Cybersecurity
Cybersecurity
What is Cybersecurity?
- Cybersecurity is the effort to protect individuals, organizations, and governments from
malicious digital attacks by protecting networked systems and data from unauthorized
use or harm.
There are three levels of protection that currently in the world today:
1. Personal
o These are data on a personal level, you need to safeguard your identity, your
data, and your computing devices from malicious attacks.
2. Organizational
o At an organizational level, it is everyone's responsibility to protect the
organization's reputation, data and customers.
3. Government
o Its protection becomes even more vital at the government level, where national
security, economic stability and the safety and wellbeing of citizens are at stake.
Personal Data
- Any information that can be used to identify you whether it would be your name, age,
birthday, or address and it can exist in offline and online
o Offline Identity
▪ Real-life persona that you present in the real world
▪ People close to you like family, friends, and co-workers know about every
detail of your personal life
o Online Identity
▪ Activities you present to others online
▪ Username or alias you use for your online accounts, as well as the social
identity
Identity Theft
- Long-term gain by using identity theft to their advantage
- Stealing once identity to access your bank account and commit other crimes
Not all people who wants your data are criminals, there are huge companies and
business that uses data from their users to build their own profile about you and cater to
your needs. These are examples of them:
- Your internet provider (ISP)
o Tracks your online activity
o In some countries, they are legally allowed to sell this data to advertisers for a
profit.
- Advertisers
o Monitor and track your online activities such as your shopping habit, sites you
visit, and personal preferences and send those target ads your way.
- Search engines and social media platforms
o Gathers information based on your search history and online identity.
- Websites your visit
o Use cookies to track your activities in order to provide a more personalized
experience.
Organizational Data
- Traditional data is typically generated and maintained by all organizations, big and small.
This can include the following:
o Transactional Data
▪ Details relating to buying and selling, productions activities and basic
organizational operation such as any information used to help make
employment decisions.
o Intellectual Property
▪ These are patents, trademarks, and new product plans, which allows an
organization to gain economic advantage over its competitors.
▪ This information is often sensitive or considered as an organization trade
secret and losing it could prove disastrous for the future of the company.
o Financial Data
▪ Such as income statements, balance sheets, and cash flow statements,
which provide insight into the health of the company's assets.
McCumber Cube
- Model framework created by John McCumber in 1991
- Help organizations establish and evaluate information security initiatives by considering
all of the related factors that impact them.
- This security model has three dimensions:
o The foundational principles for protecting information systems.
▪ Confidentiality
• Set of rules that prevents sensitive information from being
disclosed to unauthorized people, resources and processes.
• This includes data encryption, identity proofing and two factor
authentication.
▪ Integrity
• Ensures that system information or processes are protected from
intentional or accidental modification.
• Use a hash function or checksum.
▪ Availability
• Authorized users are able to access systems and data anytime,
anywhere and those who do not meet those conditions cannot.
Phishing
- Fraudulent practice of sending emails or other messages that is imitating reputable
companies or organization in order to induce or convince the individual to enter their
information such as passwords, credit card information, or personal information out of
sheer fear or manipulation.
Internal Attacks
- employees, contracted staff or trusted partners can accidentally or intentionally
mishandle organizational data.
External attacks
- Amateurs or skilled attackers outside of the organization, these can be hired, criminal
intentions, or people who are looking to just exploit the system for fun
Malware
- Code that can be used to steal data, bypass access controls, or cause harm to
compromise a system
Types of Malwares
- Spyware
o Designed to track and spy on you
o Monitors online and offline activity
- Adware
o Often installed with version of software
o Automatically deliver advertisements to a use through browser
- Backdoor
o Gain unauthorized access by bypassing authentication procedures
- Ransomware
o Hold computer system or data it contains captive until payment is made
- Scareware
o Scare tactics to trick into taking specific actions
o Operating system style windows that pop up to warn you that your system is at
risk and needs to run a specific program for it to return to normal operation
- Rootkit
o Modify the operating system to create a backdoor, which attackers can then use
to access your computer remotely
- Virus
o Computer program that, when executed, replicates and attaches itself to other
executable files, such as a document, by inserting its own code
o Require end-user interaction to initiate activation and can be written to act on a
specific date or time.
- Trojan Horse
o Carries out malicious operations by masking its true intent
- Worms
o Replicates itself in order to spread from one computer to another
o Worms can run by themselves
Symptoms of Malware
- Increase of CPU usage
- Decreased web browsing speed
- Unexplainable problems with network connection errors
- Modified or deleted files
- Presence of unknown files
- Unknown process in the background
- Programs turning off or opening by Themselves
- Send messages and emails without consent
Methods of Entrance
1. Social Engineering
o Manipulation of people into performing actions or divulging confidential
information
▪ Pretexting
• This is when an attacker calls an individual and lies to them in an
attempt to gain access to privileged data.
▪ Tailgating
• This is when an attacker quickly follows an authorized person into
a secure, physical location.
▪ Something for something
• This is when an attacker requests personal information from a
person in exchange for something, like a free gift.
2. Denial-of-Service
o Network attack that is relatively simple to carry out, even by an unskilled attacker
3. Distributed DoS
o Similar to a dos attack but originates from multiple, coordinated sources.
4. Botnet
o Bot computer is typically infected by visiting an unsafe website or opening an
infected email attachment or infected media file.
5. SEO Poisoning
o N You’ve probably heard of search engine optimization or SEO
o which is about improving an organization’s website so that it
o gains greater visibility in search engine results
6. Wi-Fi Password Cracking
o Similar to a dos attack but originates from multiple, coordinated sources.
7. Password Attacks
o Bot computer is typically infected by visiting an unsafe website or opening an
infected email attachment or infected media file.
▪ Password Spraying
• This technique attempts to gain access to a system by ‘spraying’ a
few commonly used passwords across a large number of
accounts.
▪ Dictionary Attacks
• A hacker systematically tries every word in a dictionary or a list of
commonly used words as a password in an attempt to break into a
password-protected account.
▪ Brute Force Attacks
• The simplest and most commonly used way of gaining access to a
password-protected site, brute-force attacks see an attacker using
all possible combinations of letters, numbers and symbols in the
password space until they get it right.
▪ Rainbow Attacks
• Passwords in a computer system are not stored as plain text, but
as hashed values (numerical values that uniquely identify data). A
rainbow table is a large dictionary of precomputed hashes and the
passwords from which they were calculated.
8. Advanced Persistent Threats
o Bot computer is typically infected by visiting an unsafe website or opening an
infected email attachment or infected media file.
Security Vulnerabilities
- Hardware Vulnerability
o Hardware vulnerabilities are specific to device models and are not generally
exploited through random compromising attempts.
o While hardware exploits are more common in highly targeted attacks, traditional
malware protection and good physical security are sufficient protection for the
everyday user.
- Software Vulnerability
o Software vulnerabilities are usually introduced by errors in the operating system
or application code.
▪ Non-Validated Output
• Programs often require data input, but this incoming data could
have malicious content, designed to force the program to behave
in an unintended way.
▪ Buffer Overflow
• Buffers are memory areas allocated to an application. A
vulnerability occurs when data is written beyond the limits of a
buffer.
▪ Race Conditions
• This vulnerability describes a situation where the output of an
event depends on ordered or timed outputs.
▪ Access Control Problem
• Access control is the process of controlling who does what and
ranges from managing physical access to equipment to dictating
who has access to a resource, such as a file, and what they can
do with it, such as read or change the file.
▪ Weakness in Security Practice
• Systems and sensitive data can be protected through techniques
such as authentication, authorization and encryption.
Software Updates
- The goal of software updates is to stay current and avoid exploitation of vulnerabilities.
A Strong Password
- Do not use dictionary words or names in any languages
- Do not use common misspellings of dictionary words
- If possible, use special characters such as ! @ # $ % ^ & * ( )
- Do not use computer names or account names
- Use a password with more than ten characters
Using a Passphrase
- Choose a statement that is meaningful
- Add special characters such as !@#$%^&*()
- The longer the better
- Avoid common or famous statements, for example, lyrics from a popular song
Encryption
- Encryption is the process of converting information into a form in which unauthorized
parties cannot read it.
- How do you Encrypt?
o Select one or more files or folders
o Right Click the selected data and go to “properties”.
o Find and click “Advanced.”
o Select the “Encrypt contents to secure data” check box.
o Files and folders that have been encrypted with EFS are displayed in green as a
show here.
Backing Up Data
- Home Network
o Storing your data locally means that you have total control of it.
- Secondary Location
o You could copy all of your data to a network attached storage device (NAS), a
simple external hard drive or maybe even back up important folders on thumb
drives, CDs, DVDs or tapes.
- The Cloud
o You could subscribe to a cloud storage service, like Amazon Web Services
(AWS). The cost of this service will depend on the amount of storage space you
need, so you may need to be more selective about what data you back up