0% found this document useful (0 votes)
27 views

CS Lecture 1

Uploaded by

Naima Naeem
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

CS Lecture 1

Uploaded by

Naima Naeem
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Introduction to Cyber

Security
Understanding the Basics and Importance in Today's World
Shermeen Adnan
Course Overview

 What This Course Covers


 Understanding the core concepts of cyber security.
 Recognizing different types of cyber threats and attacks.
 Learning about the importance of protecting digital information.
 Gaining insight into real-world cyber security challenges.
 Developing practical skills for safeguarding systems and networks.
Overview of Cyber Security

 Definition
 Cyber security refers to the practices, technologies, and processes designed to
protect computers, networks, programs, and data from unauthorized access,
damage, or attacks.
 It covers a broad range of domains, including but not limited to network
security, information security, application security, and endpoint protection.
 Key Objectives
 Confidentiality: Ensuring that sensitive information is accessible only to those
authorized to view it.
 Integrity: Protecting data from being altered or tampered with by unauthorized
individuals.
 Availability: Guaranteeing that data and systems are available when needed by
authorized users.
Scope of Cyber Security

 It involves implementing multiple layers of protection across the


computing environment, including the hardware, software, and data.
 Cyber security measures are designed to prevent cyber threats like
hacking, malware, phishing, and ransomware from compromising
sensitive information and disrupting business operations.
Differentiating Cyber Security from
Information Security
 Information Security
 A broader concept that involves protecting all forms of data, whether in
digital or physical form, from unauthorized access, disclosure, alteration,
or destruction.
 It focuses on the protection of information assets within an organization,
regardless of how the data is processed, stored, or transmitted.
 Cyber Security
 A subset of information security specifically concerned with protecting
digital data and the systems that process it from cyber threats.
 Cyber security deals primarily with online or digital threats, whereas
information security encompasses both digital and physical security
measures.
Key Concepts and Terminologies

 Threats
 Potential sources of harm to a system or data, such as hackers, malware, or
insider threats.
 Example: A hacker attempting to gain unauthorized access to a network.
 Vulnerabilities
 Weaknesses or flaws in a system that can be exploited by a threat to gain
unauthorized access or cause harm.
 Example: An outdated software version that lacks security patches.
 Attacks
 Actual events where a threat exploits a vulnerability to cause damage or gain
unauthorized access.
 Example: A phishing attack where an employee is tricked into clicking a malicious
link, leading to a data breach.
Key Concepts and Terminologies

 Difference Between a Cyber Threat and a Cyber Attack


 Cyber Threat: A possible danger that could exploit a vulnerability to
breach security and cause harm.
 Example: The potential for ransomware to infect a network.
 Cyber Attack: A deliberate and malicious attempt to breach security,
often resulting in damage, data loss, or unauthorized access.
 Example: An actual ransomware attack that encrypts files and demands
payment for decryption.
Key Concepts and Terminologies

 Common Cyber Security Terms


 Malware: Malicious software designed to infiltrate, damage, or disable
computers and networks.
 Types: Viruses, worms, trojans, spyware, adware.
 Phishing: A deceptive method where attackers send fraudulent
communications, often via email, to trick individuals into divulging
sensitive information or installing malware.
 Ransomware: A type of malware that encrypts a victim's files, rendering
them inaccessible until a ransom is paid.
Core Areas of Cyber Security

 Network Security:
• Definition:
• Protecting the integrity and usability of networks and data during
transmission.
• Involves implementing hardware and software solutions like firewalls,
intrusion detection systems, and encryption.
• Importance:
• Ensures secure communication channels and protects against
unauthorized access, data breaches, and various forms of cyber attacks.
Core Areas of Cyber Security

 Information Security:
• Definition:
• Protecting data from unauthorized access, disclosure, alteration, and
destruction.
• Involves implementing data encryption, access controls, and data
masking.
• Importance:
• Ensures that sensitive information, such as personal data and intellectual
property, is safeguarded from cyber threats.
Core Areas of Cyber Security

 Application Security:
• Definition:
• Securing software applications from vulnerabilities that can be exploited
by attackers.
• Includes measures like secure coding practices, regular software updates,
and vulnerability assessments.
• Importance:
• Protects applications from being used as an entry point for cyber attacks,
ensuring that both the software and the data it handles remain secure.
Core Areas of Cyber Security

 Operational Security:
• Definition:
• Protecting the day-to-day operations of organizations by ensuring that
processes and procedures are secure.
• Involves monitoring operational processes, securing communication
channels, and managing access controls.
• Importance:
• Prevents unauthorized access and disruptions to business operations,
maintaining the confidentiality, integrity, and availability of information.
Core Areas of Cyber Security

 Disaster Recovery & Business Continuity:


• Disaster Recovery:
• Planning and implementing procedures to recover from cyber incidents,
such as data breaches or system failures.
• Example: Regular data backups, disaster recovery sites, and business
continuity plans.
• Business Continuity:
• Ensuring that critical business operations can continue during and after a
cyber incident.
• Example: Having redundant systems and processes in place to minimize
downtime.
Core Areas of Cyber Security

 End-User Education:
• Definition:
• Training and educating users about the importance of cyber security and
the best practices to follow to protect against cyber threats.
• Topics Covered: Recognizing phishing attempts, using strong passwords,
and avoiding suspicious downloads.
• Importance:
• Users are often the first line of defense against cyber attacks; informed
users are less likely to fall victim to common threats like phishing or social
engineering.
Types of Cyber Attacks

 Phishing:
• Description:
• Deceptive attempts to steal sensitive information (like usernames,
passwords, and credit card numbers) by posing as a trustworthy entity.
• Example: A fraudulent email that appears to be from a bank, asking the
recipient to verify their account details.
• Prevention:
• Educating users on how to recognize phishing emails, using email filters,
and implementing two-factor authentication.
Types of Cyber Attacks

 Malware:
• Description:
• Malicious software designed to harm or exploit any programmable device,
service, or network.
• Types: Viruses, worms, trojans, spyware.
• Prevention:
• Installing and updating antivirus software, avoiding suspicious downloads,
and regularly patching software vulnerabilities.
Types of Cyber Attacks

 Ransomware:
• Description:
• A type of malware that encrypts a victim’s data and demands a ransom for
the decryption key.
• Example: The WannaCry ransomware that affected hundreds of
thousands of computers worldwide.
• Prevention:
• Regularly backing up data, using up-to-date security software, and
educating users about the dangers of unsolicited emails and downloads.
Types of Cyber Attacks

 Denial-of-Service (DoS):
• Description:
• Attacks that flood a system, server, or network with overwhelming traffic
to exhaust resources, making it unavailable to legitimate users.
• Example: A website being taken offline by a flood of malicious traffic.
• Prevention:
• Implementing traffic filtering, using DoS protection services, and ensuring
sufficient bandwidth to handle traffic spikes.
Types of Cyber Attacks

 Man-in-the-Middle (MitM):
• Description:
• Attackers intercept communication between two parties to steal or
manipulate data.
• Example: Eavesdropping on a conversation between a user and a website
to steal login credentials.
• Prevention:
• Using encryption (e.g., HTTPS), strong authentication methods, and
avoiding unsecured Wi-Fi networks.
Significance of Cyber Security in
Today's World
 Rise of Cyber Threats
 In today's interconnected world, cyber threats are more prevalent and
sophisticated than ever before.
 Cybercriminals employ a wide array of tactics, including malware,
phishing, ransomware, and social engineering, to exploit vulnerabilities.
Significance of Cyber Security in
Today's World
 Economic and Societal Impact
 Financial Losses: Businesses and individuals can suffer significant financial
harm from cyber attacks. This includes direct theft, fraud, and costs
associated with responding to and recovering from breaches.
 Reputation Damage: Companies that experience data breaches often face
severe reputational damage, leading to loss of customer trust and
business opportunities.
 Personal Impact: Individuals face risks such as identity theft, financial
fraud, and loss of privacy.
Significance of Cyber Security in
Today's World
 National and Global Security
 Critical Infrastructure: Protecting the infrastructure that societies depend
on, such as power grids, water supply, and communication networks, is
essential for national security.
 Cyber Warfare: Nation-states are increasingly engaging in cyber warfare,
targeting each other’s critical systems and infrastructure, posing a
significant global threat.
Significance of Cyber Security in
Today's World
 Everyday Relevance
 With the increasing reliance on digital technologies for everything from
banking to healthcare to communication, cyber security is relevant to
everyone, not just IT professionals.
 Personal data protection has become a crucial concern, with individuals
needing to adopt basic security practices such as using strong passwords,
enabling two-factor authentication, and being cautious with sharing
personal information online.
Interactive Discussion

 What comes to mind when you hear the term ‘Cyber Security’?
 Personal Experiences
 The Role of Social Media
 Cyber Security in Daily Life
Real-World Examples of Cyber
Attacks
 WannaCry Ransomware Attack (2017):
• Overview:
• A global ransomware attack that affected more than 200,000 computers in
over 150 countries.
• Impact: Encrypted files on infected systems and demanded ransom
payments in Bitcoin.
• Affected Organizations: National Health Service (NHS) in the UK, FedEx,
and Telefónica, among others.
• Lesson Learned:
• The importance of applying security patches promptly, as WannaCry
exploited a known vulnerability for which a patch had already been
released.
Real-World Examples of Cyber
Attacks
 SolarWinds Supply Chain Attack (2020):
• Overview:
• Attackers compromised the software updates of SolarWinds’ Orion
platform, affecting thousands of organizations, including U.S. government
agencies.
• Impact: Gained unauthorized access to sensitive data and networks,
leading to widespread espionage.
• Lesson Learned:
• The critical need for robust supply chain security and the importance of
monitoring for unusual activity even in trusted software.
Real-World Examples of Cyber
Attacks
 Equifax Data Breach (2017):
• Overview:
• A data breach at Equifax, one of the largest credit reporting agencies,
exposed the personal information of approximately 147 million people.
• Impact: Stolen data included Social Security numbers, birth dates, and
addresses.
• Lesson Learned:
• The necessity of patching known vulnerabilities and implementing strong
data encryption measures to protect sensitive information.
Importance of Cyber Security in Today's
World : The Evolving Threat Landscape

 Rapid Technological Advancements Leading to New


Vulnerabilities:
• Innovation and Technology:
• Technological advancements such as cloud computing, artificial intelligence
(AI), and the Internet of Things (IoT) offer numerous benefits but also
introduce new vulnerabilities.
• New technologies often come with unknown security weaknesses that can be
exploited by cybercriminals.
• Emerging Vulnerabilities:
• Example: The rise of smart devices (IoT) has introduced numerous entry
points for attackers, including poorly secured connected devices.
• Example: Cloud services, while providing scalability and flexibility, have
introduced new risks related to data breaches and misconfigurations.
Importance of Cyber Security in
Today's World : The Evolving Threat
Landscape
 Increase in the Frequency and Sophistication of Cyber
Attacks:
• Frequency:
• Cyber attacks are becoming increasingly common, with new incidents
reported daily across various sectors.
• Statistics: According to recent reports, there is a cyber attack every 39
seconds on average.
• Sophistication:
• Attackers are employing advanced techniques such as AI-driven attacks,
multi-vector attacks, and zero-day exploits.
• Example: Ransomware attacks have become more sophisticated, using
encryption algorithms to hold data hostage and demanding high ransoms.
Importance of Cyber Security in Today's
World : Impact of Cyber Attacks

 On Individuals:
• Identity Theft:
• Attackers steal personal information such as Social Security numbers, credit card
details, and login credentials, leading to identity theft.
• Example: Data breaches at major retailers and financial institutions have exposed
millions of individual records.
• Financial Loss:
• Victims may suffer financial losses due to fraudulent transactions, unauthorized
charges, and theft of funds.
• Example: Phishing scams can trick individuals into transferring money or revealing
sensitive financial information.
• Privacy Breaches:
• Unauthorized access to personal data can lead to privacy violations, including the
exposure of sensitive personal information.
• Example: Unauthorized access to personal health records or private
communications.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Businesses:
• Financial Loss:
• Cyber attacks can result in significant financial losses due to theft, fraud, and the
costs associated with recovery and remediation.
• Example: The 2017 Equifax breach cost the company over $4 billion in damages
and settlements.
• Reputational Damage:
• Businesses face reputational harm when customer data is compromised, leading to
a loss of customer trust and confidence.
• Example: The 2013 Target breach damaged the company’s reputation and led to a
decline in customer trust.
• Legal Consequences:
• Companies may face legal penalties and regulatory fines for failing to protect
customer data or comply with data protection laws.
• Example: The General Data Protection Regulation (GDPR) imposes heavy fines for
non-compliance with data protection requirements.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Governments:
• National Security Threats:
• Cyber attacks can target critical infrastructure, government agencies, and national
security systems, posing a threat to national security.
• Example: The 2020 SolarWinds attack compromised multiple U.S. government
agencies and was attributed to state-sponsored actors.
• Loss of Public Trust:
• Government breaches erode public confidence in the ability of authorities to
safeguard sensitive information.
• Example: The 2015 OPM breach exposed personal data of over 21 million federal
employees, affecting public trust in government agencies.
• Economic Impact:
• Cyber attacks can have broader economic implications, affecting trade, financial
markets, and national economies.
• Example: Disruptions to critical infrastructure can lead to significant economic
losses and operational disruptions.
Why Cyber Security is a Global
Concern
 Global Interconnectivity and the Need for International
Cooperation:
• Interconnected Systems:
• Global interconnectedness means that cyber threats can easily cross
borders and affect multiple countries simultaneously.
• International Cooperation:
• Cyber security requires collaborative efforts between countries,
organizations, and institutions to address threats and share information.
• Example: International agreements and partnerships such as the
Budapest Convention on Cybercrime aim to enhance global cyber security
efforts.
Why Cyber Security is a Global
Concern
 The Role of Cyber Security in Critical Infrastructure:
• Energy Sector:
• Securing power grids and energy systems to prevent disruptions and
attacks that could impact millions of people.
• Healthcare Sector:
• Protecting medical records and healthcare systems from breaches that
could jeopardize patient privacy and safety.
• Transportation Sector:
• Ensuring the security of transportation systems, including aviation and
public transit, to prevent disruptions and attacks.
Emerging Trends and Challenges

 Artificial Intelligence and Machine Learning in Cyber Security:


• AI and ML Applications:
• AI and machine learning are being used to detect and respond to cyber
threats more effectively by analyzing large volumes of data and identifying
patterns.
• Challenges:
• AI can also be used by attackers to automate attacks and evade detection,
requiring ongoing advancements in defensive technologies.
Emerging Trends and Challenges

 The Rise of the Internet of Things (IoT) and Associated Risks:


• IoT Vulnerabilities:
• The proliferation of connected devices introduces new attack vectors and
challenges for securing IoT ecosystems.
• Challenges:
• Ensuring that IoT devices are properly secured, monitored, and updated to
prevent exploitation.
Emerging Trends and Challenges

 Importance of a Proactive Cyber Security Strategy:


• Proactive Measures:
• Adopting a proactive approach involves continuous monitoring, threat
intelligence, and regular security assessments to anticipate and mitigate
potential risks.
• Strategy Development:
• Organizations should develop comprehensive cyber security strategies
that include risk management, incident response, and employee training.
The Role of Individuals in Cyber
Security
 Importance of Strong Passwords:
• Creating Strong Passwords:
• Using complex passwords with a mix of letters, numbers, and special
characters to enhance security.
• Example: Avoiding common passwords and using password managers to
generate and store unique passwords.
The Role of Individuals in Cyber
Security
 Recognizing Phishing Attempts:
• Phishing Awareness:
• Educating individuals to identify and avoid phishing emails, messages, and
phone calls that attempt to steal personal information.
• Example: Checking email addresses for authenticity, avoiding clicking on
suspicious links, and verifying requests for sensitive information.
The Role of Individuals in Cyber
Security
 Staying Informed:
• Ongoing Education:
• Keeping up-to-date with the latest cyber threats and best practices for
protecting personal and professional information.
• Example: Following cyber security news, attending training sessions, and
participating in awareness programs.
The Role of Individuals in Cyber
Security
 The Concept of "Cyber Hygiene":
• Definition:
• Cyber hygiene refers to practices and steps that individuals can take to
maintain and improve their cyber security.
• Examples: Regularly updating software, using multi-factor authentication,
and being cautious with online activities.
Task

 In upcoming class Students will individually analyze and elaborate on


recent real-world examples of cyber attacks.

You might also like