SlideShare a Scribd company logo
1 of 26
Cyber Crime
• Cyber crimes are, as the name implies,
crimes committed using computers, phones
or the internet.
• Some types of cyber crime include:
• Illegal interception of data.
• System interferences.
• Copyrights infringements.
• Sale of illegal items.
1
Cyber Security
• Cyber security is the body of
technologies, processes and practices
involved in protecting individuals and
organizations from cyber crime.
• It is designed to protect integrity of
networks, computers, programs and data
from attack, damage or unauthorized
access.
2
Kill Chain, Zero-
day attack,
ransomware,
alert fatigue and
Man-in the
middle attack are
just a few
examples of
common cyber
attacks.
Cyber Security Principles
 There are five key principles in cyber
security:
• Confidentiality
• Integrity
• Availability
• Accountability
• Auditability
3
Cyber Security Principle Definitions
• Confidentiality:
• A set of rules that limits access or place restrictions on
certain type of information.
• Integrity:
• Assurance that the information is trustworthy and
accurate.
• Availability:
• The guarantee of reliable access to the information by
authorized people.
4
Cyber Security Principle Definitions
• Accountability:
• Is an assurance that an individual or an
organization will be evaluated on their
performance or behaviour related to
something for which they are responsible.
• Auditability:
• A security audit is a systematic evaluation of
the security of a company’s information
system by measuring how well it conforms to
a set of established criteria.
5
Cyber Threat
• A Cyber threat is any malicious act that attempts to
gain access to a computer network without
authorization or permission from the owners.
• It refers to the wide range of malicious activities that
can damage or disrupt a computer system, a network
or the information it contain.
• Most common cyber threats: Social Engineered
Trojans, Unpatched Software, Phishing, Network
worms, etc.
6
Sources of Cyber Threats
• Cyber threats can come from a wide
variety of sources, some notable
examples include:
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
7
Anyone with a
motive and the
needed
technology can
create cyber
threats.
Cyber Threat Classifications
• Threats can be classified by multiple criteria:
• Attacker's Resources
• Attacker's Organization
• Attacker's Funding
• On basis of these criteria, threats are of 3
types:
• Unstructured Threats
• Structured Threats
• Highly Structured threats
8
Unstructured Cyber Threats
• Resources: Individual or small group.
• Organization: Little or no organization.
• Funding: Negligible.
• Attack: Easy to detect and make use of freely
available cyberattack tool.
• Exploitation based on documented vulnerabilities.
9
Structured Cyber Threats
• Resources: Well trained individual or group.
• Organization: Well planned.
• Funding: Available.
• Attack: Against particular individual or organizations.

• Exploitation based on information Gathering.
1
0
Highly Structured Cyber Threats
• Extensive organization, resources and
planning over time.
• Attack: Long term attack on particular
machine or data.
• Exploitation with multiple methods:
• Technical, social and insider help.
1
1
Cyber Security Threat Index Level
• Cyber threats are evaluated daily by the
CTU (counter threat unit) and associated
with an threat index level.
• The threat index levels are:
• Level 1: Guarded.
• Level 2: Elevated.
• Level 3: High.
• Level 4:Critical.
1
2
Types of Cyber Attacks
• Advanced Persistent Threat (APT):
• A network attack in which an
unauthorized person gains access to
network and stays there undetected for a
long period of time.
• Backdoor:
• Method of bypassing normal
authentication and gaining access in OS
or application.
1
3
Types of Cyber Attacks Continued
• Buffer Overflow:
• An exploit that takes advantage of the
program that is waiting for a user’s
input.
• Man-in-the-middle Attack
• This attack intercepts and relays
messages between two parties who
are communicating directly with each
other.
1
4
Types of Cyber Attacks Continued
• Cross-Site Scripting (XSS):
• A code injection attack that allows an
attacker to execute malicious JavaScript
in another user’s browser.
• Denial of Service Attack:
• Any attack where the attackers attempt to
prevent the authorized users from
accessing the service.
1
5
Types of Cyber Attacks Continued
• SQL injection:
• A very common exploited web application
vulnerability that allows malicious hacker
to steal and alter data in website’s
database.
• Zero-day exploit:
• A vulnerability in a system or device that
has been disclosed but is not yet
patched.
1
6
Impacts of Cyber Attacks
• A successful cyber attack can cause major
damage to organizations or systems, as well
as to business reputation and consumer
trust.
• Some potential results include:
• Financial loss.
• Reputational damage.
• Legal consequences.
1
7
Types of Malicious Code
• Virus:
• Malicious software program, when it is
executed, it replicates itself by modifying
other computer programs and inserting
its own code.
• Network Worm:
• Standalone malware which replicates
itself in order to spread to other
computers.
1
8
Types of Malicious Code Continued
• Trojan Horse:
• A program that claims to free your computer
from viruses but instead introduces viruses
onto your system.
• Botnet:
• Used to perform distributed denial-of-service
attack (DDoS attack), steal data, send spam,
and allow the attacker access to the device
and its connection.
1
9
Types of Malicious Code Continued
• Keylogger:
• A type of surveillance technology used to
monitor and record each keystroke typed
on specific computer’s keyboard.
• Rootkit:
• Collection of tools or programs that
enable administrator-level access to
computer or computer network.
2
0
Types of Malicious Code Continued
• Spyware:
• Software that is hidden from the user in order
to gather information about internet
interaction, keystrokes, passwords, and other
valuable data.
• Adware:
• Designed to display advertisements on your
computer and redirect your search requests
to advertising websites to collect marketing
data about you.
2
1
Types of Malicious Code Continued
• Ransomware:
• Malware that prevents or limits users
from accessing their system, either by
locking the system’s screen or by
locking the user’s files unless a
ransom is paid.
2
2
What is a Vulnerability?
• A cyber-security term that refers to a flaw in
a system that can leave it open to attack.
• Vulnerability is the composition of three
elements:
1. A flaw in system.
2. Access of attacker to that flaw.
3. Capability of attacker to exploit the flaw.
2
3
Classification of Vulnerabilities
• Vulnerabilities are classified according to
the asset:
• Hardware.
• Software.
• Network.
• Personal.
• Physical site.
• Organizational.
2
4
Causes
• Some of the vulnerability in the
system occur due to:
• Missing patches.
• Cleartext credentials.
• Using unencrypted channels.
• RF Emanation.
2
5
THANK YOU
2
6

