+ All Categories
Home > Documents > Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive...

Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive...

Date post: 16-Jan-2016
Category:
Upload: emmeline-kelly
View: 215 times
Download: 0 times
Share this document with a friend
12
Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure o Mobile devices o Asymetrical o Drones
Transcript
Page 1: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 1 of 12

Cybersecurity

o Threats Risks Vulnerabilitieso 6 Environments

o Competitive Environmento Technological Environment

o Cyber riskso Infrastructure o Mobile devices

o Asymetricalo Drones

Page 2: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 2 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Page 3: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 3 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Page 4: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 4 of 12

CybersecurityTop trends Mobile everything

Phablets Drones

Data breaches Effecting top brands New TLDs Government data breaches

Malware Celebrity searches Flashlight apps

Social Media hacking Spear Phishing

Web Server errors

Page 5: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 5 of 12

CybersecurityTop trends Mobile everything Data breaches

Effecting top brands New gTLDs

AAA to Zippo

Government data breaches

Malware Social Media

hacking Spear Phishing

Web Server errors

Page 6: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 6 of 12

CybersecurityTop trends Mobile everything Data breaches

Effecting top brands New gTLDs Government data breaches

Malware Social Media hacking

Spear Phishing Web Server errors

Page 7: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 7 of 12

CybersecurityTop trends Mobile everything Data breaches Malware Viruses, worms, Trojan horses, spyware

etc. Android Apple

Social Media hacking Spear Phishing

Web Server errors

Page 8: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 8 of 12

CybersecurityTop trends Mobile everything Data breaches Malware Social Media hacking

Spear Phishing Watering Hole

Web Server errors

Page 9: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 9 of 12

Future Threats, Risks and Vulnerabilities - Infrastructure

Risks “the industrial control

systems governing the operations of utilities, from water storage and purification to nuclear power reactors, pose a growing risk to national security and Canada’s economic and societal well-being. ”

Page 10: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 10 of 12

Social – Cultural Environment

Risks Household devices and appliances

with IP addresses In condos and apts were there is a

centrally wired structure Houses in micro-communities (gated

communities or prestigious developments) where there is wired or bluetooth connectivity

Page 11: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Slide 11 of 12

Mobile web access Marketing and business

Future Threats, Risks and Vulnerabilities

Page 12: Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.

Tim Richardson

School of MarketingSeneca [email protected]

University of Toronto,

CCIT Program, MississaugaandDept. of Management, [email protected]

www.witiger.comhttp://people.senecac.on.ca/tim.richardson/powerpoints/


Recommended