Class 1
Class 1
1
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
Cyber Security
IT4204
Class Schedule
2
Chapter outline
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
» Introduction
» Evolution of cyber security
» Targets of criminal hackers
» Principles of cyber security
» Implementing the principles
» Cyber security professionals
» Cyber security objectives
» General cyber security tips
3
Chapter one: Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Cyberspace:
» The environment in which communication over computer networks occurs.
❖ Security:
» We could not find a clear cut definition for security.
» Security is a process of maintaining an acceptable level of perceived risk.
❖ Cyber Security:
» It is all about protecting computers, networks, programs and data from
unintended or unauthorized access, change or destruction.
4
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
5
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Information security :
» The system of designing mechanisms to maintain confidentiality, integrity and
availability of data.
❖ The CIA triad of information security:
» Confidentiality: Ensures that data or information systems are accessed only by
authorized users.
» Integrity: Ensures that data is edited only by authorized users and remains in
its original state when at rest.
» Availability: Data and information systems are available when required.
6
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Cyber crime:
» It is any crime that involves a computer and network. The computer can be
used as a weapon of crime, or it may be the target.
» We will try to see some of the most common cyber crimes types and their
respective prevention/mitigation mechanisms.
❖ Hacking/Cracking:
» An illegal intrusion into computer system or network.
» Government websites are the hot targets of many hackers due to the coverage
they receive.
» Prevention: Implementing proper IDS/IPS mechanism.
7
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Phishing:
» Fraudulent attempt, usually made using email to steal your personal
information. The personal information can be username, password, credit card
details etc.
» Prevention: Unsolicited e-mail filtering mechanism
❖ Denial of Service (DoS/DDoS) :
» An act where criminals floods bandwidth of the victim's network.
» DoS: Attacks are launched from single host.
» DDoS: Attacks are launched from multiple hosts.
» Prevention: Availability service such as access control service (X.800 and RFC
2828) and implementing proper IDS/IPS on firewall.
8
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
9
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Email Spam:
» It is an electronic version of junk mail which involves sending unwanted
messages, often unsolicited advertisements to a large number of recipients. It
is used to deliver different types of malicious codes to the victim.
❖ Malware: Malicious software (virus, worms and Trojan) which are specifically
designed to disrupt or damage computer systems or mobile devices. Hackers use
them as a means to extract personal information such as passwords, usernames
and credit card details.
» Virus: Attach themselves to a computer and file and then circulate to other
files and computers in the network with the intention of altering or deleting
the files.
» Worms: They don’t attach themselves to other files but they make many
copies of themselves to eat up the system’s available memory.
» Trojan: Act themselves as something important, fun or helpful while their
intention is causing harm or stealing information.
» Prevention: Installing antivirus, using anti-adware and spy-ware tools 11
…Introduction
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Ransom ware:
» Hackers use this program to lock you out of your device and demand a ransom
in return for access.
» Prevention: Install antivirus software, protect ports and harden endpoints.
❖ ATM Skimming:
» Installing a skimming machine keypad on top of the genuine ATM machine
keypad which appears as genuine part of the true machine to the user.
» It then collect credit card number and corresponding PIN which will help them
to make fraudulent transaction later on.
» Prevention: Make a quick scan, check the keypad before using it or use other
options like mobile wallets.
12
Evolution of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Although cyber security has evolved hugely over the past two decades, the
evolution of cyber-security has gone hand in hand with the developments of
communication technology.
❖ Let’s take a look at some of the more notable incidents in the history of hacking
and cyber security.
❖ The first hacker:
» Technically, the very first cyber-attack occurred in France in 1834.
» In 1940, Rene Carmille became the first ethical hacker.
» In 1962, the first computer passwords had been set up by MIT to limit students’ time on
the computers and provide privacy for their computer use.
» The first computer virus is believed to have been used in 1969 at the University of
Washington Computer Center.
» Kevin Mitnick is often referred to as the first cybercriminal. 13
…Evolution of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Reading assignment: Crucial moments in cyber history: Read and know more about
these cyber security incidents.
