SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Cyber Security
Introduction
Definitions and Principles
Cyber Crime
• Cyber crimes are, as the name implies, crimes
committed using computers, phones or the internet.
• Some types of cyber crime include:
• Illegal interception of data.
• System interferences.
• Copyrights infringements.
• Sale of illegal items.
3
Cyber Security
• Cyber security is the body of technologies, processes
and practices involved in protecting individuals and
organizations from cyber crime.
• It is designed to protect integrity of networks,
computers, programs and data from attack, damage
or unauthorized access.
4
Kill Chain, Zero-
day attack,
ransomware,
alert fatigue and
Man-in the
middle attack
are just a few
examples of
common cyber
attacks.
Cyber Security Principles
There are five key principles in cyber security:
• Confidentiality
• Integrity
• Availability
• Accountability
• Auditability
5
Cyber Security Principle Definitions
• Confidentiality:
• A set of rules that limits access or place
restrictions on certain type of information.
• Integrity:
• Assurance that the information is trustworthy
and accurate.
• Availability:
• The guarantee of reliable access to the
information by authorized people.
6
Cyber Security Principle Definitions
• Accountability:
• Is an assurance that an individual or an
organization will be evaluated on their
performance or behaviour related to something
for which they are responsible.
• Auditability:
• A security audit is a systematic evaluation of
the security of a company’s information system
by measuring how well it conforms to a set of
established criteria.
7
Cyber Threats
Cyber Threat
• A Cyber threat is any malicious act that attempts to
gain access to a computer network without
authorization or permission from the owners.
• It refers to the wide range of malicious activities that
can damage or disrupt a computer system, a network
or the information it contain.
• Most common cyber threats: Social Engineered
Trojans, Unpatched Software, Phishing, Network
worms, etc.
9
Sources of Cyber Threats
• Cyber threats can come from a wide variety of
sources, some notable examples include:
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
10
Anyone with a
motive and the
needed
technology can
create cyber
threats.
Cyber Threat Classifications
• Threats can be classified by multiple criteria:
• Attacker's Resources
• Attacker's Organization
• Attacker's Funding
• On basis of these criteria, threats are of 3 types:
• Unstructured Threats
• Structured Threats
• Highly Structured threats
11
Unstructured Cyber Threats
• Resources: Individual or small group.
• Organization: Little or no organization.
• Funding: Negligible.
• Attack: Easy to detect and make use of freely
available cyberattack tool.
• Exploitation based on documented vulnerabilities.
12
Structured Cyber Threats
• Resources: Well trained individual or group.
• Organization: Well planned.
• Funding: Available.
• Attack: Against particular individual or organizations.
• Exploitation based on information Gathering.
13
Highly Structured Cyber Threats
• Extensive organization, resources and planning over
time.
• Attack: Long term attack on particular machine or
data.
• Exploitation with multiple methods:
• Technical, social and insider help.
14
Cyber Security Threat Index Level
• Cyber threats are evaluated daily by the CTU (counter
threat unit) and associated with an threat index level.
• The threat index levels are:
• Level 1: Guarded.
• Level 2: Elevated.
• Level 3: High.
• Level 4:Critical.
15
Cyber Attacks
Types of Cyber Attacks
• Advanced Persistent Threat (APT):
• A network attack in which an unauthorized
person gains access to network and stays there
undetected for a long period of time.
• Backdoor:
• Method of bypassing normal authentication and
gaining access in OS or application.
17
Types of Cyber Attacks Continued
• Buffer Overflow:
• An exploit that takes advantage of the program
that is waiting for a user’s input.
• Man-in-the-middle Attack
• This attack intercepts and relays messages
between two parties who are communicating
directly with each other.
18
Types of Cyber Attacks Continued
• Cross-Site Scripting (XSS):
• A code injection attack that allows an attacker
to execute malicious JavaScript in another
user’s browser.
• Denial of Service Attack:
• Any attack where the attackers attempt to
prevent the authorized users from accessing
the service.
19
Types of Cyber Attacks Continued
• SQL injection:
• A very common exploited web application
vulnerability that allows malicious hacker to
steal and alter data in website’s database.
• Zero-day exploit:
• A vulnerability in a system or device that has
been disclosed but is not yet patched.
20
Impacts of Cyber Attacks
• A successful cyber attack can cause major damage to
organizations or systems, as well as to business
reputation and consumer trust.
• Some potential results include:
• Financial loss.
• Reputational damage.
• Legal consequences.
21
Malicious Code
Types of Malicious Code
• Virus:
• Malicious software program, when it is
executed, it replicates itself by modifying other
computer programs and inserting its own code.
• Network Worm:
• Standalone malware which replicates itself in
order to spread to other computers.
23
Types of Malicious Code Continued
• Trojan Horse:
• A program that claims to free your computer
from viruses but instead introduces viruses
onto your system.
• Botnet:
• Used to perform distributed denial-of-service
attack (DDoS attack), steal data, send spam,
and allow the attacker access to the device and
its connection.
24
Types of Malicious Code Continued
• Keylogger:
• A type of surveillance technology used to
monitor and record each keystroke typed on
specific computer’s keyboard.
• Rootkit:
• Collection of tools or programs that enable
administrator-level access to computer or
computer network.
25
Types of Malicious Code Continued
• Spyware:
• Software that is hidden from the user in order
to gather information about internet interaction,
keystrokes, passwords, and other valuable
data.
• Adware:
• Designed to display advertisements on your
computer and redirect your search requests to
advertising websites to collect marketing data
about you.
26
Types of Malicious Code Continued
• Ransomware:
• Malware that prevents or limits users from
accessing their system, either by locking the
system’s screen or by locking the user’s files
unless a ransom is paid.
27
Vulnerabilities
What is a Vulnerability?
• A cyber-security term that refers to a flaw in a system
that can leave it open to attack.
• Vulnerability is the composition of three elements:
1. A flaw in system.
2. Access of attacker to that flaw.
3. Capability of attacker to exploit the flaw.
29
Classification of Vulnerabilities
• Vulnerabilities are classified according to the asset:
• Hardware.
• Software.
• Network.
• Personal.
• Physical site.
• Organizational.
30
Causes
• Some of the vulnerability in the system occur due to:
• Missing patches.
• Cleartext credentials.
• Using unencrypted channels.
• RF Emanation.
31

