Current Trends.pptx - Current Trends Nobody ever defended...

This preview shows page 1 - 17 out of 29 pages.

Current Trends
Image of page 1

Subscribe to view the full document.

“Nobody ever defended anything successfully, there is only attack and attack and attack some more.” - Gen. George S. Patton
Image of page 2
IP Filtering: 150.148.0..
Image of page 3

Subscribe to view the full document.

From a USA IP Address: 4
Image of page 4
From a Canadian IP Address: 5
Image of page 5

Subscribe to view the full document.

Storefronts Amazon: 40 percent of its sales from affiliates whom they call Associates, and third party sellers who list and sell products on the Amazon websites. Ebay: Notably, EBay Inc. also owns PayPal, Skype , StubHub, Kijiji, and other businesses. Sell.com
Image of page 6
Affiliate Networks
Image of page 7

Subscribe to view the full document.

Affiliate Networks
Image of page 8
9
Image of page 9

Subscribe to view the full document.

Online Pharmacy Fraud FDA Approved Same drugs as local pharmacy No prescripton required Licensed pharmacy
Image of page 10
Online Pharmacy Fraud
Image of page 11

Subscribe to view the full document.

12
Image of page 12
Breach Landscape 1/2014 9/2014 54 million 7/2014 8/2014 11/2014 1.16 Million 1/2014 9/2014 54 million 7/2014 8/2014 11/2014 1.16 Million 2014 Point of Sale Breaches 2015 PII Breaches
Image of page 13

Subscribe to view the full document.

POS Breach
Image of page 14
Department of Energy Cyber Attacks Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014, a review of federal records obtained by USA TODAY finds. Attempts to breach the security of critcal informaton systems that contain sensitve data about the naton's power grid, nuclear weapons stockpile and energy labs.
Image of page 15

Subscribe to view the full document.

Department of Energy Cyber Attacks Total of 1,131 cyberattacks over a 48-month period ending in October 2014. Of those attempted cyber intrusions, 159 were successful "The potental for an adversary to disrupt, shut down (power systems), or worse … is real here," said Scott White, Professor of Homeland Security and Security Management and Director of the Computng Security and Technology program at Drexel University. "It's absolutely real.” A cyber attack in 2013 resulted in unauthorized access to personally identfying informaton for more than 104,000 Energy Department employees and contractors
Image of page 16
Department of Energy Cyber Attacks Records show 53 of the 159 successful intrusions from October 2010 to
Image of page 17
You've reached the end of this preview.
  • Fall '16

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern