Professional Documents
Culture Documents
4-Info Security Essentials v3.3 (LUMS)
4-Info Security Essentials v3.3 (LUMS)
4-Info Security Essentials v3.3 (LUMS)
Essentials
AQEEL AHMAD
CTO, E2E GROUP
https://e2egoc.com
V 3.3
What comes to mind?
• Hackers
• Cyber terrorists
I am the • Organized Attacks
• Viruses
Victim • Trojan Horses
• Ransomware
• Yahoodi Sazish
Reality is slightly different
• Human Negligence
• Lax Email Habits
• Poor Backup Practices
I am the • Misdelivery
• Weak Passwords
Weak Link • Reused Passwords
• Sharing Passwords unsafely
• Installing untrusted applications
• Poor security on mobile devices
Cyber Attacks
System Others
misconfiguration 5%
5%
Stolen/lost
device
8%
Phishing
38%
Inadvertant
disclosure
12%
Network
Intrusion
32%
source: ic3.gov
SECURITY LANDSCAPE
Phishing
Spoofing
Vulnerability
Denial of
Software Service
Authentication Systematic
Security
Attacks
Spamming
IDS/WAF etc.
Security
Strength
Frequency
Sharing
Passwords
Passwords
Individual Two Factor
Site trust
Security Authentication
Network
Firewalls etc.
Security
Webcams
Device Security
IoT etc
False Sense of Safety
Over
Confidence
Ignorance
Personal data is a tradable commodity
Dark web
Account
Social
Passwords Email Coworker Hire a Cyber Custom
Security Credit cards Documents Spying Ransomware
($1 per Addresses Data Hitman Malware
Numbers
account)
have I been pwnd?
Before the victim knows -
Partially public - $$ Fully Public - $
$$$$
https://haveibeenpwned.com
Most Terrifying Vulnerabilities in Recent Times
IaaS Full
PaaS Partial
SaaS Minimal
A Real Life Example
What to do as an Internet Citizen
https://haveibeenpwned.com/
https://howsecureismypassword.net/
https://codebeautify.org/send-snap-message
https://bitwarden.com/
https://www.lastpass.com/
https://vimeo.com/154958732
(Presentation by the author of Have I been Pwned)
Thank You & Questions