Intro To Cybersecurity

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

INTRODUCTION

TO
CYBERSECURITY

Dr. M. Sujithra
Coimbatore Institute of Technology
Coimbatore, Tamilnadu
Cyber Security

• Cyber security is the body of


technologies, processes and
practices involved in protecting
individuals and organizations
from cyber crime.

• It is designed to protect integrity


of networks, computers,
programs and data from attack,
damage or unauthorized access.
Cyber Security Principles
There are five key principles in cyber security:

• Confidentiality

• Integrity

• Availability

• Accountability

• Auditability.
Cyber Threat

• A Cyber threat is any malicious act that attempts


to gain access to a computer network without
authorization or permission from the owners.
• It refers to the wide range of malicious activities
that can damage or disrupt a computer system,
a network or the information it contain.
• Most common cyber threats: Social Engineered
Trojans, Unpatched Software, Phishing, Network
worms, etc.
Sources of Cyber Threat

Cyber threats can come from a wide variety of sources, some


notable examples include:
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
Cyber Threat Classifications

Threats can be classified by multiple criteria:


• Attacker's Resources
• Attacker's Organization
• Attacker's Funding

On basis of these criteria, threats are of 3 types:


• Unstructured Threats
• Structured Threats
• Highly Structured threats
Types of Cyber Threat:

Threats can be classified by multiple criteria:


Advanced Persistent Threat (APT):
• A network attack in which an unauthorized person gains access
to network and stays there undetected for a long period of
time.

Backdoor:
• Method of bypassing normal authentication and gaining access
in OS or application
Types of Cyber Threat:

Buffer Overflow:
• An exploit that takes advantage of the program that is waiting
for a user's input.

Man-in-the-middle Attack
• This attack intercepts and relays messages between two
parties who are communicating directly with each other.
Types of Cyber Threat:

Cross-Site Scripting (XSS):


• A code injection attack that allows an attacker to execute
malicious JavaScript in another user's browser.

Denial of Service Attack:


• Any attack where the attackers attempt to prevent the
authorized users from accessing the service.
Impacts of Cyber Attacks

A successful cyber attack can cause major damage to


organizations or systems, as well as to business reputation and
consumer trust.

• Some potential results include:


• Financial loss.
• Reputational damage.
• Legal consequences.
Vulnerability

What is a Vulnerability?
A cyber-security term that refers to a flaw in a system that can
leave it open to attack.

Vulnerability is the composition of three elements:

1. A flaw in system.
2. Access of attacker to that flaw.
3. Capability of attacker to exploit the flaw
Classification of Vulnerability

Vulnerabilities are classified according to the asset:

• Hardware.
• Software.
• Network.
• Personal.
• Physical site.
• Organizational.
CYBERATTACK INCIDENT

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy