2022 Cybersecurity Trainee Manual 6.0
2022 Cybersecurity Trainee Manual 6.0
Update 1.0
Copyright © 2021
Digital Banking - Data Analytics
Table of Contents
Introduction ..................................................................................................................... 3
Elements of Cybersecurity............................................................................................... 10
Principles of Cybersecurity .............................................................................................. 12
Types Of Cybersecurity Threats ....................................................................................... 15
Cybersecurity For Financial Services ................................................................................ 21
Page 2 of 26
Digital Banking - Data Analytics
MODULE 1
Introduction
Introduction
In today’s interconnected world, an understanding of the elements and principles of
cybersecurity is important to minimizing susceptibility to cyber-attacks. In this course, we
will develop an understanding of the core components of cybersecurity for organization
level and personal cyber security.
Key Terms
Cybersecurity: the art of protecting applications, networks, and data from
unauthorized access or criminal use.
Cyber-attack: an offensive attempt that targets computer information
systems, to steal, manipulate or destroy information.
Hacking: gaining of unauthorized access to data in a system or computer.
Vulnerability: a weakness in a computer system or network that can be
exploited by an attacker
Cyber-risk: any risk of damage to an organization resulting due to the
unauthorized use of its information technology systems.
Malware: any type of software designed to harm or exploit any computer
system or network.
Page 3 of 26
Digital Banking - Data Analytics
Elements
Scope
Application security
• Consists of all the practices that enhances the security of applications.
• The development phase of any application is critical to its security as most
vulnerabilities emanate from this phase.
• Accidental introduction of vulnerabilities can be avoided through secure coding
practices
• Organisations are also tasked with ongoing threat detection through various tools
to prevent cyberattacks that could deny users access to an application.
Information Security
• This is a set of practices that enables organizations to keep data secure
• The main goal of information security is to protect the confidentiality, integrity and
availability of information
Page 4 of 26
Digital Banking - Data Analytics
Network Security
• Network security is any activity undertaken by an organization to prevent and
protect against unauthorized access into corporate networks.
• Network security ensures that corporate networks are protected from breaches that
could also lead to application and data breaches.
Operational Security
- Operational security is a risk management process that ensures sensitive
organizational information is secured.
- Also known as OPSEC, it enables IT managers to view operational activities from
the perspective of a potential attacker which ensures they can quickly spot
vulnerabilities and potential system flaws.
In the past ten years, we have seen some of the largest data breaches, most widespread
ransomware and financial hacks as cybercrime keeps gaining ground worldwide.
Page 5 of 26
Digital Banking - Data Analytics
• Multi factor Authentication ensures that users have to present two or more pieces
of credentials when accessing an account or system.
• Credentials can be in three categories:
o something you know (e.g. password, Personal Identification Number)
o something you have (e.g., Phone, token, credit card)
Page 6 of 26
Digital Banking - Data Analytics
• XDR automatically collects data from multiple touchpoints like email, service
endpoints, servers and correlates them to provide better context to threats.
• It provides better visibility through the collection and correlation threat information
across multiple touch points.
• With better to context into threats, events that would have evaded security teams
are brought into limelight.
• Examples of XDR tools include: Cynet, Palo Alto Networks, Sophos, McAfee.
• ZTNA gives users secure connectivity to private applications without ever placing
them on the network or exposing apps to the internet.
• ZTNA provisions access to private application on a user’s behalf through a secure
tunnel. It provides an added layer of protection for corporate applications and
services by shielding otherwise publicly visible IP addresses.
Page 7 of 26
Digital Banking - Data Analytics
Just like the five generations of computers, Cybersecurity has evolved from mere
standalone attacks to large scale multi-vector attacks with several reputable organizations
taking big hits over the years.
Fifth-generation attacks refer to cyber-attacks characterized by a wide scope and the use
of advanced attack tools which has sparked an urgent need for more sophisticated
measures in coping with these attacks.
2017 in particular was a global wake-up call as organizations witnessed uncommon levels
of cyber-attacks underlining how they need to be better prepared and equipped to identify
and respond to digital threats.
Page 8 of 26
Digital Banking - Data Analytics
Importance of Cybersecurity
Rising Cyberattacks
Cyberattacks are on the rise as more devices are
getting connected to the internet as such
organizations need to pay detailed attention to Cyber
security to minimize exposure.
