SlideShare a Scribd company logo
1 of 10
AGENDA

1   Information Security
2   Access management
3
    Internet / Email Security
4
    Mobile Device Security
Username and password theft results
       in $800,000 loss in two days




Cyber criminals used a compromised PC to rob more than $800,000 from Hillary
Machinery, according to the Dallas Morning News. From the username and
password, criminals accessed the corporateaccount at Plains Capital Bank in Plano, Texas.
The bank had a twofactor authentication process using hard-coded IP addresses. Cyber
criminals spoofed the IP address on the desktop, defeating the security measures and
transferring $800,000 over a two-day period.
Threats to Internet / Email Security
World-Wide Attack Trends
                     900M




                                                                                                                                                Network Intrusion Attempts
                                                                                                                                      150,000
                     800M
Infection Attempts




                                                                                                     Blended Threats
                                                                                                (CodeRed, Nimda, Slammer)
                     700M                                                                                                             125,000

                     600M                                                          Denial of Service
                                                                                    (Yahoo!, eBay)                                    100,000
                     500M
                                                                                                       Malicious Code                 75,000
                     400M                                   Mass Mailer Viruses
                                                           (Love Letter/Melissa)                       Infection
                     300M                                                                              Attempts*
                                                                                                                                      50,000
                                                        Zombies
                                                                                                                  Network
                     200M
                                  Polymorphic Viruses                                                             Intrusion           25,000
                     100M              (Tequila)                                                                  Attempts**
                        0                                                                                                             0
                        1996         1997               1998            1999                2000            2001            2002   2003

                               *Analysis by Symantec Security Response using data from Symantec, IDC & ICSA; 2003 estimated                **Source: CERT
Spam Continues to Grow and
          Evolve
The Bullet is Fired

            Code Red doubled its infection rate every
37 minutes. Slammer doubled every 8.5 seconds, and infected 90%
              of unprotected servers in 10 minutes!




              Exploits now appearing just 5 days after the
                   vulnerability is publicly disclosed!




     At its peak, 1 out of every 12 emails was infected with
                             MyDoom!
Growth and Impact of Email Fraud
 Cost                     Description                        Source
 $60        Cost of Identity Theft in last 5 years in US       FTC
Billion
 600      Individual time spent recovering from Identity   Identity Theft
hours                         Theft                          Resource
                                                              Center
 3.4%      US Population fallen victim to Identity Theft     Gartner
            In Canada, 13,000 cases of Identify Theft       Computer
                           reported                        World Canada
 3%       Estimated number of people reporting fraud to        FTC
                             FTC
 3.5       Number of FDIC fraud messages caught by          Symantec
million     Brightmail in one week in January 2004
.




         48% of Companies Faced Social Engineering Attacks Claims Survey




    Social engineering attacks are on the rise and large companies are incurring huge
    losses due to them, a new report has revealed.

    According to a report commissioned by Check Point Software Technologies, 48
    percent of large companies have been targeted with more than 25 successful
    social engineering attacks in the past two years.

    The report, which surveyed 850 IT and security professionals with companies in
    North America, Europe, Australia, and New Zealand, also revealed that for each
    social engineering attack, companies incurred losses between $25,000 and
    $100,000
Mobile Hacking Nearly Doubled In 2011

The figures come from data collected by Symantec, which reported blocking more
than 5.5 billion malicious attacks in 2011, up 81% increase from 2010, while the
number of Web attacks blocked per day increased by 36% percent.

In addition, the number of unique malware variants Symantec tracked increased to
403 million.

The study also noted that approximately 1.1 million identities were stolen per data
breach on average in 2011, a dramatic increase over the amount seen in any other
year.

More Related Content

Similar to Information Security Awareness

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet businessAndrei Kolesnikov
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Ajeet Choudhary
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeLumiverse Solutions Pvt Ltd
 
Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024FTx Identity
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 

Similar to Information Security Awareness (20)

Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
 
Unit 1
Unit 1Unit 1
Unit 1
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of Cybercrime
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024Unraveling the Latest Cybersecurity Trends in 2024
Unraveling the Latest Cybersecurity Trends in 2024
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 

Information Security Awareness

  • 1. AGENDA 1 Information Security 2 Access management 3 Internet / Email Security 4 Mobile Device Security
  • 2. Username and password theft results in $800,000 loss in two days Cyber criminals used a compromised PC to rob more than $800,000 from Hillary Machinery, according to the Dallas Morning News. From the username and password, criminals accessed the corporateaccount at Plains Capital Bank in Plano, Texas. The bank had a twofactor authentication process using hard-coded IP addresses. Cyber criminals spoofed the IP address on the desktop, defeating the security measures and transferring $800,000 over a two-day period.
  • 3.
  • 4. Threats to Internet / Email Security
  • 5. World-Wide Attack Trends 900M Network Intrusion Attempts 150,000 800M Infection Attempts Blended Threats (CodeRed, Nimda, Slammer) 700M 125,000 600M Denial of Service (Yahoo!, eBay) 100,000 500M Malicious Code 75,000 400M Mass Mailer Viruses (Love Letter/Melissa) Infection 300M Attempts* 50,000 Zombies Network 200M Polymorphic Viruses Intrusion 25,000 100M (Tequila) Attempts** 0 0 1996 1997 1998 1999 2000 2001 2002 2003 *Analysis by Symantec Security Response using data from Symantec, IDC & ICSA; 2003 estimated **Source: CERT
  • 6. Spam Continues to Grow and Evolve
  • 7. The Bullet is Fired Code Red doubled its infection rate every 37 minutes. Slammer doubled every 8.5 seconds, and infected 90% of unprotected servers in 10 minutes! Exploits now appearing just 5 days after the vulnerability is publicly disclosed! At its peak, 1 out of every 12 emails was infected with MyDoom!
  • 8. Growth and Impact of Email Fraud Cost Description Source $60 Cost of Identity Theft in last 5 years in US FTC Billion 600 Individual time spent recovering from Identity Identity Theft hours Theft Resource Center 3.4% US Population fallen victim to Identity Theft Gartner In Canada, 13,000 cases of Identify Theft Computer reported World Canada 3% Estimated number of people reporting fraud to FTC FTC 3.5 Number of FDIC fraud messages caught by Symantec million Brightmail in one week in January 2004
  • 9. . 48% of Companies Faced Social Engineering Attacks Claims Survey Social engineering attacks are on the rise and large companies are incurring huge losses due to them, a new report has revealed. According to a report commissioned by Check Point Software Technologies, 48 percent of large companies have been targeted with more than 25 successful social engineering attacks in the past two years. The report, which surveyed 850 IT and security professionals with companies in North America, Europe, Australia, and New Zealand, also revealed that for each social engineering attack, companies incurred losses between $25,000 and $100,000
  • 10. Mobile Hacking Nearly Doubled In 2011 The figures come from data collected by Symantec, which reported blocking more than 5.5 billion malicious attacks in 2011, up 81% increase from 2010, while the number of Web attacks blocked per day increased by 36% percent. In addition, the number of unique malware variants Symantec tracked increased to 403 million. The study also noted that approximately 1.1 million identities were stolen per data breach on average in 2011, a dramatic increase over the amount seen in any other year.