1 Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA
2 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
3 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
4 Motivation Prepare for the future Anticipate the emerging risks you can prepare better you can inform beneficiaries you may be one step ahead in the security arms race
5 A strategy for a Secure Information Society one of the cornerstones in developing a culture of security is improving our knowledge of the problem. to facilitate effective responses to existing and emerging threats to electronic networks...
6 Federal Plan for Cybersecurity We need to Assess security implications of emerging information technologies Develop and apply new metrics to assess cyber security and information assurance They found that: Integration of emerging technologies into the IT infrastructure increases the breadth of and access to vulnerabilities. emerging technologies will present more information than can reasonably be analyzed with existing capabilities. A particularly difficult problem is finding trends and patterns in attacks
7 So We need to Collect information for Current, Emerging, and Future threats and vulnerabilities in Network and information systems security Current threats: now Emerging threats: next 3 years Future threats: 3 years after that
8 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
9 What drives emerging threats? Technical Dimensions What will be the technologies of the future? Application Dimensions What will be the applications of the future? Future Market Trends and Dimensions What are the trends in the market?
10 Drivers: Technical Dimensions Which technical dimensions drive future threats? Wireless Networks Wireless networks could potential be eavesdropped Wireless devices may become more transparent Less visible more integrated with other appliances Proliferation of Broadband Networks i.e. compromised computers have more firepower today. e.g. a 1 Mbps DSL computer can send 10 Gbytes of information per day One million (1,000,000) SPAM messages 10 million attack packets 10 years ago a computer on a 28.8Kbps modem Had two-three orders of magnitude less firepower
11 Drivers: Technical Dimensions (II) Which technical dimensions drive future threats? Device miniaturization Devices will not remind of a traditional computer They will be integrated into other devices (doors, kitchens, etc.) They may not run (properly configured) protection software (e.g. Antivirus) Digital identities (e.g. RFID) More products will have a digital ID People will frequently carry (or wear) products with digital IDs Digital ID readers will proliferate (in public buildings, etc.)
12 Drivers: Applications Smart Mobile Phones Eavesdropping, Loss of privacy, stalking E-banking, e-commerce, e-everything Financial loss, attacks to banking system, attacks to the stock market, etc. Smart Home AmI Lots of wireless potential vulnerable devices Smart Vehicles What if the computer that controls the brakes is compromised?
13 Drivers: Applications (II) E-health What if the computer which controls a medical device gets compromised? What if our medical record is stored in a compromised computer? E-government More and more of our personal information will be stored on-line Blogs Blogs encourage people, including minors, to publish their information on the web This may be used for stalking today It may be used to invade their privacy, etc.
14 Drivers: Future Market Trends and Dimensions On-line services will become more common Online services: commerce, entertainment, news, etc. Even a second-life is possible on-line Mobile phone use will prevail People are on the go mobile phones are needed to support our mobile world Much like electricity supports industrialized nations Service-oriented information society European Economy moves away from traditional products and steps into new forms of services The Internet enables these services to be composed to create even fancier ones E.g. find a doctor who has an opening at a date a time compatible with your schedule and your mother s schedule and who is located nearby
15 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
16 Current Risks SPAM to addresses, phones, etc. Botnets zombie computers Phishing Using more means (phones, SMS) More targeted ( Hi Pal. We met at the IST conf. Let me tell you about ) Identity theft Login/password Route hijacking Divert/Intercept traffic from the Internet Instant Messaging Chat, etc. SMS, etc.
17 Current Risks Peer-to-peer systems File sharing systems Download malware Malware on Cell Phones Through SMS, MMS, (free) games Hackers in Stock Market Through compromised bank accounts Software Vulnerabilities Software is getting larger and more complex No protection (e.g. antivirus) in some devices Mobile phones Printers, Refrigerators, kitchens, stoves, etc.
