Click me
Transcribed

The Rise of the Cyberwarrior

THE RISE OF THE CYBERWARRIOR How cyber threats are creating new job opportunities October In March 2013, National Intelligence Director James Clapper asserted that cybercrime is the #1 national security threat in the U.S. MARK VOUR According to the Pentagon, cyberattacks can be considered an official act of war CALENDAR OCTOBER IS NATIONAL CYBERSECURITY AWARENESS MONTH CYBER THREATS ARE REAL AND GROWING The Symantec 2013 Internet Security Threat Report reveals the numbers of cyber threats in 2012: On average, 1 in every 291 emails contained a virus Each day, 247,350 web attacks were blocked 1 breach = 604,826 exposed identities The report also showed the increase of cyber threats in 2012 over the previous year: 95% of threats were targeted at Android users 42% MORE 30% MORE 125% MORE 58% MORE targeted cyber attacks web-based attacks social media phishing sites mobile malware families BEWARE OF DISTRIBUTED DENIAL OF SERVICE (DD0S) ATTACKS Techopedia defines DDOS as "a type of computer attack that uses a number of hosts to overwhelm a server, causing a website to experience a complete system crash" The largest-known DDOS attack occurred in March 2013, reaching 300 Gbps (gigabits per second) According to Prolexic Technologies, from 2012 to 2013, DDOS attacks increased 22% THE NEW (CYBER) RULES OF ENGAGEMENT: THE TALLINN MANUAL Commissioned by NATO, this handbook has 95 "black letter rules" explaining the proper etiquette of international cyber warfare MAJOR INTERNATIONAL HACK JOBS NAME OF WHO'S (UNOFFICIALLY) DAMAGE DATE TYPE VICTIM CYBER ATTACK RESPONSIBLE? DONE Destroyed 2009/2010 Stuxnet Uranium uranium (Estimated) U.S. and Israeli centrifuges, setting back Iran's nuclear enrichment Worm plant in Natanz, Iran governments Likely considered illegal according to Tallinn Manual programs Cutting Sword of Justice, a hacktivist organization 75% of PCs Saudi wiped clean Aramco, Shamoon 2012 Virus Saudi Arabian What is a hacktivist? oil firm A private citizen who engages in hacking for ideological, political, religious, or patriotic reasons Unknown Al-Quassam Multiple attacks from number of Cyber Fighters, a hacktivist Al-Quassam Cyber Fighters, a hacktivist organization Operation customers DDOS September 2012 - present Ababil unable to access bank websites organization CALLING ALL CYBERWARRIORS The Bureau of Labor Statistics expects very high demand for information security analysts who can fend off increasingly sophisticated cyber attacks, especially in the federal government and health care sectors May 2012: Tom Kellermann, VP of Trend Micro and former member of President Obama's cybersecurity commission, estimated how many cybersecurity experts will need to be hired in the near future 88.8 X 10,000 X 10,000 Government: 10,000 New Hires Private: 40,000 New Hires In January 2013, the Defense Department's Cyber Command approved plans to create 4,000 new jobs, growing the force to nearly 5x its current size 3 NEW CYBER COMMAND FORCES National Mission Forces Combat Mission Forces Cyber Protection Forces Protect computer systems that Help plan and execute Secure Defense Department networks control national infrastruc offensive assaults WALKING THE PATH OF THE CYBERWARRIOR According to the National Initiative • Computer Science for Cybersecurity Careers and Studies, • Mathematics some of the most common degree • Information Technology programs that can prepare you for a • Network Management career in cyber security are: Cybersecurity • National cybersecurity policy and law • System vulnerability assessments Examples of online cybersecurity courses as seen in U.S. News & Report • Cybercrime investigations and forensics Visit National Initiative for Cybersecurity Careers and Studies (NICCS) @ niccs.us-cert.gov Launched by the Department of Homeland Security in February 2013, this online resource offers information on cybersecurity careers, education, and training Note: A degree in any field discussed in this infographic is not a guarantee of employment. Employment opportunities