Florida Center for Cybersecurity

Collaboration is key in combating cyber threats due to the interdisciplinary nature of Cybersecurity:

  • 30% of Cybersecurity is comprised of topics in Information Technology (IT)
  • 70% of Cybersecurity is comprised of topics in Sociology, Psychology, and Politics

Cyber Attack Targets

  • Attacks happen around the world
  • Everyone, anywhere -- at any time -- can be a target

Norse Cybersecurity Attack Map

Norse Cybersecurity Attack Map

Hacker Motivations

  • Malicious hackers are often after Intellectual Property (IP) and Personally Identifiable Information (PII) for monetary gains
  • A malicious hacker might attack a system just to prove, "Hey, I can do this!"
  • Malicious hackers may be motivated politically or engage in cyber-espionage

Hacker Methods

What We Can Do

  • Capture data from audit logs
  • Analyze log data to see potential attacks in real-time and to predict future attacks
  • Educate and train people about how to protect against and react during a cyber attack
  • Obtain upper-management buy-in to ensure appropriate resources and time are devoted to protecting the organization

Collecting Cyber Data

  • Programs are available both in open source format online and in the marketplace that allow the capturing and analysis of such technical data

Analyzing Cyber Threats Example

  • 60-second snapshot of real infrastructure that is often attacked
  • Results: data packets are hitting the US and coming from Asian countries; the timing of most of the hits occurs in the first part of the 60-second period

Understanding Cybersecurity means understanding the need for both physical and technological security controls.