0% found this document useful (0 votes)
125 views

What Is Cyber Security

This document provides an overview of cybersecurity. It defines cybersecurity as the practice of defending computers, networks, programs and data from malicious attacks. The document outlines why cybersecurity is important for protecting data and systems from threats. It also describes some of the key challenges in cybersecurity like network security, application security, data security, identity management and more. Finally, it provides examples of common cyber threats like malware, phishing, and denial of service attacks.

Uploaded by

Humayoun Saeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views

What Is Cyber Security

This document provides an overview of cybersecurity. It defines cybersecurity as the practice of defending computers, networks, programs and data from malicious attacks. The document outlines why cybersecurity is important for protecting data and systems from threats. It also describes some of the key challenges in cybersecurity like network security, application security, data security, identity management and more. Finally, it provides examples of common cyber threats like malware, phishing, and denial of service attacks.

Uploaded by

Humayoun Saeed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 56

ITCS – Introduction

to Cyber Security
SPRING-2021
What is Cybersecurity?
• Cyber security refers to the body of technologies, processes,
and practices designed to protect networks, devices, programs,
and data from attack, damage, or unauthorized access. Cyber
security may also be referred to as information technology
security.
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can
be divided into a few common categories.
Why Cybersecurity is Important?
• Our world today is ruled by technology and we can’t do without it at
all. From booking our flight tickets, to catching up with an old friend,
technology plays an important role in it.
• However, the same technology may expose you when it’s vulnerable
and could lead to loss of essential data. Cyber security, alongside
physical commercial security has thus, slowly and steadily, become
one of the most important topics in the business industry to be
talked about.
Why Cybersecurity is Important?
• Cyber security is necessary since it helps in securing data from
threats such as data theft or misuse, also safeguards your system
from viruses.
• Cyber security becomes important as Business are being carried
now on Network of Networks. Computer networks have always been
the target of criminals, and it is likely that the danger of cyber
security breaches will only increase in the future as these networks
expand, but there are sensible precautions that organizations can take
to minimize losses from those who seek to do harm.
CHALLENGES OF CYBER SECURITY
• For an effective cyber security, an organization needs to coordinate its
efforts throughout its entire information system. Elements of cyber
encompass all of the following:
1. Network security: The process of protecting the network from
unwanted users, attacks and intrusions.
2. Application security: Apps require constant updates and testing to
ensure these programs are secure from attacks.
3. Endpoint security: Remote access is a necessary part of business,
but can also be a weak point for data. Endpoint security is the process of
protecting remote access to a company’s network.
4. Data security: Inside of networks and applications is data. Protecting
company and customer information is a separate layer of security.
5. Identity management: Essentially, this is a process of understanding the
access every individual has in an organization.
6.Database and infrastructure security: Everything in a network involves
databases and physical equipment. Protecting these devices is equally
important.
7.Cloud security: Many files are in digital environments or “the cloud”.
Protecting data in a 100% online environment presents a large amount of
challenges.
9. Mobile security: Cell phones and tablets involve virtually
every type of security challenge in and of themselves.
10. Disaster recovery/business continuity planning: In the
event of a breach, natural disaster or other event data must be
protected and business must go on. For this, you’ll need a plan.
End-user education: Users may be employees accessing the
network or customers logging on to a company app. Educating
good habits (password changes, 2-factor authentication, etc.) is
an important part of cybersecurity.
Categories
1. Network security is the practice of securing a computer network
from intruders, whether targeted attackers or opportunistic malware.
2. Application security focuses on keeping software and devices free
of threats. A compromised application could provide access to the
data its designed to protect. Successful security begins in the design
stage, well before a program or device is deployed.
3. Information security protects the integrity and privacy of data,
both in storage and in transit.
4. Operational security includes the processes and decisions for
handling and protecting data assets. The permissions users have
when accessing a network and the procedures that determine how
and where data may be stored or shared all fall under this umbrella.
5. Disaster recovery and business continuity define how an
organization responds to a cyber-security incident or any other event that
causes the loss of operations or data. Disaster recovery policies dictate how
the organization restores its operations and information to return to the
same operating capacity as before the event. Business continuity is the
plan the organization falls back on while trying to operate without certain
resources.
6. End-user education addresses the most unpredictable cyber-security
factor: people. Anyone can accidentally introduce a virus to an otherwise
secure system by failing to follow good security practices. Teaching users to
delete suspicious email attachments, not plug in unidentified USB drives,
and various other important lessons is vital for the security of any
organization.
What is cyber security?