MODULE 2
Elements of
Cybersecurity
Introduction
A dilemma is making a difficult choice between two competing alternatives. We learn
deeply when we try to resolve dilemmas. We will review the fundamental dilemmas that
Cybersecurity has to resolve. All Cybersecurity decisions involve getting the right balance
between dilemmas.
Definitions
Term Definition
Vulnerability A weakness that can be exploited by cybercriminals to gain
unauthorized access to a computer system
Data Custodian Those responsible for the safe custody, transport and storage of
data as well as implementing business rules.
Module Vision
Access Bank will have the best-balanced cybersecurity profile in the industry. We will have
the easiest access to data by legitimate users with the best protection against
cybercriminals.
Objectives
On completing this section, participants will understand the tradeoffs that have to be
made to balance the need for free open access to data and the threat of cybercriminals.
They will apply this balance to designing new products and the day-to-day requirements
of the workplace.
Concepts
Page 10 of 26
Digital Banking - Data Analytics
Elements
Dilemma Resolution
Security vs Easy access to data Better unique identifiers
How do you improve security without making By making unique identifiers
it harder for legitimate users to access data? simpler to use but harder to copy.
Planning for new threats Faster detection and response
How do you plan for a new threat that has By improving detection and
never happened before? response speeds.
Everything has a vulnerability Continuous Redesign
How do you resolve all elements and By improving design before
processes of electronic data processing attacks happen.
having some vulnerability?
Every new solution hides a new threat Better testing
How do you manage the imperfections of By improving testing.
new solutions?
All vulnerabilities will eventually be Increased vigilance
exploited By thinking like a cybercriminal.
How do you respond to criminals looking for
vulnerabilities?
People Trust when they should not Zero trust policies
How do you control people’s natural desire to By having zero trust policies.
trust?
Innovation creates new types of misuse Built-in protection
How do you prevent innovations creating new By a deeper analysis of
vulnerabilities? innovation.
People want to know more than they Better Education
need to know By teaching ethics and
How do you limit natural curiosity? consequences.
The data custodian is not the data Limit Custodian Access
owner By preventing custodians from
How do you resolve the person in charge of accessing data using encryption.
data not being the owner of that data?
Tips
When assessing a cybersecurity situation, look at the situation from different perspectives.
Wear the user’s hat, the company hat, the data owner’s hat, the cybercriminal’s hat and
the government hat. Use each perspective to assess how well the convenience has been
balanced with the vulnerability.
Transformation
When you routinely assess the balance and can make good judgment calls on which
direction an adjustment should go, you have transformed your cybersecurity skills.
Exercise
Individual
Imagine a new invention that would improve security AND improve data access.
Page 11 of 26
Digital Banking - Data Analytics
MODULE 3
Principles of
Cybersecurity
Introduction
Cybersecurity principles provide strategic guidance on how organisations can protect their
systems and data from cyber threats. This module will help raise your awareness of key
cyber security principles to ensure you’re informed of the various ways you can contribute
in ensuring your organization is safe from cyberattacks.
Definitions
Privilege: The access rights which a user of a computer has to perform security-
relevant functions on a computer system.
Compliance: the act of complying to organisational policies.
Module Vision
To ensure the appreciation of key cybersecurity principles and how they can be applied in
the work environment.
Concepts
At work, our daily tasks will heavily involve either development, maintenance or usage of
digital systems. As we have learnt through this course, these digital systems are increasingly
being targeted by hackers hence the need to apply core security principles to our everyday
interaction with these systems.
Compliance and least privilege access are at the heart of these principles as negligence has
been reported to be the greatest cause of data leaks in organizations with 66% of data
breaches mostly down to employee negligence and non-compliance to security policies.
Elements
Compliance
• It isn’t just enough for an organisation to develop solid cybersecurity policies.
• All employees should be required to undergo training programs and pay critical
attention and comply to these to policies in their daily work.
Page 12 of 26
Digital Banking - Data Analytics
Simplicity
• Organisations are increasingly developing new digital systems in order to expand
their reach and ensure profitable growth.
