Final Project- Briefing Project.pptx - Final Project...

This preview shows page 1 - 6 out of 20 pages.

Final Project: Briefing Project University of Maryland University College Professor Philip Famelio, CCJS 390 6380 Cybercrime and security 14 th July 2019
What is a cybersecurity threat Cybersecurity is the state of providing, protecting, and recovering networks, devices, and programs from any computer-related attack on a company or an individual. Cyberattacks could be threats to organizations, employees, and consumers. They may be designed to access or destroy sensitive data of the company or extort money from it. They could destroy businesses and damage people’s financial lives as well as their personal lives. The best defense for this would be a robust cybersecurity system with multiple layers of protection spread across computers, networks, and programs. However, only a robust cybersecurity system will not be enough fight against this threat, but we should make smart cyber defense choices. Many types of cyberthreats can lead to a company and its networks, but they generally fall into three categories. The categories are attacks on; Confidentiality Integrity Availability
Attacks on confidentiality. These include stealing personal identifying information, company secrets, and customer bank account or credit card information. This information could be sold on the dark web. Attacks on integrity. These attacks consist of personal or enterprise sabotage and are often called leaks. A cybercriminal will hack in and release sensitive information to expose the data and influence the public to lose trust in that organization. Attacks on availability. This type of cyberattack aims to block users from accessing their data until they pay a fee or ransom. Typically, a cybercriminal will infiltrate the network and block you from accessing critical data, demanding for a ransom. Companies sometimes have to pay the ransom and fix the cyber vulnerability afterward so that they can avoid halting business activities.
Common cyber threats categories: Social engineering An attack on confidentiality is the process of psychologically manipulating people into performing actions or giving away information. Phishing attacks are the most common of social engineering attacks. Phishing attacks usually come in the form of a deceptive email that tricks the user into giving away personal information. APTs (Advanced Persistent Threats) A type of attack on integrity, are attacks where an unauthorized user infiltrates a network undetected and stays in the network for a long time. The intent of an APT is to steal company data but not harm the network. APTs happen most often in sectors with high-value information, such as national defense, manufacturing, and the finance industry. Malware Malicious software is a type of attack on availability. It refers to software that is designed to gain access or damage a computer without the knowledge of the owner. Several common types of malware include spyware, keyloggers, true viruses, and worms.
Significant threats on company data Cybersecurity Threat #1: Employees

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture