Cyber Security Introduction - II
Cyber Security Introduction - II
Cyber Security Introduction - II
to
Cyber Security
Introduction
2
To Understand
What is the
What is the need of
meaning of the
Cyber Security
word CYBER
3
Meaning of the Word “Cyber”
It is a combining form
relating to information
technology, the internet and
virtual reality.
4
Cyber Crime
Cyber Crimes are, as the name implies, crimes
committed using computers, phones or the internet.
5
Cyber Security Kill Chain, Zero-
day attack,
ransomware, alert
Cyber Security is the body of technologies, fatigue and Man-
in the middle
processes and practices involved in protecting attack are just a
few examples of
individuals and organizations from cyber crime. common cyber
attacks.
6
Need of Cyber Security
7
ASSESSMENT/EVALUATION
8
Personal Data
Personal Data
• Offline Identity
Your identity that interacts on a regular basis at home,
school or work.
this is how we act, in physical reality, around people;
what information we tell and to who.
• Online Identity
Your identity while you are in cyberspace.
Also called digital or internet identity, is a social
identity that an internet user establishes over the
internet e.g. Username
o Should not include any personal information
o Should be appropriate and respectful and Should not attract
unwanted attention
10
Your Data
11
Personal Data as a Target
How do the criminals get your money?
• Online credentials
Gives thieves access to your accounts
• Creative schemes
Trick into wiring money to your friends or family
Why do they want your identity?
• Long-term profits
• Medical benefits
• File a fake tax return
• Open credit card accounts
• Obtain loans
12
Protecting Your
Personal Data
Protecting Your Computing Devices
Keep the Firewall On
• Prevent unauthorized access to your data or computing
devices
• Keep the firewall up to date
14
Protecting Your Computing Devices
Manage Your Operating System and Browser
• Set the security settings at medium or higher
• Update your computer’s operating system and browser
• Download and install the latest software patches
and security updates
information be secure.
17
Major Security
Problems
Major Security Problems
Virus
Hacker
Malware
Trojan Horses
Password Cracking
19
Viruses and Worms
20
Solution
worms
21
Solution – Security Suites/Antivirus
22
Hackers
In common, a Hacker is a
person who breaks into
computers, usually by
gaining access to
administrative controls.
23
Types of Hackers
24
Types of Hackers
White Hat Hacker: break into system with
permission to discover weaknesses so that the
security of these systems can be improved.
27
Malware
28
Types of Malware
Worms
Rootkits Spyware
Trojans Crimeware
29
Symptoms of Malware
Presence of unknown files,
An increase in CPU usage.
programs, or desktop icons.
Decrease in computer speed.
Unknown processes running.
The computer freezes or
Programs turning off or
crashes often.
reconfiguring themselves.
Decrease in browsing speed. Email is being sent without
Unexplainable problems with the user’s knowledge or
consent.
network connections.
30
To Stop Malware
31
Trojan Horses
32
How to Avoid Trojans
33
Password Cracking
Password attacks are by hackers that are able to
determine passwords or find passwords to
different protected electronic areas and social
network sites.
34
Securing Password
Always use Strong Password
Never use same password for two different
passwords.
www.security.org/how-secure-is-my-password/
35
Securing Password
Tips in choosing a good passphrase:
• Choose a meaningful statement to you
• Add special characters, such as ! @ # $ % ^ & * ( )
• The longer the better
• Avoid common or famous statements, for example, lyrics from
a popular song
36
37
Cyber Security Counter Measures
Audit regularly
Awareness to staff
Firewalls
38
Cyber Security Strategy - India
Security Policy, Legal Framework
IT Act, 2000
IT (Amendment) Bill, 2006 Data Protection & Computer
Crimes
Capacity Building
Skill & Competence Development
International Collaboration
39
40
41
ASSESSMENT/EVALUATION
Mention any five (5) Major Security Problems
42
Cyber Security
Principles
Cyber Security Principles
• Confidentiality
• Integrity
• Availability
• Accountability
• Auditability
44
Cyber Security Principle
Definitions
Confidentiality:
A set of rules that limits access or place restrictions
on certain type of information.
Integrity:
Assurance that the information is trustworthy and
accurate.
Availability:
The guarantee of reliable access to the information
by authorized people.
45
Cyber Security Principle
Definitions
Accountability:
Is an assurance that an individual or an organization
will be evaluated on their performance or behaviour
related to something for which they are responsible.
Auditability:
A security audit is a systematic evaluation of the
security of a company’s information system by
measuring how well it conforms to a set of
established criteria.
46
Cyber Threats
Cyber Threat
A Cyber threat is any malicious act that attempts to gain
access to a computer network without authorization or
permission from the owners.
Rogue employees.
49
Cyber Threat Classifications
Threats can be classified by multiple criteria:
Attacker's Resources
Attacker's Organization
Attacker's Funding
50
Unstructured Cyber Threats
Resources: Individual or small group.
Funding: Negligible.
51
Structured Cyber Threats
Resources: Well trained individual or group.
Funding: Available.
52
Highly Structured Cyber Threats
53
Cyber Security Threat Index Level
54
ASSESSMENT/EVALUATION
55
Cyber Security Attackers,
Professionals, Criminals &
Specialists
Cyber Attackers & Cyber Security
Professionals
Cyber Attackers are individuals or organizations who
perform malicious activities to destroy, expose, alter,
steal, or gain unauthorized access to assets.
57
Cyber Security Criminals
A Cyber Criminal is a person who conducts some form of illegal
activity using computers or other digital technology such as the
Internet. The criminal may use computer expertise, knowledge of
human behavior, and a variety of tools and services to achieve his
or her goal.
