Class Presentation Week 1 - Introduction To Cybersecurity
Class Presentation Week 1 - Introduction To Cybersecurity
Cybersecurity threats
and vulnerabilities
1
Course introduction
2
INSTRUCTOR
▪ Kedar Mendhurwar CCIE Security, CISSP, CCSP, CISA
▪ Sr. IT Security Architect at Government of Quebec & President
at Rootsec Inc.
▪ Working in Security since 2009 and teaching since 2014.
▪ Experience working in different security roles.
Contact information
▪ Email: [email protected]
▪ Availability:
• Online 15-30 minutes before and after day’s lecture.
• Through email anytime.
(I reply as soon as possible, usually within 24 hours)
▪ 5 weeks (Tuesdays and thursdays) – January 14th, 2025 – February 13th, 2025
▪ 30 hours in-class and around 30 hours off the class work
▪ 3 reports (solo or in-group) and 1 in-class quiz
▪ Moodle
▪ Office 365
▪ Zoom
▪ Class video recordings
▪ Sharepoint
▪ Other reading resources (updated weekly)
▪ VirtualBox
▪ In the middle of the night, the camera starts playing creepy music & a
strange voice begins speaking to the child.
https://www.youtube.com/watch?v=P6X75eknvc8
▪ FBI most wanted criminal & expert hacker is on the run from US
federal law enforcement in Manhattan
https://www.youtube.com/watch?v=ysAam9Zmdv0
▪ To slow down Iran’s nuclear weapons development, Israel & US develop advanced malware
▪ Mossad & CIA use a USB stick to smuggle the malware into highly secure & air-gapped systems
deep within the nuclear facility. The malware makes the centrifuges spin 10x faster than
▪ BUT it also spreads outside of the Iranian nuclear facility and infects thousands of computers
▪ Stuxnet was the most advanced malware of its time, and the first documented use of
▪ We’ll cover it later in class, but you can read more about it here:
https://en.wikipedia.org/wiki/Stuxnet
▪ More and more of our life is becoming internet connected, exposing us to risks we
▪ 3,809,448 cyber attacks per day, 158,727 per hour, 2,645 per minute and 44
attacks every second of every day.
▪ The average cost of a data breach in 2022 was over $4.24 million
▪ The entire cost of cyberattacks in 2022 was $6 trillion
▪ By 2025, cybercrime will cost the world $10.5 trillion yearly
▪ The average life cycle of a data breach is about 11 months.
31
THE PRESENT DIGITAL LANDSCAPE
Current challenges
▪ Threats are increasing
▪ Alerts to threats are increasing
▪ Need for security analysts and experts is in high demand
▪ Required knowledge on cybersecurity is increasing
▪ Less time
What is Cybersecurity ?
1. Confidentiality
2. Integrity
3. Availability
4. Authenticity
5. Accountability
6. Non-repudiation
7. Principle of least privilege
8. Separation of duties
1. Confidentiality
1. Confidentiality (Contd.)
2. Integrity
2. Integrity (Contd.)
3. Availability
3. Availability (Contd.)
5. Non-repudiation
5. Non-repudiation (Contd.)
6. Accountability
8. Separation of duties
Cybersecurity threats
and vulnerabilities
64
Recap week 1 – day 1
▪ Types of attackers
▪ Types of attacks
▪ Security terminologies
▪ Threats, vulnerabilities and Risk
▪ Impact of vulnerabilities on organizations
1. Script kiddies
Individuals with little to no technical expertise using pre-
existing tools or scripts available on internet
E.g., rookie hackers
5. Hacktivists
Hacker activists who attack computer system for
social or political reasons
E.g., Anonymous
6. Cyber gangs
Criminal gangs who aim to maximize the amount of
money they can collect through cyber crime
E.g., Lazarus, Cosmic Lynx, Fin7, Exagerrated Lion
7. Nation states
Work for the government to disrupt or compromise
target governments, organizations or individuals to gain
access to valuable data or intelligence
E.g., Russian interference in 2016 US election, Russian
cyberattacks on Ukraine, Conflicts between Iran and
Iraq
8. Insider threats
Past or present employees, partners, consultants,
vendors, contractors etc.
E.g., NSA breach, Uber breach, Tesla breach,
TRUE OR FALSE ?
in an ethical way.
▪ Hacktivists are individuals who perform hacking activities for personal gains.
▪ Gray hat hackers are ethical hackers who make use of unethical ways.
▪ Out of all the attacker types, insider threats cause the biggest damage.
▪ Malware attack
▪ Social engineering
▪ DoS and DDoS
▪ Man in the middle (MITM)
▪ Phishing
▪ Spear Phishing
▪ Ransomware
▪ Injection attacks
▪ Insider threats
▪ Spoofing
▪ Session high jacking
▪ Web attacks
▪ Network attacks
▪ Insider threats
▪ Eavesdropping
▪ Birthday attack
▪ Cross site scripting
▪ Insider threats
Group activity:
95
SECURITY TERMINOLOGIES
AAA
96
SECURITY TERMINOLOGIES
Threats
External threats
❑ Arise from outside the organization
❑ Must bypass the perimeter controls for attack to be successful
❑ Often make use of malware, impersonation, fake job postings, DDOS etc.
Internal threats
❑ Arise from within the organization
❑ Immune to the perimeter controls
❑ Often make use of trust, privilege escalation, social engineering
97
SECURITY TERMINOLOGIES
Due Diligence and Due care
❑ Due Diligence
o Acting like a prudent person
o Taking necessary precautions in a given situation
o E.g., Ensuring password security
❑ Due Care
o Implementation of due diligence
o E.g., using a password manager
98
SECURITY TERMINOLOGIES
Other definitions
99
Vulnerability, Threat
and risk
What is a vulnerability ?
What is a Vulnerability ?
▪ Complexity
▪ Attacker Familiarity
▪ Connectivity
▪ Poor password management
▪ Internet
▪ OS flaws
▪ Software bugs
▪ Unchecked user input
▪ People
What is a threat ?
What is a threat ?
What is a risk ?
What is a risk ?
QUIZ TIME ☺
Use case 1
Use case 2
▪ In 2020, DDOS attacks overwhelmed New Zealand's Exchange (NZX) in 2020.
▪ Exchange of cash, debt, and derivatives halted for most of four days
▪ NZX was vulnerable because it lacked adequate defenses and a response playbook
▪ An attack that shuts down trading at a large and interconnected financial market
exchange could disrupt price information more widely, as well as clearing and
settlement, and trigger a loss of confidence.
Use case 3
▪ In 2020, a nation-state actor inserted malware into a routine update of network
management software sold by SolarWinds, a third-party vendor.
▪ SolarWinds customers, which included large financial institutions, were infected by
the malware when they installed the software update.
▪ The attack opened a backdoor through which attackers could have exploited the
customers' computer systems.
▪ While financial institutions do not appear to have been the intended targets, if they
had been, the outcome for financial stability could have been much worse, as the
attackers reportedly had access to the computer systems for some time