Más contenido relacionado

Similar a Cyber Security Introduction project comprehensive

Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtaufiq463421
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet BankingChiheb Chebbi
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 

Similar a Cyber Security Introduction project comprehensive (20)

Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Security In Internet Banking
Security In Internet BankingSecurity In Internet Banking
Security In Internet Banking
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 

Último

PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...anilsa9823
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024Energy for One World
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up NumberMs Riya
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Christina Parmionova
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 

Último (20)

PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
(VASUDHA) Call Girls Balaji Nagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
Lucknow 💋 Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024
 
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas  Whats Up Number
##9711199012 Call Girls Delhi Rs-5000 UpTo 10 K Hauz Khas Whats Up Number
 
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore EscortsVIP Russian Call Girls in Indore Ishita 💚😋  9256729539 🚀 Indore Escorts
VIP Russian Call Girls in Indore Ishita 💚😋 9256729539 🚀 Indore Escorts
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.Global debate on climate change and occupational safety and health.
Global debate on climate change and occupational safety and health.
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 

Cyber Security Introduction project comprehensive

  • 3. Cyber Crime • Cyber crimes are, as the name implies, crimes committed using computers, phones or the internet. • Some types of cyber crime include: • Illegal interception of data. • System interferences. • Copyrights infringements. • Sale of illegal items. 3
  • 4. Cyber Security • Cyber security is the body of technologies, processes and practices involved in protecting individuals and organizations from cyber crime. • It is designed to protect integrity of networks, computers, programs and data from attack, damage or unauthorized access. 4 Kill Chain, Zero- day attack, ransomware, alert fatigue and Man-in the middle attack are just a few examples of common cyber attacks.
  • 5. Cyber Security Principles There are five key principles in cyber security: • Confidentiality • Integrity • Availability • Accountability • Auditability 5
  • 6. Cyber Security Principle Definitions • Confidentiality: • A set of rules that limits access or place restrictions on certain type of information. • Integrity: • Assurance that the information is trustworthy and accurate. • Availability: • The guarantee of reliable access to the information by authorized people. 6
  • 7. Cyber Security Principle Definitions • Accountability: • Is an assurance that an individual or an organization will be evaluated on their performance or behaviour related to something for which they are responsible. • Auditability: • A security audit is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to a set of established criteria. 7
  • 9. Cyber Threat • A Cyber threat is any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. • It refers to the wide range of malicious activities that can damage or disrupt a computer system, a network or the information it contain. • Most common cyber threats: Social Engineered Trojans, Unpatched Software, Phishing, Network worms, etc. 9
  • 10. Sources of Cyber Threats • Cyber threats can come from a wide variety of sources, some notable examples include: • National governments. • Terrorists. • Industrial secret agents. • Rogue employees. • Hackers. • Business competitors. • Organization insiders. 10 Anyone with a motive and the needed technology can create cyber threats.
  • 11. Cyber Threat Classifications • Threats can be classified by multiple criteria: • Attacker's Resources • Attacker's Organization • Attacker's Funding • On basis of these criteria, threats are of 3 types: • Unstructured Threats • Structured Threats • Highly Structured threats 11
