1 / 0

Cyber Security in Innovation and Internationalization

Cyber Security in Innovation and Internationalization. Sarah Stromer , Sam Baez, Jonathan Petit Bois MBA 533 IBC Event . Cyber-Threats . E xamples. Track Data Computer Intrusion – PC and Server Denial of Service Attacks Virus & Worms Deployment Trojan Horse Attacks Mobile Malware

media
Download Presentation

Cyber Security in Innovation and Internationalization

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security in Innovation and Internationalization

    Sarah Stromer, Sam Baez, Jonathan Petit Bois MBA 533 IBC Event
  2. Cyber-Threats Examples Track Data Computer Intrusion – PC and Server Denial of Service Attacks Virus & Worms Deployment Trojan Horse Attacks Mobile Malware Cloud-Based Attacks
  3. National Cybersecurity and Communication Integration Center(NCCIC) The Purpose of NCCIC NCCIC operational structure aligns to its primary capabilities Liaison Analysis Planning Assist and Assess
  4. The Situation Target Store Track Data (Cyber Threat) Black Friday Customers Debit Cards and Credit Cards Sophisticated Black Market Customer Information
  5. Prevention Recommendation Cyber Security threats can be internal as well as external Risk assessment team Proper Training Solutions, policies, procedures to reduce attacks Plan for the worst Cyber Insurance
  6. References Cyber risk assessment and management. (n.d.). Retrieved from http://www.staysafeonline.org/re-cyber/cyber-risk-assessment-management/ Hu, E. (2014, January 17). Analysts: Credit card hacking goes much further than target. Retrieved from http://www.npr.org/blogs/alltechconsidered/2014/01/17/263375116/analysts-credit-card-hacking-goes-much-further-than-target Lapowsky, I. (2014, January 03). 5 biggest cyber threats to watch for in 2014. Inc., Retrieved from http://www.inc.com/issie-lapowsky/5-cyberthreats-2014-mcafee.html Levinson, C., Yadron, D., & Ziobro, P. (2014, January 29). Target hackers used stolen vendor credentials. The Wall Street Journal. Retrieved from http://online.wsj.com/news/articles/SB10001424052702303973704579350722480135220
More Related