cyber security trends for 2016
TRANSCRIPT
Initial Exploit Typically Using Angler Toolkit
RansomwarePayload
User Clicks an Email Link or Malvertising
MaliciousInfrastructure
Request of Ransom
Encryption of Files
C&C Comm. & Asymmetric Key
Exchange
Infection Vector
Off-network/RoamingOn-network
Email security
Endpoint antivirus
OpenDNS network layer security service
Firewall
Training, policy and response plan
Patch Management