Lect 2_3
Lect 2_3
Cybersecurity 2
Cyber security is the collection of :
Tools (Access control, antivirus etc)
Policies,
security concepts, security
safeguards and guidelines
Risk management approaches and
actions, training, best practices, assurance
and technologies that can be used to
protect the cyber environment and
organization and user’s assets.
Cybersecurity Concerned 3
Protection of organization and user’s
assets include :
Connected computing devices
Personnel
Infrastructure and Applications
Services and Telecommunications systems,
And the totality of transmitted and/or stored
information in the cyber environment.
Another way to think about it 4
Availability, Integrity
and Confidentiality
One way to think about it 5
cybersecurity = security of
information systems and networks
with the goal of protecting
operations and assets
11
Management of vulnerability
https://cybergrape.co.nz/solutions/vulnerability-
management.html
What is cyber security risk? 12
fun
Committing any crime using cyber
space (using internet) is no more
fun as there are stringent laws.
Cyber security trend overview
https://www.varonis.com/blog/data-breach-statistics/
17
Types of Cyber Crime 18
Types of Cyber Crime 19
Man-in-the-Middle Attacks
Strong Wireless Access Point (WAP). Encryption on
Access Points.
Strong Router Login Credentials
Virtual Private Network
Secure your network with an intrusion detection system
Use hardwired, or non Wi-Fi, connections
Don’t connect to public Wi-Fi systems.
Turn off “Auto Connect” for your wireless devices.
Examine the source of the Wi-Fi signals before attempting to
connect
Countermeasures to Prevent MITM 27
Attacks
Examine the source of the Wi-Fi signals before attempting to
connect. Ad Hoc networks typically show up differently and
could represent a 3rd party attempting to hijack your connection
This symbol
represents an ‘ad
hoc’ connection. Do
not connect to this
wireless source
Remember – You Get What You Pay For 28
Wi Fi Or… Mi Tm
Is now really the time to send that confidential document?
Question? 29