More Related Content

Similar to Cyber Security

Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf filedebmajumder741249
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfAsmaaLafi1
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Attack on computer
Attack on computerAttack on computer
Attack on computerRabail khan
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
10900220021_cyber (1).pptx
10900220021_cyber (1).pptx10900220021_cyber (1).pptx
10900220021_cyber (1).pptxpk3172517
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtaufiq463421
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Arun Velayudhan
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesBilalMehmood44
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDFChetanmalviya8
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.pptKaukau9
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 

Similar to Cyber Security (20)

Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Attack on computer
Attack on computerAttack on computer
Attack on computer
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
10900220021_cyber (1).pptx
10900220021_cyber (1).pptx10900220021_cyber (1).pptx
10900220021_cyber (1).pptx
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
types of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptxtypes of cyber attack by taufiqurrahman.pptx
types of cyber attack by taufiqurrahman.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 

More from parveen837153

Introduction to CSS in HTML.ppt
Introduction to CSS in HTML.pptIntroduction to CSS in HTML.ppt
Introduction to CSS in HTML.pptparveen837153
 
Object Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptxObject Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptxparveen837153
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit Iparveen837153
 
Unit I Advanced Java Programming Course
Unit I   Advanced Java Programming CourseUnit I   Advanced Java Programming Course
Unit I Advanced Java Programming Courseparveen837153
 

More from parveen837153 (6)

Advanced Excel
Advanced ExcelAdvanced Excel
Advanced Excel
 
Introduction to CSS in HTML.ppt
Introduction to CSS in HTML.pptIntroduction to CSS in HTML.ppt
Introduction to CSS in HTML.ppt
 
Object Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptxObject Oriented Programming using C++.pptx
Object Oriented Programming using C++.pptx
 
IOT-Monograph .docx
IOT-Monograph .docxIOT-Monograph .docx
IOT-Monograph .docx
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
Unit I Advanced Java Programming Course
Unit I   Advanced Java Programming CourseUnit I   Advanced Java Programming Course
Unit I Advanced Java Programming Course
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

