Lecture 1 - Security Fundamentals, Threats, Attacks and Vulnerability
Lecture 1 - Security Fundamentals, Threats, Attacks and Vulnerability
• Algoma University respectfully acknowledges that its three campuses are located on the inherent and treaty lands of First Nations and within
traditional lands of Indigenous peoples. For thousands of years, Indigenous peoples inhabited and cared for this land, and continue to do so today.
• The Sault Ste. Marie campus is located in an area known as Baawaating on sacred lands set aside for education as envisioned by Chief Shingwauk
for our children and for those as yet unborn.
• Located in Robinson-Huron Treaty territory, this land is the traditional territory of the Anishinaabek, specifically the Garden River and
Batchewana First Nations, as well as Métis People. Sault Ste. Marie is also home to several urban Indigenous peoples.
• We also acknowledge that; Brampton campus is part of Treaty Lands and Territory of the Mississaugas of the Credit.
• In particular we acknowledge the territory of the Anishinabeg particularly the, Huron-Wendat, Haudenosaunee and Ojibway/ Chippewa peoples;
the land that is home to the Métis; and most recently, the territory of the Mississaugas of the Credit First Nation who are direct descendants of the
Mississaugas of the Credit.
• We also acknowledge that; Timmins campus is located on Treaty #9 territory, also known as the James Bay Treaty.
• It is the traditional territory of the Ojibwe/Chippewa, including the Mattagami First Nation, as well as the Mushkegowuk Cree), Algonquin, and
Métis Peoples
Equity, Diversity, Inclusion
https://algomau.ca/about/equity-diversity-and-inclusion/
Course Slides Acknowledgement
The slides of this course were originally prepared by Dr. Samuel Faloye at Brampton
Campus of Algoma University and adopted for this course
Module Objectives
1 2 3 4
1.Define 2. Identify threat 3. Describe the 4. Explain the
information security actors and their different types of impact of attacks
and explain why it attributes vulnerabilities and
is important attacks
What is Information Security?
Enterprises
Governments
Competitors Launch attacks against an opponent’s system May steal new product research or a list
to steal classified information. of current customers to gain a competitive
advantage.
Criminal Move from traditional criminal activities to Usually run by a small number of
syndicates more rewarding and less risky online attacks. experienced online criminal networks that
do not commit crimes themselves but act as
entrepreneurs.
Cyberterrorists Attack a nation’s network and computer Targets may include a small group of
infrastructure to cause disruption and panic computers or networks that can affect
among citizens. the largest number of users, such as the
computers that control the electrical power
grid of a state or region.
Vulnerabilities and Attacks
Social engineering
does not even
exploit technology
vulnerabilities
A vulnerability is the state of being exposed to the
possibility of being attacked or harmed
Cybersecurity vulnerabilities can be categorized into
platforms, configurations, third parties, patches, and
zero-day vulnerabilities
Platforms
A computer platform is a system that consists of
the hardware device and an OS that runs software
Vulnerabilities All platforms have vulnerabilities to some degree,
some platforms have serious vulnerabilities
including:
Legacy platforms
On-premises platforms
Cloud platforms
• Configuration settings are often not properly
implemented
• Results in weak configurations
Vulnerabilities
Third Parties
Almost all businesses use external entities
known as third parties
Examples of third parties include:
outsourced code development, data storage
facilities
Vendor management is the process
organizations use to monitor and manage the
Vulnerabilities interactions with all of their external third
parties
Connectivity between the organization and
the third party is known as system
integration
One of the major risks of third-party system
integration involves the principle of the
weakest link
Vulnerabilities
Smishing
Social engineering
Impacts of loss)
This results in lost productivity (financial loss)
Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of
cloud computing for government adoption: a systematic review. International Journal of
Information Security, 1-17.
Ali, A. S., Zaaba, Z. F., & Singh, M. M. (2024). The rise of “security and privacy”:
bibliometric analysis of computer privacy research. International Journal of Information
Security, 23(2), 863-885.
Farayola, O. A., Olorunfemi, O. L., & Shoetan, P. O. (2024). Data privacy and security in IT: a
review of techniques and challenges. Computer Science & IT Research Journal, 5(3), 606-615.