may require different or additional qualifications or certifications beyond those described in this infographic. Employment opportunities may also vary based on other factors including coursework completed, geographic location and general economic conditions. None of the information contained in this infographic is intended to nor shall it guarantee any result for any individual. Created for OnlineSchools.com © QuinStreet, Inc., 2013 SOURCES OnlineSchools.com For every chapter of your education "National Cyber Security Awareness Month 2012: Are You the Weakest Link?" Federal Bureau of Investigation, Oct. 1, 2012, "Pentagon: Cyber Attacks Can Qualify as Acts of War," Mashatle, Lauren Indvik, May 31, 2011, mashable com/2011/05/31/pentagon-tyber-attacks-act-of-war/ "Cyber-crime tops threats to US, intelligence chief says," Los Angeles Times, Ken Dilanian, March 12, 2013, articles latimes.com/2013/mar/12/news/la-pn-cybercrime-threat-20130312 www.tbi.gov/news/news_blog/national-cyber-security-awarenes5-manth-2012 ৪ - 2013 Internet Security Threat Report, Volume 18," Symanter, Accessed April 24, 2013 ter Arpacred www.symantec.com/security_response/publications/threatreport jsp?om_ext_cid=biz es के এ "Intensity of DDGS Cyber Attacks Explodes in 10: Average Bandwith Surges 691%," FOXBusiness. Matt Egan, April 17, 2013, www.foxbusiness.com/technalogy/2013/04/17/intensity-ddos-attacks-explode-in-first-oquarter-average-bandwith-surges-61/ पराप বাাানানা প প০ n de afies ibianast attark in bistony " BRC. Dave Lee. March 27, 2013, www.bbc.co.uk/news/technology-21954636 "Distributed Denial of Service IDDOS)," techopedia, Accessed April 24 2013, www.techopedia.com/definition/10261/distributed-denial-of-service-ddos "Giobal internet slows after 'biggest Lanal Evnerts Spurnet Attark "Act of Farre "Wired, Kim Zeter. Marth 25, 2013, www wired.com/threatlevel/2013/03/stuanet-act-of-force/ "In Cyterattack on Sauti Firm. US. Sees Iran Eiring Beck The New York Times, Nicnle Parlunth (ut 21 2012 Marh 27 a012 on Iran Was Ilegal www.nytimes com/2012/10/24/business/global/oyberattack-on-saudi-gil-firm-disquiets-us.html?pagewanted-all&_r=1& s ा "Bank DDOS Attacks Resuine: Wells Fargo Confirms Disruptions, Information Week, Mathew J. Schwartz, March 27, 2013. www.infomiationweek com/security/attacks/bank-ddos-attacks-resume-wells-fargo-con/240151825 "Nato Cyber Warfare Manual Civilian Hackers 'legitimate Targets' Conventional "Rules of cyberwar don't target nuclear plants or hospitals, says Nato manual." The Guardian, Owen Bowcott, March 18, 2013. www.guardian.co.uk/world/2013/mar/18/rules-cyberwarfare-nato-manual "For Job Security, Try DCyberSecurity, Experts Say," Mashable, Alex Fitzpatrick, May 29, 2012, meshable.com/2012/05/29/cybersecurity-career/ "Degree Programs, National Initiative For Cybersecurity Careers and Studies, Accessed April 24, 2013, niccs us-cert gov/education/degree-programs "Online Cyber Security Bachelor's Degree, s ১s ৪.10d & World etmbaica arinbu ong hepon, Accessed April 24, 2013 acbalern www.usnews com/education/online-education/cyber-security-bachelors-degree?int=431fad উনন এ "Information Security Analysts, Web Developers, and Computer Network Architects," Occupational Outlook Handbook (2012-13 Edition). Bureau of Labor Statistics, March 29, 2013, k Architects. www.bls.gov/ooh/computer-and-nformation-technology/information-sECurity-analysts-web-deavelopers-and-computer-network-architects htmětab-6 "DHS Launches National Initiative for Cybesecurity Careers and Studies. Department of Homeland Security, Feb 21, 2013 "Pentagon ta boost cybersecurity force", Ellen Nakashima. The Washington Post, January 27, 2013 http://www.washingtonpost com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/087 d9dc2-5fec-11e2-105a-60552816712_storyhtml

The Rise of the Cyberwarrior

shared by OnlineSchools on Jun 11
389 views
1 shares
0 comments
This infographic looks at statistics about cyber threats and how we are dealing with the problem.

Publisher

OnlineSchools

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size