Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 15
HAZARA UNIVERSITY Dr.
Muhammad Asad Khan Modern Telecommunication Systems
1 What is Cybersecurity? Definition: Cybersecurity encompasses the practices, frameworks, tools, and technologies to protect systems, networks, and sensitive information from cyber threats. OR Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems and data from unauthorized use or harm. Key Domains: • Network Security • Application Security • Cloud Security • Information Security • End-User Education Goal: Achieve a secure digital environment for individuals, businesses, and governments.
Dr. Muhammad Asad Khan 2
Why is Cybersecurity Important? 1. Modern Dependencies: • Digital transformation across industries. • Critical infrastructures like healthcare, energy, and transportation rely on technology.
2. Potential Damages from Cyberattacks:
• Data breaches (e.g., personal identifiable information theft). • Financial fraud (costing billions globally). • Operational disruptions (e.g., ransomware attacks on hospitals).
Key Insight: A single breach can compromise millions of records in seconds.
Dr. Muhammad Asad Khan 3 Common Cyber Threats 1. Malware (Malicious Software): Includes viruses, worms, trojans, ransomware, and spyware. Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. Example: WannaCry ransomware attack affected over 150 countries. 2. Phishing: Fraudulent communication to trick individuals into providing sensitive information. Example: Fake emails imitating banks or e-commerce platforms.
Dr. Muhammad Asad Khan 4
Common Cyber Threats 3. Denial of Service (DoS) and Distributed DoS (DDoS): Flooding servers or networks to make them unavailable. Example: Mirai botnet targeting IoT devices. 4. Insider Threats: Employees or partners exploiting access to steal data or sabotage operations. 5. Advanced Persistent Threats (APTs): Prolonged and targeted attacks by sophisticated hackers, often state-sponsored.
Dr. Muhammad Asad Khan 5
Common Cyber Threats 6. Zero-Day Attack: A zero-day attack is a cyber attack that exploits a software, firmware, or hardware vulnerability that is unknown to the vendor or antivirus vendors: How it works: An attacker finds the vulnerability before the vendor can patch it, creates an exploit, and uses it to launch an attack.
7. Man-in-the-Middle (MitM) Attack: A man-in-the-middle (MITM) attack is
a cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets such as a user and a web application.
Dr. Muhammad Asad Khan 6
Common Cyber Threats 8. Social Engineering • Social engineering is not a cyber attack. Instead, social engineering is all about the psychology of convincing: • It targets the mind like your old school grifter or con man. • The aim is to gain the trust of targets, so they lower their guard and then encourage them to take unsafe actions such as divulging personal information, clicking on web links, or opening attachments that may be malicious.
Dr. Muhammad Asad Khan 7
The Core Principles of Cybersecurity 1. Confidentiality: Ensure only authorized users access sensitive information. Tools: Encryption, access controls, and secure passwords. 2. Integrity: Maintain data accuracy and trustworthiness. Tools: Hashing, digital signatures, and backup systems. 3. Availability: Ensure continuous access to information and systems. Tools: Redundancy, disaster recovery, and DDoS protection.
Dr. Muhammad Asad Khan 8
Layers of Cybersecurity 1. Physical Security: Prevent unauthorized physical access to devices and infrastructure. Examples: Surveillance cameras, locks, and biometric systems.
2. Network Security: Secure network infrastructure using firewalls, intrusion
detection systems (IDS), and secure VPNs.
3. Application Security: Identify and patch vulnerabilities during development
and deployment. Example: OWASP top 10 vulnerabilities.
Dr. Muhammad Asad Khan 9
Layers of Cybersecurity 4. Endpoint Security: Protect devices like laptops, smartphones, and tablets. Example: Antivirus software and endpoint detection tools.
5. Cloud Security: Secure cloud-based resources and comply with regulations
(e.g., GDPR, CCPA). Tools: Identity management, encryption, and threat monitoring.
Dr. Muhammad Asad Khan 10
How to Stay Safe Online Personal Cyber Hygiene: • Use strong, unique passwords and a password manager. • Avoid oversharing personal information online. • Verify emails and links before clicking (hover over links to check the URL). • Regularly update all software and firmware. • Backup critical files on secure storage.
Dr. Muhammad Asad Khan 11
How to Stay Safe Online Corporate Cybersecurity Practices: • Conduct regular employee training to spot phishing and social engineering. • Implement multi-layered defenses (firewalls, monitoring systems). • Test incident response plans through tabletop exercises. • Invest in endpoint protection, SIEM (Security Information and Event Management), and Zero Trust models.
Dr. Muhammad Asad Khan 12
Real-World Cybersecurity Cases Case Study 1: WannaCry Ransomware (2017) Impact: Over 200,000 computers across 150 countries affected, targeting healthcare, logistics, and government agencies. Lesson: Importance of patching vulnerabilities (EternalBlue exploit). Case Study 2: SolarWinds Supply Chain Attack (2020) Impact: Breach in SolarWinds’ Orion software affecting thousands of organizations, including governments and Fortune 500 companies. Lesson: Secure software supply chains and monitor vendor trustworthiness.
Dr. Muhammad Asad Khan 13
Real-World Cybersecurity Cases Case Study 3: Colonial Pipeline Ransomware (2021) Impact: Shutdown of the largest fuel pipeline in the U.S., causing fuel shortages. Lesson: Critical infrastructure needs robust cybersecurity protections.
Dr. Muhammad Asad Khan 14
Careers in Cybersecurity • Cybersecurity Analyst: Monitor and respond to threats. • Penetration Tester (Ethical Hacker): Identify vulnerabilities by mimicking attackers. • Incident Responder: Manage and recover from cyber incidents. • Security Architect: Design robust security frameworks. • Governance, Risk, and Compliance Analyst: Ensure adherence to regulations like GDPR or CCPA. Required Skills: • Technical knowledge (e.g., networking, programming, and cryptography). • Soft skills (e.g., problem-solving and communication). • Certifications: CISSP, CEH, CISM, CompTIA Security+.