Sei sulla pagina 1di 69

CYBERSECURITY

POWERPOINT TEMPLATE
AGENDA
Cybersecurity

1. DEFINITION
2. Network
3. Threats
4. News
5. Security
6. Future
7. Checklist
DEFINITION
CYBERSECURITY
There are only two types
of companies: Those
that have been hacked,
and those that will be.
Robert Mueller, FBI Director, 2012
DEFINITION
Cybersecurity

Cybersecurity secures the connection of physical units (e.g.


equipment and control units) to external, virtual space, like the
Internet. This includes data generation, transmission, storage and
analysis on physical and non-physical interfaces.

German Electrical and Electronic Manufacturers’ Association, 2014


DEFINITION
Glossary

TERM DEFINITION TERM DEFINITION


Vulnerabilities in software that can specifically
Hackers who provide time and resources Exploit
APT (Advanced (money) in large quantities with long-term
be exploited by programs or codes
Persistent Threat) goals A hole in the software that is unknown to the
Zero Day manufacturer
Attempting to conceal another’s identity in
Spoofing Through tricks, consumers are misled into
networks
Phishing/ Spear revealing personal or sensitive information / a
Phishing targeted and personalized phishing attack by
Hidden software that can be activated by an email
Kill Switch outside source in emergency situations
OSINT (Open Source Information collected from public sources
Intelligence)
Jamming Intentional disruption of radio communication People who are hired by criminals to accept
and forward money from customers, but are
Money Mule deceived into thinking they are working for a
Defacement Hacking a website’s content, electronic graffiti legal organization
The generic term for malicious programs and
A hidden part of software to access a Malware viruses for performing unwanted and harmful
Backdoor computer functions
The unavailability of a previously accessible
A network of computers that can be remotely DoS/DDoS (Denial of service (DoS)/ if a larger number of different
Botnet controlled by botmasters Service) systems are overloaded, it is known as
distributed denial of service (DDoS).
NETWORK
CYBERSECURITY
NETWORK
Cyberspace

I II III IV V VI

INDUSTRIAL SOCIAL DATA MARKET Online E-government


REVOLUTION NETWORKS STORAGE PLACE BANKING POLICY
NETWORK
Developmental Stages of the Industrial Revolution

End of the 18th Century Start of the 20th Century Start of the 70s Present

INDUSTRY 1.0 INDUSTRY 2.0 INDUSTRY 3.0 INDUSTRY 4.0


Mechanization Electrification Automatization Networks of humans,
machines (M2M) and
by introducing mechanical by introducing labor-based by electronics and IT to things (Internet of Things)
production powered by water mass production powered by further automated production
and steam electrical energy based on cyber-physical
1969 First programmable logic production systems
1870 First production line, controller (PLC), Modicon 084
Cincinnati slaughterhouses
1784 First mechanical loom

Level of Complexity
NETWORK
Gap in the Risk Assessment for Industry 4.0 in the Automation Pyramid

Industry 4.0
Supply Chain Level 5:
Management Supply Chain Level

Level 4: Enterprise Resource


Corporate Level Planning (ERP)

GAP Manufacturing Execution Level 3:


Systems (MES) Operational Level

Supervisory Control and Data


Level 2:
Process Control Level Acquisition (SCADA)

Industry 4.0 Programmable Logic Controller (PLC) Level 1:


Field/ Control Level

Level 0: Manufacturing/
Process Level
NETWORK
Safety Aspects of Industry 4.0

IT Security

Privacy by Know-how &


Design Confidentiality

INDUSTRY

Product
4.0 Hedging
Monitoring Production
Obligations Losses

Product
Liability
NETWORK
Services for (Virtual) Social Life

SOCIAL NETWORKS:
Facebook
Twitter Maintaining social
Instagram contacts, creating virtual
Xing profiles, sending
LinkedIn messages/ chatting, social
YouTube groups (looking for
Vimeo partners, looking
for a job)
MESSAGING SERVICES:
 Skype
 WhatsApp
NETWORK
Data Storage

Big data: collecting, Fast data transmission


storing and analyzing due to constant
large volumes of data improvement in internet
connections and
networks

Unrestricted and Communication


worldwide access to data worldwide via the
due to good internet internet with
networks subsequent data storage
NETWORK
Market Place

Today, trade and service


industries have to present
themselves on the Internet
and offer their services.
Buyers have to give them
sensitive, personal
information, which can lead
to a data breach.

