Cybersecurity Final

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

HAZARA UNIVERSITY Dr.

Muhammad Asad Khan Modern Telecommunication Systems


1
What is Cybersecurity?
Definition: Cybersecurity encompasses the practices, frameworks, tools, and technologies
to protect systems, networks, and sensitive information from cyber threats.
OR
Cybersecurity is the ongoing effort to protect individuals, organizations and governments
from digital attacks by protecting networked systems and data from unauthorized use or
harm.
Key Domains:
• Network Security
• Application Security
• Cloud Security
• Information Security
• End-User Education
Goal: Achieve a secure digital environment for individuals, businesses, and governments.

Dr. Muhammad Asad Khan 2


Why is Cybersecurity
Important?
1. Modern Dependencies:
• Digital transformation across industries.
• Critical infrastructures like healthcare, energy, and transportation rely on
technology.

2. Potential Damages from Cyberattacks:


• Data breaches (e.g., personal identifiable information theft).
• Financial fraud (costing billions globally).
• Operational disruptions (e.g., ransomware attacks on hospitals).

Key Insight: A single breach can compromise millions of records in seconds.


Dr. Muhammad Asad Khan 3
Common Cyber Threats
1. Malware (Malicious Software):
Includes viruses, worms, trojans, ransomware, and
spyware.
Ransomware is a type of malware which prevents
you from accessing your device and the data
stored on it, usually by encrypting your files.
Example: WannaCry ransomware attack affected
over 150 countries.
2. Phishing:
Fraudulent communication to trick individuals into providing sensitive information.
Example: Fake emails imitating banks or e-commerce platforms.

Dr. Muhammad Asad Khan 4


Common Cyber Threats
3. Denial of Service (DoS) and Distributed DoS (DDoS):
Flooding servers or networks to make them unavailable.
Example: Mirai botnet targeting IoT devices.
4. Insider Threats:
Employees or partners exploiting access to steal data or sabotage operations.
5. Advanced Persistent Threats (APTs):
Prolonged and targeted attacks by sophisticated hackers, often state-sponsored.

Dr. Muhammad Asad Khan 5


Common Cyber Threats
6. Zero-Day Attack: A zero-day attack is a cyber attack that exploits a
software, firmware, or hardware vulnerability that is unknown to the vendor or
antivirus vendors:
How it works: An attacker finds the vulnerability before the vendor can patch
it, creates an exploit, and uses it to launch an attack.

7. Man-in-the-Middle (MitM) Attack: A man-in-the-middle (MITM) attack is


a cyberattack in which a hacker steals sensitive information by eavesdropping
on communications between two online targets such as a user and a web
application.

Dr. Muhammad Asad Khan 6


Common Cyber Threats
8. Social Engineering
• Social engineering is not a cyber attack. Instead, social engineering is all
about the psychology of convincing:
• It targets the mind like your old school grifter or con man.
• The aim is to gain the trust of targets, so they lower their guard and then
encourage them to take unsafe actions such as divulging personal information,
clicking on web links, or opening attachments that may be malicious.

Dr. Muhammad Asad Khan 7


The Core Principles of
Cybersecurity
1. Confidentiality: Ensure only authorized users access
sensitive information.
Tools: Encryption, access controls, and secure
passwords.
2. Integrity: Maintain data accuracy and
trustworthiness.
Tools: Hashing, digital signatures, and backup systems.
3. Availability: Ensure continuous access to
information and systems.
Tools: Redundancy, disaster recovery, and DDoS
protection.

Dr. Muhammad Asad Khan 8


Layers of Cybersecurity
1. Physical Security: Prevent unauthorized physical access to devices and
infrastructure.
Examples: Surveillance cameras, locks, and biometric systems.

2. Network Security: Secure network infrastructure using firewalls, intrusion


detection systems (IDS), and secure VPNs.

3. Application Security: Identify and patch vulnerabilities during development


and deployment.
Example: OWASP top 10 vulnerabilities.

Dr. Muhammad Asad Khan 9


Layers of Cybersecurity
4. Endpoint Security: Protect devices like laptops, smartphones, and tablets.
Example: Antivirus software and endpoint detection tools.

5. Cloud Security: Secure cloud-based resources and comply with regulations


(e.g., GDPR, CCPA).
Tools: Identity management, encryption, and threat monitoring.

Dr. Muhammad Asad Khan 10


How to Stay Safe Online
Personal Cyber Hygiene:
• Use strong, unique passwords and a password manager.
• Avoid oversharing personal information online.
• Verify emails and links before clicking (hover over links to check the URL).
• Regularly update all software and firmware.
• Backup critical files on secure storage.

Dr. Muhammad Asad Khan 11


How to Stay Safe Online
Corporate Cybersecurity Practices:
• Conduct regular employee training to spot phishing and social engineering.
• Implement multi-layered defenses (firewalls, monitoring systems).
• Test incident response plans through tabletop exercises.
• Invest in endpoint protection, SIEM (Security Information and Event
Management), and Zero Trust models.

Dr. Muhammad Asad Khan 12


Real-World Cybersecurity
Cases
Case Study 1: WannaCry Ransomware (2017)
Impact: Over 200,000 computers across 150 countries affected, targeting
healthcare, logistics, and government agencies.
Lesson: Importance of patching vulnerabilities (EternalBlue exploit).
Case Study 2: SolarWinds Supply Chain Attack (2020)
Impact: Breach in SolarWinds’ Orion software affecting thousands of
organizations, including governments and Fortune 500 companies.
Lesson: Secure software supply chains and monitor vendor trustworthiness.

Dr. Muhammad Asad Khan 13


Real-World Cybersecurity
Cases
Case Study 3: Colonial Pipeline Ransomware (2021)
Impact: Shutdown of the largest fuel pipeline in the U.S., causing fuel
shortages.
Lesson: Critical infrastructure needs robust cybersecurity protections.

Dr. Muhammad Asad Khan 14


Careers in Cybersecurity
• Cybersecurity Analyst: Monitor and respond to threats.
• Penetration Tester (Ethical Hacker): Identify vulnerabilities by mimicking
attackers.
• Incident Responder: Manage and recover from cyber incidents.
• Security Architect: Design robust security frameworks.
• Governance, Risk, and Compliance Analyst: Ensure adherence to regulations like
GDPR or CCPA.
Required Skills:
• Technical knowledge (e.g., networking, programming, and cryptography).
• Soft skills (e.g., problem-solving and communication).
• Certifications: CISSP, CEH, CISM, CompTIA Security+.

Dr. Muhammad Asad Khan 15

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy