Week1 Module3
Week1 Module3
1
Objectives
✓Justify the need for Cyber Security
✓Emphasis on Cyber Security Challenges
2
Learning Outcomes
3
Outline
Why Cyber Security is important?
Who are Hackers? What do they do generally?
Common ways of how a computer can become infected
Statistics on Cyber Attacks
Need for Security- A Technological View
Types of Cyber threats
Attacks on Confidentiality
Attacks on Integrity
Attacks on Availability
Methods and Practices of Countering Cyber Attacks
Social Engineering
Phishing Attacks
Unpatched Software
Social Media Threats
Advanced Persistent Threats 4
Outline
Cyber Security Core Functions
Four Important Fundamentals of Security
Protect the Device
Protect the connection of Device
Protect Email Communication
Protect and backup electronic documents and files
Other essentials in securing the Computing systems
Physical Security
Protect against Unauthorized Administrators
Assign the least Permissions possible
Use the most secure Operating Systems possible
Use Strong passwords or Pass Phrases
Use Secure Authentication methods
Cyber Security Challenges
5
Why Cyber Security is important?
6
Hackers
7
Common ways a computer can become
infected
Visiting malicious
websites Careless download
of software, free
downloads
8
Top Five Risks- Global Instability
Natural disaster
Failure to Extreme
address climate weather
change conditions
Top 5
Risks
9
Cyber Attacks in the Year 2018
• WannaCry ransomware, Petya, and NotPetya
led to $300 million loss in companies
• The ransomware spread through emails
demanded money for release of encrypted
data
• Billions of data records are leaked for Business
& Political gains
10
Important Terminologies
11
Interdependency of vulnerability, threat
and risk
Vulnerability
Risk
Cyber Threat
Actor Motivation
12
Types of cyber threats
13
CIA Triad
Confidentiality
CIA Triad
Integrity Availability
14
Common categories of Cyber-attacks
Attacks on
Confidentiality
Attacks on Integrity
Cyber-Attacks
Attacks on Availability
15
Attacks on confidentiality
16
Attacks on integrity
17
Attacks on availability
18
Possible Attack Strategies
Social Engineering
Phishing
Unpatched Software
19
Cyber Security Core Functions
Identify
Protect
Develop
understanding Detect
Develop and
Manage implement Respond
systems, safeguards Identify the
assets, data occurrence Recover
and Ensure of cyber Take action
capabilities delivery of security on the
services detected Resilience
events
cyber Restoration
security
events
20
Four Important Fundamentals of
Security
Cyber security
Protect the
Protect email
connection of
communication
devices
21
Risks and Consequences in Devices
Key - logging
Intrusion
Risks
Theft
Malicious applications
Fraud
Consequences Extortion
Spying
Corruption and loss
22
Online Communication risks and
consequences
Devices
• Information loss
• Fraud
• Physical harm
Consequences • Extortion
• Theft
23
Risks and Consequences in Email and
Backup Services
Risks
Risks
Phishing
Cloud-based servers
Social Engineering
Online theft
Metadata loss
Unsecure networks, sharing
Theft
Consequences
Consequences
Fraud
Permanenet loss
Theft
Fraud
Reputational risk
ID theft
Blackmail
24
Other essentials in securing the
Computers
Physical security
Use of secure
authentication methods
25
Cyber Security Challenges
26
Conclusion
27
Thank you
28