Example:
Shops
Amazon, Zalando, Alibaba,
Lesara, Conleys etc.
Travel
Expedia, TUI, WEG.de,
Travel24 etc.
NETWORK
Banking

ELECTRONIC PAYMENTS IN EUROPE (BS) DAILY CASH AMOUNT (%) E-COMMERCE & E-BANKING
200 90
 Banking transactions
180 80
177 via electronic data
160 78 transfers
70
140 60  Payments are going
60
through more and
120
50 more over the
100 internet
80
87 40

30
60

40 20

20 10

0 0
2010 2015 2020 2010 2015 2020
Payment transactions in 27 countries of the European Union
NETWORK
Policy

E-government is the policy’s information


and communication space.

Administrative services of the state can be


performed more quickly and efficiently.

Political expression is easier


(e.g., discussions in forums, possibility for anonymity,
etc.).

Distance between citizens is shorter


(e.g. politicians’ social profiles).
NETWORK
Policy: E-Government Use (in %) of Individuals Across Countries (2015 Survey)

Spain
Submitting completed forms
Great Britain
Germany
France
Downloading official forms

Accessing information on public websites

Interaction with state agencies

0 10 20 30 40 50 60 70
THREATS
CYBERSECURITY
THREATS
Threats in Cyberspace

INFORMATION & ABUSE


 Targeted government
control and influence of
citizens
 Propaganda
 Consciously communicating
false information
 State espionage
 Data breach
 Identity theft
 Hackers
 Internet crimes,
encouraging sedition
 Terrorism
THREATS
Threat Radar

ALL TYPES OF THREATS

Prevention
Detection
SW vulnerabilities Predictability
Innovative attacks
SOCIETY: THREATS BY INCREASED Erosion privacy Black
NETWORKING Zero Day
Swan
ID theft
Action from
Erosion trust a distance

Legislation hotspot Smart-X


Drones
Education SDN 3D
SCADA Printer
Social media Persistence
Espionage
DDOS THREATS BY TECHNOLOGICAL
Proliferation
Supply chain
Abuse of services Robots DEVELOPMENTS
HACKERS: THREATS THAT ARE CLEARLY POSED BY Sabotage
HACKERS
THREATS
Threat Tree (example: open safe)

Uncover
user
passwords
Install
malware
Other
Phishing Spam actions

Detect codes by
penetrating the Divulge
system confidential
information
THREATS
Threats are Becoming Increasingly more complex
More Complex software programs

Supply chain isn’t New types of viruses


transparent every day

THREATS ARE
Tablet computer BECOMING MORE Cloud storage
COMPLEX

Mobile data storage Several updates daily


THREATS
Complexity of Cyber Attack Capabilities are Growing (2014 Survey)
High Foreign state sponsored cyber
espionage
Insecure codes Cyber terrorism
Cyber warfare

Critical infrastructure
attacks
Cyber crime Malware
BUSINESS IMPACT:
Identity theft
 Citizen trust
Data breach
 Cost to protect Hackers

 Legal/ regulatory Network attacks


DATA EVERYWHERE; USER
 Critical infrastructure EXPERIENCE DRIVEN
 Wearable technology
 Internet of things
INTERNET ACCESS AND HIGHLY ACCESS ANYWHERE & ANYTIME
  Smart devices
CONNECTED SYSTEMS Integrated online eligibility
DATA IN SECURE BUSINESS SYSTEMS  Online access to citizen data systems  Drones
 Mainframe systems  Advances in  Big data  Artificial intelligence
 Internetworking internetworking  Cloud  Mobile payment
   
Low Emergence of open systems Citizen self service Mobile Etc.

1990s 2000s 2010-2014 Now


THREATS
Evaluation of Cyber Risks

Very
High

High Unacceptable risk


EXTENT OF DAMAGE

Medium

Low Acceptable risk

Very
Low

PROBABILITY OF OCCURRENCE
THREATS
Cybersecurity Problem Systematics

1. FOUR GROUPS OF
ATTACKERS:
a. Government
b. Enterprises
c. Cybercriminals
4. FOUR TYPES OF TARGET
a. Public sector
d. Cyberterrorists or
hacktivists b. Private enterprise
c. Individuals CAPABILITY
d. Critical national 6. ASSETS:
infrastructure (CNI)
2. CAPABILITY: a. Data

The ability to hack, steal b. Systems that


ATTACKERS Assets
or damage vary in
criticality
5. VULNERABILITY: INCENTIVE
Can be technical (lack of
firewall) or human (employees
being tricked)

