CO1 Session1
CO1 Session1
CO1 Session1
CS801C
CONTENTS
2
INTRODUCTION
Cybersecurity Analytics involves aggregating data for the purpose of collecting evidence,
building timelines, and analyzing capabilities to perform and design a proactive cybersecurity
strategy that detects, analyzes, and mitigates cyberthreats.
3
INTRODUCTION (Contd…)
In today's interconnected world, cyber security has become more and more important as
more and more information is being stored and transmitted digitally. As a result, cyber-
attacks have also become more common.
5
IMPORTANCE OF CYBER SECURITY
6
CHALLENGES OF CYBER SECURITY
3. Limited Budgets
4. Insider Threats
5. Complexity of Technology
7
TYPES OF CYBER SECURITY THREATS
1. Malware attack
Attacks use many methods to get malware into a user’s device, most often social engineering. Users may
be asked to take an action, such as clicking a link or opening an attachment.
• Trojan virus
• Ransomware
• Wiper malware
• Worms
TYPES OF CYBER SECURITY THREATS
Social engineering attacks work by psychologically manipulating users into performing actions
desirable to an attacker, or divulging sensitive information.
• Phishing
• Malvertising
• Drive-by downloads
The objective of a denial of service (DoS) attack is to overwhelm the resources of a target system and
cause it to stop functioning, denying access to its users. Distributed denial of service (DDoS) is a
variant of DoS in which attackers compromise a large number of computers or other devices, and use
them in a coordinated attack against the target system.
• Botnet
• Smurf attack
TYPES OF CYBER SECURITY THREATS
When users or devices access a remote system over the internet, they assume they are communicating
directly with the server of the target system. In a MitM attack, attackers break this assumption, placing
themselves in between the user and the target server.
• Session hijacking
• Replay attack
• IP spoofing
• Bluetooth attacks
TYPES OF CYBER SECURITY THREATS
5. Password attacks
A hacker can gain access to the password information of an individual by ‘sniffing’ the connection to the
network, using social engineering, guessing, or gaining access to a password database. An attacker can
‘guess’ a password in a random or systematic way.
• Dictionary attack
• Pass-the-hash attack
1. Network Security
Focuses on securing computer networks from unauthorized access, data breaches, and other
network-based threats. It involves technologies such as:
14
TYPES OF CYBER SECURITY
b) Passive attack: In a passive attack, the intruder intercepts data that travels through the
network. Here, the intruder eavesdrops but does not alter the message.
15
TYPES OF CYBER SECURITY
2. Application Security
Concerned with securing software applications and preventing vulnerabilities that could be
exploited by attackers. It involves secure coding practices, regular software updates and patches,
and application-level firewalls.
Most of the Apps that we use
on our Cell-phone are Secured
and work under the rules and
regulations of the Google Play
Store.
16
TYPES OF CYBER SECURITY
17
TYPES OF CYBER SECURITY
4. Cloud Security
It involves securing data, applications, and infrastructure hosted on cloud platforms, and ensuring
appropriate access controls, data protection, and compliance. It uses various cloud service
providers such as AWS, Azure, Google Cloud, etc., to ensure security against multiple threats.
18
TYPES OF CYBER SECURITY
5. Mobile Security
It involves securing the organizational and personal data stored on mobile devices such as cell phones,
tablets, and other similar devices against various malicious threats. These threats are Unauthorized
access, Device loss or Theft, Malware, etc.
19
TYPES OF CYBER SECURITY
6. Internet of Things (IoT) Security
Devices frequently run on old software, leaving them vulnerable to recently identified security
vulnerabilities. This is generally the result of connectivity problems or the requirement for end users to
manually download updates from a C&C center.
20
SUMMARY
Cybersecurity is an essential part of our digital lives, protecting our personal and professional
assets from cyber threats. By understanding the types of cyber threats, taking proactive steps to
protect yourself, and staying informed about the latest best practices, you can help ensure the
safety and security of your digital assets. This Chapter contains the topics of introduction of
cyber security, overview, Importance and challenges of cyber security, Types of Cyber Security,
Cyber security threats and protection.
21
SELF-ASSESSMENT QUESTIONS
22
TERMINAL QUESTIONS
5. Why cyber security? Give a brief overview of cyber security with CIA triad?
23
REFERENCES FOR FURTHER LEARNING OF THE SESSION
Reference Books
1.Cyber security analytics: Technology and Automation – Martti Lehto, Pekka Neittaanmaki –
2015 (e-Book edition :1)
2.Information Security Analytics: Finding security insights, Patterns, Anomalies in Big data –
Mark Talabis, Jason Martin, Robert McPherson – 2014 (e-Book edition :1).
3.Advances In Cyber Security Analytics and Decision System - Shishir K. Shandilya, Neal
Wagner, Atulya K. Nagar ꞏ 2020 (e-Book edition :1).
4.Mastering Your Introduction to Cyber Security Paperback – by Dr Michael C Redmond Phd.
5.Cyber Security: A practitioner's guide Paperback – by David Sutton
24
THANK YOU
25