CS Lecture 1
CS Lecture 1
Security
Understanding the Basics and Importance in Today's World
Shermeen Adnan
Course Overview
Definition
Cyber security refers to the practices, technologies, and processes designed to
protect computers, networks, programs, and data from unauthorized access,
damage, or attacks.
It covers a broad range of domains, including but not limited to network
security, information security, application security, and endpoint protection.
Key Objectives
Confidentiality: Ensuring that sensitive information is accessible only to those
authorized to view it.
Integrity: Protecting data from being altered or tampered with by unauthorized
individuals.
Availability: Guaranteeing that data and systems are available when needed by
authorized users.
Scope of Cyber Security
Threats
Potential sources of harm to a system or data, such as hackers, malware, or
insider threats.
Example: A hacker attempting to gain unauthorized access to a network.
Vulnerabilities
Weaknesses or flaws in a system that can be exploited by a threat to gain
unauthorized access or cause harm.
Example: An outdated software version that lacks security patches.
Attacks
Actual events where a threat exploits a vulnerability to cause damage or gain
unauthorized access.
Example: A phishing attack where an employee is tricked into clicking a malicious
link, leading to a data breach.
Key Concepts and Terminologies
Network Security:
• Definition:
• Protecting the integrity and usability of networks and data during
transmission.
• Involves implementing hardware and software solutions like firewalls,
intrusion detection systems, and encryption.
• Importance:
• Ensures secure communication channels and protects against
unauthorized access, data breaches, and various forms of cyber attacks.
Core Areas of Cyber Security
Information Security:
• Definition:
• Protecting data from unauthorized access, disclosure, alteration, and
destruction.
• Involves implementing data encryption, access controls, and data
masking.
• Importance:
• Ensures that sensitive information, such as personal data and intellectual
property, is safeguarded from cyber threats.
Core Areas of Cyber Security
Application Security:
• Definition:
• Securing software applications from vulnerabilities that can be exploited
by attackers.
• Includes measures like secure coding practices, regular software updates,
and vulnerability assessments.
• Importance:
• Protects applications from being used as an entry point for cyber attacks,
ensuring that both the software and the data it handles remain secure.
Core Areas of Cyber Security
Operational Security:
• Definition:
• Protecting the day-to-day operations of organizations by ensuring that
processes and procedures are secure.
• Involves monitoring operational processes, securing communication
channels, and managing access controls.
• Importance:
• Prevents unauthorized access and disruptions to business operations,
maintaining the confidentiality, integrity, and availability of information.
Core Areas of Cyber Security
End-User Education:
• Definition:
• Training and educating users about the importance of cyber security and
the best practices to follow to protect against cyber threats.
• Topics Covered: Recognizing phishing attempts, using strong passwords,
and avoiding suspicious downloads.
• Importance:
• Users are often the first line of defense against cyber attacks; informed
users are less likely to fall victim to common threats like phishing or social
engineering.
Types of Cyber Attacks
Phishing:
• Description:
• Deceptive attempts to steal sensitive information (like usernames,
passwords, and credit card numbers) by posing as a trustworthy entity.
• Example: A fraudulent email that appears to be from a bank, asking the
recipient to verify their account details.
• Prevention:
• Educating users on how to recognize phishing emails, using email filters,
and implementing two-factor authentication.
Types of Cyber Attacks
Malware:
• Description:
• Malicious software designed to harm or exploit any programmable device,
service, or network.
• Types: Viruses, worms, trojans, spyware.
• Prevention:
• Installing and updating antivirus software, avoiding suspicious downloads,
and regularly patching software vulnerabilities.
Types of Cyber Attacks
Ransomware:
• Description:
• A type of malware that encrypts a victim’s data and demands a ransom for
the decryption key.
• Example: The WannaCry ransomware that affected hundreds of
thousands of computers worldwide.
• Prevention:
• Regularly backing up data, using up-to-date security software, and
educating users about the dangers of unsolicited emails and downloads.
Types of Cyber Attacks
Denial-of-Service (DoS):
• Description:
• Attacks that flood a system, server, or network with overwhelming traffic
to exhaust resources, making it unavailable to legitimate users.
• Example: A website being taken offline by a flood of malicious traffic.
• Prevention:
• Implementing traffic filtering, using DoS protection services, and ensuring
sufficient bandwidth to handle traffic spikes.
Types of Cyber Attacks
Man-in-the-Middle (MitM):
• Description:
• Attackers intercept communication between two parties to steal or
manipulate data.
• Example: Eavesdropping on a conversation between a user and a website
to steal login credentials.
• Prevention:
• Using encryption (e.g., HTTPS), strong authentication methods, and
avoiding unsecured Wi-Fi networks.
Significance of Cyber Security in
Today's World
Rise of Cyber Threats
In today's interconnected world, cyber threats are more prevalent and
sophisticated than ever before.
Cybercriminals employ a wide array of tactics, including malware,
phishing, ransomware, and social engineering, to exploit vulnerabilities.
Significance of Cyber Security in
Today's World
Economic and Societal Impact
Financial Losses: Businesses and individuals can suffer significant financial
harm from cyber attacks. This includes direct theft, fraud, and costs
associated with responding to and recovering from breaches.
Reputation Damage: Companies that experience data breaches often face
severe reputational damage, leading to loss of customer trust and
business opportunities.