3. INCENTIVE:
Different motives to
attack
THREATS
Attacker Classification

ATTACKER OBJECTIVE MEANS APPROACH


 Information  Enormous financial  Buy knowledge
STATE ACTORS,  Espionage possibilities  Training
INTELLIGENCE  Combat crime  Benefits more important  Inconspicuous attacks
 Damage than costs  Sustainable
Aim

TERRORISTS  Damage  Buying knowledge on the


 Average financial means
 Attention black market
 Political manipulation  Physical and mental attacks

 Business  Existing gangs


ORGANIZED CRIME  Money  Earn money  Organized specialists
 Focus: cost benefits  Blackmail
Opportunistic

 Attention
 Minimal means  Motivated amateurs &
HACKTIVISTS,  Damage specialists
GROUPS  Huge bandwidth and
 Highlighting system coverage  Momentum
vulnerabilities

 Fame
VANDALS, SCRIPT  Minimal means
 Reputation  Applying available tools
KIDDIES  Little knowledge
 Attention
THREATS
Organizations Behind Cybercrime

State-sponsored Hacktivist Criminal

Intellectual property Sensationalism Monetization

Information Disruption Data value


Interest
Disruption Environmentalism Intellectual property

Warfare Social impact Financially motivated


THREATS
The Most Affected Sectors in Germany, 2013-2014 (Bitkom, 2015)

68% 66% 60% 58% 58%


Automotive Chemicals and Pharmaceuticals Finance and Insurance Health Media and Culture
THREATS
Vulnerable Systems

FINANCIAL SYSTEMS ENERGY EQUIPMENT AVIATION AUTOMOTIVE INDUSTRY

GOVERNMENT LARGE ENTERPRISES CONSUMER DEVICES INDUSTRIAL EQUIPMENT


THREATS
Spam

SPAM
Seems legitimate and Many email accounts
are sent to an email have spam filtering
account

Contains often
dangerous links (to
Can also be sent on social download) or invoices for
networks or apps alleged online orders
THREATS
Malware

ATTACKER TROJANS & WORMS VICTIM


ARE SENT VIA INFECTED
EMAILS

hacker

Can transfer sensitive data such as


passwords, banking information, personal data

Various new forms of malware appear Nest undetected in computer systems


on the internet every day. or creep in during downloads
THREATS
Botnets

ATTACKER BOTNET Controller INFECTED TARGET


Networks consisting of
Can send infected and INFECTED INFECTED INFECTED
several computers
dangerous (spam) emails

INFECTED INFECTED INFECTED

hACKER
INFECTED INFECTED INFECTED

Can send infected and INFECTED INFECTED INFECTED


dangerous (spam) emails

INFECTED INFECTED INFECTED


hACKER

Can attacks all IT systems


THREATS
Denial-of-service (DOS) attacks

ATTACKER BOTNET Controller INFECTED TARGET


Networks consisting of
several computers
Are also used as a distraction
while malicious software is
being installed INFECTED INFECTED INFECTED
Block internet services
hACKER
INFECTED INFECTED INFECTED

INFECTED INFECTED INFECTED

INFECTED INFECTED INFECTED


hACKER

INFECTED INFECTED INFECTED

It purpose is to Interrupt web servers which then causes a mass of data packets to be sent to the server
THREATS
Phishing

ATTACKER TROJANS & WORMS VICTIM

hacker
Creates fake messages that include links to
online shops, social networks, payment
services, etc.

Aims to easily obtain sensitive and Victims enter personal and confidential
personal data information unsuspectingly
THREATS
Nexus of the Threat Situation
attack
Vulnerabilities Drive-by-Exploits Distributed Denial of
Service attacks

enable
patches

SPAM

depends on use
Manufacturer User Social Engineering Targeted attacks Botnets

distributes
with handling
is careless

contain
Apps Malware Identity theft
THREATS
Procedure for
Looking for victims
an APT Attack

Preparing for/ diverting


Eliminating evidence
attacks

Continuous
PROCEDURE
monitoring FOR AN Initial infection
APT ATTACK
Data espionage/
Spying on the network
sabotaging systems

Obtaining further rights


NEWS
CYBERSECURITY
NEWS
Personal Experience (in %) of IT Users in the Last 12 Months (2015 Survey)

Finanzieller Schaden durch Schadprogramme/Datendiebstahl 1

Betrug im Rahmen von Online-Banking 3

Betrug im Rahmen von Online-Shopping etc. 13

Versenden von unerwünschten E-Mails im eigenen Namen 15

Auspionieren von Zugangsdaten zu Online-Diensten 18

Infizieren von Computern mit Schadprogrammen 39

0 10 20 30 40 50
NEWS
Number of Incidents and Goals of Attackers (PWC, 2014, 400 Companies with up
to 1,000 Employees)

NUMBER OF INCIDENTS ATTACKER TARGETS


60%
50%
40%
Unknown
8% 30%
36% 18% ≥10 Incidents

4-9 Incidents
20%
10% 2-3 Incidents 10%
28% 1 Incidents 0%
System Access data Image and Customer Intellectual Other
availability reputation and property,
contract trade
data secrets
NEWS
Hackers’ Employment Relationship (in %) (2016 Survey)

379 People with Hacking Abilities in Germany,


Great Britain and USA
30
25
20
15
10
5
0 Freiberufler Mitarbeiter bei Mitarbeiter bei IT- Mitarbeiter in IT- Mitarbeiter bei IT- Mitarbeiter bei Mitglied der Sonstiges
Consulting Firma Hersteller Abteilung enes Dienstleister Regierung Streitkräfte
Unternehmens
NEWS
Domino Effect on Security Incidents

Domino effect on security incidents


NEWS
Cyber Threats (2014)

Cyber attacks on the


19,000 pages of TV5 Monde
were attacked German Bundestag using
Trojan software

Cybercriminals used malware


to gain access to credit card
information (56 million
shoppers) 2014: Multiple attacks against
Sony crashed the PS network
and forced Sony to ban “The
Interview“ in cinemas.

Hackers stole personal data


from 40 million consumers
(credit card, names, phone
numbers, etc.)

The cybercrime statistic of the Bundeskriminalamt (German Federal Criminal Office) was a total of 64,426 incidents in 2014 in Germany
NEWS
Cybercrime in Companies

 In 2014: Almost 1/3 of


companies in Germany were
victims of cybercrime.
 Small and medium sized
companies are often the victims
of cyber attacks.
 Companies are not prepared for
digital attacks.
 Crimes are targeted more
towards data theft.
NEWS
Cyber Attacks on Governments

May 2015, Germany


 Parliament’s IT network and its
fractions IT systems were infected by
malware.
June 2015, Canada
 Federal government websites in
Canada were hit by a cyber attack.

By penetrating internal data networks,


hackers can access highly sensitive
information from the government or send
false information. This could lead to serious
consequences.
NEWS
Cyber Terrorism

January 2015
 Jihadists hacked 19,000 French
websites (from banks to media
organizations)
 Websites were either taken down or
threats and the flag of the Islamic
terrorist organization were put
online.
SECURITY
CYBERSECURITY
SECURITY
Cybersecurity Myths

WE CONDUCTED AN WE’VE NEVER BEEN WE’VE DESIGNED HIGH- WE COMPLY WITH A THIRD PARTY
INTRUDER TEST. ATTACKED SO OUR END SECURITY TOOLS. INDUSTRY REGULATIONS PROVIDER RUNS OUR
The test should cover
SECURITY SYSTEM MUST Security tools are only
AND BEST PRACTICES. SECURITY.
the entire BE GOOD. effective when Compliance Regardless of the
infrastructure so that properly configured, requirements often competence and
the company can Caution: threats integrated and capabilities of the provider,
continue to grow and only meet the the question is whether
quickly eliminate all controlled within all minimum safety complex threats in a
discovered become more security operations.
complex. measurements and company will be taken
vulnerabilities. not all critical systems seriously enough for a third
party to sufficiently protect
and information. it.

WE’VE INVESTED IN OUR SECURITY IS WE ONLY NEED TO WE’VE COMPLETED OUR WE AREN’T
STRICT SECURITY MANAGED ADEQUATELY SECURE OUR INTERNET SECURITY PROJECT. STATISTICALLY AT RISK.
CONTROLS. BY THE IT TEAM. APPLICATIONS. Security is an ongoing Every company is at
It is not enough to rely A threat can take over One should also be project that can never risk for a data breach
on standard IT security an entire business. equipped against be completed. and should be
controls alone. Critical Therefore, internal threats and prepared.
business elements management should member/ staff abuse.
should be above all work closely with IT.
protected.
SECURITY MEASURES
Standards for
Secure use of web services
Internet Security

Secure deployment of web


Secure use of emails
services

Secure wireless Internet Security Secure provisioning of


connections CONFIGURATION email servers
INDIVIDUAL
ADJUSTMENTS
Secure Internet Secure remote access
telephony BASIC ARCHITECTURE to local networks

