What Is Cyber Security
What Is Cyber Security
to Cyber Security
SPRING-2021
What is Cybersecurity?
• Cyber security refers to the body of technologies, processes,
and practices designed to protect networks, devices, programs,
and data from attack, damage, or unauthorized access. Cyber
security may also be referred to as information technology
security.
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can
be divided into a few common categories.
Why Cybersecurity is Important?
• Our world today is ruled by technology and we can’t do without it at
all. From booking our flight tickets, to catching up with an old friend,
technology plays an important role in it.
• However, the same technology may expose you when it’s vulnerable
and could lead to loss of essential data. Cyber security, alongside
physical commercial security has thus, slowly and steadily, become
one of the most important topics in the business industry to be
talked about.
Why Cybersecurity is Important?
• Cyber security is necessary since it helps in securing data from
threats such as data theft or misuse, also safeguards your system
from viruses.
• Cyber security becomes important as Business are being carried
now on Network of Networks. Computer networks have always been
the target of criminals, and it is likely that the danger of cyber
security breaches will only increase in the future as these networks
expand, but there are sensible precautions that organizations can take
to minimize losses from those who seek to do harm.
CHALLENGES OF CYBER SECURITY
• For an effective cyber security, an organization needs to coordinate its
efforts throughout its entire information system. Elements of cyber
encompass all of the following:
1. Network security: The process of protecting the network from
unwanted users, attacks and intrusions.
2. Application security: Apps require constant updates and testing to
ensure these programs are secure from attacks.
3. Endpoint security: Remote access is a necessary part of business,
but can also be a weak point for data. Endpoint security is the process of
protecting remote access to a company’s network.
4. Data security: Inside of networks and applications is data. Protecting
company and customer information is a separate layer of security.
5. Identity management: Essentially, this is a process of understanding the
access every individual has in an organization.
6.Database and infrastructure security: Everything in a network involves
databases and physical equipment. Protecting these devices is equally
important.
7.Cloud security: Many files are in digital environments or “the cloud”.
Protecting data in a 100% online environment presents a large amount of
challenges.
9. Mobile security: Cell phones and tablets involve virtually
every type of security challenge in and of themselves.
10. Disaster recovery/business continuity planning: In the
event of a breach, natural disaster or other event data must be
protected and business must go on. For this, you’ll need a plan.
End-user education: Users may be employees accessing the
network or customers logging on to a company app. Educating
good habits (password changes, 2-factor authentication, etc.) is
an important part of cybersecurity.
Categories
1. Network security is the practice of securing a computer network
from intruders, whether targeted attackers or opportunistic malware.
2. Application security focuses on keeping software and devices free
of threats. A compromised application could provide access to the
data its designed to protect. Successful security begins in the design
stage, well before a program or device is deployed.
3. Information security protects the integrity and privacy of data,
both in storage and in transit.
4. Operational security includes the processes and decisions for
handling and protecting data assets. The permissions users have
when accessing a network and the procedures that determine how
and where data may be stored or shared all fall under this umbrella.
5. Disaster recovery and business continuity define how an
organization responds to a cyber-security incident or any other event that
causes the loss of operations or data. Disaster recovery policies dictate how
the organization restores its operations and information to return to the
same operating capacity as before the event. Business continuity is the
plan the organization falls back on while trying to operate without certain
resources.
6. End-user education addresses the most unpredictable cyber-security
factor: people. Anyone can accidentally introduce a virus to an otherwise
secure system by failing to follow good security practices. Teaching users to
delete suspicious email attachments, not plug in unidentified USB drives,
and various other important lessons is vital for the security of any
organization.
What is cyber security?
• Cyber security can be described as the collective methods, technologies, and
processes to help protect the confidentiality, integrity, and availability of
computer systems, networks and data, against cyber-attacks or unauthorized
access. The main purpose of cyber security is to protect all organizational
assets from both external and internal threats as well as disruptions caused due
to natural disasters.
