0% found this document useful (0 votes)
9 views28 pages

Week1 Module3

The document outlines the importance of cyber security, detailing its challenges, threats, and necessary practices for protection. It emphasizes the need for continuous adaptation to new cyber threats and provides insights into various types of attacks, including those on confidentiality, integrity, and availability. Additionally, it highlights the role of hackers, common infection methods, and essential security measures to safeguard information systems.

Uploaded by

agnusraymond.8d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views28 pages

Week1 Module3

The document outlines the importance of cyber security, detailing its challenges, threats, and necessary practices for protection. It emphasizes the need for continuous adaptation to new cyber threats and provides insights into various types of attacks, including those on confidentiality, integrity, and availability. Additionally, it highlights the role of hackers, common infection methods, and essential security measures to safeguard information systems.

Uploaded by

agnusraymond.8d
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

CYBER SECURITY

Week 1: Introduction to Cyber Security – Cyberspace –


Information Systems – Security Principles - Importance of Cyber
Security
Module 3: Importance and Need for Cyber Security – Cyber
threats – Cyber challenges
Course Co-Ordinator Content Reviewer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj
Professor-Department of Computer Professor, Department of Information
Science Technology
Avinashilingam Institute for Home Madras Institute of Technology Campus,
Science and Anna University,
Higher Education for Women Chennai-600 044.
(Deemed-to-be-University), Coimbatore [email protected]
[email protected] +919444150081
9486772744

1
Objectives
✓Justify the need for Cyber Security
✓Emphasis on Cyber Security Challenges

2
Learning Outcomes

✓Derive the important terminologies and


difference between certain terms
✓Summarize and Illustrate the security
rudiments through the incidents happened both
at National and International Level
✓Outline and Prepare the fundamentals of
Security Practices and Comprehend the
Security Challenges

3
Outline
Why Cyber Security is important?
Who are Hackers? What do they do generally?
Common ways of how a computer can become infected
Statistics on Cyber Attacks
Need for Security- A Technological View
Types of Cyber threats
Attacks on Confidentiality
Attacks on Integrity
Attacks on Availability
Methods and Practices of Countering Cyber Attacks
Social Engineering
Phishing Attacks
Unpatched Software
Social Media Threats
Advanced Persistent Threats 4
Outline
Cyber Security Core Functions
Four Important Fundamentals of Security
Protect the Device
Protect the connection of Device
Protect Email Communication
Protect and backup electronic documents and files
Other essentials in securing the Computing systems
Physical Security
Protect against Unauthorized Administrators
Assign the least Permissions possible
Use the most secure Operating Systems possible
Use Strong passwords or Pass Phrases
Use Secure Authentication methods
Cyber Security Challenges
5
Why Cyber Security is important?

• Cyber Security is not a one-time process to


achieve
• It is an ever growing challenge encountered
from time to time
• When old problems are fixed and rectified, new
targeted attacks challenge the Cyberspace
• Cyber security is a process by itself and not the
end

6
Hackers

• Hackers are unauthorized users of a system


• They invade a system through the
vulnerabilities or weak points in the system
• They makes use of large diverse tools to harm
a computer system
• They gain access to computer systems through
malicious logic

7
Common ways a computer can become
infected

Opening an email from


unknown sources

Visiting malicious
websites Careless download
of software, free
downloads

8
Top Five Risks- Global Instability

• According to the World Economic Forum’s Global


Risk Report 2018, Cyber-attacks are 3rd threat the
World is facing today after natural disasters

Natural disaster

Failure to Extreme
address climate weather
change conditions
Top 5
Risks

Data frauds Cyber-Attacks

9
Cyber Attacks in the Year 2018
• WannaCry ransomware, Petya, and NotPetya
led to $300 million loss in companies
• The ransomware spread through emails
demanded money for release of encrypted
data
• Billions of data records are leaked for Business
& Political gains

10
Important Terminologies

• Vulnerability – any weakness in the system


• Threat – possible danger to assets
• Attack – evades security services and violates
security policy
• Risk – possibility of suffering loss

11
Interdependency of vulnerability, threat
and risk

Vulnerability

Risk
Cyber Threat

Actor Motivation

12
Types of cyber threats

• An actor of adversary gains access to the


system in a number of ways
• Threats gains access to networks through
malicious attempts
• The types of threats are increasing in its
landscape by two technology trends
• IoT (Internet of Things) and
• Data Proliferation

13
CIA Triad

Confidentiality

CIA Triad

Integrity Availability

14
Common categories of Cyber-attacks

Attacks on
Confidentiality

Attacks on Integrity
Cyber-Attacks

Attacks on Availability

15
Attacks on confidentiality

• Stealing or copying the target's personal


information
• For example, attacks like credit card fraud,
identity theft, or stealing bitcoin wallets
• Carried out for political, military, or economic
gains

16
Attacks on integrity

• The common name used is sabotage


• Seeks to corrupt, damage, or destroy
information or systems
• Offenders can range from script kiddies to
international or national attackers

17
Attacks on availability

• Preventing a target from accessing by the


genuine users
• For example, ransomware and denial-of-
service attacks
• Ransomware encrypts the target's data and
demands a ransom to decrypt it
• DoS floods a network resource with requests,
making it unavailable due to jam

18
Possible Attack Strategies

Social Engineering

Phishing

Unpatched Software

Advanced Social Media


Persistent Threats
Threats

19
Cyber Security Core Functions

Identify
Protect
Develop
understanding Detect
Develop and
Manage implement Respond
systems, safeguards Identify the
assets, data occurrence Recover
and Ensure of cyber Take action
capabilities delivery of security on the
services detected Resilience
events
cyber Restoration
security
events

20
Four Important Fundamentals of
Security

Cyber security

Protect and backup


Protect the device electronic
documents and files

Protect the
Protect email
connection of
communication
devices

21
Risks and Consequences in Devices

Key - logging
Intrusion
Risks
Theft
Malicious applications

Fraud
Consequences Extortion
Spying
Corruption and loss

22
Online Communication risks and
consequences

• Snooping and Sniffing


Risks • Tracking
• Fake

Devices

• Information loss
• Fraud
• Physical harm
Consequences • Extortion
• Theft

23
Risks and Consequences in Email and
Backup Services

Email Services Backup Services

Risks
Risks
Phishing
Cloud-based servers
Social Engineering
Online theft
Metadata loss
Unsecure networks, sharing
Theft

Consequences
Consequences
Fraud
Permanenet loss
Theft
Fraud
Reputational risk
ID theft
Blackmail

24
Other essentials in securing the
Computers

Physical security

Protect against unauthorized


Administrators

Assign the least


permission possible
Securing computers
Use the most secure OS
possible

Use strong passwords or pass-


phrase

Use of secure
authentication methods
25
Cyber Security Challenges

• Increasing number of users and adoption of


technology
• Unrestricted or open access to Information
• Lack of control mechanisms
• Growing sophistication of threats
• Lack of preparedness to handle the upcoming
challenges
• Inadequate and restricted handling of related
crimes legally or the legal challenges

26
Conclusion

• Security is a very important concern today due


to digitization and Information exchange
• The essentials in Cyber Security are discussed
in this section
• One has to understand the challenges and the
best practices to be followed to ensure security

27
Thank you

28

You might also like