SlideShare a Scribd company logo
Module 1: The Danger
CyberOps Associate v1.0
2
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Objectives
Module Title: The Danger
Module Objective: Explain why networks and data are attacked.
Topic Title Topic Objective
War Stories Explain why networks and data are attacked.
Threat Actors Explain the motivations of the threat actors behind specific security incidents.
Threat Impact Explain the potential impact of network security attacks.
3
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.1 War Stories
4
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Hijacked People
• Hackers can set up open “rogue”
wireless hotspots posing as a genuine
wireless network.
• Rogue wireless hotspots are also known
as “evil twin” hotspots.
Evil twin attacks and how to prevent them
5
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Ransomed Companies
• Employees of an organization are often lured
into opening attachments that install
ransomware on the employees’ computers.
• This ransomware, when installed, begins the
process of gathering and encrypting
corporate data.
• The goal of the attackers is financial gain,
because they hold the company’s data for
ransom until they are paid.
6
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Targeted Nations
• Some of today’s malware is so sophisticated
and expensive to create that security
experts believe only a nation state or group
of nations could possibly have the influence
and funding to create it.
• Such malware can be targeted to attack a
nation’s vulnerable infrastructure, such as
the water system or power grid.
• One such malware was the Stuxnet worm
that infected USB drives and infiltrated
Windows operating systems. It then
targeted Step 7 software that was
developed by Siemens for their
Programmable Logic Controllers (PLCs).
Zero Days, a film released in 2016, documents what is
known about the Stuxnet targeted malware attack.
7
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Video - Anatomy of an Attack
Watch this video to view details of a complex attack.
8
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Lab - Installing the Virtual Machine
In this lab, you will complete the following objectives:
• Install VirtualBox on your personal computer
• Download and install the CyberOps Workstation Virtual Machine (VM).
9
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger
Lab - Cybersecurity Case Studies
In this lab, you will analyze the given cases and answer questions about them.
10
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.2 Threat Actors
11
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Actors
Threat Actors
• Threat actors are individuals or groups of individuals who perform
cyberattacks. They include, but are not limited to:
• Amateurs
• Hacktivists
• Organized crime groups
• State-sponsored groups
• Terrorist groups
• Cyberattacks are intentional malicious acts meant to negatively
impact another individual or organization.
12
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Actors
Threat Actors (Contd.)
Amateurs
• They are also known
as script kiddies
and have little or no
skill.
• They often use
existing tools or
instructions found on
the internet to launch
attacks.
• Even though they
use basic tools, the
results can still be
devastating.
Hacktivists
• These are hackers who
publicly protest against
a variety of political and
social ideas.
• They post articles and
videos, leaking
sensitive information,
and disrupting web
services with
illegitimate traffic in
Distributed Denial of
Service (DDoS)
attacks.
Financial Gain
• Much of the hacking
activity that
consistently threatens
our security is
motivated by financial
gain.
• Cybercriminals want to
gain access to bank
accounts, personal
data, and anything else
they can leverage to
generate cash flow.
Trade Secrets and
Global Politics
• At times, nation states
hack other countries, or
interfere with their
internal politics.
• Often, they may be
interested in using
cyberspace for
industrial espionage.
• The theft of intellectual
property can give a
country a significant
advantage in
international trade.
13
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Actors
How Secure is the Internet of Things?
• The Internet of Things (IoT) helps individuals
connect things to improve their quality of life.
• Many devices on the internet are not updated with
the latest firmware. Some older devices were not
even developed to be updated with patches. These
two situations create opportunity for threat actors
and security risks for the owners of these devices.
 In October 2016, a DDoS attack against the
domain name provider Dyn took down many
popular websites.
 The attack came from a large number of
webcams, DVRs, routers, and other IoT devices
that had been compromised by malicious
software.
14
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Actors
Lab - Learning the Details of Attacks
In this lab, you will research and analyze IoT application vulnerabilities.
15
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.3 Threat Impact
16
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Impact
PII, PHI, and PSI
• Personally Identifiable Information (PII) is any information
that can be used to positively identify an individual, for example,
name, social security number, birthdate, credit card numbers etc.
• Cybercriminals aim to obtain these lists of PII that can then be
sold on the dark web. Stolen PII can be used to create fake
financial accounts, such as credit cards and short-term loans.
• A subset of PII is protected health information (PHI): The
medical community creates and maintains Electronic
Medical Records (EMRs) that contain Protected Health
Information (PHI), a subset of PII.
• Personal Security Information (PSI), another type of PII,
includes usernames, passwords, and other security-related
information that individuals use to access information or services
on the network.
17
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Impact
Lost Competitive Advantage
• The loss of intellectual property to competitors is a serious concern.
• An additional major concern is the loss of trust that comes when a company is unable
to protect its customers’ personal data.
• The loss of competitive advantage may come from this loss of trust rather than
another company or country stealing trade secrets.
18
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Impact
Politics and National Security
• It is not just businesses that get hacked.
• In February 2016, a hacker published the personal information of 20,000 U.S. Federal Bureau of
Investigation (FBI) employees and 9,000 U.S. Department of Homeland Security (DHS)
employees. The hacker was apparently politically motivated.
• State-supported hacker warriors can cause disruption and destruction of vital services
and resources within an enemy nation.
• The Stuxnet worm was specifically designed to impede Iran’s progress in enriching uranium that
could be used in a nuclear weapon. Stuxnet is a prime example of a network attack motivated
by national security concerns.
• The internet has become essential as a medium for commercial and financial
activities. Disruption of these activities can devastate a nation’s economy.
19
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat Impact
Lab - Visualizing the Black Hats
In this lab, you will research and analyze cybersecurity incidents to create scenarios
highlighting how organizations can prevent or mitigate an attack.
The biggest cyber attacks of 2022
The Top 10 Biggest Cyber Attacks Of 2021
20
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1.4 The Danger Summary
21
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Danger Summary
What Did I Learn in this Module?
• Threat actors can hijack banking sessions and other personal information by using “evil
twin” hotspots.
• Threat actors include, but are not limited to, amateurs, hacktivists, organized crime groups,
state sponsored, and terrorist groups.
• As the Internet of Things (IoT) expands, webcams, routers, and other devices in our homes
are also under attack.
• Personally Identifiable Information (PII) is any information that can be used to positively
identify an individual.
• The medical community creates and maintains Electronic Medical Records (EMRs) that
contain Protected Health Information (PHI), a subset of PII.
• Personal Security Information (PSI) includes usernames, passwords, and other security-
related information that individuals use to access information or services on the network.
CA_Module_1.pdf