• As organizational assets are made up of multiple disparate systems, an
effective and efficient cyber security posture requires coordinated efforts
across all its information systems. Therefore, cyber security is made up of the
following sub-domains:
Sub-domains:
1. Application security involves implementing various defenses within all
software and services used within an organization against a wide range of
threats. It requires designing secure application architectures, writing
secure code, implementing strong data input validation, threat modeling,
etc. to minimize the likelihood of any unauthorized access or modification
of application resources.
2. Identity management includes frameworks, processes, and activities that
enables authentication and authorization of legitimate individuals to
information systems within an organization. Data security involves
implementing strong information storage mechanisms that ensure security
of data at rest and in transit.
3. Network security involves implementing both hardware and software
mechanisms to protect the network and infrastructure from unauthorized
access, disruptions, and misuse. Effective network security helps protect
organizational assets against multiple external and internal threats.
4. Mobile security refers to protecting both organizational and personal
information stored on mobile devices like cell phones, laptops, tablets, etc.
from various threats such as unauthorized access, device loss or theft, malware,
etc.
5. Cloud security relates to designing secure cloud architectures and
applications for organization using various cloud service providers such as
AWS, Google, Azure, Rackspace, etc. Effective architecture and environment
configuration ensures protection against various threats.
6. Disaster recovery and business continuity planning (DR&BC) deals with
processes, monitoring, alerts and plans that help organizations prepare for
keeping business critical systems online during and after any kind of a disaster
as well as resuming lost operations and systems after an incident.
7. User education formally
training individuals regarding topics on computer security is essential in raising
awareness about industry best practices, organizational procedures and policies
as well as monitoring and reporting malicious activities.
What are the benefits of cybersecurity?
• The benefits of implementing and maintaining cybersecurity
practices include:
• Business protection against cyberattacks and data breaches.
• Protection for data and networks.
• Prevention of unauthorized user access.
• Improved recovery time after a breach.
• Protection for end users and endpoint devices.
• Regulatory compliance.
• Business continuity.
• Improved confidence in the company's reputation and trust for
developers, partners, customers, stakeholders and employees.
What is a cyber-attack?
• A cyber-attack is a deliberate attempt by external or
internal threats or attackers to exploit and compromise
the confidentiality, integrity and availability of
information systems of a target organization or
individual(s). Cyber-attackers use illegal methods, tools
and approaches to cause damages and disruptions or gain
unauthorized access to computers, devices, networks,
applications and databases.
Types of cyber threats
• The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial
gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic
or fear.
So, how do malicious actors gain control of computer systems? Here are some
common methods used to threaten cyber-security:
Cyber Threats
1. Malware:
Malware means malicious software. One of the most common cyber
threats, malware is software that a cybercriminal or hacker has created
to disrupt or damage a legitimate user’s computer. Often spread via an
unsolicited email attachment or legitimate-looking download, malware
may be used by cybercriminals to make money or in politically
motivated cyber-attacks.
• Malware refers to any unwanted software and executable code used to
perform an unauthorized, often harmful, action on a computing device
2. Advanced Persistent Threats
• The advanced persistent threats are those threats that go the stealthy way
around to penetrate systems and servers and stays there for a longer time
without getting noticed/detected by anybody.
• They are designed specially to mine highly sensitive information and these
days many organizations fail to protect themselves from advanced persistent
threat attacks.
• The APTs are not like typical malware, they are designed specially to serve a
purpose, and in other words, they are being made for targeted attacks. Below is
one depicted lifecycle of advanced persistent threat.
• Ransomware can also be classified as one type of APT attacks where a malware penetrates inside
your system, and as the days pass, it starts to encrypt all of your files slowly.