  • 12. Unstructured Cyber Threats • Resources: Individual or small group. • Organization: Little or no organization. • Funding: Negligible. • Attack: Easy to detect and make use of freely available cyberattack tool. • Exploitation based on documented vulnerabilities. 12
  • 13. Structured Cyber Threats • Resources: Well trained individual or group. • Organization: Well planned. • Funding: Available. • Attack: Against particular individual or organizations. • Exploitation based on information Gathering. 13
  • 14. Highly Structured Cyber Threats • Extensive organization, resources and planning over time. • Attack: Long term attack on particular machine or data. • Exploitation with multiple methods: • Technical, social and insider help. 14
  • 15. Cyber Security Threat Index Level • Cyber threats are evaluated daily by the CTU (counter threat unit) and associated with an threat index level. • The threat index levels are: • Level 1: Guarded. • Level 2: Elevated. • Level 3: High. • Level 4:Critical. 15
  • 17. Types of Cyber Attacks • Advanced Persistent Threat (APT): • A network attack in which an unauthorized person gains access to network and stays there undetected for a long period of time. • Backdoor: • Method of bypassing normal authentication and gaining access in OS or application. 17
  • 18. Types of Cyber Attacks Continued • Buffer Overflow: • An exploit that takes advantage of the program that is waiting for a user’s input. • Man-in-the-middle Attack • This attack intercepts and relays messages between two parties who are communicating directly with each other. 18
  • 19. Types of Cyber Attacks Continued • Cross-Site Scripting (XSS): • A code injection attack that allows an attacker to execute malicious JavaScript in another user’s browser. • Denial of Service Attack: • Any attack where the attackers attempt to prevent the authorized users from accessing the service. 19
  • 20. Types of Cyber Attacks Continued • SQL injection: • A very common exploited web application vulnerability that allows malicious hacker to steal and alter data in website’s database. • Zero-day exploit: • A vulnerability in a system or device that has been disclosed but is not yet patched. 20
  • 21. Impacts of Cyber Attacks • A successful cyber attack can cause major damage to organizations or systems, as well as to business reputation and consumer trust. • Some potential results include: • Financial loss. • Reputational damage. • Legal consequences. 21
  • 23. Types of Malicious Code • Virus: • Malicious software program, when it is executed, it replicates itself by modifying other computer programs and inserting its own code. • Network Worm: • Standalone malware which replicates itself in order to spread to other computers. 23
  • 24. Types of Malicious Code Continued • Trojan Horse: • A program that claims to free your computer from viruses but instead introduces viruses onto your system. • Botnet: • Used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. 24
  • 25. Types of Malicious Code Continued • Keylogger: • A type of surveillance technology used to monitor and record each keystroke typed on specific computer’s keyboard. • Rootkit: • Collection of tools or programs that enable administrator-level access to computer or computer network. 25
  • 26. Types of Malicious Code Continued • Spyware: • Software that is hidden from the user in order to gather information about internet interaction, keystrokes, passwords, and other valuable data. • Adware: • Designed to display advertisements on your computer and redirect your search requests to advertising websites to collect marketing data about you. 26
  • 27. Types of Malicious Code Continued • Ransomware: • Malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the user’s files unless a ransom is paid. 27
  • 29. What is a Vulnerability? • A cyber-security term that refers to a flaw in a system that can leave it open to attack. • Vulnerability is the composition of three elements: 1. A flaw in system. 2. Access of attacker to that flaw. 3. Capability of attacker to exploit the flaw. 29
  • 30. Classification of Vulnerabilities • Vulnerabilities are classified according to the asset: • Hardware. • Software. • Network. • Personal. • Physical site. • Organizational. 30
  • 31. Causes • Some of the vulnerability in the system occur due to: • Missing patches. • Cleartext credentials. • Using unencrypted channels. • RF Emanation. 31