You are on page 1of 12

PALO ALTO NETWORKS CYBERSECURITY ACADEMY

What is Cybersecurity & Why Should I Care?


CYBERSECURITY is a set of techniques used to
protect networks, programs and data from attack,
damage, or unauthorized access.

Your
o u r D a ta a nd Phon N et w
Y e – o rk s
s e nc e O n line Ho me :
Pre
T he C l ou d ’” - Sc
AKA: ‘ Work h oo l

INTERNET OF THINGS
IoT

1 | ©2014, Palo Alto Networks. Confidential and Proprietary.


What do the Bad Guys want???
• Steal personally identifiable
information (PII): full identity theft
packages to commit financial fraud.
• Exfiltrate organizational
information: includes intellectual
capital/property
• Harvest authentication credentials:
Stolen username and password
combinations­
• Pilfer financial data: Unauthorized
withdrawals from accounts or
charges against credit lines  

2 | ©2014, Palo Alto Networks. Confidential and Proprietary.


PREVENTING SUCCESSFUL CYBERATTACKS – REDUCE VISIBILITY

Network Endpoint Cloud

Visibility

ANALYTICS
Who is the Adversary?
The Who is he?
Adversary He could be sitting right next to you….
He could be your Facebook Friend…..
He could be…. Bob!

Bob Wants To….


Bob
1. Get In
2. Get the Job Done Your Job …..
3. Get Out (Undetected) …..STOP BOB!
… and stay your friend!
FACEBOOK basic vulnerabilities

Attacker Weaponization Target


and Delivery

lo w an yo n e to es se nti ally take control of


….would al
Facebook vulnerability… ge r, m od ify its contents, distribute
or M e ss en
any message sent by Chat n te ch n iq ues to o ut sm art security
tomati o
malware and even insert au
defenses. nv e rsation
“I hack a n ge a co
ed to c h p p. By
vulnera a few Facebo l icious us e r
e
e r A
sseng r remove
bi ok m a M
I did th lity they won’ accounts usin lit y all ows a n lin e Chat &
o m o dif y o
is witho t ga a bi kO le t
their st ut ever  fix.” Vulner the Faceboo y, it is possib much more
uff kno in ilit nd
The issu , or being any wing the pers thread his vulnerab o, file, link, a
where
e here
i s ho w physica on, touching gt
abusin message, ph
ot
Facebo ll
ok uses y close to them any se
nt
phone
numbe .
rs.
INSTAGRAM basic vulnerabilities

Attacker Target
Weaponization
and Delivery
BBC REPORT: Hackers h
ave gained ;
access to the personal d a ck s In s ta g ra m
ata of
10-Ye ar- O l d H
celebrities on Instagram
by using a o m F a c eb o o k
"flaw" in its security sys
tems. Wins $10K Fr

September 2017: 6 MILLION Instagram


users hacked!!
Personal Devices – YOUR Phone!!

Attacker Target
Weaponization
and Delivery
2017 - mor
e than 1.5
incidents o million new
ra bility f mobile m
ew B lue to o th v u lne been detec alware hav
September 2017: N co n ds!
ted by McA
fee Labs in
e
ck a ph on e in 10 s e the first qu
can ha arter of th
for a total e year alon
of more th e–
mobile ma a n 16 millio
lware incid n
ents.
Spear Phishing + Decoy

Spear Phishing Email


Weaponization
and Delivery

Attacker Target

Exploit Document

Backdoor Access

Decoy Document
Backdoor Trojan
How do you win?
Bob You
Don’t be Force attackers Use Basic
low hanging to use their "Cyber
best tools. Hygiene"
Fruit

Know your Have visibility


Know where the
valuable data
network into all areas
resides.

Who can
Know the benefit from
How would you
attack your own
attacker compromising
you?
network?
Critical Need for Cybersecurity Training
MANY MANY JOBS AND GREAT PAY!!

11 | © 2017, Palo Alto Networks. Confidential and Proprietary.


It’s time to STAND TALL …
… Take ACTION

12 | © 2016, Palo Alto Networks, Inc. Confidential and Proprietary.

You might also like