18 Emerging Risks SCADA Supervisory Control And Data Acquisition Increased home automation A hacker may penetrate the computer which controls the front door Massive collections of personal data Invisible data collection in public places Invisible data collection in private premises Security is more an art rather than a science
19 Emerging Risks (II) DoS attack to the home telephone Image hackers/spamers calling all the time on the telephone Hacking home heat and/or air-conditioning system Turn on/off the stove while the owner is away Internet users are younger, less experienced, and more prone to targeted attacks Internet users may not have strong motives to clean up their compromised computers Malware over multiple networks (GSM, GPRS, Internet, Bluetooth)
20 Future Risks Manageability Currently we manage a few digital devices: Computer, PDA, mobile phone, laptop In the future we will have 10 s if not 100 s of such devices most of which will be hidden Over-use of ICT People use ICT even when not needed They send instead of talking to people They use e-voting systems when traditional raise your hand votes work just fine Such approaches open the road to cyber attackers Use home appliances to attack infrastructures Use thousands of compromised phones to jam the telephone network Use thousands of compromised Airconditioning units to overload the electric power GRID
21 Roadmap Motivation Why is this work important? Which are the drivers of the emerging threats? Technical Dimensions New Applications Market Trends Which are the Risks? Current, Emerging, and Future Scenarios Objectives How do you come up with one? Examples
22 Scenarios: Objectives Goals: Present easy to say story Set the stage by an example Explain Who may be the victims? Who may be the attackers? What is the magnitude of the attack? Is there any way we could have prevented it?
23 Scenarios: How do you come up with one? Think 1. Ask what if questions What if an attacker manages to compromise X? What if an attacker manages to get my login and password for my bank She would be ample to empty my bank account 2. Combine them with real-life events What of an attacker manages to compromise X at a time of Y? What if an attacker manages to get my login and password for my bank at the time of my Christmas bonus? She would be able to get more money
24 Scenarios: How do you come up with one? II 3. Explore the dimension of scale What if an attacker manages to compromise X? What if an attacker manages to compromise lots of Xes? e.g. what if an attacker manages to compromise 1000 bank accounts? She may be able to steal 1000 times more money She may be able to shutter the credibility of the bank What if an attacker manages to compromise lots of accounts in several different banks She may be able to undermine the credibility of the banking system
25 Bank Compromization: What if an attacker manages to compromise one bank account? Time: What if the attacker waits before withdrawing the money from the account? Scale: What if the attacker manages to compromise a large number of accounts? Real Life: What if the attacker compromises an account at a time of a stock market crisis? The attacker may be able to compromise more accounts without getting noticed and withdraw a large amount of money The attacker may be able to collect personal information about the owner of the account and use it for blackmail The attacker may be able to escalate the stock market crisis
26 Scenario I: Stock Market Manipulation Mr Smith subscribes to an stock-market alerting SMS service which informs him of promising stock One day he received an alert for a large rise in OILUC (Oil United Consortium) and he decided to immediately sell some of his OILUC stock through his mobile phone. The day after he realized that there was no rise in the price of OILUC Actually thousands of people sold their OILUC stock at rock bottom price as a result of the fake SMS messages they received
27 Scenario I: Stock Market Manipulation Dimensions of the problem Phishing: Mr Smith received a fake SMS for an alleged increase in his stock m-banking Mr. Smith was able to sell stock via his mobile phone Mobile way of life People on the go make important financial decisions without having the time to thoroughly double-check them
28 Scenario II: Bank Crash John Cracker managed to get the personal data (names, phones, and addresses) of customers of the Western European Credit Bank He sent a phishing to half of them inviting them to check out the alleged new features of the web site of the bank. John managed to collect usernames and passwords for about 500 accounts. Then he launched a double attack: He robbed the accounts He send the telephone numbers of the victims to reporters alerting them of the fact
29 Scenario II: Bank Crash Most of the victims found themselves learning about the phishing scam live on the evening news. The impact was so huge that all the bank s customers demanded to withdraw their money. To avoid crashing, next day the bank remain closed until people calm down. Then John released the second part of his attack. He sent to the rest of the bank s customers seemingly on behalf of the Bank president where he: Apologized for the problem Told them that although the bank is closed, the web site of the bank is open and that through it they can transfer their money to an account of their choice
30 Scenario II Dimensions of the problem: Phishing The customers of the bank were tricked by messages E-banking People used e-banking to transfer money The media The extend of the problem was aggravated by the media and this eventually resulted in panic Two-phase attack The first phase creates panic through a small number of compromised accounts The second phase harvests more money from people in panic
31 In closing The dimensions that drive emerging risks are: New technology Wireless networks, residential broadband networks, device miniaturization, etc. New applications Mobile phones, e-banking, e-government, etc. Social Engineering Phishing, etc. We need to Understand the dimensions of the problem Work towards addressing current, emerging and future risks.
32 Emerging Risks Emerging Risks in Network and Information Systems Security Evangelos Markatos FORTH-ICS, Crete, Greece in collaboration with Louis Marinos ENISA
33 Back up Slides
34 PITAC s Report 2005 US Report Findings: Funding for fundamental research in civilian cyber security should also be substantially increased at other agencies, most notably DHS and DARPA. As a result, the PITAC recommends that the Federal government strengthen its cyber security technology transfer partnership with the private sector. Specifically, the Federal government should place greater emphasis on the development of metrics, models, datasets, and testbeds so that new products and best practices can be evaluated;
35 Things to remember What is the most important thing I would like you to remember Privacy Pervasiveness ICT Integration Social ENGineering PPING
36 Scenarios (III) Exploit both scale and real-life events What if an attacker manages to compromise one traffic light? She may be able to obstruct traffic in one intersection She may even cause accidents, which will obstruct traffic even further What if an attacker manages to compromise several traffic lights? She may be able to obstruct traffic in a whole city What of an attacker manages to compromise several traffic lights during rush hour? She may create chaos
CyberSecurity CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas (FORTH) Crete, Greece 1 Roadmap The problem: The trust
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
E-Commerce Security and Fraud Protection CHAPTER 9 LEARNING OBJECTIVES 1. Understand the importance and scope of security of information systems for EC. 2. Describe the major concepts and terminology of
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
BEHIND OUR DIGITAL DOORS: CYBERSECURITY & THE CONNECTED HOME Executive Summary In support of National Cyber Security Awareness Month (October), ESET and the National Cyber Security Alliance (NCSA) commissioned
Cole p01.tex V3-07/28/2009 3:46pm Page 1 Network Security Landscape COPYRIGHTED MATERIAL IN THIS PART Chapter 1 State of Network Security Chapter 2 New Approaches to Cyber Security Chapter 3 Interfacing
Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: email@example.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
2015 Transit Safety Summit Cybersecurity In Transit Vulnerable Systems APTA Enterprise Cyber Security WG update Cyber attacks may be targeted toward one or more of the *system layers that Transit agencies
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
January 2011 Report #49 Spam made up 81.69% of all messages in December, compared with 84.31% in November. The consistent drop in spam made us wonder, did spammers take a holiday break? Global spam volume
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS I want you to take home four points Understand Educate Collaborate Prepare It s a great
Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving
Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Proofpoint Uncovers Internet of Things (IoT) Cyberattack Page 7 of 11 By Published: Jan 16, 2014 12:30 p.m. ET 217 28 49 More Than 750,000 Phishing and SPAM Emails Launched From "Thingbots" Including Televisions,
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests Wendel Guglielmetti Henrique Rob Havelt Trustwave - SpiderLabs Session ID: HT1-202 Session Classification: Intermediate First
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
White Paper Top Five Security Issues for Small and Medium-Sized Businesses SUMMARY Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing
Threat Intelligence Pty Ltd firstname.lastname@example.org 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
Texas Municipal League Annual Conference October 10, 2013 Kristin Judge Executive Director Trusted Purchasing Alliance Center for Internet Security William F. Pelgrin CIS President & CEO Chair Center for
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
STATE OF CLOUD SECURITY BULLETIN Information Security in the Energy Sector Summer 2013 FROM APR SEP 2012 67% of Alert Logic customers in the energy industry experienced BRUTE FORCE ATTACKS 61% of Alert
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q3/2015 1 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: almost 6,400 new Android malware instances every day 04-04 What are hacking
Cyber crime in business: The facts Bedfordshire Police has launched a new unit dedicated to investigating cyber crime the Cyber Hub. It exists to prosecute offenders and protect the public, including businesses.