SlideShare a Scribd company logo
2
Most read
7
Most read
18
Most read
CYBERSECURITY ATTACK VECTORS
How to Protect Your Organization
Ripped From the Headlines!
CYBERSECURITY ATTACK VECTORS
In 2015, more than 178 million Americans had
their records exposed in cyber attacks
*Cyber attacks cost the average
American firm $15.4 million
*http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/
**Damage from hacks cost businesses $400
billion per year
**http://www.inc.com/will-yakowicz/cyberattacks-cost-companies-400-billion-each-year.html
CYBERSECURITY ATTACK VECTORS
IT’S NOT IF YOU WILL BE ATTACKED BUT WHEN!
There are important ways you can protect yourself and your
organization
First, it’s vital to understand the major methods cyber
criminals use to accomplish attacks…..
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
Ransomware
Ransomware is becoming more sophisticated and more prevalent.
These types of attacks restrict access to a computer until a ransom is
paid. If the ransom is not paid, data is destroyed forcing organizations
to either pay the ransom or lose critical data forever.
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
Delivery of Malicious Code
These attacks, often referred to as “watering hole” attacks are
characterized by hackers injecting malicious code on to a public web
page known to be frequented by those in a particular industry.
This type of attack is intended to infect a computer and thus gain
access to a targeted network.
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
Social Engineering
Individuals are able to prey on the trustworthiness or inexperience of
staff by posing as company personnel, vendors, or powerful authorities
to gain information or resources that they can use to bypass
organizational security.
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
Remote Access
Through open ports or the exploitation of web code, hackers are able
to use SQL injection to gain unauthorized access to a server.
CYBERSECURITY ATTACK VECTORS
Criminals are aided by the conscious assistance of an organization’s
employee(s)
Major Attack Vectors Utilized by Cyber Criminals
The Inside Job
CYBERSECURITY ATTACK VECTORS
Phishing schemes involve attempts to steal your identity or
information (such as usernames, passwords, and credit card
details) for financial gain by using a fake email disguised as one
sent from a trustworthy entity to entice you to click on a bad link
or file. These often come dressed as from a financial institution
(such as a bank).
Major Attack Vectors Utilized by Cyber Criminals
Phishing
CYBERSECURITY ATTACK VECTORS
The FBI reported that between October of 2013 and August of 2015
$750 million was extracted from more than 7,000 companies using
spoofing type scams. Criminals fake correspondance from the
executives of victim companies, asking employees to initiate
unauthorized international wire transfers on the company’s behalf.
In spoofing, an e-mail header is manipulated to look like it came
from somewhere different than the source.
Major Attack Vectors Utilized by Cyber Criminals
Spoofing
Access Through Intermediaries
Retail chain Target suffered an extremely high profile breach in
2013, which led to 40 million credit and debit cards to be stolen
during that holiday shopping season.
The attack was implemented in part through the use of a malware
that successfully garnered the electronic credentials of Target’s
HVAC vendor.
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
Brute Force Attack
An attack that uses automation to systematically check all
possible passwords or keys until the correct password is
discovered. The success of these attacks are based on the
strength of the password. This is why longer, more complex
passwords are safer.
CYBERSECURITY ATTACK VECTORS
Major Attack Vectors Utilized by Cyber Criminals
What Can I Do?
There are some important steps you as a leader can
take to protect your organization today…
CYBERSECURITY ATTACK VECTORS
Security Audits & Assessments
These security assessments examine your internal and external
security including your firewall ports, packet flow, access and
authentication to your network, traffic control and much more.
They are followed by a report and a remediation plan that you
can use to fix any vulnerabilities.
They should be performed at least once a year. It is also
important to do thorough research on any company you will use
to perform these. You will be allowing them access to your
network, so it is critical that you have vetted their credentials.
CYBERSECURITY ATTACK VECTORS
What Can I Do?
Governance
It is important to have procedures and processes surrounding
your security including documented rules for passwords, role-
based access control, rules for reporting potential security
weaknesses, and the requirements for reporting potential security
weaknesses and the requirements of applying security updates,
patches, and fixes.
CYBERSECURITY ATTACK VECTORS
What Can I Do?
Incident Response Plan
Organizations often have documented disaster recovery plans
without having security incident response plans. This is
unfortunate. Planning for various types of breaches, your
organizational response based on the severity of the breach,
specific roles during or following a breach, and running exercises
that simulate a breach are all important ways you can prepare.
When something does happen you want to ensure that the entire
team is working together to mitigate risk.
CYBERSECURITY ATTACK VECTORS
What Can I Do?
Education
Your team members can be your greatest asset or vulnerability
when it comes to cybersecurity. Every member of your team
should be taught how to spot and avoid cyber threats. Security
education today must be a cornerstone of every organization’s
technology strategy.
CYBERSECURITY ATTACK VECTORS
What Can I Do?
Let Us Help You Protect Your Organization
FUTURE POINT OF VIEW
A Cyber Weapon For Your Organization
INTERNAL ASSESSMENTS: We will assess
and report on areas such as Access
Controls, Malware, Physical Security,
Wireless and Mobile, Change Management,
Patch/Update Management, Remote Access,
Backups, and Disaster Recovery.
EXTERNAL ASSESSMENTS:
Penetration Testing, Network and
Firewalls, System Change
Management, Public Facing Access, and
more.
We offer the following services:
Let Us Help You Protect Your Organization
FUTURE POINT OF VIEW
A Cyber Weapon For Your Organization
We offer the following services:
VULNERABILITY TEST
SUBSCRIPTION: These are periodic,
random, unannounced, tests to your
cyber perimeter to validate that no
changes or oversights have occurred
that leave your organization vulnerable
to an attack or breach.
CYBERSECURITY FORENSICS
SERVICE: This is offered if you have
already experienced a breach. We
uncover and identify where, how, and
via whom the breach occurred.
Let Us Help You Protect Your Organization
FUTURE POINT OF VIEW
A Cyber Weapon For Your Organization
We offer the following services:
EDUCATION: We offer private and public education to equip your team and leadership
with the ability to identify and avoid the latest in cyber threats. These courses are
designed to educate all members of your organization how to continually protect the
organization’s digital assets.
For More Information on our Cybersecurity Education Please
Visit FPOV.com/edu