59
Cyber Warfare & Cyber
War
Cyber Warfare and Its Purpose
Cyberwarfare is the use of cyber attacks against an
enemy state, causing comparable harm to actual
warfare and/or disrupting vital computer systems.
61
A crucial example of this is
the STUXNET malware.
62
Purpose of Cyber Warfare
The main purpose of cyber warfare is to gain advantage
over adversaries, nations, or competitors by
compromising their systems. However, reasons and
motivations for cyber warfare runs deeper:
64
Purpose of Cyber Warfare
Income Generation: Cyber warfare “soldiers” can engage in
these kinds of attacks for their own financial benefit. If they
are employed by the government, they can earn a fee for
their services. Further, they could break the defenses of a
financial institution and steal money for themselves.
65
ASSESSMENT/EVALUATION
Differentiate between Cyber Attacker and
Cyber Security Professional?
66
Cyber Attacks
Types of Cyber Attacks
• Backdoor:
• Method of bypassing normal authentication and
gaining access in OS or application.
68
Types of Cyber Attacks Continued
• Buffer Overflow:
• An exploit that takes advantage of the program that
is waiting for a user’s input.
• Man-in-the-middle Attack
• This attack intercepts and relays messages
between two parties who are communicating
directly with each other.
69
Types of Cyber Attacks Continued
70
Types of Cyber Attacks Continued
• SQL Injection:
• A very common exploited web application
vulnerability that allows malicious hacker to steal
and alter data in website’s database.
• `
• Zero-day Exploit:
• A vulnerability in a system or device that has been
disclosed but is not yet patched.
71
Impacts of Cyber Attacks
72
ASSESSMENT/EVALUATION
Mention any four Cyber Attack & Briefly Explain
two (2) of them.
73
Malicious Code
Types of Malicious Code
• Virus:
• Malicious software program, when it is executed, it
replicates itself by modifying other computer
programs and inserting its own code.
• Network Worm:
• Standalone malware which replicates itself in order
to spread to other computers.
75
Types of Malicious Code
Continued
• Trojan Horse:
• A program that claims to free your computer from
viruses but instead introduces viruses onto your
system.
• Botnet:
• Used to perform distributed denial-of-service attack
(DDoS attack), steal data, send spam, and allow the
attacker access to the device and its connection.
76
Types of Malicious Code
Continued
• Keylogger:
• A type of surveillance technology used to monitor
and record each keystroke typed on specific
computer’s keyboard.
• Rootkit:
• Collection of tools or programs that enable
administrator-level access to computer or computer
network.
77
Types of Malicious Code
Continued
• Spyware:
• Software that is hidden from the user in order to
gather information about internet interaction,
keystrokes, passwords, and other valuable data.
• Adware:
• Designed to display advertisements on your computer
and redirect your search requests to advertising
websites to collect marketing data about you.
78
Types of Malicious Code
Continued
• Ransomware:
• Malware that prevents or limits users from
accessing their system, either by locking the
system’s screen or by locking the user’s files unless
a ransom is paid.
79
Vulnerabilities
What is a Vulnerability?
1. A flaw in system.
2. Access of attacker to that flaw.
3. Capability of attacker to exploit the flaw.
81
Classification of Vulnerabilities
82
Causes of Vulnerabilities
83
ASSESSMENT/EVALUATION
Mention any five (5) types of Malicious Code
you know and briefly explain three (3).
What is Vulnerability?
84
Safeguarding Your
Online Privacy
Two Factor Authentication
86
OAuth 2.0
87
Do Not Share Too Much on Social
Media
Share as little information as possible on social media
88
Email and Web Browser Privacy
Email is like sending a postcard.
Copies of the email can be read by anyone with access.
The email is passed among different servers
Using private browsing mode can prevent others from
gathering information about your online activities.
Private mode on popular browser
Microsoft Internet Explorer: InPrivate
Google Chrome: Incognito
Mozilla Firefox: Private tab / private window
Safari: Private: Private browsing
89
Protecting the
Organization
Firewall & Types of Firewall
Firewalls control or filter incoming or outgoing communications on a
network or device. Below are common types of firewall:
Network Layer Firewall: source and destination IP addresses
Transport Layer Firewall: source and destination data ports,
connection states
Application Layer Firewall: application, program or service
Context Aware Application Firewall: user, device, role, application
type, and threat profile
Proxy Server: web content requests
Reverse Proxy Server: protect, hide, offload, and distribute access
to web servers
Network Address Translation (NAT) Firewall: hides or
masquerades the private addresses of network hosts
Host-based Firewall: filtering of ports and system
service calls on a single computer operating system.
91
Security Appliances
Security appliances fall into these general categories:
• Routers - can have many firewall capabilities:
traffic filtering, IPS, encryption, and VPN.
• Firewalls – may also have router capability,
advanced network management and analytics.
• IPS - dedicated to intrusion prevention.
• VPN - designed for secure encrypted tunneling.
• Malware/Antivirus - Cisco Advanced Malware Protection (AMP)
comes in next generation Cisco routers, firewalls, IPS devices,
Web and Email Security Appliances and can also be installed as
software in host computers.
• Other Security Devices – includes web and email security
appliances, decryption devices, client access
control servers, and security management systems.
92
Legal Issues in Cybersecurity
Personal Legal Issues
Be responsible with your skills
93
Cybersecurity Jobs
Some online job search engine
• ITJobMatch
• Monster
• CareerBuilder
Different types of cybersecurity jobs
• Penetration testing / ethical hacker
• Security administrator
• Network administrator
• System administrator
94
95