xls, .jpg).            ♦ PII can be used for social engineering           networking community.
♦ Phishing is used to trick users into divulging     attacks and identity theft.
                                                                                                    ♦ Limit who can view your profile.
  Personally Identifiable Information (PII) such   ♦ Military members as well as families and
  as:                                                                                               ♦ Limit who can add you to their network.
                                                     friends should not discuss or post any
     ∗ Passwords, SSNs, DoB                          information related to unit locations,
                                                     assigned duties, work schedules, or
     ∗ Credit Card numbers
                                                     deployment information.
     ∗ PINs, Addresses

   Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a part
      to play in ensuring Army networks stay secure and our national assets are protected.

Weitere ähnliche Inhalte

Was ist angesagt?

When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks revetonMumbere Joab
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareSymantec
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksKeepnet Labs.
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptYash Diwakar
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attacki-engage
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?AariyaRathi
 
Readying People Against Deceptive Practices
Readying People Against Deceptive PracticesReadying People Against Deceptive Practices
Readying People Against Deceptive PracticesMSFTSIRv16
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?ahanashrin
 
Ransomware
Ransomware Ransomware
Ransomware Armor
 

Was ist angesagt? (20)

When Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
 
Ransomware
RansomwareRansomware
Ransomware
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Ransomware
RansomwareRansomware
Ransomware
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Ransomware
RansomwareRansomware
Ransomware
 
WHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of RansomwareWHITE PAPER▶ The Evolution of Ransomware
WHITE PAPER▶ The Evolution of Ransomware
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Tip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacksTip sheet series – Ransomware attacks
Tip sheet series – Ransomware attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
What is wanna cry ransomware attack
What is wanna cry ransomware attackWhat is wanna cry ransomware attack
What is wanna cry ransomware attack
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Wannacry
WannacryWannacry
Wannacry
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Readying People Against Deceptive Practices
Readying People Against Deceptive PracticesReadying People Against Deceptive Practices
Readying People Against Deceptive Practices
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 
Ransomware
Ransomware Ransomware
Ransomware
 

Ähnlich wie Threat and Mitigation

cybersecurity-180303131014.pdf
cybersecurity-180303131014.pdfcybersecurity-180303131014.pdf
cybersecurity-180303131014.pdfyashgupta810747
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?RONIKMEHRA
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Filip Maertens
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Tripwire
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxDhruvsinhbhati
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is ImpossibleRichard Stiennon
 

Ähnlich wie Threat and Mitigation (20)

One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
cybersecurity-180303131014.pdf
cybersecurity-180303131014.pdfcybersecurity-180303131014.pdf
cybersecurity-180303131014.pdf
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
Mis05
Mis05Mis05
Mis05
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011Mobile Banking Channel Security - Cyber Security Conference 2011
Mobile Banking Channel Security - Cyber Security Conference 2011
 
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptxCYBER SECURITY AWARENESS.pptx [Read-Only].pptx
CYBER SECURITY AWARENESS.pptx [Read-Only].pptx
 
Why Risk Management is Impossible
Why Risk Management is ImpossibleWhy Risk Management is Impossible
Why Risk Management is Impossible
 

Mehr von Noel Waterman

6 February 2013 1 ABCT Weekly Newsletter
6 February  2013 1 ABCT Weekly Newsletter6 February  2013 1 ABCT Weekly Newsletter
6 February 2013 1 ABCT Weekly NewsletterNoel Waterman
 
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Noel Waterman
 
MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013Noel Waterman
 
Jan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterJan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterNoel Waterman
 
30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting 25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting Noel Waterman
 
25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides 25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides Noel Waterman
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing ScamsNoel Waterman
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Noel Waterman
 
15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
Fort Riley Combined Scholarship 2012 2013 Application
Fort Riley Combined Scholarship  2012 2013 ApplicationFort Riley Combined Scholarship  2012 2013 Application
Fort Riley Combined Scholarship 2012 2013 ApplicationNoel Waterman
 
9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly NewsletterNoel Waterman
 
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Noel Waterman
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly NewsletterNoel Waterman
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly NewsletterNoel Waterman
 
Tips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventTips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventNoel Waterman
 
December 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateDecember 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateNoel Waterman
 
5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly NewsletterNoel Waterman
 

Mehr von Noel Waterman (20)

6 February 2013 1 ABCT Weekly Newsletter
6 February  2013 1 ABCT Weekly Newsletter6 February  2013 1 ABCT Weekly Newsletter
6 February 2013 1 ABCT Weekly Newsletter
 
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle Policy 13   Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
Policy 13 Motorcycle, Moped, Motor Scooter, and All-terrain vehicle
 
MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013MISC Scholarship Guide 2012 2013
MISC Scholarship Guide 2012 2013
 
Jan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner NewsletterJan/Feb 2013 Devil's Corner Newsletter
Jan/Feb 2013 Devil's Corner Newsletter
 