» The first network freeze, 1988
» The Department of Homeland Security, 2002
» The birth of Anonymous, 2003
» Operation Aurora, 2009
» Stuxnet, 2010
» Eternal Blue and ransom-ware attacks, 2017
» General Data Protection Regulation (GDPR), 2018
» The Twitter hack, 2020
» Remote work - The new norm, more security features coming in 2021
» Artificial intelligence (AI) enabled cyber security 15
Targets of criminal hackers
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
17
…Targets of criminal hackers
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
18
…Targets of criminal hackers
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Physical hardware
» It is easiest to steal information when you have physical access to a device
such as a smartphone or a personal computer.
» You can easily check all accessed accounts through the registry, browser
history, or saved passwords without even having to use a code.
» Having physical access to a device also enables you to make it possible to plant
a listening device into its system in order to phish out any additional
information at any point in the future.
19
…Targets of criminal hackers
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Target locations
» If a hacker cannot find any vulnerability in a system that he wants to hack, the
next thing that he will try to find is where the computer system is located.
» This will allow him to further study vulnerabilities through social engineering,
dumpster diving, or even gaining physical access to a targeted device.
» Every device connected through the internet has an IP address and can be
easily searched for in order to figure out where it is located.
» A hacker, on the other hand, knows how to hide his location in order to
remain undetected while he launches an attack.
20
Principles of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
21
…Principles of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Govern principles:
» G1: A Chief Information Security Officer provides leadership and oversight of
cyber security.
» G2: The identity and value of systems, applications and data is determined and
documented.
» G3: The confidentiality, integrity and availability requirements for systems,
applications and data are determined and documented.
» G4: Security risk management processes are embedded into organizational risk
management frameworks.
» G5: Security risks are identified, documented, managed and accepted both
before systems and applications are authorized for use, and continuously
throughout their operational life. 22
…Principles of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Protect principles:
» P1: Systems and applications are designed, deployed, maintained according to
their value and their confidentiality, integrity and availability requirements.
» P2: Systems and applications are delivered and supported by trusted suppliers.
» P3: Systems and applications are designed and configured to reduce the attack
surface.
» P4: Only trusted and supported operating systems, applications and computer
code can execute on systems.
» P5: Data is encrypted at rest and in transit between different systems.
» P6: Data, applications and configuration settings are backed up in a secure and
proven manner
23
Principles of cyber security
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Detect principles:
» D1: Event logs are collected and analyzed in a timely manner to detect cyber
security events.
» D2: Cyber security events are analyzed in a timely manner to identify cyber
security incidents.
❖ Respond Principles:
» R1: Cyber security incidents are reported both internally and externally to
relevant bodies in a timely manner.
» R2: Cyber security incidents are contained, eradicated and recovered from in a
timely manner.
» R3: Business continuity and disaster recovery plans are enacted when
required. 24
Implementing the principles
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ A given organization can use the following maturity model to assess the
implementation of individual principles, groups of principles or the cyber security
principles as a whole.
» Incomplete: The principles are partially implemented.
» Initial: The cyber security principles are implemented, but in a poor or ad hoc
manner.
» Developing: The principles are sufficiently implemented on a project-by-
project basis.
» Managing: The cyber security principles are established as standard business
practices and robustly implemented throughout the organization.
» Optimizing: A continuous improvement exists for the implementation of the
cyber security principles throughout the organization 25
Cyber security professionals
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
❖ Cyber security professionals are the rock-stars of the computer world today. There
are many different positions in this field and can be found in businesses, voluntary
agencies, government agencies etc.
❖ They can work as:
» Ethical hackers
» Source code auditors
» Security architects
» Computer crime investigators
» Security consultants
» Cryptographers
» Security analysts
26
Cyber security objectives
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
29
…Cyber security objectives
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
32
General cyber security tips
TESFAY G/SILASSIE [ M-Tech ] CYBER SECURITY [ IT4204 ] MU-MIT
33