The document discusses various cybersecurity threats including ransomware, espionage, and human factors. It provides recommendations for organizations to improve their security posture such as limiting administrative access, deploying centralized logging, implementing two-factor authentication, testing users with phishing simulations, and limiting ad network participation. The document examines the economics of security and classifies threats as being opportunistic, targeted, structured, or unstructured.
Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to studying CSIRTs. Network, 100, 2.
Sundaramurthy, S. C., McHugh, J., Ou, X., Rajagopalan, S. R., & Wesch, M. (2014). An anthropological approach to studying CSIRTs. Network, 100, 2.
Every town had one doctor and they were also your vet
Many home remedies spawn from this time – milk as a treatment for stomach ulcers is an example
Major health crises were frequent and impossible to control
15 MINUTES
What do all attackers have in common?
What do all attackers have in common?
20 MINUTES
Attackers more often than not will go after humans
Humans are inherently fallible
APT1 report was pivotal in understanding this threat
Sony attack by NK was first major destructive attack against the US
https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf
https://www.fireeye.com/current-threats/annual-threat-report/mtrends.html