• Cyber security can be described as the collective methods, technologies, and
processes to help protect the confidentiality, integrity, and availability of
computer systems, networks and data, against cyber-attacks or unauthorized
access. The main purpose of cyber security is to protect all organizational
assets from both external and internal threats as well as disruptions caused due
to natural disasters.
• As organizational assets are made up of multiple disparate systems, an
effective and efficient cyber security posture requires coordinated efforts
across all its information systems. Therefore, cyber security is made up of the
following sub-domains:
Sub-domains:
1. Application security involves implementing various defenses within all
software and services used within an organization against a wide range of
threats. It requires designing secure application architectures, writing
secure code, implementing strong data input validation, threat modeling,
etc. to minimize the likelihood of any unauthorized access or modification
of application resources.
2. Identity management includes frameworks, processes, and activities that
enables authentication and authorization of legitimate individuals to
information systems within an organization. Data security involves
implementing strong information storage mechanisms that ensure security
of data at rest and in transit.
3. Network security involves implementing both hardware and software
mechanisms to protect the network and infrastructure from unauthorized
access, disruptions, and misuse. Effective network security helps protect
organizational assets against multiple external and internal threats.
4. Mobile security refers to protecting both organizational and personal
information stored on mobile devices like cell phones, laptops, tablets, etc.
from various threats such as unauthorized access, device loss or theft, malware,
etc.
5. Cloud security relates to designing secure cloud architectures and
applications for organization using various cloud service providers such as
AWS, Google, Azure, Rackspace, etc. Effective architecture and environment
configuration ensures protection against various threats.
6. Disaster recovery and business continuity planning (DR&BC) deals with
processes, monitoring, alerts and plans that help organizations prepare for
keeping business critical systems online during and after any kind of a disaster
as well as resuming lost operations and systems after an incident.
7. User education formally
training individuals regarding topics on computer security is essential in raising
awareness about industry best practices, organizational procedures and policies
as well as monitoring and reporting malicious activities.
What are the benefits of cybersecurity?
• The benefits of implementing and maintaining cybersecurity
practices include:
• Business protection against cyberattacks and data breaches.
• Protection for data and networks.
• Prevention of unauthorized user access.
• Improved recovery time after a breach.
• Protection for end users and endpoint devices.
• Regulatory compliance.
• Business continuity.
• Improved confidence in the company's reputation and trust for
developers, partners, customers, stakeholders and employees.
What is a cyber-attack?
• A cyber-attack is a deliberate attempt by external or
internal threats or attackers to exploit and compromise
the confidentiality, integrity and availability of
information systems of a target organization or
individual(s). Cyber-attackers use illegal methods, tools
and approaches to cause damages and disruptions or gain
unauthorized access to computers, devices, networks,
applications and databases.
Types of cyber threats
• The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial
gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to cause panic
or fear.
So, how do malicious actors gain control of computer systems? Here are some
common methods used to threaten cyber-security:
Cyber Threats

1. Malware:
Malware means malicious software. One of the most common cyber
threats, malware is software that a cybercriminal or hacker has created
to disrupt or damage a legitimate user’s computer. Often spread via an
unsolicited email attachment or legitimate-looking download, malware
may be used by cybercriminals to make money or in politically
motivated cyber-attacks.
• Malware refers to any unwanted software and executable code used to
perform an unauthorized, often harmful, action on a computing device
2. Advanced Persistent Threats
• The advanced persistent threats are those threats that go the stealthy way
around to penetrate systems and servers and stays there for a longer time
without getting noticed/detected by anybody.
• They are designed specially to mine highly sensitive information and these
days many organizations fail to protect themselves from advanced persistent
threat attacks.
• The APTs are not like typical malware, they are designed specially to serve a
purpose, and in other words, they are being made for targeted attacks. Below is
one depicted lifecycle of advanced persistent threat.
• Ransomware can also be classified as one type of APT attacks where a malware penetrates inside
your system, and as the days pass, it starts to encrypt all of your files slowly.
History of Malwares – Past & Present
 First virus launched more than three decades ago
– It used to be a display of programming skills in old golden days
 Today’s threats are not only complex but easy to launch
– Partially due to a wide variety of diverse attackers
• Politically or financially motivated
– And partially due to explosion of Internet
 Malicious code might be:
– embedded in an email, injected into fake software packs, Fake AV, placed on a
web page
History of Malwares – Past & Present
Malware History & Timeline
Mobile Malware TimeLine
Computer Virus - Definition
 Malicious code that replicates by copying itself to another program, computer
boot sector or document
 A virus can be spread by:
– opening an email attachment
– clicking on an executable file
– visiting an infected website or viewing an infected website advertisement

