Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cybersecurity: Risk

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.

Cybersecurity: Risk

Security presentation given to students at Pellissippi State Community College as part of a panel event with their chapter of Association for Information Technology Professionals

Avatar for christinejones

christinejones

February 24, 2016
Tweet

More Decks by christinejones

Other Decks in Technology

Transcript

  1. Risk Evaluation 4 Big Questions 1. How attractive a target

    are you? 2. What do you have of value? 3. What counter measures do you have against attack? 4. What would be the result of a compromise?
  2. Mitigation Think like an attacker. What could someone with malicious

    intent do? How can you make it harder or close off the ‘easy’ attacks? ex: sanitize user input, encrypting data Always be on the lookout for new vulnerabilities. People are constantly thinking of new attacks.