How to Avoid Becoming Your Own Worst Enemy презентация

How to Avoid Becoming  Your Own Worst Enemy
 Presented by
Have You Been Hacked?If not, You Will BeWhy?Typical Hacker RepresentationsTypical Hacker RepresentationsTypical Hacker RepresentationsHackers in RealityWhat techniques do hackers use?Hacking Techniques
 Distributed Denial of Service (DDOS)
 Physical Attack
 Social EngineeringThe most popular technique
 Social Engineering (Phishing)
 Attempting to acquire sensitivePhishing ExampleThe Deadliest Cyber Security Sins
 Having a weak password or noneWhat is the risk?Leading effects of security errors
 Financial loss
 Loss of property
 MentalLessons Learned
 You are at risk
 Hackers have numerous techniques butThank You!References
 Blackhat [Motion picture]. (2015). United States: Forward Pass.
 Hackers [MotionImages Retrieved From
 http://www.securingthehuman.org
 http://www.mewan.net
 http://www.indiegrits.com
 http://serialeifilmy.tv
 http://www.thegomarketingteam.com
 http://img.thesun.co.uk
 https://b1u31c3.wordpress.com/



Слайды и текст этой презентации
Слайд 1
Описание слайда:
How to Avoid Becoming Your Own Worst Enemy Presented by David Savlowitz


Слайд 2
Описание слайда:
Have You Been Hacked?

Слайд 3
Описание слайда:
If not, You Will Be

Слайд 4
Описание слайда:
Why?

Слайд 5
Описание слайда:

Слайд 6
Описание слайда:
Typical Hacker Representations

Слайд 7
Описание слайда:
Typical Hacker Representations

Слайд 8
Описание слайда:
Typical Hacker Representations

Слайд 9
Описание слайда:
Hackers in Reality

Слайд 10
Описание слайда:
What techniques do hackers use?

Слайд 11
Описание слайда:
Hacking Techniques Distributed Denial of Service (DDOS) Physical Attack Social Engineering (Phishing) Custom Exploit Development

Слайд 12
Описание слайда:
The most popular technique Social Engineering (Phishing) Attempting to acquire sensitive information by posing as a trusted entity

Слайд 13
Описание слайда:
Phishing Example

Слайд 14
Описание слайда:
The Deadliest Cyber Security Sins Having a weak password or none at all Not updating frequently Ignoring the truth that you are a target of cyber crime Thinking your security is perfect Sharing your personal information online Leaving your devices unlocked when unattended Not backing up your data frequently Opening emails from a sender you do not recognize Clicking unfamiliar links Disabling your anti-virus software Disabling you firewall Writing down your password

Слайд 15
Описание слайда:
What is the risk?

Слайд 16
Описание слайда:
Leading effects of security errors Financial loss Loss of property Mental and or physical illness Death

Слайд 17
Описание слайда:
Lessons Learned You are at risk Hackers have numerous techniques but it only takes one to destroy you When in doubt ask a professional

Слайд 18
Описание слайда:
Thank You!

Слайд 19
Описание слайда:
References Blackhat [Motion picture]. (2015). United States: Forward Pass. Hackers [Motion picture]. (1995). United States: United Artists. Kennedy, D., & Couric, K. (2014, January 1). TrustedSec CEO David Kennedy on The Katie Show. Retrieved March 25, 2015, from https://vimeo.com/77102165 Security Awareness Blog. (2013, January 9). Retrieved April 17, 2015, from http://www.securingthehuman.org/blog/2013/01/09/free-security-awareness-poster-you-are-a-target Seger, L. (2012). Creating the myth. In Signs of Life in the USA (7th ed., p. 386). Boston: Bedford/St. Martin's. WarGames [Motion picture]. (1983). United artists ; Sherwood productions.

Слайд 20
Описание слайда:
Images Retrieved From http://www.securingthehuman.org http://www.mewan.net http://www.indiegrits.com http://serialeifilmy.tv http://www.thegomarketingteam.com http://img.thesun.co.uk https://b1u31c3.wordpress.com/


Скачать презентацию на тему How to Avoid Becoming Your Own Worst Enemy можно ниже:

Похожие презентации