SlideShare una empresa de Scribd logo
1 de 27
Learning Outcomes
1. Understand network threat
2. Explain methods of attacks
3. Implement security measures to
protect networks
Introduction
• People use network to exchange sensitive
information with each other.
• Network security is a shared responsibility
that each person must accept when they
connect to the network.
• This chapter: you will learn about threats that
exist and how to protect your computer &
information.
Network Threat & Intrusion
Threats??
• Threat is a possible danger that might exploit
a vulnerability to breach security and cause possible
harm.
• Vulnerability is a weakness which allows attacker to
reduce a system's information assurance.
• “Ancaman”
Intrusion??
• Intrusion is an attacks to a network can be cause the
result in a loss of time and money due to damage or
theft of important information or assets.
• Intruders can hack the software vulnerabilities,
hardware attacks or any method to modifying software
or exploiting software vulnerabilities
• “Pencerobohan”
Types of Threats and Intrusions
Threats &
Intrusions
Malicious
Code
Hacking
Data Loss/
Manipulation
Disruption
of Service
Natural
Disaster
Theft
Information
Theft
Identity
Theft
Malicious Code (Malware/Malcode)
1. Malicious code is code causing damage to
a computer or system.
2. It also can get into networks and spread.
3. It can also send messages through email
and steal information.
4. Example: Virus, Trojan, Spyware, Adware,
and etc.
Hacking
1. Hacking is any technical effort to
manipulate the normal behavior of network
connections and connected systems.
2. Hackers gain access to the network and
may arise:
i. Data Loss / Data Manipulation
ii. Disruption of Service
Hacking (cont…)
Data Loss / Data Manipulation
• Breaking into a computer to destroy / alter
data records.
• Example of data loss:
– Sending virus the reformats a computer’s hard
drive.
• Example of data manipulation:
– Breaking into a records system to change
information such as price item.
Hacking (cont…)
Disruption of Service
• Preventing legitimate users from
accessing services to which they should
be entitled.
• Example:
– Disruption of PTSS user login to check
examination result system.
Natural Disaster
1. Natural disaster causes by flood, fire, storm
and etc.
2. Disaster recovery planning - how data
would be recovered.
3. Example of recovery planning:
• On-site standby – duplicate system/data
• Off-site standby – duplicate across the site
• Reciprocal agreements – hire the firm that
offer commercial recovery as a service
Theft
1. Theft is the taking of another
person's property without that person's
permission / crimes against property.
2. Types of Theft:
i. Information theft
ii. Identity theft
Theft (cont…)
Information Theft
• Breaking into a computer to obtain
confidential information.
• Information can be used or sold for
various purposes.
• Example:
– Stealing a organization’s proprietary
information such as design, research and
development info.
Theft (cont…)
Identity Theft
• A form of information theft where personal
information is stolen for the purpose of
taking over someone’s identity.
• Example:
– Stole information an individual to use her/his
legal documents.
– Apply credit and make unauthorized online
purchases.
Test your knowledge????
1
2
3
4
5
Sources of Network Intrusion
Source of network intrusion
Security threats from network intruders can come
from both internal and external sources
External Sources
• External threats arise from individuals
working outside of an organization.
• They do not have authorized access to the
computer systems or network.
• External attackers work their way into a
network mainly from the Internet, wireless
links or dialup access servers.
Internal Sources
• Internal threats occur when someone has
authorized access to the network through a
user account or have physical access to the
network equipment.
• The internal attacker knows the internal
politics and people.
• They often know what information is both
valuable and vulnerable and how to get to it.
Social Engineering
Social Engineering
• SE  methods of exploiting human
weaknesses.
• Social engineering is a term that refers to the
ability of something or someone to influence
the behavior of a group of people.
• SE is collection of techniques used to deceive
internal users into performing specific actions
or revealing confidential information.
Social Engineering (cont…)
Social Engineering (cont…)
• Attacker takes advantage of unsuspecting
legitimate users to gain access to internal
resources and private information, such as
bank account numbers or passwords.
• Three of the most commonly used techniques
in social engineering are: pretexting, phishing,
and vishing.
Continue Next Class…
I don’t stop when I’m tired.
I only stop when I’m done…
Group presentation
• Each group need to present about
threat and intrusion. From the topic
given, each group must prepare slide
presentation to describe detail about
the topic. Content in your slide follow
as above :
• 1. Definition
• 2. Advantage and disadvantage
• 3. Example

Más contenido relacionado

La actualidad más candente

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutirysefreed
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Preethi T G
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignPratum
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedRasheed Ur Rehman
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 