More Related Content

Similar to CA_Module_1.pdf

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
FitCEO, Inc. (FCI)
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
RambilashTudu
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
Vrince Vimal
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
Cisco Russia
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
SsendiSamuel
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
RishabhDwivedi70
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
inside-BigData.com
 

Similar to CA_Module_1.pdf (20)

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 

More from EhabRushdy1

Part#1_Logic_Design.pptx LOGIC Circuit Course
Part#1_Logic_Design.pptx  LOGIC Circuit CoursePart#1_Logic_Design.pptx  LOGIC Circuit Course
Part#1_Logic_Design.pptx LOGIC Circuit Course
EhabRushdy1
 
Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptx
EhabRushdy1
 
Ch1 Internet of IoT.ppt ----------------
Ch1 Internet of IoT.ppt ----------------Ch1 Internet of IoT.ppt ----------------
Ch1 Internet of IoT.ppt ----------------
EhabRushdy1
 
Qam.pptx
Qam.pptxQam.pptx
Qam.pptx
EhabRushdy1
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
EhabRushdy1
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
EhabRushdy1
 

More from EhabRushdy1 (6)

Part#1_Logic_Design.pptx LOGIC Circuit Course
Part#1_Logic_Design.pptx  LOGIC Circuit CoursePart#1_Logic_Design.pptx  LOGIC Circuit Course
Part#1_Logic_Design.pptx LOGIC Circuit Course
 
Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptx
 
Ch1 Internet of IoT.ppt ----------------
Ch1 Internet of IoT.ppt ----------------Ch1 Internet of IoT.ppt ----------------
Ch1 Internet of IoT.ppt ----------------
 
Qam.pptx
Qam.pptxQam.pptx
Qam.pptx
 
CA_Module_13.pdf
CA_Module_13.pdfCA_Module_13.pdf
CA_Module_13.pdf
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

