Cyber Vulnerabilities: The Counterintelligence CI Perspective - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Cyber Vulnerabilities: The Counterintelligence CI Perspective

Description:

Recognize cyber vulnerabilities and their impact on information technology ... Are approached or contacted by anyone requesting classified sensitive information ... – PowerPoint PPT presentation

Number of Views:264
Avg rating:3.0/5.0
Slides: 13
Provided by: uc96
Category:

less

Transcript and Presenter's Notes

Title: Cyber Vulnerabilities: The Counterintelligence CI Perspective


1
Cyber Vulnerabilities The Counterintelligence
(CI) Perspective
  • Willie Edwards
  • Instructor
  • Counterintelligence Training Academy

2
Goal and Objectives
  • Recognize cyber vulnerabilities and their impact
    on information technology systems.
  • Recognize the cyber attack process
  • Define cyber terrorism
  • Define cyber espionage
  • Recognize user vulnerabilities
  • Describe ways to reduce user vulnerabilities

3
What do you expect to learn today?
4
Information and Special Technologies Program
  • Proactive integration and use of information
    security and intrusion detection capabilities
  • Deter, detect, prevent, and/or neutralize
    technical attacks and intelligence gathering
    activities
  • Target Foreign intelligence and international
    terrorist elements

5
The Cyber Attack Process
  • Spotting
  • Assessing
  • Targeting
  • Attacking
  • Reaping/Ceasing

6
The CI Perspective
  • Cyber Terrorism (Overt)
  • Cyber Espionage (Covert)

7
Targets
  • Computer Systems
  • Networks
  • E-mail
  • Websites
  • Hardware
  • Personnel
  • Information Technology Personnel
  • Users

8
Vulnerabilities
  • E-mail
  • Unsolicited
  • Chain
  • Attachments
  • Websites
  • Business Information
  • Personnel Information
  • Personnel
  • Financial
  • Disgruntled
  • Divided Loyalties

9
Reducing Risks
  • Break into groups of 3 or 4 and list 3 ways that
    you can reduce your vulnerability to attack.

10
Recognize, React and Report
  • Notify your CI Office if you
  • Are approached or contacted by anyone requesting
    classified sensitive information
  • Believe you are targeted
  • Have knowledge of foreign intelligence targeting
    and recruiting

11
Additional Resources
  • National Counterintelligence Executive
    http//www.ncix.gov
  • DOE Computer Incident Advisory Capability (DOE
    CIAC) http//www.ciac.org
  • Local CI Office
  • Counterintelligence Training Academy
  • / http//www.nnsi.doe.gov/c

12
Summary
  • Recognize cyber vulnerabilities and their impact
    on information technology systems.
  • Recognize the cyber attack process
  • Define cyber terrorism
  • Define cyber espionage
  • Recognize user vulnerabilities
  • Describe ways to reduce user vulnerabilities
Write a Comment
User Comments (0)
About PowerShow.com