You are on page 1of 16

 

CYBER THREAT INTELLIGENCE PLAN &


PROPOSAL:
PLANNING & PREPARING FOR SOCIAL ENGINEERING THREATS
NICHOLAS WICKER
PROGRAM OF CYBER SECURITY OPERATIONS & LEADERSHIP, UNIVERSITY OF SAN DIEGO
CSOL 580-01-SP22: CYBER INTELLIGENCE
PROFESSOR RON FULTON 1
FEBRUARY 28, 2022

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D


AGENDA

 Discussion
 Social engineering explained
 The Cyber Kill Chain®
 Background
 Statistics
 Threat vectors
 How to decrease vulnerabilities
 Recommendations
 Closing remarks

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D 2


DISCUSSION

3
(Hassold, 2021)

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D


SOCIAL ENGINEERING EXPLAINED

4
(Pilette, 2021)
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
SOCIAL ENGINEERING ATTACK FORMS

(Salahdine & Kaabouch, 2019)

DESTROY/SHRED PHYSICAL DOCUMENTS. DO NOT THROW AWAY IN COMMON RECEPTACLES


BUSINESS SENSITIVE / TECHNOLOGY VISION 3D 5
THE CYBER KILL CHAIN®

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D (Lockheed, 2020)


BACKGROUND

(Okta, n.d.) (NC3, n.d.) 7

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D


STATISTICS

(Cognate, 2021)

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D 8


STATISTICS CONT.

(Evans & Smith, 2019)

(Evans & Smith, 2019)


BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
THREAT VECTORS

(Fortinet, n.d.) (PurpleSec, 2021)


10
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
RANSOMWARE

11

(Accenture, 2021)
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
RANSOMWARE PROCESS

(Gantenbein, 2022)

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D 12


HOW TO DECREASE VULNERABILITIES

(NCSC, n.d.)
13

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D


RECOMMENDATIONS

(Coppinger, 2020) (Samantha, 2020)


14
BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
CLOSING REMARKS

15

(US Signal, 2021)


BUSINESS SENSITIVE / TECHNOLOGY VISION 3D
REFERENCES

 Accenture. (2021). Threats unmasked cyber threat intelligence report. Retrieved February 27, 2022, from https://www.accenture.com/_acnmedia/PDF-158/Accenture-2021-Cyber-Threat-Intelligence-
Report.pdf
 Cognate. (2021, August 29). Ransomware Attack Statistics 2021 - Growth & Analysis. Retrieved February 20, 2022, from https://www.cognyte.com/blog/ransomware_2021/ 
 Coppinger, N. (2020, December 23). The Complete Guide to Phishing Attacks: Varonis Guide. Retrieved February 17, 2022, from https://www.varonis.com/blog/phishing-attacks
 Evans, C., & Smith, C. (2019, October). Beyond Obfuscation - National Defense Industrial Association. Retrieved February 27, 2022, from
https://www.ndia.org/-/media/sites/ndia/policy/documents/cyber/beyond-obfuscation_final.ashx?la=en 
 Fortinet. (n.d.). What is Phishing? Avoiding Email Scams & Attacks. Retrieved February 18, 2022, from https://www.fortinet.com/resources/cyberglossary/phishing
 Hassold, C. (2021, May 18). Cyber threat intelligence: How to stay ahead of threats. Agari. Retrieved February 6, 2022, from https://www.agari.com/email-security-blog/what-is-cyber-threat-intelligence/
 Lockheed Martin. (2020, January 15). Cyber Kill Chain®. Lockheed Martin. Retrieved February 12, 2022, from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
 NC3. (n.d.). Home. Retrieved February 17, 2022, from https://nc3.go.ke/attack-vectors/
 NCSC. (n.d.). Reducing Your Exposure to Cyber Attack. Retrieved February 18, 2022, from https://www.ncsc.gov.uk/information/reducing-your-exposure-to-cyber-attack
 Okta. (n.d.). What is an Attack Surface? (And How to Reduce it). Retrieved February 18, 2022, from https://www.okta.com/identity-101/what-is-an-attack-surface/
 Pilette, C. (2021, July 26). What is social engineering? A definition + techniques to watch for. Official Site. Retrieved February 5, 2022, from https://us.norton.com/internetsecurity-emerging-threats-what-is-
social-engineering.html
 PurpleSec. (2021, August 6). 2021 Cyber Security Statistics Trends & Data. Retrieved February 18, 2022, from https://purplesec.us/resources/cyber-security-statistics/
 Salahdine, F., & Kaabouch, N. (2019, April 2). Social Engineering Attacks: A survey. MDPI. Retrieved February 6, 2022, from https://www.mdpi.com/1999-5903/11/4/89/htm
 Samantha. (2020, February 25). Email Security: Protecting Yourself Against Phishing Scams. Retrieved February 18, 2022, from https://www.hosting.co.uk/blog/protection-phishing/
 US Signal. (2021, September 1). Moving beyond "blinky box" security to defense-in-depth security. Retrieved February 27, 2022, from https://ussignal.com/blog/moving-beyond-blinky-box-security-to- 16
defense-in-depth-security

BUSINESS SENSITIVE / TECHNOLOGY VISION 3D

You might also like