CA_Module_1.pdf

  • 1. Module 1: The Danger CyberOps Associate v1.0
  • 2. 2 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: The Danger Module Objective: Explain why networks and data are attacked. Topic Title Topic Objective War Stories Explain why networks and data are attacked. Threat Actors Explain the motivations of the threat actors behind specific security incidents. Threat Impact Explain the potential impact of network security attacks.
  • 3. 3 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.1 War Stories
  • 4. 4 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Hijacked People • Hackers can set up open “rogue” wireless hotspots posing as a genuine wireless network. • Rogue wireless hotspots are also known as “evil twin” hotspots. Evil twin attacks and how to prevent them
  • 5. 5 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Ransomed Companies • Employees of an organization are often lured into opening attachments that install ransomware on the employees’ computers. • This ransomware, when installed, begins the process of gathering and encrypting corporate data. • The goal of the attackers is financial gain, because they hold the company’s data for ransom until they are paid.
  • 6. 6 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Targeted Nations • Some of today’s malware is so sophisticated and expensive to create that security experts believe only a nation state or group of nations could possibly have the influence and funding to create it. • Such malware can be targeted to attack a nation’s vulnerable infrastructure, such as the water system or power grid. • One such malware was the Stuxnet worm that infected USB drives and infiltrated Windows operating systems. It then targeted Step 7 software that was developed by Siemens for their Programmable Logic Controllers (PLCs). Zero Days, a film released in 2016, documents what is known about the Stuxnet targeted malware attack.
  • 7. 7 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Video - Anatomy of an Attack Watch this video to view details of a complex attack.
  • 8. 8 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Lab - Installing the Virtual Machine In this lab, you will complete the following objectives: • Install VirtualBox on your personal computer • Download and install the CyberOps Workstation Virtual Machine (VM).
  • 9. 9 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Lab - Cybersecurity Case Studies In this lab, you will analyze the given cases and answer questions about them.
  • 10. 10 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.2 Threat Actors
  • 11. 11 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Actors Threat Actors • Threat actors are individuals or groups of individuals who perform cyberattacks. They include, but are not limited to: • Amateurs • Hacktivists • Organized crime groups • State-sponsored groups • Terrorist groups • Cyberattacks are intentional malicious acts meant to negatively impact another individual or organization.
  • 12. 12 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Actors Threat Actors (Contd.) Amateurs • They are also known as script kiddies and have little or no skill. • They often use existing tools or instructions found on the internet to launch attacks. • Even though they use basic tools, the results can still be devastating. Hacktivists • These are hackers who publicly protest against a variety of political and social ideas. • They post articles and videos, leaking sensitive information, and disrupting web services with illegitimate traffic in Distributed Denial of Service (DDoS) attacks. Financial Gain • Much of the hacking activity that consistently threatens our security is motivated by financial gain. • Cybercriminals want to gain access to bank accounts, personal data, and anything else they can leverage to generate cash flow. Trade Secrets and Global Politics • At times, nation states hack other countries, or interfere with their internal politics. • Often, they may be interested in using cyberspace for industrial espionage. • The theft of intellectual property can give a country a significant advantage in international trade.
  • 13. 13 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Actors How Secure is the Internet of Things? • The Internet of Things (IoT) helps individuals connect things to improve their quality of life. • Many devices on the internet are not updated with the latest firmware. Some older devices were not even developed to be updated with patches. These two situations create opportunity for threat actors and security risks for the owners of these devices.  In October 2016, a DDoS attack against the domain name provider Dyn took down many popular websites.  The attack came from a large number of webcams, DVRs, routers, and other IoT devices that had been compromised by malicious software.
  • 14. 14 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Actors Lab - Learning the Details of Attacks In this lab, you will research and analyze IoT application vulnerabilities.
  • 15. 15 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.3 Threat Impact
  • 16. 16 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Impact PII, PHI, and PSI • Personally Identifiable Information (PII) is any information that can be used to positively identify an individual, for example, name, social security number, birthdate, credit card numbers etc. • Cybercriminals aim to obtain these lists of PII that can then be sold on the dark web. Stolen PII can be used to create fake financial accounts, such as credit cards and short-term loans. • A subset of PII is protected health information (PHI): The medical community creates and maintains Electronic Medical Records (EMRs) that contain Protected Health Information (PHI), a subset of PII. • Personal Security Information (PSI), another type of PII, includes usernames, passwords, and other security-related information that individuals use to access information or services on the network.
  • 17. 17 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Impact Lost Competitive Advantage • The loss of intellectual property to competitors is a serious concern. • An additional major concern is the loss of trust that comes when a company is unable to protect its customers’ personal data. • The loss of competitive advantage may come from this loss of trust rather than another company or country stealing trade secrets.
  • 18. 18 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Impact Politics and National Security • It is not just businesses that get hacked. • In February 2016, a hacker published the personal information of 20,000 U.S. Federal Bureau of Investigation (FBI) employees and 9,000 U.S. Department of Homeland Security (DHS) employees. The hacker was apparently politically motivated. • State-supported hacker warriors can cause disruption and destruction of vital services and resources within an enemy nation. • The Stuxnet worm was specifically designed to impede Iran’s progress in enriching uranium that could be used in a nuclear weapon. Stuxnet is a prime example of a network attack motivated by national security concerns. • The internet has become essential as a medium for commercial and financial activities. Disruption of these activities can devastate a nation’s economy.
  • 19. 19 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat Impact Lab - Visualizing the Black Hats In this lab, you will research and analyze cybersecurity incidents to create scenarios highlighting how organizations can prevent or mitigate an attack. The biggest cyber attacks of 2022 The Top 10 Biggest Cyber Attacks Of 2021
  • 20. 20 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.4 The Danger Summary
  • 21. 21 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Danger Summary What Did I Learn in this Module? • Threat actors can hijack banking sessions and other personal information by using “evil twin” hotspots. • Threat actors include, but are not limited to, amateurs, hacktivists, organized crime groups, state sponsored, and terrorist groups. • As the Internet of Things (IoT) expands, webcams, routers, and other devices in our homes are also under attack. • Personally Identifiable Information (PII) is any information that can be used to positively identify an individual. • The medical community creates and maintains Electronic Medical Records (EMRs) that contain Protected Health Information (PHI), a subset of PII. • Personal Security Information (PSI) includes usernames, passwords, and other security- related information that individuals use to access information or services on the network.