• Ensuring simplicity in the development of these systems reduces attack surface and
the risk of misconfiguration that could lead to security breaches.
• Attack surface area can be minimized by reducing the entry points available to
untrusted users, and eliminating services legacy services that have running
substitutes.
Consistency
• Security policies have to be applied across the board. These includes all hardware
and software utilized in the organization. It’s important a single vulnerability in a
device could expose the entire organization and this can be mitigated through
consistent application of security policies.
• We should never assume that products will come with enough security installed
therefore all devices irrespective of default capabilities should follow organisational
security policies.
Separation of duties
• This means that more than one person is required to complete a process to prevent
fraud.
• When no one individual has sole control over a process, it limits the ability of
individuals to negatively impact the Confidentiality, Integrity, or Availability of
information systems in an organisation.
Fail Securely
• System Failures are inevitable but they must fail securely to prevent damage.
• Failing securely means that attackers must not be able to gain access to a system
or data when there’s a system failure or downtime.
Page 13 of 26
Digital Banking - Data Analytics
Secure by default
• Secure by default focuses on a holistic approach to security by ensuring that the
default configuration of a system is as secure as possible.
• This means that security measures are built are into either hardware/software
without the need of add-ons. Secure by default principles requires that products
should have certain security features at the minimum such as password prompts,
TLS encryption, failed authentication locks etc.
Tip
Don’t ever think that you, your systems, or accounts are not valuable to attackers. There
are many ways these attackers can use your personal information to harm you, your
family or organization.
Exercise
Negligence in cybersecurity can exist in diverse forms. In what practical ways do you think
a Banker can depict negligence putting the Bank at risk of cyberattacks?
Page 14 of 26
Digital Banking - Data Analytics
MODULE 4
Types Of
Cybersecurity
Threats
Introduction
Cybersecurity is the management of computer threats, especially malicious attacks by
anyone trying to access a network to corrupt data, steal confidential information, damage,
or disrupt sensitive data.
Definitions
Unauthorized unintended entry into a system without the owner’s permission.
access:
Confidential Information that needs the owner’s permission before access.
information:
Malicious A breach of computer defences to cause harm or demand money.
attack:
Phishing: an attempt by an attacker to trick users into providing sensitive
information or installing malware.
Man-in-the- occurs when an unauthorized party intercepts communications
middle-attack between two systems or people to gain access to sensitive
(MITM): information or perform fraudulent actions.
DDoS: an attempt to make it impossible for a service to be delivered by
overwhelming the computer systems with traffic.
Malvertising: is the use of online advertising by cyber attackers to spread and
inject malicious code into your computer.
Ransomware: a type of malware that prevents users from accessing their
system unless a ransom is paid.
Module Vision
To ensure the work environment and customer & internal data is safe from breach from
different cyber threats. This will ensure Access Bank is viewed as safe by its customers &
stakeholders
Objectives
To ensure participants are able to identify malicious threats in the workplace &
environment and adopt preventive actions. This will enable a more secure work & personal
life interaction
Page 15 of 26
Digital Banking - Data Analytics
Concepts
Page 16 of 26
Digital Banking - Data Analytics
Malvertising: Malvertising is an attack in which the culprits insert a malicious code into a
recognized online advertising networks which then redirects users to malicious websites
created by the culprits. Malvertising works in one of the following ways: Insert code that
installs malware or adware on the user’s computer; Redirects the user to a malicious
website, rather than the target suggested by the ad’s content; Redirects the user to a
malicious website very similar to a real site, which is a operated by the attacker
Rogue Software/scareware: Rogue software are software that leverages pop-up ads
which generates erroneous or misleading alerts in an attempt to lure users into believing
they need to download or buy software to address a cybersecurity problem. the
consequence of downloading rogue software includes credit card fraud or identity theft.
Page 17 of 26
Digital Banking - Data Analytics
Password attacks: Password attacks simply refer to the theft of your password by a
hacker.
Page 18 of 26
Digital Banking - Data Analytics
Examples
Man in the Middle: The attacker installs a packet sniffer to analyze network traffic for
insecure communications. When a user logs in to a site, the attacker retrieves their user
information and redirects them to a fake site that mimics the real one. The attacker's fake
site gathers data from the user, which the attacker can then use on the real site to access
the target's information.