Secure Internet connection


Securing a server
of local networks

Securing PC clients
SECURITY
Classification of IT Security Standards

Focus

Information security
Evaluation Evaluating IT security
management systems

Security measures and


Policy monitoring

Techniques Cryptographic and


security techniques Physical security

Architectural level
Product System Process Surroundings
SECURITY
Four Steps to Improve Cybersecurity

 monitor SECURITY THROUGH


 plan and test
BE PREPARED  respond PROTECTION AND
 insure RESILIENCE

 establish a risk-based and business-


aligned strategy SECURITY THROUGH
SET THE BAR  identify and protect valuable assets STRATEGY AND
 align architecture and capability ALIGNMENT

 set access protocols


 conduct regular patching and manage
vulnerable files SECURITY THROUGH
GET THE BASICS RIGHT  secure essential systems CONTROL
 Conduct regular testing and root cause
analysis

 develop security awareness


 lead from the top SECURITY THROUGH
PERSONAL PROTECTION  show consequences of poor behaviour BEHAVIOR
 include security practices at home
SECURITY
Continuous Steps of a Security Management Process

1
Risk
analysis

4
Validation and Security 2
Policies,
improvement Management organizational measures
Process
3
Technical
measures
SECURITY
The Three Lines of Defence Model

Governance Body/ Board/ Audit Committee

Senior Management

EXTERNAL AUDIT

REGULATOR
1. Safety Barrier 2. Safety Barrier 3. Safety Barrier
Finance Controlling

Security

Internal Risk Management


Management
Controlling Internal Audit
Controlling
Measures Quality

Inspection

Compliance
SECURITY
Creating an Effective Cybersecurity Program

the ongoing
operation

CYBER
SECURITY
SERVICES

proper case
Physical security RESPOND responses
SECURITY
Tips for Implementing a Cybersecurity Program

FOCUS ON CRITICAL INFORMATION What effect does an attack on your business have and what can be done about it?

EVALUATE A CYBER INCIDENT What vulnerabilities have been identified and how have they been resolved?
RESPONSE PLAN

LOOK OVER THE BUDGET Is the cybersecurity budget being used appropriately?

BE INFORMED ABOUT KEY RISK Do you know enough about defence, monitoring, risk and data protection?
INDICATORS

WORK WITH INTERNAL AND Are you constantly being briefed on new developments in technology and
EXTERNAL SPECIALISTS cybersecurity?

FOLLOW THE SAFETY RULES OF What are the privacy and security policies of external providers? Do they meet your
EXTERNAL PROVIDERS requirements?

COMPLY WITH LAWS/ Are you keeping up-to-date with the latest cyber threats and new laws?
REGULATIONS FOR CYBERSECURITY
SECURITY
5 Levels of Cybersecurity Flow Processes

Example of improvement for threat


and vulnerability management

Example of improvement for


applications security

5. OPTIMIZED
4. MANAGED
3. DEFINED
2. REPEATABLE
The target state is set to level 4 for
1. AD HOC OR INITIAL threat and vulnerability
management0

An improvement will increase


cybersecurity applications
Only on a level 1 maturity in maturity from level 2 to 3.
managing threats and
vulnerabilities
SECURITY
Security Potential Example

Policy & standards, strategy & operating model, risk management, training &
SECURITY GOVERNANCE AND awareness, third party security, physical security, business continuity, business
MANAGEMENT engagement, metrics & reporting, asset management, human resources security

Threat intelligence, vulnerability management, compliance monitoring, security incident


THREAT AND VULNERABILITY management, penetration testing, event response and investigation

ACCESS AND IDENTITY Provisioning & deprovisioning, user management, role based access control, multi
MANAGEMENT factor authentication, access certification

Secure system devices, code review, developer training, application protection, cloud
APPLICATIONS protection

Security architecture, malware protection, web and email security, network protection,
INFRASTRUCTURE security hardening

Privacy, data classification, data protection, data back-up and availability, data discovery
DATA and monitoring, mobile device security
SECURITY
Critical Infrastructure
Sectors in Germany

Health Food

Energy Water

Critical
Finance and Infrastructure Transport and
Insurance Sectors in Germany Traffic
These institutions are vital to the state
and any failure would have significant
consequences.
State and
Media and Culture
Administration
Source: Bundesamt für Sicher-
heit in der Informationstechnik

Information Technology and Telecommunication


SECURITY
Protection of End-Users

Internet service providers, mobile network operators,


telecommunications companies, infrastructure vendors and anti-
spam technology vendors created the group:

Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) (2004)


