CYBER SECURITY
1
INTRODUCTION
 Internet also has it’s own disadvantages - Cyber crime- illegal activity committed on
the internet.
 Cyber security refers to the technologies and processes designed to protect computers,
networks and data from unauthorized access, vulnerabilities and attacks delivered via
the Internet by cyber criminals.
 Cyber security standards are security standards which enable organizations to practice
safe security techniques to minimize the number of successful cyber security attacks.
2
 3 core Principles of Cyber Security:
 Confidentiality
 Integrity
 Availability
 Confidentiality: Sensitive / Confidential - remain & shared - appropriate users.
 Integrity: Integrity in information and not be altered .
 Availability: Information & Systems - available who need it.
3
WHY CYBER SECURITY IMPORTANT
 Securing data from threats :
 Avoid Data Breaches
 Analysis of vulnerabilities in compiled software without source code
 Phishing
 Viruses/Intrusions
 Data Exposure
4
TYPES OF CYBER ATTACKS
 Malware
 Phishing
 Password Attacks
 Denial-of-Service (DoS) Attacks
 Drive-By Downloads
 Malvertising
5
6
7
8
9
MORRIS
WORM
• 1998 – Large
USA users –
UNIX System
failure – Robert
Tappan Morris
SLAMMER
WORM
• 2003
• 75,000
• Internet Hosts
• Net Traffic Slow
WANK WORM
• 2006
• NASA
• Block
Attachment
Emails
• Before launch of
Galileo Space
Shuttle
DoS
• Iranian Cyber
Army
• 2010
• Baidu –Chinese
Search Engine
• Iranian Political
Pages
COMPLEX
MALWARE
• 2012
• Red October
• Office Program
– Word
• Eastern Europe ,
Asia
• Confidential
Info. – Govt
SERVER
MESSAGE
BLOCK
WORM
• 2014
• Guardians of
Peace
• Sony Pictures
Entertainment
• Employee -
Personal
Information
EVOLUTION OF
CYBER ATTACKS
MAJOR CYBER ATTACKS
 Anthem
Hackers breached a database that contained 80 million records of current, former customers
and employees. The information accessed included names, Social Security numbers, birthdays,
addresses, email and employment information, including income.
 Ashley Madison
Credit card details – of over 11 million users was leaked.
10
 TalkTalk
The mobile phone provider was the target of a bunch of teenage hackers who stole the details
of over 20,000 customers.
The company was left with a bill of £35 million, having had millions wiped off its share price,
and is facing law suits from customers and investors.
 EBay
eBay exposed that the hacking managed to take personal record of 233 million customers.
Data such as phone numbers, usernames, physical addresses, passwords were compromised.
11
12SPECIAL REFERNCE TO INDIA
13
COMMON ATTACK PATTERNS
 Insider and privilege misuse
 Physical theft and loss
 Web app attacks
 Denial-of-service attacks
 Cyber-espionage.
 POS intrusions
 Payment card skimmers.
14
MEASURES TO PREVENT CYBER
ATTACKS
 A cyber countermeasure is defined as an action, process, technology, device, or
system that serves to prevent or mitigate the effects of a cyber attack against a
computer, server, network or associated device.
15
1. Use Complex Passwords
2. Limit Access to Critical Data
3. Secure Your Wi-Fi Network
4. Introduce Encryption Software
5. Take Regular Back-up
6. Secure Laptops and Smartphones
7. Impart Cyber Security Policies to Employees
16
2016 CYBER SECURITY COMPANIES
 IBM Security
Sector: Enterprise IT Security Solutions
Corporate HQ: Waltham, Mass.
 CISCO
Sector: Threat Protection and Network Security
Corporate HQ: San Jose, Calif.
 root9B
Sector: Cyber security Consulting and Operational Support
Corporate HQ: Colorado Springs, Colo.
17
18

CYBER SECURITY

  • 1.
  • 2.
    INTRODUCTION  Internet alsohas it’s own disadvantages - Cyber crime- illegal activity committed on the internet.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.  Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. 2
  • 3.
     3 corePrinciples of Cyber Security:  Confidentiality  Integrity  Availability  Confidentiality: Sensitive / Confidential - remain & shared - appropriate users.  Integrity: Integrity in information and not be altered .  Availability: Information & Systems - available who need it. 3
  • 4.
    WHY CYBER SECURITYIMPORTANT  Securing data from threats :  Avoid Data Breaches  Analysis of vulnerabilities in compiled software without source code  Phishing  Viruses/Intrusions  Data Exposure 4
  • 5.
    TYPES OF CYBERATTACKS  Malware  Phishing  Password Attacks  Denial-of-Service (DoS) Attacks  Drive-By Downloads  Malvertising 5
  • 6.
  • 7.
  • 8.
  • 9.
    9 MORRIS WORM • 1998 –Large USA users – UNIX System failure – Robert Tappan Morris SLAMMER WORM • 2003 • 75,000 • Internet Hosts • Net Traffic Slow WANK WORM • 2006 • NASA • Block Attachment Emails • Before launch of Galileo Space Shuttle DoS • Iranian Cyber Army • 2010 • Baidu –Chinese Search Engine • Iranian Political Pages COMPLEX MALWARE • 2012 • Red October • Office Program – Word • Eastern Europe , Asia • Confidential Info. – Govt SERVER MESSAGE BLOCK WORM • 2014 • Guardians of Peace • Sony Pictures Entertainment • Employee - Personal Information EVOLUTION OF CYBER ATTACKS
  • 10.
    MAJOR CYBER ATTACKS Anthem Hackers breached a database that contained 80 million records of current, former customers and employees. The information accessed included names, Social Security numbers, birthdays, addresses, email and employment information, including income.  Ashley Madison Credit card details – of over 11 million users was leaked. 10
  • 11.
     TalkTalk The mobilephone provider was the target of a bunch of teenage hackers who stole the details of over 20,000 customers. The company was left with a bill of £35 million, having had millions wiped off its share price, and is facing law suits from customers and investors.  EBay eBay exposed that the hacking managed to take personal record of 233 million customers. Data such as phone numbers, usernames, physical addresses, passwords were compromised. 11
  • 12.
  • 13.
  • 14.
    COMMON ATTACK PATTERNS Insider and privilege misuse  Physical theft and loss  Web app attacks  Denial-of-service attacks  Cyber-espionage.  POS intrusions  Payment card skimmers. 14
  • 15.
    MEASURES TO PREVENTCYBER ATTACKS  A cyber countermeasure is defined as an action, process, technology, device, or system that serves to prevent or mitigate the effects of a cyber attack against a computer, server, network or associated device. 15
  • 16.
    1. Use ComplexPasswords 2. Limit Access to Critical Data 3. Secure Your Wi-Fi Network 4. Introduce Encryption Software 5. Take Regular Back-up 6. Secure Laptops and Smartphones 7. Impart Cyber Security Policies to Employees 16
  • 17.
    2016 CYBER SECURITYCOMPANIES  IBM Security Sector: Enterprise IT Security Solutions Corporate HQ: Waltham, Mass.  CISCO Sector: Threat Protection and Network Security Corporate HQ: San Jose, Calif.  root9B Sector: Cyber security Consulting and Operational Support Corporate HQ: Colorado Springs, Colo. 17
  • 18.

Editor's Notes

  • #14 Motives of the attack also help affected companies design their cyber defences