In this scenario, an attacker intercepts a data transfer between a client and server. By
tricking the client into believing it is still communicating with the server and the server into
believing it is still receiving information from the client, the attacker is able to intercept
data from both as well as inject their own false information into any future transfers.
Page 19 of 26
Digital Banking - Data Analytics
Phishing example: An email from Access Bank arrives telling the customer that their
account has been compromised and will be deactivated unless they confirm their debit
card details. The link in the phishing email takes the victim to fake Access Bank website
and the stolen credit card information is used to commit further crimes.
Password attack example: A group of hackers attacked Zoom and leaked about half a
million credentials up for sale. How did they do it? With credential stuffing. They collected
multiple dumps of leaked credentials in the darknet or internet, cracked them, and used
them with automated tools on Zoom’s login page. They could then evaluate the response
and determine the valid credentials, which they put up for sale.
Malware called Fireball infected 250 million computers and devices in 2017, hijacking
browsers to change default search engines and track web activity. However, the malware
had the potential to become more than a mere nuisance. Three-quarters of it was able to
run code remotely and download malicious files.
Page 20 of 26
Digital Banking - Data Analytics
MODULE 5
Cybersecurity
For Financial
Services
U1.0
Introduction
Financial services have a fiduciary obligation to their customers and by virtue of their
business hold sensitive customer financial information which makes them prime targets for
malicious actors who seek to compromise their information system to have access to this
data. This information includes banking details, Bank verification no. (BVN), home
address, email address, Passport information, National identity card no., phone,
transaction history, and other income information. With technology evolving by the day,
advances in digital technology, payment solutions, social media, internet of things,
artificial intelligence have increased the surface area financial services players need to
protect against malicious actors.
Definitions
Deepfake: use of ML & AI to generate a fake image, audio or video of a person
Page 21 of 26
Digital Banking - Data Analytics
information can be used in purchasing goods and services in the name of the victim
or to fleece the victim of their financial resources.
• State sanctioned attacks: some cyberattacks are actually conceptualised,
financed and launched through proxies by foreign governments. State sanctioned
proxies are able to inflict significant damage to an entity (nation, company) with
their computers, an internet connection and the backing of government. This is the
modern mode of warfare between countries, as rather than employing military
might in pursuit of state goals, countries are now turning to cyber warfare to
advance their agenda.
The Russian Federal Security Service (FSB) (Secret service) has developed a bad
reputation for partnering with malicious actors by protecting, recruiting into active service
hackers who it then uses to carry out online attacks.
• Employee Oversight: Banks have strict recruitment processes and procedures in
place with regular training carried out for its staff members, however in spite of this
from time to time there is a lapse in employee security consciousness or a complete
absence of knowledge which malicious actors swiftly take advantage of. Example an
employee unknowingly opening a phising mail on his work laptop which then
installs a virus on the institutions network.
• Ransomware: Ransomware is a malware that takes over a victim’s computer
system, an organizations data by encrypting the data and making it impossible for
the owner to access the ransomed data unless they usually pay a large fee
(ransom). These attacks target financial institutions because the criminals know
their targets would pay huge amounts for customer data not to be leaked or
compromised further.
• Third-party vendors: Financial services use vendors to deliver certain services
that are usually outside its focus or expertise. These 3rd parties provide a wider
surface area for malicious actors to exploit in order to compromise the security
architecture of companies. Consequently, financial services have to establish
adhered to service protocols to reduce the vulnerabilities their interaction with 3rd
party vendors expose them to.
• New Gen Technologies: Technology is evolving faster than financial services can
keep up with the entry of Deepfake technology, key officers in a firm can have their
identity cloned and used to gain access to sensitive data that only they would
otherwise have had access to, thereby posing a huge threat to financial services.
Page 22 of 26
Digital Banking - Data Analytics
Adopting open-standards
- Open standards like OAuth allows organisations to securely establish identities
across platforms
- The availability and extensibility of open standard components creates the right
conditions for organisations to further strengthen their systems
Page 23 of 26
Digital Banking - Data Analytics
Page 24 of 26
Digital Banking - Data Analytics
Page 25 of 26
Digital Banking - Data Analytics
Page 26 of 26