FCS - Unit 1
FCS - Unit 1
❖ Understand the importance of privacy for the personal, organizational and cyber data
❖ Analyze and evaluate the importance of data, its privacy and security
❖ Apply the protection measures to digital devices using latest tools and technologies
❖ Non-state actors
❖ Cyber terrorism
❖ Cyber warfare
❖ Case Studies
Overview of cyber security
Cybersecurity divide into two parts one is cyber, and the other is
security.
Cyber security is vital to protecting our digital world, from personal data
to critical infrastructure.
Overview of cyber security
Definition:
❖ It encompasses the types of attacks, their frequency, and their potential impact.
Attackers use sophisticated techniques like Businesses, governments, and individuals are
ransomware, phishing, and social engineering to increasingly vulnerable as more devices and data are
exploit vulnerabilities. connected online.
The Increasing Threat Landscape
Why is it Increasing?
Rise of Cybercrime:
Impact:
Highly sophisticated and persistent attacks carried out by nation-states, organized crime
groups, or other well-resourced adversaries.
Characteristics:
❖ Long-term campaigns: Involve sustained attacks aimed at infiltrating or exploiting a
target over an extended period.
❖ Stealthy and evasive techniques: Methods used by attackers to avoid detection and
bypass security measures.
Objectives:
❖ Espionage, sabotage, data theft, disruption of critical infrastructure
Emergence of New Threats
Ransomware:
❖ Encrypting data and demanding a ransom for its release. Increasingly sophisticated and
impactful, targeting critical infrastructure.
IoT Vulnerabilities:
Increased Connectivity:
❖ The rise of the Internet of Things (IoT) creates a vast attack surface.
Cloud Computing:
❖ AI can be used by both attackers and defenders, making the threat landscape more
dynamic.
Cybersecurity Terminologies
Attack
Cyber Space Attack
Vector
Attack
Threat Risk
surface
Hacker
Cybersecurity Terminologies
Cyberspace:
Location Exists in computer networks and the internet Exists in the natural, material environment
Access Requires electronic devices and internet connection Accessible without technology (physical presence)
Security Cybersecurity measures (firewalls, encryption) Physical security measures (locks, surveillance)
Regulation Digital laws, online governance, and policies Physical laws, regulations, and societal norms
Environment Digital ecosystems (websites, platforms) Natural and built environments (cities, nature)
Cybersecurity Terminologies
Attack Surface:
❖ The total area of a computer system or network that is exposed to potential attacks.
❖ Attack surface is the general term for the areas of a system, device, or network that contain
security vulnerabilities that may be exploited.
❖ The attack surface of an organization’s computer systems and devices can often vary
significantly depending on what they are used for and how they have been configured.
Cybersecurity Terminologies
Cybersecurity Terminologies
Threat
❖ Computer security threats are potential threats to your computer’s efficient operation and
performance.
❖ As the world becomes more digital, computer security concerns are always developing.
❖ A threat in a computer system is a potential danger that could jeopardize your data security.
Cybersecurity Terminologies
Hacker
❖ An individual with advanced computer skills, often used to describe those who use
their skills for malicious purposes.
❖ Computer hackers are unauthorized users who gain access to computers in order to
steal, alter, or delete data, generally by installing malicious software without your
knowledge or agreement.
❖ They can get access to the information you don’t want them to have thanks to their
cunning techniques and in-depth technological knowledge.
Types of Hackers
• These types of hackers, often known as crackers and always have a malicious motive and
Black Hat gain illegal access to computer networks and websites.
• Their goal is to make money by stealing secret organizational data, stealing funds from
Hacker online bank accounts, violating privacy rights to benefit criminal organizations, and so
on.
• White hat hackers (sometimes referred to as ethical hackers) are the polar opposites of
black hat hackers. They employ their technical expertise to defend the planet against
White Hat malicious hackers.
• White hats are employed by businesses and government agencies as data security
hacker analysts, researchers, security specialists, etc. White hat hackers, with the permission of
the system owner and with good motives, use the same hacking tactics that the black
hackers use.
• They fall somewhere between the above-mentioned types of hackers, in that they gain
Grey Hat illegal access to a system but do so without any malicious intent.
• The goal is to expose the system’s weaknesses. Instead of exploiting vulnerabilities for
Hacker unlawful gains, grey hat hackers may offer to repair vulnerabilities they’ve identified
through their own unauthorized actions.
Non-State Actors
❖ Non-state actors are individuals or groups that engage in cyber activities but are not directly
affiliated with a nation-state.
❖ Include various groups and individuals with diverse motivations and capabilities.
❖ Examples of non-state actors include: script kiddies, scammers, hacktivists, blackhat hackers,
and criminal organizations
Types of Non-State Actors
Criminal Groups:
Examples:
• Ransomware gangs: Groups that encrypt victims' data and demand a ransom for its release.
Hacktivists:
Examples:
• Groups that conduct cyberattacks to protest government policies or support a particular cause.
Terrorist Organizations:
Examples:
Financial Gain:
❖ Includes activities like stealing financial data, extorting money through ransomware, and selling stolen data on
the dark web.
Political Activism:
❖ Aim to disrupt government operations, spread propaganda, or raise awareness for a cause.
Espionage:
Financial Loss:
Reputational Damage:
International Cooperation:
Terrorism:
Cyberterrorism:
2) Economic Damage:
❖ Disruption of businesses, financial markets, and critical infrastructure.Loss of productivity
and economic output.
3) Loss of Life:
❖ In some cases, cyberattacks can have direct or indirect impacts on human life.