La actualidad más candente (20)

Hacking
HackingHacking
Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutiry
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Hackers
HackersHackers
Hackers
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

Similar a Topic 5.0 basic security part 1

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.pptEndAlk15
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfSujanTimalsina5
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdfdeepakbharathi16
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesDeepakDeepu503835
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 

Similar a Topic 5.0 basic security part 1 (20)

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Network security
Network securityNetwork security
Network security
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breaches
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 

Más de Atika Zaimi

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service providerAtika Zaimi
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaAtika Zaimi
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network servicesAtika Zaimi
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipAtika Zaimi
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocolAtika Zaimi
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1Atika Zaimi
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesAtika Zaimi
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingAtika Zaimi
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 

Más de Atika Zaimi (10)

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking media
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devices
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 

Último

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Topic 5.0 basic security part 1

  • 1.
  • 2. Learning Outcomes 1. Understand network threat 2. Explain methods of attacks 3. Implement security measures to protect networks
  • 3. Introduction • People use network to exchange sensitive information with each other. • Network security is a shared responsibility that each person must accept when they connect to the network. • This chapter: you will learn about threats that exist and how to protect your computer & information.
  • 4. Network Threat & Intrusion
  • 5. Threats?? • Threat is a possible danger that might exploit a vulnerability to breach security and cause possible harm. • Vulnerability is a weakness which allows attacker to reduce a system's information assurance. • “Ancaman”
  • 6. Intrusion?? • Intrusion is an attacks to a network can be cause the result in a loss of time and money due to damage or theft of important information or assets. • Intruders can hack the software vulnerabilities, hardware attacks or any method to modifying software or exploiting software vulnerabilities • “Pencerobohan”
  • 7. Types of Threats and Intrusions Threats & Intrusions Malicious Code Hacking Data Loss/ Manipulation Disruption of Service Natural Disaster Theft Information Theft Identity Theft
  • 8. Malicious Code (Malware/Malcode) 1. Malicious code is code causing damage to a computer or system. 2. It also can get into networks and spread. 3. It can also send messages through email and steal information. 4. Example: Virus, Trojan, Spyware, Adware, and etc.
  • 9. Hacking 1. Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. 2. Hackers gain access to the network and may arise: i. Data Loss / Data Manipulation ii. Disruption of Service
  • 10. Hacking (cont…) Data Loss / Data Manipulation • Breaking into a computer to destroy / alter data records. • Example of data loss: – Sending virus the reformats a computer’s hard drive. • Example of data manipulation: – Breaking into a records system to change information such as price item.
  • 11. Hacking (cont…) Disruption of Service • Preventing legitimate users from accessing services to which they should be entitled. • Example: – Disruption of PTSS user login to check examination result system.
  • 12. Natural Disaster 1. Natural disaster causes by flood, fire, storm and etc. 2. Disaster recovery planning - how data would be recovered. 3. Example of recovery planning: • On-site standby – duplicate system/data • Off-site standby – duplicate across the site • Reciprocal agreements – hire the firm that offer commercial recovery as a service
  • 13. Theft 1. Theft is the taking of another person's property without that person's permission / crimes against property. 2. Types of Theft: i. Information theft ii. Identity theft
  • 14. Theft (cont…) Information Theft • Breaking into a computer to obtain confidential information. • Information can be used or sold for various purposes. • Example: – Stealing a organization’s proprietary information such as design, research and development info.
  • 15. Theft (cont…) Identity Theft • A form of information theft where personal information is stolen for the purpose of taking over someone’s identity. • Example: – Stole information an individual to use her/his legal documents. – Apply credit and make unauthorized online purchases.
  • 17. Sources of Network Intrusion
  • 18. Source of network intrusion Security threats from network intruders can come from both internal and external sources
  • 19. External Sources • External threats arise from individuals working outside of an organization. • They do not have authorized access to the computer systems or network. • External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.
  • 20. Internal Sources • Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. • The internal attacker knows the internal politics and people. • They often know what information is both valuable and vulnerable and how to get to it.
  • 22. Social Engineering • SE  methods of exploiting human weaknesses. • Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people. • SE is collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.
  • 24. Social Engineering (cont…) • Attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords. • Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.
  • 26. I don’t stop when I’m tired. I only stop when I’m done…
  • 27. Group presentation • Each group need to present about threat and intrusion. From the topic given, each group must prepare slide presentation to describe detail about the topic. Content in your slide follow as above : • 1. Definition • 2. Advantage and disadvantage • 3. Example