 Eliminates of bots, malware, spam, viruses, dos attacks and other exploitation
 Cooperates against messaging abuse

Working together against cybercrime


SECURITY
Network and Information Security

European network and


information security agency
(ENISA) (2005)

Objective is to improve network and


information security
Serves EU institutions and the EU
market

Working together against cybercrime


SECURITY
Cybersecurity for Individuals

Three recommended actions for more security on the Internet:


1. Ignore untrustworthy offers and emails.
2. Periodically update operating systems and browsers on computers.
3. Install current protection programs with continuous updates.
(e.g. antivirus, firewall, intrusion detection systems, honeypots, spam
filtering, encryption software, vulnerability scanner, test programs for
security software, anti-phishing software, anti-spyware)

Cyber attacks can have dramatic consequences for individuals.


Data can be stolen, operating systems blocked and bank accounts
accessed.
FUTURE
CYBERSECURITY
FUTURE
Corporate Risks of 2015-2020 in Europe, Africa, and the Middle East (Allianz
Barometer, 2015)

Cyber risks 37%

Political risks (riots, war) 21%

Natural catastrophes 19%

Terrorism, war 15%

Operation and supply interruption 11%


FUTURE
New Research Program of the Federal Government with Four Focus Areas

NEW HIGH-TECH SECURE


INFORMATION INFORMATION & PRIVACY & DATA
TECHNOLOGIES COMMUNICATION APPLICATIONS PROTECTION
FOR MORE TECHNOLOGY
SAFETY (ICT) SYSTEMS

Security measures and Protection of critical More control over citizens’


New encryption capabilities
solutions for networked infrastructures and personal data on the
and security measures
systems networked industrial plants Internet
FUTURE
Research Center at Florida International University (FIU)

Applied Research Center (ARC)


 Cybersecurity research divisions:

Cyberspace Technology Testing, Cyberspace Infrastructure and Cyberspace


Work Force Development
 These areas include firewall management, intrusion detection/prevention
systems, security monitoring and threat management.
CHECKLIST
CYBERSECURITY
CHECKLIST
Cybersecurity Checklist

What is our plan to respond to a data breach? Are we adequately insured?

How do we monitor our systems Do our security goals align with


and prevent breaches? business priorities?

How often do we verify the


Cybersecurity How much is the issue of
effectiveness of our
security? checklist security integrated into
your business?

Can you answer these


questions about your
Is our security clear and Do we have the basic rights for
consistent? business? security measures?

Have we identified and protected our


Are third parties really securing our
most valuable processes and
most valuable information?
information?

Do we treat cybersecurity as a business or an IT responsibility?


CHECKLIST

Cybersecurity Questions for a Business


Do we treat cybersecurity as a business or IT responsibility?

Do our security goals align with business priorities?

Have we identified and protected our most valuable processes and information?

Does our business culture support a secure cyber environment?

Do we focus on security compliance or security capability?

Are we certain our third-party partners are securing our most valuable information?

Do we regularly evaluate the effectiveness of our security?

Do we have a plan for responding to a security breach?


CHECKLIST

HELPFUL TIPS
Are the Internet services that are being accessed and used safe?
Are employees trained for cyber attacks?
Are mobile devices such as laptops, smartphones and tablets protected from a data
breach?
Is a cyber attack from outside the corporate network possible? What are your
external access options?
Are there any contingency strategies and exercises?
Are there periodic updates for operating systems and programs
Do you know the email sender who is requesting data?
Do I trust the source of the links/ download?
Thank you for purchasing Vielen Dank dass Sie sich für unsere
our templates. Vorlagen entschieden haben.
This PowerPoint template includes special Diese PowerPoint Vorlage beinhaltet besondere
design fonts that are embedded in this Design-Schriftarten, die zur Verwendung in
document. If you also wish to use these fonts diese Vorlage eingebettet sind. Sollten Sie den
for other presentations, you will need to install Wunsch haben, diese Schriftarten (Fonts) auch
them on your computer. in anderen Präsentationen zu verwenden,
müssen Sie diese Schriftarten auf Ihrem
Download these fonts free of charge from the Computer installieren.
link below by copying it into the address field of
your web browser. Die Schriftarten können kostenfrei über die
unten genannte Internetseite heruntergeladen
werden. Kopieren Sie dazu einfach den Link in
das Adressfenster Ihres Web-Browsers.

Bebas neue Bebas neue


http://www.dafont.com/bebas-neue.font http://www.dafont.com/de/bebas-neue.font

Potrebbero piacerti anche