Computer Worms - Definition


 Worms are standalone software and do not require a host program or human
help to propagate
– Worms either exploit a vulnerability on the target system or
– use some kind of social engineering to trick users into executing them
Trojans - Definition
 Users are typically tricked into loading and executing it on their systems
– Can delete / steal data, annoy the users through ads etc.
 Trojans do not reproduce by infecting other files nor do they self-replicate
 Trojans spread through user interaction such as:
– opening an e-mail attachment or
– downloading and running a file from the Internet
Sniffers, Spyware & Keylogger
 Sniffers secretly listen on the machine’s network to capture any passwords
that might be going by on the network

 Spyware is malware that secretly collects information about your activities


(e.g. web sites you browse) and send that information to a third party

 A keylogger is malware that records everything you type


– Attackers are usually most interested in passwords
– Keystrokes are logged into a file and sending them off to remote attackers
Birth of Spam
 Growing use of email for official or business activities resulted in yet another
problem
– Junk email or spam for advertising goods or services
• It might be legitimate services or illegal or unwanted advertisements
– This resulted not only in waste of Business Workflow but also wastes time of workers and
even creating legal issues by spreading highly objectionable material e.g. racism, religion or
other unwanted contents

 As a countermeasure, this period resulted in email scanning and content filtering


at the Internet gateways
Botnet

 One major use of malware is to create botnets


– giant networks of "zombie" computers that can be made to carry out a
variety of nefarious actions
 A computer that has joined a botnet may not harm its owner directly.
– infected PCs in the botnet go on the offensive, when commanded by Bot
Master

 A bot agent can be a stand-alone malware component


– an executable or a DLL file or code added to the legitimate code
– Main function is to establish communication with the botnet’s network
component
b
Phishing attacks
 Phishing attack - tricking computer users to disclose their confidential information
– Used for financial gains - Data theft followed by money theft
• Based on social engineering

 How it is done?
– Create a replica website for a target bank
– Spam out an email initiating a sort of genuine correspondence from the institution
involved
• Customers are informed that bank has changed their IT infrastructure and want all clients to
reconfirm their user info
– A link is embedded in the email taking the victim to the replica site
• Rest is formality – credentials land into the hacker’s database
Rootkit
 A Rootkit is a word derived from:
– root  privileged user in Linux-like OS
– kit  set of tools
 A tool that removes the footprints of hacker from the victim machine
 Rootkits bring two powerful cards to the table
– Extreme stealth and remote control
 A Rootkit when installed performs two main functions
– hides evidence of attackers' activities is hidden
– attackers can gain remote backdoor access to the systems at will
 Rootkits mostly run with super-user privileges
– ‘root’ in Unix-like systems and ‘Administrator’ in Windows
 Attackers exploit software weaknesses to get rootkit installed
Rootkit

