Professional Documents
Culture Documents
Topic 2 - Overview of Cyber Threats - DR Ram Kumar G
Topic 2 - Overview of Cyber Threats - DR Ram Kumar G
• Risky Actions
• Knowledge Check
• Appendix
2
3
4
Types of Risk and Threats for Information Security
5
The Growing Cyber-Attack Surface
6
7 V&A Source: The Threat Lifecycle Management Framework, Log Rhythm
8
Data Leakage Vectors
1.Email
• Outbound Emails
• Unencrypted PII mails
• Outlook Web Access
9.Out of View Sensitive 2.Internet
Data • File Sharing Websites
• Inability to locate and • Send out data using
protect sensitive data personal email IDs
3.Mobile Devices
8.Hardcopy Documents • Loss/Theft of Device
• Personal phones with email
• Ability to print sync
sensitive data & take • Laptops with sensitive data in
home
Data Leakage
hard disk
• Not following Clear • .pst file in local hard disk
• Unrestricted Internet Access
Desk Policy outside company network
10
11
12
13
Key Threats
14
15
16
17
18
19
Business Risks
20
Malware Threats
21
Information Security Threats
22
23
New Threat Vectors
24
New Threat Vectors
25
Risky Actions
26
27
Insider Threat Impacts
28
29
30
31
32
33
34
35
Relatively high-likelihood, high-impact threats
36
Relatively low-likelihood, high-impact threats
37
Relatively high-likelihood, low-impact threats
38
39
40
41
42
43
Multiple Levels of Security Controls
44
45
Knowledge Check
• No scoring
46
Knowledge Check (1/5)
D. Both B and C
48
Knowledge Check (3/5)
A. Credential harvesting
C. Data Theft
50
Knowledge Check (5/5)
51
Thank You!
52
Appendix
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Implications of Hacked Email
70
Implications of Hacked PC
71
72
73
74
75
76
77