SlideShare uma empresa Scribd logo
1 de 18
Confidential
Cyber Vulnerabilities
& How Companies
Can Test Them?
October 2018
Prepared by:
1
Confidential
COMMON THREATS
Malware Phishing Whaling
Spyware Botnet
2
Ransomware
Confidential 3
More than 400
businesses are
targeted with
business email
compromise (BEC)
scams every day
Phishing volume
grew by a massive
41 percent in Q2
2017
Almost half of all
breaches are
caused by phishing
FACTS ABOUT PHISHING
PHISHING
Confidential
Phishing is the leading cause
of Ransomware
4
Confidential 5
Leading Cause of Ransomware
46%
36%
12%
1%
5%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Spam/Phishing
emails
Lack of Employee
Training
Malicious Websites/
Web Ads
Lack of Security Ads Others
PercentageofRespondents
Cause of Ransomware infection
Source: © Statista 2018
Confidential
What are cyber vulnerabilities
and how can we limit them?
6
Confidential 7
EXTERNAL VULNERABILITIES
INTERNAL VULNERABILITIES
The attacker could be a criminal or hacker and they
use the vulnerabilities to get into the network or
access data.
The attacker could be found within the business, they
can be employees that intentionally sell information or
mistakenly expose the information.
Confidential 8
EXAMPLES OF
EXTERNAL VULNERABILITIES
Insufficient access control to
customers, suppliers, partners
Cloning access cards & FOB
Keys
Weak firewall rules and
unpatched software on firewall
Weak Security administration
Confidential 9
EXAMPLES OF
INTERNAL VULNERABILITIES
Unprotected
Laptops
Unpatched
Software
Access Control
Issues
Vulnerabilities in
internal Applications
Weak/ Default
Password
Confidential
42%
33%
18%
7%
Where are the threats coming from?
Ex-employees
10
PERCENTAGES
Third Parties
Employees
Outside the
Organization
Within the organization
58%
Source: Clearswift.com
Confidential
LIMIT CYBER VULNERABILITIES
Train your
Workforce
Secure
Configurations
for Hardware &
Software
Control Use of
Administrative
Privileged
Accounts
Install proper
Firewalls &
Anti-virus
Track all
hardware
devices on the
network
Practice Patch
Management
Conduct
Vulnerability
Assessment
Use strong
passwords
Backup your
data
11
Confidential
Joining the workforce?
12
What you can expect when
you join the workforce
• Career opportunities
• A booming industry
• What you are likely to hear even
if you are not in the
Cybersecurity field
Confidential 13
HOW COMPANIES TEST CYBER
VULNERABILITIES
External Penetration Testing
Internal Penetration Testing
Vulnerability Assessment
Web Application Testing
Social Engineering
Confidential 14
PENETRATION TESTING
External Penetration
Testing
• An external penetration
test mimics the actions of
an actual attacker
exploiting weaknesses in
the network security.
Internal Penetration
Testing
• This test examines
internal IT systems for any
weakness that could be
used to disrupt the
Confidentiality, Integrity or
Availability of the network,
thereby allowing the
organization to address
each weakness .
This process helps identify the security vulnerabilities within the system
or network by simulating an attack.
Confidential 15
VULNERABILITY ASSESSMENT
A vulnerability assessment is the process of identifying, quantifying, and
prioritizing (or ranking) the vulnerabilities in a system.
Table Risk Level Matrix
Impact
Likelihood Low Medium High
High Medium High High
Medium Low Medium High
Low Low Low Medium
Confidential 16
WEB APPLICATION TESTING
Web application testing, a software testing technique exclusively
adopted to test the applications that are hosted on web in which the
application interfaces and other functionalities are tested.
Web application Testing Techniques to
test Confidentiality, Integrity, Availability
• Functionality Testing
• Usability testing
• Interface testing
• Compatibility testing
• Performance testing
• Security testing
Confidential 17
SOCIAL ENGINEERING
Phishing
• Phishing is the
fraudulent attempt
to obtain sensitive
information such
as usernames,
passwords and
credit card details,
often for malicious
reasons, by
disguising as a
trustworthy entity
in an electronic
communication.
Vishing
• Vishing is the
telephone
equivalent of
phishing. It is
described as the
act of using the
telephone in an
attempt to scam
the user into
surrendering
private
information that
will be used for
identity theft.
Tailgating
• Tailgating is a
physical security
breach in which
an unauthorized
person follows an
authorized
individual to enter
a secured
premise.
Confidential
CONTACT INFORMATION
www.24By7Security.com
@24By7Security
(844) 55-CYBER (29237)
Contact@24By7Security.com
18

Mais conteúdo relacionado

Mais procurados

Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Cyber security
Cyber securityCyber security
Cyber securityRIPPER95
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and ITKomalah Nair
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive PresentationNormShield, Inc.
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityTestingXperts
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?AariyaRathi
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threatsTIKAJ
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsVeriato
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 

Mais procurados (19)

Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Security testing
Security testingSecurity testing
Security testing
 
Security in Computing and IT
Security in Computing and ITSecurity in Computing and IT
Security in Computing and IT
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
Pen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurityPen testing and how does it help strengthen cybersecurity
Pen testing and how does it help strengthen cybersecurity
 
What is a malware attack?
What is a malware attack?What is a malware attack?
What is a malware attack?
 
Protection against cyber threats
Protection against cyber threatsProtection against cyber threats
Protection against cyber threats
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
FireEye
FireEyeFireEye
FireEye
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 

Semelhante a Cyber Vulnerabilities & How companies can test them

Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsBugRaptors
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
2011-10 The Path to Compliance
2011-10 The Path to Compliance 2011-10 The Path to Compliance
2011-10 The Path to Compliance Raleigh ISSA
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 

Semelhante a Cyber Vulnerabilities & How companies can test them (20)

Cyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber ThreatsCyber Security Testing - Protect Your Business From Cyber Threats
Cyber Security Testing - Protect Your Business From Cyber Threats
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
QualySec's Website Security Penetration Testing Services in USA
QualySec's Website Security Penetration Testing Services in USAQualySec's Website Security Penetration Testing Services in USA
QualySec's Website Security Penetration Testing Services in USA
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
2011-10 The Path to Compliance
2011-10 The Path to Compliance 2011-10 The Path to Compliance
2011-10 The Path to Compliance
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 

Último

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Cyber Vulnerabilities & How companies can test them

  • 1. Confidential Cyber Vulnerabilities & How Companies Can Test Them? October 2018 Prepared by: 1
  • 2. Confidential COMMON THREATS Malware Phishing Whaling Spyware Botnet 2 Ransomware
  • 3. Confidential 3 More than 400 businesses are targeted with business email compromise (BEC) scams every day Phishing volume grew by a massive 41 percent in Q2 2017 Almost half of all breaches are caused by phishing FACTS ABOUT PHISHING PHISHING
  • 4. Confidential Phishing is the leading cause of Ransomware 4
  • 5. Confidential 5 Leading Cause of Ransomware 46% 36% 12% 1% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Spam/Phishing emails Lack of Employee Training Malicious Websites/ Web Ads Lack of Security Ads Others PercentageofRespondents Cause of Ransomware infection Source: © Statista 2018
  • 6. Confidential What are cyber vulnerabilities and how can we limit them? 6
  • 7. Confidential 7 EXTERNAL VULNERABILITIES INTERNAL VULNERABILITIES The attacker could be a criminal or hacker and they use the vulnerabilities to get into the network or access data. The attacker could be found within the business, they can be employees that intentionally sell information or mistakenly expose the information.
  • 8. Confidential 8 EXAMPLES OF EXTERNAL VULNERABILITIES Insufficient access control to customers, suppliers, partners Cloning access cards & FOB Keys Weak firewall rules and unpatched software on firewall Weak Security administration
  • 9. Confidential 9 EXAMPLES OF INTERNAL VULNERABILITIES Unprotected Laptops Unpatched Software Access Control Issues Vulnerabilities in internal Applications Weak/ Default Password
  • 10. Confidential 42% 33% 18% 7% Where are the threats coming from? Ex-employees 10 PERCENTAGES Third Parties Employees Outside the Organization Within the organization 58% Source: Clearswift.com
  • 11. Confidential LIMIT CYBER VULNERABILITIES Train your Workforce Secure Configurations for Hardware & Software Control Use of Administrative Privileged Accounts Install proper Firewalls & Anti-virus Track all hardware devices on the network Practice Patch Management Conduct Vulnerability Assessment Use strong passwords Backup your data 11
  • 12. Confidential Joining the workforce? 12 What you can expect when you join the workforce • Career opportunities • A booming industry • What you are likely to hear even if you are not in the Cybersecurity field
  • 13. Confidential 13 HOW COMPANIES TEST CYBER VULNERABILITIES External Penetration Testing Internal Penetration Testing Vulnerability Assessment Web Application Testing Social Engineering
  • 14. Confidential 14 PENETRATION TESTING External Penetration Testing • An external penetration test mimics the actions of an actual attacker exploiting weaknesses in the network security. Internal Penetration Testing • This test examines internal IT systems for any weakness that could be used to disrupt the Confidentiality, Integrity or Availability of the network, thereby allowing the organization to address each weakness . This process helps identify the security vulnerabilities within the system or network by simulating an attack.
  • 15. Confidential 15 VULNERABILITY ASSESSMENT A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system. Table Risk Level Matrix Impact Likelihood Low Medium High High Medium High High Medium Low Medium High Low Low Low Medium
  • 16. Confidential 16 WEB APPLICATION TESTING Web application testing, a software testing technique exclusively adopted to test the applications that are hosted on web in which the application interfaces and other functionalities are tested. Web application Testing Techniques to test Confidentiality, Integrity, Availability • Functionality Testing • Usability testing • Interface testing • Compatibility testing • Performance testing • Security testing
  • 17. Confidential 17 SOCIAL ENGINEERING Phishing • Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Vishing • Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. Tailgating • Tailgating is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.

