38th cyberspace readiness squadron amsc fm training symposium cyber security alex roosma, 1st lt,...
TRANSCRIPT
![Page 1: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/1.jpg)
38th Cyberspace Readiness Squadron
AMSC FM Training Symposium
Cyber Security
Alex Roosma, 1st Lt, USAF6 March 2014
![Page 2: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/2.jpg)
UNCLASSIFIED//FOUO
Overview
• Real-world cyber attacks• Hacker methodology• How to protect yourself and others• Resources• Questions
2
![Page 3: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/3.jpg)
UNCLASSIFIED//FOUO
Real-World Examples
Recent High Profile Breaches:• Adobe user passwords• Target • US Dept of Energy• LivingSocial• Snowden Leaks• New York Times• AHMC Hospitals Breach
3
![Page 4: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/4.jpg)
UNCLASSIFIED//FOUO
Hacker Motivations
Motivations for network attacks:
• Money – Selling financial, personal or corporate information
• Fame – Kevin Mitnick
• Ideology – Edward Snowden, Anonymous
4
![Page 5: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/5.jpg)
UNCLASSIFIED//FOUO
Attack Vectors
• Social Engineering• Fraudulent Website• Phishing• Malicious Code• Insider Threat
5
![Page 6: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/6.jpg)
UNCLASSIFIED//FOUO
Anatomy of an Attack
Reconnaissance
Scanning
Exploit
Keeping Access
Covering Tracks6
![Page 7: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/7.jpg)
UNCLASSIFIED//FOUO
How to protect yourself and others
• Be aware of attack vectors• Phishing• Social Engineering• Email Attachment Malware• Websites (just because you can get to a site at work doesn’t
guarantee its safety)
• Secure your password• Not guessable from your social media profile• Employ a password manager
• Secure Personal Identifiable Information (PII)• Keep data at rest encrypted• Encrypt email messages or use AMRDEC SAFE:
https://safe.amrdec.army.mil/safe/
7
![Page 8: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/8.jpg)
UNCLASSIFIED//FOUO
Resources
http://www.staysafeonline.org/
http://www.getnetwise.org/
http://www.onguardonline.gov/
http://www.ikeepsafe.org/
8
![Page 9: 38th Cyberspace Readiness Squadron AMSC FM Training Symposium Cyber Security Alex Roosma, 1st Lt, USAF 6 March 2014](https://reader036.vdocument.in/reader036/viewer/2022082816/56649cf85503460f949c8da5/html5/thumbnails/9.jpg)
UNCLASSIFIED//FOUO
Questions
9
?