 Most of Rootkits are persistent


– Remain active even system reboots
 Rootkits employ more than one mechanisms to hide the activities of
attacker
– Otherwise, attacker may need to compromise system again if patched or
upgraded
 Rootkit need to hide
– System logs, files created, processes spawned, registry entries, ports opened
etc.
The nine most common examples of social engineering
are:
1.Phishing: tactics include deceptive emails, websites, and text messages to steal information.
2.Spear Phishing: email is used to carry out targeted attacks against individuals or
businesses.
3.Baiting: an online and physical social engineering attack that promises the victim a reward.
4.Malware: victims are tricked into believing that malware is installed on their computer and
that if they pay, the malware will be removed.
5.Pretexting: uses false identity to trick victims into giving up information.
6. Quid Pro Quo: relies on an exchange of information or service to convince the
victim to act.
7. Tailgating: relies on human trust to give the criminal physical access to a secure
building or area.
8. Vishing: urgent voice mails convince victims they need to act quickly to protect
themselves from arrest or other risk.
9. Water-Holing: an advanced social engineering attack that infects both a website
and its visitors with malware.
The one common thread linking these social engineering techniques is the human
element. Cybercriminals know that taking advantage of human emotions is the best
way to steal.
Types of Malware – Summerizing

1. Virus: A self-replicating program that attaches itself to clean file and spreads
throughout a computer system, infecting files with malicious code.
2. Trojans: A type of malware that is disguised as legitimate software.
Cybercriminals trick users into uploading Trojans onto their computer where
they cause damage or collect data.
3. Spyware: A program that secretly records what a user does, so that
cybercriminals can make use of this information. For example, spyware
could capture credit card details.
4. Ransomware: Malware which locks down a user’s files --
typically through encryption -- and demanding a payment to decrypt
and the threat of erasing it unless a ransom is paid.
5. Adware: Advertising software which can be used to spread
malware.
6. Botnets: Networks of malware infected computers which
cybercriminals use to perform tasks online without the user’s
permission.
Cyber Threats Cont.…

3. SQL injection
An SQL (structured language query) injection is a type of cyber-attack used to take control
of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven
applications to insert malicious code into a databased via a malicious SQL statement. This
gives them access to the sensitive information contained in the database.
4 .Social engineering
is an attack that relies on human interaction to trick users into breaking security
procedures to gain sensitive information that is typically protected.
5. Phishing
Phishing is a form of social engineering where fraudulent email or text messages that
resemble those from reputable or known sources are sent. Often random attacks, the
intent of these messages is to steal sensitive data, such as credit card or login information.
6. Spear phishing is a type of phishing attack that has an intended
target user, organization or business.
6. Insider threats are security breaches or losses caused by humans
-- for example, employees, contractors or customers. Insider threats
can be malicious or negligent in nature.
2. Advanced persistent threats (APTs) are prolonged targeted
attacks in which an attacker infiltrates a network and remains
undetected for long periods of time with the aim to steal data.
7. Man-in-the-middle attack
• are eavesdropping attacks that involve an attacker intercepting and relaying messages
between two parties who believe they are communicating with each other.
8. Denial-of-service attack
• A denial-of-service attack is where cybercriminals prevent a computer system from
fulfilling legitimate requests by overwhelming the networks and servers with traffic. This
renders the system unusable, preventing an organization from carrying out vital functions.
9. Distributed denial-of-service (DDoS) attacks
• are those in which multiple systems disrupt the traffic of a targeted system, such as a
server, website or other network resource. By flooding the target with messages,
connection requests or packets, the attackers can slow the system or crash it, preventing
legitimate traffic from using it.
Types of Hackers
• Ethical Hacker (White hat): A hacker who gains access to systems with a view
to fix the identified weaknesses. They may also perform penetration Testing and
vulnerability assessments
• Cracker (Black hat): A hacker who gains unauthorized access to computer
systems for personal gain. The intent is usually to steal corporate data, violate
privacy rights, transfer funds from bank accounts etc.
• Grey hat: A hacker who is in between ethical and black hat hackers. He/she
breaks into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner.
Types of Hackers
• Script kiddies: A non-skilled person who gains access to computer
systems using already made tools.

• Hacktivist: A hacker who use hacking to send social, religious, and


political, etc. messages. This is usually done by hijacking websites and
leaving the message on the hijacked website.

• Phreaker: A hacker who identifies and exploits weaknesses in telephones


instead of computers.
What’s the difference between a cyberattack and a security
breach?