More Related Content

PPTX
cyber security
PPTX
Cyber attacks and IT security management in 2025
PPTX
Introduction to Cyber Security
PPTX
Cyber Security 03
PPTX
Cyber security ppt
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Introduction to cyber security
PDF
Introduction to Cybersecurity
cyber security
Cyber attacks and IT security management in 2025
Introduction to Cyber Security
Cyber Security 03
Cyber security ppt
Cyber Security Presentation "It Will Never Happen To Me"
Introduction to cyber security
Introduction to Cybersecurity

What's hot (20)

PPTX
Cyber security
PPT
Building An Information Security Awareness Program
PDF
Cyber security
PPTX
Cybersecurity
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPT
Cyber Security and Cyber Awareness
PDF
Basics of Cyber Security
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber security system presentation
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber security
PPTX
Cybersecurity Awareness
PDF
Cybersecurity Fundamental Course by Haris Chughtai.pdf
PPTX
Cybersecurity
PDF
Network Security Presentation
PPTX
Cyber Security A Challenges For Mankind
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cyber security
Cyber security
Building An Information Security Awareness Program
Cyber security
Cybersecurity
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber Security and Cyber Awareness
Basics of Cyber Security
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber security system presentation
Overview of the Cyber Kill Chain [TM]
Network security (vulnerabilities, threats, and attacks)
Cyber security
Cybersecurity Awareness
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity
Network Security Presentation
Cyber Security A Challenges For Mankind
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber security
Ad

Viewers also liked (20)

PDF
How to Pick a Technology Vendor: Top 6 Questions to Ask
PDF
HART as an Attack Vector
PPT
Point of View
PDF
Cyber security 2013
PPTX
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
PPTX
Rivers of Information Tools
PDF
Enterprise security: ransomware in enterprise and corporate entities
PDF
PDF
Web backdoors attacks, evasion, detection
PPTX
Trojan virus & backdoors
PPTX
MMW April 2016 Ransomware Resurgence
PPT
Layer 7: Getting Your SOA to Production Without Cost and Complexity
PPTX
Microsoft Cloud Database & Cloud BI
PPT
Business Intelligence in the Cloud I
PPTX
How to stay protected against ransomware
PPTX
A dill pickle
PPT
Going MAD: A Framework For Delivering Pervasive BI Solutions
ODP
Katherine Mansfield Presentation
PPTX
Mansfield web
PPTX
Business Intelligence In The Cloud
How to Pick a Technology Vendor: Top 6 Questions to Ask
HART as an Attack Vector
Point of View
Cyber security 2013
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Rivers of Information Tools
Enterprise security: ransomware in enterprise and corporate entities
Web backdoors attacks, evasion, detection
Trojan virus & backdoors
MMW April 2016 Ransomware Resurgence
Layer 7: Getting Your SOA to Production Without Cost and Complexity
Microsoft Cloud Database & Cloud BI
Business Intelligence in the Cloud I
How to stay protected against ransomware
A dill pickle
Going MAD: A Framework For Delivering Pervasive BI Solutions
Katherine Mansfield Presentation
Mansfield web
Business Intelligence In The Cloud
Ad

