Lec 1
Lec 1
• Personal
On a personal level, you need to safeguard your identity, your
data, and your computing devices.
• Organizational
At an organizational level, it is everyone’s responsibility to
protect the organization’s reputation, data and customers.
• Government
As more digital information is being gathered and shared, its
protection becomes even more vital at the government level,
where national security, economic stability and the safety and
wellbeing of citizens are at stake.
Protection of Personal Data
• Offline identity
Your offline identity is the real-life persona that you present
on a daily basis at home, at school or at work. As a result,
family and friends know details about your personal life,
including your full name, age and address
• Online identity
Your online identity is not just a name. It’s who you are and
how you present yourself to others online. It includes the
username you use for your online accounts, as well as the
social identity you establish and portray on online
communities and websites.
Protection of Personal Data Cont.
• Personal Information
• Medical Records
• Education Records
• Employment and
Financial Records
What Do Hackers Want?
Technology
Refers to the software- and hardware-based solutions designed to
protect information systems from possible malicious incidents.
• Reputational damage:
A security breach can have a negative long-term impact on an
organization’s reputation that has taken years to build.
• Vandalism:
A hacker or hacking group may vandalize an organization’s
website by posting untrue information.
• Theft:
A data breach often involves an incident where sensitive personal
data has been stolen.
• Loss of revenue:
Hackers can take down an organization’s website, preventing it
from doing business online
Cybersecurity Criminals
Attackers are individuals or groups who attempt
to exploit vulnerability to breaks into computers
or networks for personal or financial gain
Types of Attackers
• Vulnerability Brokers - Grey hat hackers who attempt to discover exploits and
report them to vendors, sometimes for prizes or rewards.
• Hacktivists - Grey hat hackers who protest against different political and social
ideas. Hacktivists publicly protest against organizations or governments by
posting articles, videos, leaking sensitive information
External
Amateurs or skilled attackers outside of the organization can:
• Spyware
• Adware
• BACKDOOR
• RANSOMWARE
• Scareware
• Rootkit
• Virus
• Trojan
• worms
spyware
Designed to track and spy on you, spyware monitors your online
activity and can log every key you press on your keyboard.
You know it when you see it! It’s hard to ignore when you’re
faced with constant pop-up ads on your screen.
BACKDOOR