• A cyber-attack is not exactly the same as a security breach. A cyber-attack


as discussed above is an attempt to compromise the security of a system.
Attackers try to exploit the confidentially, integrity or availability of a
software or network by using various kinds of cyber-attacks as outlined in
the above section. Security breach on the other hand is a successful event or
incident in which a cyber-attack results in a compromise of sensitive
information, unauthorized access to IT systems or disruption of services.
• Attackers consistently try a multitude of cyber-attacks against their
targets with a determination that one of them would result in a security
breach. Hence, security breaches also highlight another significant part
of a complete cyber security strategy; which is Business Continuity
and Incidence Response (BC-IR). BC-IR helps an organization with
dealing in cases of a successful cyber-attacks. Business Continuity
relates to keeping critical business system online when struck with a
security incident whereas Incidence Response deals with responding
to a security breach and to limit its impact as well as facilitating
recovery of IT and Business systems.
How is automation used in cybersecurity?
• Automation has become an integral component to keep companies protected from the
growing number and sophistication of cyberthreats. Using artificial intelligence (AI) and
machine learning in areas with high-volume data streams can help improve cybersecurity
in three main categories:
• Threat detection. AI platforms can analyze data and recognize known threats, as well as
predict novel threats.
• Threat response. AI platforms also create and automatically enact security protections.
• Human augmentation. Security pros are often overloaded with alerts and repetitive
tasks. AI can help eliminate alert fatigue by automatically triaging low-risk alarms and
automating big data analysis and other repetitive tasks, freeing humans for more
sophisticated tasks.
Other benefits of automation in cybersecurity include attack classification, malware
classification, traffic analysis, compliance analysis and more.
Cybersecurity vendors and tools
Vendors in the cybersecurity field typically offer a variety of security
products and services. Common security tools and systems include:
• Identity and access management (IAM)
• Firewalls
• Endpoint protection
• Antimalware
• Intrusion prevention/detection systems (IPS/IDS)
• Data loss prevention (DLP)
• Endpoint detection and response
• Security information and event management (SIEM)
• Encryption tools
• Vulnerability scanners
• Virtual private networks (VPNs)
• Cloud workload protection platform (CWPP)
• Cloud access security broker (CASB)
Well-known cybersecurity vendors include Check Point, Cisco, Code42,
CrowdStrike, FireEye, Fortinet, IBM, Imperva, KnowBe4, McAfee, Microsoft,
Palo Alto Networks, Rapid7, Splunk, Symantec, Trend Micro and Trustwave.
Cyber safety tips - protect yourself against
cyberattacks

• How can businesses and individuals guard against cyber


threats? Here are our top cyber safety tips:
• Update your software and operating system: This means you
benefit from the latest security patches.
• Use anti-virus software: Security solutions like
Kaspersky Total Security will detect and removes threats. Keep
your software updated for the best level of protection.
• Use strong passwords: Ensure your passwords are not easily
guessable.
• Do not open email attachments from unknown senders: These
could be infected with malware.
• Do not click on links in emails from unknown senders or
unfamiliar websites: This is a common way that malware is spread.
• Avoid using unsecure WIFI networks in public places: Unsecure
networks leave you vulnerable to man-in-the-middle attacks.
What are the career opportunities in
cybersecurity?
• As the cyber threat landscape continues to grow and new threats
emerge -- such as IoT threats
– individuals are needed with cybersecurity awareness, hardware
and software skills.
Career opportunities in cybersecurity
• IT professionals and other computer specialists are needed in security
roles, such as:
• Chief information security officer (CISO) is the individual who
implements the security program across the organization and oversees
the IT security department's operations.
• Chief security office (CSO) is the executive responsible for the
physical and/or cybersecurity of a company.
• Security engineers protect company assets from threats with a focus
on quality control within the IT infrastructure.
• Security architects are responsible for planning, analyzing, designing,
testing, maintaining and supporting an enterprise's critical infrastructure.
• Security analysts have several responsibilities that include planning
security measures and controls, protecting digital files, and conducting
both internal and external security audits.
• Penetration testers are ethical hackers who test the security of
systems, networks and applications, seeking vulnerabilities that could
be exploited by malicious actors.
• Threat hunters are threat analysts who aim to uncover vulnerabilities
and attacks and mitigate them before they compromise a business.
• Other cybersecurity careers include security consultants,
data protection officer, cloud security architects,
security operations manager (SOC) managers and analysts, security
investigators, cryptographers and security administrators.

You might also like