DATA4300 Week 02 Workshop
DATA4300 Week 02 Workshop
WARNING
The material in this communication may be subject to copyright under the Act. Any
further reproduction or communication of this material by you may be the subject of
copyright protection under the Act.
Subtypes are
• Ransomware - data is encrypted by an unauthorised
person and the owner has to pay to get the decryption key
https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/
Review of common cyberattacks 2
Social Engineering = Psychological methods such as fear,
trust, offers of money or services, friendship, etc. are used to
manipulate computer users into action
Subtypes are
https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/
Review of common cyberattacks 3
Denial of Service (DoS) attacks = a “malicious” attack which may overwhelm a
computer network to the point where users are unable to perform normal operations
For example,
• Unable to access email
• Can’t open websites or online accounts
• False requests clog up the network
Similar attack is called a Distributed Denial of Service (DDoS) attack. In this case,
there are many sources (systems) of attack and that makes it more difficult to block
https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/
Activity: Quick Quiz
B. You download a game and realise later that someone has your
personal details
C. You go to work and notice that the network is running slow that not
a lot is happening, memory seems to be used up and you can’t
access Outlook. Your colleagues have the same problem.
Activity: Business Scenario
Suppose that you are working as a new IT project manager at the South Australian
Police Department (SAPOL). The project you have been given is to assess and
improve the cybersecurity as part of SAPOL’s strategic plan.
Take a look at their services and the data they may have, e.g. crime and traffic
statistics, employee data, branch location data, reports and other information.
So you will need to assess what their vulnerabilities are and create a risk mitigation
plan.
How might this be done? What is the right terminology to use in the report of your
plan?
The Cyberattack types we have discussed (Malware, etc) are attack vectors.
Two others include
• weak encryption
• unpatched software (apps with known vulnerabilities)
under CC BY
This Photo by Unknown Author is licensed
• Other common attack vectors will be discussed in TECH2400
https://www.fortinet.com/resources/cyberglossary/attack-surface
Activity: Attack surface and risk mitigation
Can include physical and virtual (digital) devices, i.e. firewalls, PCs, tablets and
laptops, printers
1. The first step in protecting your attack surface is to define and map it
3. Identify all company data storage locations and who currently has permission
to access the data
https://www.fortinet.com/resources/cyberglossary/attack-surface
Activity: Attack surface for SAPOL
– Where might the data, e.g. licence data, criminal stats, details of
crimes/incident, staff payroll data, be stored?
https://www.netwrix.com/information_security_risk_assessment_checklist.html
https://www.netwrix.com/information_security_risk_assessment_checklist.html
Risk mitigation methods
Develop a zero trust framework
Network Segmentation
Train employees
Streamline processes
https://www.fortinet.com/resources/cyberglossary/what-is-the-zero-trust-network-security-model
Zero Trust contd…
• Another way of looking at the problem. Instead of trying to guard
the attack surface, imagine a “protect surface” made up of
https://www.fortinet.com/resources/cyberglossary/what-is-the-zero-trust-network-security-model
Activity: Protect surface assessment
3. What are the most vulnerable assets? This Photo by Unknown Author is
licensed under CC BY-SA-NC
Source: https://www.policechiefmagazine.org/the-emerging-cyberthreat-cybersecurity/
This Photo by
Unknown Author
is licensed under
CC BY-NC-ND
https://www.centerpointit.com/compromised-cops-the-risk-of-poor-police-
cybersecurity/#:~:text=Police%20departments%20store%20sensitive%20crimi
nal,develop%20strategies%20to%20reduce%20crime.
Activity: Potential cybersecurity
threats
Form groups and answer the following with reference to
your SAPOL project
This Photo by Unknown Author is licensed under CC BY-NC This Photo by Unknown Author is licensed under CC
BY-SA
Network Concepts
• Before we explain Network segmentation
concepts, let’s review the idea of networks
https://www.ibm.com/topics/networking#:~:text=It's%20essentially%20any%20network%20device,receive
%20access%20to%20the%20network.
Network Concepts
https://www.ibm.com/topics/networking#:~:text=It's%20essentially%20any%20network%20device,receive%20acc
ess%20to%20the%20network.
Activity: Network Topologies
(shapes)
Typical
arrangements of
computer
networks
• Form pairs
• Networks divided using Virtual Local Area Networks (VLANS) which operate
independently within the larger network (behaves like a switch)
• Software-defined networking
(SDN) segmentation separates
the control functions of the
network (“brains”) from the
infrastructure (switchers and
routers), and applications on the
network
• For example, staff working with the police payroll system, crime
stats data system and infringement notice system, may want to
keep their network traffic and communications isolated.
Source: https://www.policechiefmagazine.org/the-emerging-cyberthreat-cybersecurity/
https://www.cloudflare.com/en-gb/learning/ddos/what-is-a-ddos-attack/
Mitigating a DoS
is licensed under CC BY-SA-NC
This Photo by Unknown Author
Solution 1.
• Blackhole routing: Create a so-called blackhole route and filter the
malicious traffic down that route. This is a simple way to clear the
network.
Solution 2.
• Rate limiting: Limit the number of requests a server can accept over a
specified timeframe, and hence, limit the total traffic on the network
https://www.cloudflare.com/en-gb/learning/ddos/what-is-a-ddos-attack/
Mitigating a DoS contd..
Solution 3.
Web app firewall (WAF): WAF sits between the internet and server,
and therefore acts as a barrier to threats
Solution 4.
Anycast network diffusion: Network traffic is spread across many
servers and so the system absorbs any flood of requests
https://www.cloudflare.com/en-gb/learning/ddos/what-is-a-ddos-attack/
DDoS Cases in 2024
https://www.cloudflare.com/en-gb/learning/ddos/what-is-a-ddos-attack/
https://techmonitor.ai/technology/cybersecurity/biggest-cyberattacks-of-2024
https://cybermagazine.com/articles/ddos-attacks-threatening-operation-of-paris-olympics