History of Malwares – Past & Present
First virus launched more than three decades ago
– It used to be a display of programming skills in old golden days
Today’s threats are not only complex but easy to launch
– Partially due to a wide variety of diverse attackers
• Politically or financially motivated
– And partially due to explosion of Internet
Malicious code might be:
– embedded in an email, injected into fake software packs, Fake AV, placed on a
web page
History of Malwares – Past & Present
Malware History & Timeline
Mobile Malware TimeLine
Computer Virus - Definition
Malicious code that replicates by copying itself to another program, computer
boot sector or document
A virus can be spread by:
– opening an email attachment
– clicking on an executable file
– visiting an infected website or viewing an infected website advertisement
How it is done?
– Create a replica website for a target bank
– Spam out an email initiating a sort of genuine correspondence from the institution
involved
• Customers are informed that bank has changed their IT infrastructure and want all clients to
reconfirm their user info
– A link is embedded in the email taking the victim to the replica site
• Rest is formality – credentials land into the hacker’s database
Rootkit
A Rootkit is a word derived from:
– root privileged user in Linux-like OS
– kit set of tools
A tool that removes the footprints of hacker from the victim machine
Rootkits bring two powerful cards to the table
– Extreme stealth and remote control
A Rootkit when installed performs two main functions
– hides evidence of attackers' activities is hidden
– attackers can gain remote backdoor access to the systems at will
Rootkits mostly run with super-user privileges
– ‘root’ in Unix-like systems and ‘Administrator’ in Windows
Attackers exploit software weaknesses to get rootkit installed
Rootkit
1. Virus: A self-replicating program that attaches itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
2. Trojans: A type of malware that is disguised as legitimate software.
Cybercriminals trick users into uploading Trojans onto their computer where
they cause damage or collect data.
3. Spyware: A program that secretly records what a user does, so that
cybercriminals can make use of this information. For example, spyware
could capture credit card details.
4. Ransomware: Malware which locks down a user’s files --
typically through encryption -- and demanding a payment to decrypt
and the threat of erasing it unless a ransom is paid.
5. Adware: Advertising software which can be used to spread
malware.
6. Botnets: Networks of malware infected computers which
cybercriminals use to perform tasks online without the user’s
permission.
Cyber Threats Cont.…
3. SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control
of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven
applications to insert malicious code into a databased via a malicious SQL statement. This
gives them access to the sensitive information contained in the database.
4 .Social engineering
is an attack that relies on human interaction to trick users into breaking security
procedures to gain sensitive information that is typically protected.
5. Phishing
Phishing is a form of social engineering where fraudulent email or text messages that
resemble those from reputable or known sources are sent. Often random attacks, the
intent of these messages is to steal sensitive data, such as credit card or login information.
6. Spear phishing is a type of phishing attack that has an intended
target user, organization or business.
6. Insider threats are security breaches or losses caused by humans
-- for example, employees, contractors or customers. Insider threats
can be malicious or negligent in nature.
2. Advanced persistent threats (APTs) are prolonged targeted
attacks in which an attacker infiltrates a network and remains
undetected for long periods of time with the aim to steal data.
7. Man-in-the-middle attack
• are eavesdropping attacks that involve an attacker intercepting and relaying messages
between two parties who believe they are communicating with each other.
8. Denial-of-service attack
• A denial-of-service attack is where cybercriminals prevent a computer system from
fulfilling legitimate requests by overwhelming the networks and servers with traffic. This
renders the system unusable, preventing an organization from carrying out vital functions.
9. Distributed denial-of-service (DDoS) attacks
• are those in which multiple systems disrupt the traffic of a targeted system, such as a
server, website or other network resource. By flooding the target with messages,
connection requests or packets, the attackers can slow the system or crash it, preventing
legitimate traffic from using it.
Types of Hackers
• Ethical Hacker (White hat): A hacker who gains access to systems with a view
to fix the identified weaknesses. They may also perform penetration Testing and
vulnerability assessments
• Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
• Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Types of Hackers
• Script kiddies: A non-skilled person who gains access to computer
systems using already made tools.