Protection of End-User Machines
Examples of Endpoints
Tablets, Mobile devices, Smartwatches, Printers, Servers, ATM machines, Medical Devices
Types of Endpoint Security
Internet Of Things: Securing computing devices at the networks they are linked to from
threats and breaches via means of protecting, identifying, and tracking risks.
Data Loss Prevention: It is the type of endpoint security that detecting and stopping data
breaches.
Network Access Control: It restricts the availability of network resources to endpoint devices.
URL filtering: Technology that offers enables groups to control their users and visitors on the
web page.
Browser Isolation: Isolation of a web user’s surfing interest far from their nearby networks
and infrastructure.
Protection of End-User Machines
❖ End-user devices are often the first line of defense against cyberattacks.
❖ They can be entry points for malware, data breaches, and other security threats.
❖ Improved Compliance
❖ Cost Saving
Anti-virus/Anti-malware Software
Key Role:
Features:
Ensure the software has the latest virus definitions and security updates.
Firewalls
A security system that monitors and controls incoming and outgoing network traffic.
Types of Firewalls:
1) Software firewalls:
2) Hardware firewalls:
Dedicated devices that filter network traffic at the network perimeter.
❖ It is a security tool that monitors a computer network or systems for malicious activities
or policy violations.
❖ An IDS is crucial for maintaining network security and protecting sensitive data from
cyber-attacks.
❖ An IDS maintains network traffic looks for unusual activity and sends alerts when it
occurs.
Intrusion Detection and Prevention Systems (IDPS)
❖ An IPS works by analyzing network traffic in real-time and comparing it against known
attack patterns and signatures.
❖ When the system detects suspicious traffic, it blocks it from entering the network.
Benefits:
Training Methods:
Endpoint Software are more costlier. Antivuris Software generally have lower cost
Endpoint Software support Encryption Antivirus Software does not support encryption
Advance Firewall and network security. Basic firewall and network security
Critical IT and National Critical Infrastructure
Critical Infrastructure:
❖ Systems and assets essential for the security, economy, public health, and safety
of a nation.
Critical IT:
❖ Information and communication technology (ICT) systems that are vital to the
functioning of critical infrastructure.
Critical IT and National Critical Infrastructure
Interdependence:
Examples:
Cyberattacks:
Disruption of operations:
❖ Causing power outages, transportation delays, or disruptions to healthcare
services.
❖ Data breaches: Exposing sensitive data and compromising privacy.
❖ Sabotage: Malicious attacks aimed at damaging or destroying critical
infrastructure.
Examples:
❖ Ransomware attacks: Disrupting hospital operations by encrypting critical
systems.
❖ Denial-of-service (DoS) attacks: Overwhelming critical systems with traffic,
causing outages.
❖ Data breaches: Exposing sensitive patient information in healthcare systems.
The Impact of Attacks on Critical Infrastructure
Economic Impacts:
Social Impacts:
Resilience Planning:
International Cooperation:
Key Characteristics:
❖ State-sponsored activities
Motivation:
Examples:
❖ Stuxnet: Malware designed to sabotage Iranian nuclear centrifuges.
❖ NotPetya: A destructive malware attack that crippled Ukrainian infrastructure and
spread globally.
❖ Attacks on government agencies, critical infrastructure, and private companies.
Cyber Espionage
Impact:
Examples:
What Happened:
In May 2023, the Conti ransomware group launched a series of cyberattacks against the Costa
Rican government, targeting critical infrastructure like hospitals, schools, and government
agencies.
Impact:
Disrupted essential services, including healthcare, education, and transportation.
Caused significant economic and social disruption.Exposed sensitive government data.
Lessons Learned:
Importance of robust backups and disaster recovery plans: Costa Rica lacked sufficient
backups and recovery systems, leading to prolonged disruption.
Need for improved cybersecurity infrastructure: Investments in cybersecurity defenses and
incident response capabilities are crucial for government agencies.
International cooperation: Collaboration between countries is essential to combat
ransomware and other cyber threats.
The 2023 Microsoft Cloud Services Outage
What Happened:
In July 2023, a faulty software update for Microsoft Windows caused a global IT
outage that disrupted airline and hospital operations, supermarkets, and other
businesses.
Impact:
❖ Widespread disruption of critical services.
❖ Demonstrated the interconnectedness of modern systems and the potential for
cascading failures.
Lessons Learned:
❖ Thorough testing of software updates: Rigorous testing is essential to prevent
unintended consequences.
❖ Importance of incident response planning: Organizations need to have plans in
place to mitigate the impact of service disruptions.
❖ Focus on resilience: Building more resilient systems that can withstand
disruptions.
The 2023 Uber Data Breach
What Happened:
In September 2023, a 19-year-old teenager gained access to Uber's systems by
exploiting a vulnerability in a third-party engineering tool.
Impact:
Access to sensitive company data, including employee information and customer
data.
Lessons Learned:
❖ Importance of secure software development practices: Secure coding practices
and regular security audits are crucial.
❖ Third-party risk management: Organizations must carefully vet and monitor third-
party vendors and their security practices.
❖ Employee security awareness: Educate employees about social engineering
tactics and the importance of strong security practices.
References:
[1] Stallings, W., & Brown, L. (2017). Computer Security: Principles and Practice.
Pearson Education.
[2] Stallings, W., & Brown, L. (2017). Computer Security: Principles and Practice.
Pearson Education.
https://www.geeksforgeeks.org/cyber-security-tutorial/
https://www.merriam-webster.com/dictionary/source
https://www.merriam-webster.com/dictionary/source
https://www.merriam-webster.com/dictionary/source