30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter30 January 2013 1ABCT Weekly Newsletter
30 January 2013 1ABCT Weekly Newsletter
 
Teen parenting 2013
Teen parenting 2013Teen parenting 2013
Teen parenting 2013
 
25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting 25 Jan 2013 Network Meeting
25 Jan 2013 Network Meeting
 
25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides 25 Jan 2013 Network Meeting Slides
25 Jan 2013 Network Meeting Slides
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing Scams
 
Brochure protect operational_info_sm1
Brochure protect operational_info_sm1Brochure protect operational_info_sm1
Brochure protect operational_info_sm1
 
15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter15 January 2013 1ABCT Weekly Newsletter
15 January 2013 1ABCT Weekly Newsletter
 
Fort Riley Combined Scholarship 2012 2013 Application
Fort Riley Combined Scholarship  2012 2013 ApplicationFort Riley Combined Scholarship  2012 2013 Application
Fort Riley Combined Scholarship 2012 2013 Application
 
9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter9 January 2013 1ABCT Weekly Newsletter
9 January 2013 1ABCT Weekly Newsletter
 
3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter3 January 2013 1ABCT Weekly Newsletter
3 January 2013 1ABCT Weekly Newsletter
 
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
Thunderbolt Blast- Dec 12 Monthly Armor School Newsletter
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter
 
19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter19 December 2012 1ABCT Weekly Newsletter
19 December 2012 1ABCT Weekly Newsletter
 
Tips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic eventTips for talking with and helping children traumatic event
Tips for talking with and helping children traumatic event
 
December 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News UpdateDecember 2012 1ID Fort Riley Monthly News Update
December 2012 1ID Fort Riley Monthly News Update
 
5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter5 December 2012 1ABCT Weekly Newsletter
5 December 2012 1ABCT Weekly Newsletter
 

Threat and Mitigation

  • 1. What is the Threat? Cyber Warriors Needed ♦ From Hactivists to Nation-States, these threats continue to attempt to penetrate Army Cyber Command will recruit, develop and retain qualified personnel Threat AND our networks everyday. to grow Cyber Professionals as the ♦ Cyberspace threats are growing, evolving, cornerstone of the Army Cyber Force. Mitigation and sophisticated. ♦ Cyberspace crime is the largest threat to individuals. ♦ Loss of intellectual property is a significant National security risk to our information and technological advantage. U.S. Army Cyber Command ♦ Loss of operational security information Second Army puts units, soldiers, and families at risk. How Can Leaders Help? ∗ Cyberspace threats and mitigation of those threats is commander’s business. Know and mitigate the risks. ∗ Recognize Cyberspace as a contested Operational Domain. “While some people may think cyber is all about technology, people are the center of ∗ Ensure strong 2/3/6 integration in your all we do.” unit formations. Lt. Gen. Rhett Hernandez Commanding General, Army Cyber Command ∗ Respect the Threat...It’s Not Random. ∗ Enforce compliance with basic standards For More Information and discipline. Information Assurance is www.arcyber.army.mil Second to None! not a given & remediation is expensive.
  • 2. U.S. Army Cyber Command What Should I Know? What Should I Protect? What Should I Do at Home? What is Malware? Do not Store Passwords on your Computer Update Your Computer Software ♦ Malicious software delivered through email ♦ Easy access to usernames and can result in ♦ Newer software has security enhancements. and the internet. identity theft, loss of money and revealing ♦ Harder for hackers to gain unauthorized ♦ Performs unauthorized actions on the personal information about friends and family. access. computer. ♦ Look for software that: ♦ Examples of malware are: Protect Physical Access to Devices ∗ Viruses ∗ Spyware ∗ Checks automatically for software ♦ The data on the computer is just as valuable as the hardware. updates. ∗ Worms ∗ Scareware ∗ Includes anti-virus, anti-spyware, anti- ∗ Trojan horses ∗ Crimeware ♦ Physical access makes it easy to circumvent security measures. phishing, safe browsing and firewall ∗ Dishonest Adware ∗ Most Rootkits capabilities. What is Phishing? Protect your Personally Identifiable Information (PII). Choose Privacy Settings on Social ♦ Email messages from apparent legitimate Networking Sites that Provide the Greatest people or institutions targeting users. ♦ Limit PII on the Internet and social Security. networking sites. ♦ Email messages may contain malicious ♦ Limit information shared with the social attachments (.pdf, .doc, .xls, .jpg). ♦ PII can be used for social engineering networking community. ♦ Phishing is used to trick users into divulging attacks and identity theft. ♦ Limit who can view your profile. Personally Identifiable Information (PII) such ♦ Military members as well as families and as: ♦ Limit who can add you to their network. friends should not discuss or post any ∗ Passwords, SSNs, DoB information related to unit locations, assigned duties, work schedules, or ∗ Credit Card numbers deployment information. ∗ PINs, Addresses Doing nothing is not an option regarding cyber security. Be vigilant. Everyone has a part to play in ensuring Army networks stay secure and our national assets are protected.