Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Claudius Link
Claudius Link
@realn2s@infosec.exchange  ·  activity timestamp 2 years ago

I have the challenge to give an overview about #cybersecurity in 5 minutes 😮

My idea is to combine personal as well as cooperate security. To give everyone something that makes them more secure individually and improve the corporate security posture. And i would also talk about current attacks

The problem is, it's just so much for 5 minutes.

To my question to you #cybersecurity experts and non-experts alike.
What would do you think needs to be in a 5 minutes overview? What would you like to hear about?

#wisdomOfTheCrowd #FediPower

  • Copy link
  • Flag this post
  • Block
Claudius Link
Claudius Link
@realn2s@infosec.exchange  ·  activity timestamp 2 years ago

Thanks all, for the great suggestions.

I'll start with the costs of cybersecurity incidents.

For Germany this is estimated to have been 200 billion € for 2023.
So close to 5% of the GDP (~ 4 trillion €)

I'm actually slightly sceptical of this number as it was estimated through a survey. It feels a bit like #FUD to me. I probably wouldn't use this number if the presentation wasn't in a business setting.

Following up with a simplified kill chain and connecting personal, corporate and security of the society

A simplified cyber kill chain with the stage

Prepare, Deliver, Exploit, and Utilize
A simplified cyber kill chain with the stage Prepare, Deliver, Exploit, and Utilize
A simplified cyber kill chain with the stage Prepare, Deliver, Exploit, and Utilize
  • Copy link
  • Flag this comment
  • Block
Claudius Link
Claudius Link
@realn2s@infosec.exchange  ·  activity timestamp 2 years ago

I then talk about the different context of #cybersecurity and their overlap
(I don't want to suggest these are the only or correct ones ;-)

Personal, Coporate and Society security. Mention common attacks, methods used and counter measures. With #SocialEngineering as a common method and Credentials/Passwords as common between personal and corporate security.

(I'm not totally satisfied with "society security", so suggestions welcome)

Ven diagram of Personal, Coporate and Society security). Showing an overlap
Ven diagram of Personal, Coporate and Society security). Showing an overlap
Ven diagram of Personal, Coporate and Society security). Showing an overlap
  • Copy link
  • Flag this comment
  • Block
Claudius Link
Claudius Link
@realn2s@infosec.exchange  ·  activity timestamp 2 years ago

Regarding #SocialEngineering I love the work of Frank Stajano and Paul Wilson. The documented 7 common principles of #scams.

The principles are (in my adaption)

  1. Need or Greed / Bait: Something the victim/mark wants or wants to avoid.
  2. Deception: A connection to reality
  3. Distraction: an elaborate story around the scam hiding the true intentions.
  4. Authority or Trust: Scams "originate" often trusted or authoritative person, role, or organisation
  5. Time pressure & timing: The victims are pressured to decide or act quickly. And the attacks are timed, often after lunch, or the afternoon were the victim is like less energetic and attentive.
  6. Secrecy (or Dishonesty): keep the mark from asking someone else.

and may slightly less relevant in a digital Social Engineering context:

  1. Herd/Group Principle: Others are doing it as well, so I either have FOMO or think it can't be that bad

You can read more in https://www.cl.cam.ac.uk/~fms27/papers/2011-StajanoWil-scam.pdf

View (PDF)
  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.29 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct