Cyber Security Introduction
Cyber Security Introduction
Introduction
Definitions and Principles
Cyber Crime
3
Cyber Security Kill Chain, Zero-
day attack,
ransomware,
alert fatigue and
• Cyber security is the body of technologies, processes Man-in the
and practices involved in protecting individuals and middle attack
organizations from cyber crime. are just a few
examples of
common cyber
attacks.
• It is designed to protect integrity of networks,
computers, programs and data from attack, damage
or unauthorized access.
4
Cyber Security Principles
5
Cyber Security Principle Definitions
• Confidentiality:
• A set of rules that limits access or place
restrictions on certain type of information.
• Integrity:
• Assurance that the information is trustworthy
and accurate.
• Availability:
• The guarantee of reliable access to the
information by authorized people.
6
Cyber Security Principle Definitions
• Accountability:
• Is an assurance that an individual or an
organization will be evaluated on their
performance or behaviour related to something
for which they are responsible.
• Auditability:
• A security audit is a systematic evaluation of
the security of a company’s information system
by measuring how well it conforms to a set of
established criteria.
7
Cyber Threats
Cyber Threat
9
Sources of Cyber Threats Anyone with a
motive and the
needed
technology can
• Cyber threats can come from a wide variety of create cyber
sources, some notable examples include: threats.
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
10
Cyber Threat Classifications
11
Unstructured Cyber Threats
• Resources: Individual or small group.
• Funding: Negligible.
12
Structured Cyber Threats
• Resources: Well trained individual or group.
• Funding: Available.
13
Highly Structured Cyber Threats
• Extensive organization, resources and planning over
time.
14
Cyber Security Threat Index Level
• Cyber threats are evaluated daily by the CTU (counter
threat unit) and associated with an threat index level.
15
Cyber Attacks
Types of Cyber Attacks
• Backdoor:
• Method of bypassing normal authentication and
gaining access in OS or application.
17
Types of Cyber Attacks Continued
• Buffer Overflow:
• An exploit that takes advantage of the program
that is waiting for a user’s input.
• Man-in-the-middle Attack
• This attack intercepts and relays messages
between two parties who are communicating
directly with each other.
18
Types of Cyber Attacks Continued
19
Types of Cyber Attacks Continued
• SQL injection:
• A very common exploited web application
vulnerability that allows malicious hacker to
steal and alter data in website’s database.
• Zero-day exploit:
• A vulnerability in a system or device that has
been disclosed but is not yet patched.
20
Impacts of Cyber Attacks
21
Malicious Code
Types of Malicious Code
• Virus:
• Malicious software program, when it is
executed, it replicates itself by modifying other
computer programs and inserting its own code.
• Network Worm:
• Standalone malware which replicates itself in
order to spread to other computers.
23
Types of Malicious Code Continued
• Trojan Horse:
• A program that claims to free your computer
from viruses but instead introduces viruses
onto your system.
• Botnet:
• Used to perform distributed denial-of-service
attack (DDoS attack), steal data, send spam,
and allow the attacker access to the device and
its connection.
24
Types of Malicious Code Continued
• Keylogger:
• A type of surveillance technology used to
monitor and record each keystroke typed on
specific computer’s keyboard.
• Rootkit:
• Collection of tools or programs that enable
administrator-level access to computer or
computer network.
25
Types of Malicious Code Continued
• Spyware:
• Software that is hidden from the user in order
to gather information about internet
interaction, keystrokes, passwords, and other
valuable data.
• Adware:
• Designed to display advertisements on your
computer and redirect your search requests to
advertising websites to collect marketing data
about you.
26
Types of Malicious Code Continued
• Ransomware:
• Malware that prevents or limits users from
accessing their system, either by locking the
system’s screen or by locking the user’s files
unless a ransom is paid.
27
Vulnerabilities
What is a Vulnerability?
29
Classification of Vulnerabilities
30
Causes
31