Notas do Editor

  1. These are the most common types of cyber threats are malware, phishing, spyware, whaling, Botnet & spam. One of the most popular threats people is impacted by is phishing. Some other types are of threats are hacking, bots, misuse of employee privileged. Malware is a malicious software and there are different types as viruses, Ramsomware, spyware, worms and more. • Malware can get in your computer by accidentally clicking a suspicious email attachment or perhaps you connected an infected drive to your computer. • How can malware affect your business? Malware can affect your business by loss of customer information, loss of reputation, financial cost, legal costs and More. -> http://honigconte.com/malware-attacks/ • How can we prevent malware? Examine the email before you open it (check the sender’s address, is it a trusted URL?) , update your operating system, Browsers & plugins, and antivirus install and updated. For more information -> https://blog.malwarebytes.com/101/2016/08/10-easy-ways-to-prevent-malware-infection/ What is phishing? Phishing is when they send emails posing as a reputable institution/companies in order to obtain sensible data as your password, credit card information or username. How can I avoid phishing scams? A couple of the things you could do to avoid phishing scams are to keep informed on the latest techniques use for Phishing, don’t click on emails from unfamiliar sources or people and install an anti-phishing toolbar. -> http://www.phishing.org/10-ways-to-avoid-phishing-scams What is whaling? Whaling is a type of phishing that targets C-Level Executives in order to obtain sensitive information https://digitalguardian.com/blog/what-whaling-attack-defining-and-identifying-whaling-attacks Sources: • https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx • https://purplegriffon.com/blog/10-cyber-security-threats-in-2017
  2. https://Info.phishlabs.com/blog/the-impact-of-phishing-and-why-it-should-be-your-1-priority The volume of spam emails increased by 400 percent in 2016 – If you click on the phishing email is automatically linked to spams. Symantec – More than 400 businesses are targeted with business email compromise (BEC) scams every day https://www.symantec.com/security-center/threat-report Phishing Volume grew by a massive 41 percent in Q2 2017 - https://info.phishlabs.com/q2_2017_phishing_trends_and_-intelligence_report Verizon - Almost half of all breaches are caused by phishing - https://www.verizonenterprise.com/verizon-insights-lab/dbir/
  3. We need to see the external and internal vulnerabilities
  4. Source: https://www.statista.com/statistics/700965/leading-cause-of-ransomware-infection/ https://www.nytimes.com/2017/05/15/technology/personaltech/heres-how-to-protect-yourself-from-ransomware-attacks.html Lack of Security Ads – Ransomware developers often use pop-up windows that advertise software products that remove malware. Do not click on anything through these pop-ups, then safety close the windows.
  5. We need to see the external and internal vulnerabilities
  6. Keylogger: are use to capture passwords and other private data, this software or equipment is sold in the open market. https://knowledgemines.com/keyloggers/ Example of External Vulnerability Threats - https://ebrary.net/26640/computer_science/security_threats Could Fob keys be cloned? Yes, they could be cloned  https://www.youtube.com/watch?v=cxxnuofREcM https://www.clonemykey.com/faq/ https://www.getkisi.com/blog/how-to-copy-access-cards-and-keyfobs
  7. Source: https://www.newgenapps.com/blog/internal-and-external-security-threats Infographic: Where are the threats coming from - https://www.clearswift.com/sites/default/files/images/blog/enemy-within.pdf
  8. Control Use of Administrative Privileged: minimize & monitor the administrative privileges. Practice Patch Management: a process in where you will identify, acquire, install and verify patches for products & systems. Conduct Vulnerability Scanning: to check the software and configurations of the systems of your network. Secure Configurations for Hardware & Software: Certain configurations options can open new opportunities for hackers. Track all hardware devices on the network: Use strong Passwords: Remember to change your password frequently and do not reuse the password. The password needs to contain letters, numbers, & symbols. 7. Secure Wi-Fi Networks: Make sure that the Wi-Fi Networks are encrypted 8. Have proper Back-up Plans: Perform regular back-ups of important files from your laptop. If you are a victim of malware, a backup drive will ensure that important files are not lost. 9. Firewalls: offers different layers of protection and can be in hardware or software form. Source: https://www.calyptix.com/top-threats/5-security-controls-stop-85-cyber-attacks/ http://www.manageitafrica.com/avoidable-cyber-security-mistakes-prevent-vulnerabilities/
  9. https://www.datto.com/au/blog/how-to-protect-businesses-from-ransomware
  10. External Penetration Testing: https://www.hacklabs.com/penetration-testing/ Internal Penetration Testing: https://www.hacklabs.com/internal-penetration-testing/ Penetration Testing: It’s the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. https://www.softwaretestinghelp.com/penetration-testing-guide/ Why your company needs penetration testing? - To avoid incidents as the WannaCry Ransomware attack from May 2017. Companies need to Protect their information systems against security breaches.
  11. Source: https://en.wikipedia.org/wiki/Vulnerability_assessment Extra: https://searchsecurity.techtarget.com/definition/vulnerability-assessment-vulnerability-analysis
  12. Source: https://www.tutorialspoint.com/software_testing_dictionary/web_application_testing.htm
  13. Phishing: https://en.wikipedia.org/wiki/Phishing Vishing: https://www.webopedia.com/TERM/V/vishing.html Tailgating: https://whatis.techtarget.com/definition/tailgating-piggybacking Picture: social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This is a type of confidence trick for the purpose of information gathering, fraud, or system access, and the first type of attack of this kind known in history is the Trojan horse itself (not the computer virus, but the Greek mythical event). For example, in this attack, an international cyber crime ring based out of Eastern Europe managed to steal $1 billion in 2 years from 100 different banks in nearly 30 countries using spear phishing emails targeting bank employees. The spear phishing technique is, by far, the most successful on the internet today, accounting for 91% of attacks! Website::: https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/