Personal Impact: Individuals face risks such as identity theft, financial
fraud, and loss of privacy.
Significance of Cyber Security in
Today's World
National and Global Security
Critical Infrastructure: Protecting the infrastructure that societies depend
on, such as power grids, water supply, and communication networks, is
essential for national security.
Cyber Warfare: Nation-states are increasingly engaging in cyber warfare,
targeting each other’s critical systems and infrastructure, posing a
significant global threat.
Significance of Cyber Security in
Today's World
Everyday Relevance
With the increasing reliance on digital technologies for everything from
banking to healthcare to communication, cyber security is relevant to
everyone, not just IT professionals.
Personal data protection has become a crucial concern, with individuals
needing to adopt basic security practices such as using strong passwords,
enabling two-factor authentication, and being cautious with sharing
personal information online.
Interactive Discussion
What comes to mind when you hear the term ‘Cyber Security’?
Personal Experiences
The Role of Social Media
Cyber Security in Daily Life
Real-World Examples of Cyber
Attacks
WannaCry Ransomware Attack (2017):
• Overview:
• A global ransomware attack that affected more than 200,000 computers in
over 150 countries.
• Impact: Encrypted files on infected systems and demanded ransom
payments in Bitcoin.
• Affected Organizations: National Health Service (NHS) in the UK, FedEx,
and Telefónica, among others.
• Lesson Learned:
• The importance of applying security patches promptly, as WannaCry
exploited a known vulnerability for which a patch had already been
released.
Real-World Examples of Cyber
Attacks
SolarWinds Supply Chain Attack (2020):
• Overview:
• Attackers compromised the software updates of SolarWinds’ Orion
platform, affecting thousands of organizations, including U.S. government
agencies.
• Impact: Gained unauthorized access to sensitive data and networks,
leading to widespread espionage.
• Lesson Learned:
• The critical need for robust supply chain security and the importance of
monitoring for unusual activity even in trusted software.
Real-World Examples of Cyber
Attacks
Equifax Data Breach (2017):
• Overview:
• A data breach at Equifax, one of the largest credit reporting agencies,
exposed the personal information of approximately 147 million people.
• Impact: Stolen data included Social Security numbers, birth dates, and
addresses.
• Lesson Learned:
• The necessity of patching known vulnerabilities and implementing strong
data encryption measures to protect sensitive information.
Importance of Cyber Security in Today's
World : The Evolving Threat Landscape
On Individuals:
• Identity Theft:
• Attackers steal personal information such as Social Security numbers, credit card
details, and login credentials, leading to identity theft.
• Example: Data breaches at major retailers and financial institutions have exposed
millions of individual records.
• Financial Loss:
• Victims may suffer financial losses due to fraudulent transactions, unauthorized
charges, and theft of funds.
• Example: Phishing scams can trick individuals into transferring money or revealing
sensitive financial information.
• Privacy Breaches:
• Unauthorized access to personal data can lead to privacy violations, including the
exposure of sensitive personal information.
• Example: Unauthorized access to personal health records or private
communications.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Businesses:
• Financial Loss:
• Cyber attacks can result in significant financial losses due to theft, fraud, and the
costs associated with recovery and remediation.
• Example: The 2017 Equifax breach cost the company over $4 billion in damages
and settlements.
• Reputational Damage:
• Businesses face reputational harm when customer data is compromised, leading to
a loss of customer trust and confidence.
• Example: The 2013 Target breach damaged the company’s reputation and led to a
decline in customer trust.
• Legal Consequences:
• Companies may face legal penalties and regulatory fines for failing to protect
customer data or comply with data protection laws.
• Example: The General Data Protection Regulation (GDPR) imposes heavy fines for
non-compliance with data protection requirements.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Governments:
• National Security Threats:
• Cyber attacks can target critical infrastructure, government agencies, and national
security systems, posing a threat to national security.
• Example: The 2020 SolarWinds attack compromised multiple U.S. government
agencies and was attributed to state-sponsored actors.
• Loss of Public Trust:
• Government breaches erode public confidence in the ability of authorities to
safeguard sensitive information.
• Example: The 2015 OPM breach exposed personal data of over 21 million federal
employees, affecting public trust in government agencies.
• Economic Impact:
• Cyber attacks can have broader economic implications, affecting trade, financial
markets, and national economies.
• Example: Disruptions to critical infrastructure can lead to significant economic
losses and operational disruptions.
Why Cyber Security is a Global
Concern
Global Interconnectivity and the Need for International
Cooperation:
• Interconnected Systems:
• Global interconnectedness means that cyber threats can easily cross
borders and affect multiple countries simultaneously.
• International Cooperation:
• Cyber security requires collaborative efforts between countries,
organizations, and institutions to address threats and share information.
• Example: International agreements and partnerships such as the
Budapest Convention on Cybercrime aim to enhance global cyber security
efforts.
Why Cyber Security is a Global
Concern
The Role of Cyber Security in Critical Infrastructure:
• Energy Sector:
• Securing power grids and energy systems to prevent disruptions and
attacks that could impact millions of people.
• Healthcare Sector:
• Protecting medical records and healthcare systems from breaches that
could jeopardize patient privacy and safety.
• Transportation Sector:
• Ensuring the security of transportation systems, including aviation and
public transit, to prevent disruptions and attacks.
Emerging Trends and Challenges