What motivates hackers?
Module 1: Today’s Threat Landscape Module 2: Key Principles of Security Module 3: Understanding your enemy! Module 4: Phases of Hackers Lunch Break Module 5: What motivates hackers? Module 6: Pass the Hash Module 7: Windows Security Capabilities and Tools
Module Insights We will discuss in-depth the hacker behaviors and compare it with IT Pro’s.
Discussion: Sharing is OK, but how much ?
Bad Guy select’s a target! • Based on: – Resource Person – Company – Government
Target Selection – A Person • Predator • For Financial Gain • For Political Gain • Invasion of Privacy • Cyberbully • Revenge • Identity Fraud – Impersonation • Espionage • Coercion
DEMO Person of Interest
Target Selection – Enterprises • Trade Secrets • Competitor • Insider trading • Product or Service • Secret Formula • Hostile Takeover • Spread Malicious Rumours • Industrial Espionage • Force Share Price Fall
Target Selection – GOV. • Military Coup • Political Corruption • Bribery • Country Destabilisation • Vote Manipulation • Cyber warfare
Connect with the speakers! @Erdal. Ozkaya @Milad. PFE http: //erdalozkaya. com/ https: //www. facebook. com/milad. aslaner
Tech. Net Virtual Labs Deep technical content and free product evaluations Hands-on deep technical labs Free, online, technical courses Download Microsoftware trials today. Find Hand On Labs. Take a free online course. Technet. microsoft. com/evalcenter Technet. microsoft. com/virtuallabs microsoftvirtualacademy. com
© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Office, Azure, System Center, Dynamics and other product names are or may be registered trademarks and/or trademarks in the U. S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.