Similar to Cybersecurity Attack Vectors: How to Protect Your Organization (20)

PPTX
SIEM Fundamentals-Session 1 presentations
PDF
Ethical hacking and social engineering
PDF
Module 3-cyber security
PDF
Presentation- Introduction to Cybersecurity.pdf
PPT
L N Yadav Cyber SECURITY2.ppt
PPT
L N Yadav Cyber SECURITY.ppt
PDF
Cybersecurity - Webinar Session
PPTX
Computer-Security.pptx
PPSX
csa2014 IBC
PPTX
Cybersecurity Training For Sales People.pptx
PPTX
CyberSecurity Threats in the Digital Age(1).pptx
PPTX
Information Security Basics.pptx
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PDF
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
PPTX
Cyber security
PDF
Common Cyber Attack Vectors(Infographic).pdf
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPTX
Training on Cyber Security & Awareness for employees
PPTX
Cyber security
PPTX
COMPUTER APPLICATIONS Module 4.pptx
SIEM Fundamentals-Session 1 presentations
Ethical hacking and social engineering
Module 3-cyber security
Presentation- Introduction to Cybersecurity.pdf
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY.ppt
Cybersecurity - Webinar Session
Computer-Security.pptx
csa2014 IBC
Cybersecurity Training For Sales People.pptx
CyberSecurity Threats in the Digital Age(1).pptx
Information Security Basics.pptx
Cyber Security Awareness Session for Executives and Non-IT professionals
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Cyber security
Common Cyber Attack Vectors(Infographic).pdf
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Training on Cyber Security & Awareness for employees
Cyber security
COMPUTER APPLICATIONS Module 4.pptx

More from TriCorps Technologies (9)

PDF
Online Reputation Management Tools
PDF
A Very Drone Christmas
PDF
Building a Digital Revenue Engine
PPT
11 Enterprise E-Commerce Solutions
PPT
List of 10 Sales Performance Management (SPM) Vendors
PPT
10 Cloud SAAS Based CRM Providers
PPT
15 Business Uses of iPad in the Field 
PPT
Crowdsourcing and Gov 2.0
PPT
Social Networking for Businesses
Online Reputation Management Tools
A Very Drone Christmas
Building a Digital Revenue Engine
11 Enterprise E-Commerce Solutions
List of 10 Sales Performance Management (SPM) Vendors
10 Cloud SAAS Based CRM Providers
15 Business Uses of iPad in the Field 
Crowdsourcing and Gov 2.0
Social Networking for Businesses

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Approach and Philosophy of On baking technology
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
Modernizing your data center with Dell and AMD
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Approach and Philosophy of On baking technology
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
GamePlan Trading System Review: Professional Trader's Honest Take