Cyber Security

  • 1. Cyber Crime • Cyber crimes are, as the name implies, crimes committed using computers, phones or the internet. • Some types of cyber crime include: • Illegal interception of data. • System interferences. • Copyrights infringements. • Sale of illegal items. 1
  • 2. Cyber Security • Cyber security is the body of technologies, processes and practices involved in protecting individuals and organizations from cyber crime. • It is designed to protect integrity of networks, computers, programs and data from attack, damage or unauthorized access. 2 Kill Chain, Zero- day attack, ransomware, alert fatigue and Man-in the middle attack are just a few examples of common cyber attacks.
  • 3. Cyber Security Principles  There are five key principles in cyber security: • Confidentiality • Integrity • Availability • Accountability • Auditability 3
  • 4. Cyber Security Principle Definitions • Confidentiality: • A set of rules that limits access or place restrictions on certain type of information. • Integrity: • Assurance that the information is trustworthy and accurate. • Availability: • The guarantee of reliable access to the information by authorized people. 4
  • 5. Cyber Security Principle Definitions • Accountability: • Is an assurance that an individual or an organization will be evaluated on their performance or behaviour related to something for which they are responsible. • Auditability: • A security audit is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to a set of established criteria. 5
  • 6. Cyber Threat • A Cyber threat is any malicious act that attempts to gain access to a computer network without authorization or permission from the owners. • It refers to the wide range of malicious activities that can damage or disrupt a computer system, a network or the information it contain. • Most common cyber threats: Social Engineered Trojans, Unpatched Software, Phishing, Network worms, etc. 6
  • 7. Sources of Cyber Threats • Cyber threats can come from a wide variety of sources, some notable examples include: • National governments. • Terrorists. • Industrial secret agents. • Rogue employees. • Hackers. • Business competitors. • Organization insiders. 7 Anyone with a motive and the needed technology can create cyber threats.
  • 8. Cyber Threat Classifications • Threats can be classified by multiple criteria: • Attacker's Resources • Attacker's Organization • Attacker's Funding • On basis of these criteria, threats are of 3 types: • Unstructured Threats • Structured Threats • Highly Structured threats 8
  • 9. Unstructured Cyber Threats • Resources: Individual or small group. • Organization: Little or no organization. • Funding: Negligible. • Attack: Easy to detect and make use of freely available cyberattack tool. • Exploitation based on documented vulnerabilities. 9
  • 10. Structured Cyber Threats • Resources: Well trained individual or group. • Organization: Well planned. • Funding: Available. • Attack: Against particular individual or organizations.  • Exploitation based on information Gathering. 1 0
  • 11. Highly Structured Cyber Threats • Extensive organization, resources and planning over time. • Attack: Long term attack on particular machine or data. • Exploitation with multiple methods: • Technical, social and insider help. 1 1
  • 12. Cyber Security Threat Index Level • Cyber threats are evaluated daily by the CTU (counter threat unit) and associated with an threat index level. • The threat index levels are: • Level 1: Guarded. • Level 2: Elevated. • Level 3: High. • Level 4:Critical. 1 2
  • 13. Types of Cyber Attacks • Advanced Persistent Threat (APT): • A network attack in which an unauthorized person gains access to network and stays there undetected for a long period of time. • Backdoor: • Method of bypassing normal authentication and gaining access in OS or application. 1 3
  • 14. Types of Cyber Attacks Continued • Buffer Overflow: • An exploit that takes advantage of the program that is waiting for a user’s input. • Man-in-the-middle Attack • This attack intercepts and relays messages between two parties who are communicating directly with each other. 1 4
  • 15. Types of Cyber Attacks Continued • Cross-Site Scripting (XSS): • A code injection attack that allows an attacker to execute malicious JavaScript in another user’s browser. • Denial of Service Attack: • Any attack where the attackers attempt to prevent the authorized users from accessing the service. 1 5
  • 16. Types of Cyber Attacks Continued • SQL injection: • A very common exploited web application vulnerability that allows malicious hacker to steal and alter data in website’s database. • Zero-day exploit: • A vulnerability in a system or device that has been disclosed but is not yet patched. 1 6
  • 17. Impacts of Cyber Attacks • A successful cyber attack can cause major damage to organizations or systems, as well as to business reputation and consumer trust. • Some potential results include: • Financial loss. • Reputational damage. • Legal consequences. 1 7
  • 18. Types of Malicious Code • Virus: • Malicious software program, when it is executed, it replicates itself by modifying other computer programs and inserting its own code. • Network Worm: • Standalone malware which replicates itself in order to spread to other computers. 1 8
  • 19. Types of Malicious Code Continued • Trojan Horse: • A program that claims to free your computer from viruses but instead introduces viruses onto your system. • Botnet: • Used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. 1 9
  • 20. Types of Malicious Code Continued • Keylogger: • A type of surveillance technology used to monitor and record each keystroke typed on specific computer’s keyboard. • Rootkit: • Collection of tools or programs that enable administrator-level access to computer or computer network. 2 0
  • 21. Types of Malicious Code Continued • Spyware: • Software that is hidden from the user in order to gather information about internet interaction, keystrokes, passwords, and other valuable data. • Adware: • Designed to display advertisements on your computer and redirect your search requests to advertising websites to collect marketing data about you. 2 1
  • 22. Types of Malicious Code Continued • Ransomware: • Malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the user’s files unless a ransom is paid. 2 2
  • 23. What is a Vulnerability? • A cyber-security term that refers to a flaw in a system that can leave it open to attack. • Vulnerability is the composition of three elements: 1. A flaw in system. 2. Access of attacker to that flaw. 3. Capability of attacker to exploit the flaw. 2 3
  • 24. Classification of Vulnerabilities • Vulnerabilities are classified according to the asset: • Hardware. • Software. • Network. • Personal. • Physical site. • Organizational. 2 4
  • 25. Causes • Some of the vulnerability in the system occur due to: • Missing patches. • Cleartext credentials. • Using unencrypted channels. • RF Emanation. 2 5