Cybersecurity Attack Vectors: How to Protect Your Organization

  • 1. CYBERSECURITY ATTACK VECTORS How to Protect Your Organization
  • 2. Ripped From the Headlines! CYBERSECURITY ATTACK VECTORS In 2015, more than 178 million Americans had their records exposed in cyber attacks *Cyber attacks cost the average American firm $15.4 million *http://money.cnn.com/2015/10/08/technology/cybercrime-cost-business/ **Damage from hacks cost businesses $400 billion per year **http://www.inc.com/will-yakowicz/cyberattacks-cost-companies-400-billion-each-year.html
  • 3. CYBERSECURITY ATTACK VECTORS IT’S NOT IF YOU WILL BE ATTACKED BUT WHEN! There are important ways you can protect yourself and your organization First, it’s vital to understand the major methods cyber criminals use to accomplish attacks…..
  • 4. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals Ransomware Ransomware is becoming more sophisticated and more prevalent. These types of attacks restrict access to a computer until a ransom is paid. If the ransom is not paid, data is destroyed forcing organizations to either pay the ransom or lose critical data forever.
  • 5. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals Delivery of Malicious Code These attacks, often referred to as “watering hole” attacks are characterized by hackers injecting malicious code on to a public web page known to be frequented by those in a particular industry. This type of attack is intended to infect a computer and thus gain access to a targeted network.
  • 6. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals Social Engineering Individuals are able to prey on the trustworthiness or inexperience of staff by posing as company personnel, vendors, or powerful authorities to gain information or resources that they can use to bypass organizational security.
  • 7. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals Remote Access Through open ports or the exploitation of web code, hackers are able to use SQL injection to gain unauthorized access to a server.
  • 8. CYBERSECURITY ATTACK VECTORS Criminals are aided by the conscious assistance of an organization’s employee(s) Major Attack Vectors Utilized by Cyber Criminals The Inside Job
  • 9. CYBERSECURITY ATTACK VECTORS Phishing schemes involve attempts to steal your identity or information (such as usernames, passwords, and credit card details) for financial gain by using a fake email disguised as one sent from a trustworthy entity to entice you to click on a bad link or file. These often come dressed as from a financial institution (such as a bank). Major Attack Vectors Utilized by Cyber Criminals Phishing
  • 10. CYBERSECURITY ATTACK VECTORS The FBI reported that between October of 2013 and August of 2015 $750 million was extracted from more than 7,000 companies using spoofing type scams. Criminals fake correspondance from the executives of victim companies, asking employees to initiate unauthorized international wire transfers on the company’s behalf. In spoofing, an e-mail header is manipulated to look like it came from somewhere different than the source. Major Attack Vectors Utilized by Cyber Criminals Spoofing
  • 11. Access Through Intermediaries Retail chain Target suffered an extremely high profile breach in 2013, which led to 40 million credit and debit cards to be stolen during that holiday shopping season. The attack was implemented in part through the use of a malware that successfully garnered the electronic credentials of Target’s HVAC vendor. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals
  • 12. Brute Force Attack An attack that uses automation to systematically check all possible passwords or keys until the correct password is discovered. The success of these attacks are based on the strength of the password. This is why longer, more complex passwords are safer. CYBERSECURITY ATTACK VECTORS Major Attack Vectors Utilized by Cyber Criminals
  • 13. What Can I Do? There are some important steps you as a leader can take to protect your organization today… CYBERSECURITY ATTACK VECTORS
  • 14. Security Audits & Assessments These security assessments examine your internal and external security including your firewall ports, packet flow, access and authentication to your network, traffic control and much more. They are followed by a report and a remediation plan that you can use to fix any vulnerabilities. They should be performed at least once a year. It is also important to do thorough research on any company you will use to perform these. You will be allowing them access to your network, so it is critical that you have vetted their credentials. CYBERSECURITY ATTACK VECTORS What Can I Do?
  • 15. Governance It is important to have procedures and processes surrounding your security including documented rules for passwords, role- based access control, rules for reporting potential security weaknesses, and the requirements for reporting potential security weaknesses and the requirements of applying security updates, patches, and fixes. CYBERSECURITY ATTACK VECTORS What Can I Do?
  • 16. Incident Response Plan Organizations often have documented disaster recovery plans without having security incident response plans. This is unfortunate. Planning for various types of breaches, your organizational response based on the severity of the breach, specific roles during or following a breach, and running exercises that simulate a breach are all important ways you can prepare. When something does happen you want to ensure that the entire team is working together to mitigate risk. CYBERSECURITY ATTACK VECTORS What Can I Do?
  • 17. Education Your team members can be your greatest asset or vulnerability when it comes to cybersecurity. Every member of your team should be taught how to spot and avoid cyber threats. Security education today must be a cornerstone of every organization’s technology strategy. CYBERSECURITY ATTACK VECTORS What Can I Do?
  • 18. Let Us Help You Protect Your Organization FUTURE POINT OF VIEW A Cyber Weapon For Your Organization INTERNAL ASSESSMENTS: We will assess and report on areas such as Access Controls, Malware, Physical Security, Wireless and Mobile, Change Management, Patch/Update Management, Remote Access, Backups, and Disaster Recovery. EXTERNAL ASSESSMENTS: Penetration Testing, Network and Firewalls, System Change Management, Public Facing Access, and more. We offer the following services:
  • 19. Let Us Help You Protect Your Organization FUTURE POINT OF VIEW A Cyber Weapon For Your Organization We offer the following services: VULNERABILITY TEST SUBSCRIPTION: These are periodic, random, unannounced, tests to your cyber perimeter to validate that no changes or oversights have occurred that leave your organization vulnerable to an attack or breach. CYBERSECURITY FORENSICS SERVICE: This is offered if you have already experienced a breach. We uncover and identify where, how, and via whom the breach occurred.
  • 20. Let Us Help You Protect Your Organization FUTURE POINT OF VIEW A Cyber Weapon For Your Organization We offer the following services: EDUCATION: We offer private and public education to equip your team and leadership with the ability to identify and avoid the latest in cyber threats. These courses are designed to educate all members of your organization how to continually protect the organization’s digital assets. For More Information on our Cybersecurity Education Please Visit FPOV.com/edu