The document discusses cyber security threats. It begins with definitions of cyber security and cyber crime. It then covers the history of security from prehistoric times to modern cryptography. Various cyber crimes are outlined like phishing and child pornography. Cyber threats include ransomware, espionage, and advanced persistent threats from hackers. Basic cyber security practices are suggested like education, using antivirus software, and avoiding public Wi-Fi. The presentation concludes with a demonstration of email spamming and a cyber security awareness video.
1. The Emerging Threats Of
Cyber Security
John Patrick Lita
Information Security Consultant
For ICCT College Students
2. • What is Cyber Security
• What is Cyber Crime
• History of Security
• Threats and Crimes
AGENDA
3. • Cyber security is the
body of technologies,
processes and practices
designed to protect
networks, computers,
programs and data from
attack, damage or
unauthorized access. In
a computing context,
the term security implies
cyber security.
WHAT IS CYBER SECURITY?
Source: whatis.techtarget.com/definition/cybersecurity
4. • Computer crime, or
cybercrime, is crime that
involves a computer and a
network. The computer
may have been used in the
commission of a crime, or it
may be the target.
WHAT IS CYBER CRIME?
https://en.wikipedia.org/wiki/Cybercrime
5. • Let’s talk about a little throwback about the history of
security and how it develops day by day, from physical
security to digital security
THE HISTORY
6. THE STONE AGE
Caveman use rocks,
braches and other natural
resources to fight predators
over time, the tools used
evolved to spears, bows
and arrows,
7. • Guard dogs started to appear around 30,000 BC
THE STONE AGE
8. SECURITY EVOLVES 3150 BC
followed by a moat around a castle in 3150 BC
the industrial revolution
12. SECURITY EVOLVES 18TH/19TH CENTURY
Cryptography: 18th and 19th Century
Cryptography made its presence felt in the 18 and 1900's,
where as vaults started appearing in the 18th and 19th
century.
13. SECURITY EVOLVES 1990S
Write protecting on floppy disc was prevalent in the 1990s, which
brings us to where we are today. the age of tokenization and
advanced cryptography that protects data at rest and data
transmit...
17. • Cyberspace lies at the heart of modern society; it impacts our
personal lives, our businesses and our essential services. Cyber
security embraces both the public and the private sector and
spans a broad range of issues related to national security,
whether through terrorism, crime or industrial espionage.
• E-crime, or cyber crime, whether relating to theft, hacking or
denial of service to vital systems, has become a fact of
life. The risk of industrial cyber espionage, in which one
company makes active attacks on another, through
cyberspace, to acquire high value information is also very
real.
• Cyber terrorism presents challenges for the future. We have to
be prepared for terrorists seeking to take advantage of our
increasing internet dependency to attack or disable key
systems.
• CPNI works with the Cabinet Office and lead Government
departments and agencies to drive forward the UK's cyber
security programme to counter these threats.
CYBER THREAT'S
Source: http://www.cpni.gov.uk/threats/other-threats/
19. RANSOMWARE
Ransomware is a type of malware that can be covertly installed on a
computer without knowledge or intention of the user that restricts access
to the infected computer system in some way, and demands that the user
pay a ransom to the malware operators to remove the restriction.
Source: https://en.wikipedia.org/wiki/Ransomware
20. ESPIONAGE
Espionage (colloquially,
spying) is the obtaining of
information considered
secret or confidential
without the permission of
the holder of the
information. Espionage can
be committed by an
individual or a spy ring (a
cooperating group of
spies), in the service of a
government or a company,
or operating independently.
Source: https://en.wikipedia.org/wiki/Espionage
21. ADVANCE PERSISTENT THREAT (APT)
An advanced persistent
threat (APT) is a network
attack in which an
unauthorized person gains
access to a network and
stays there undetected for a
long period of time. The
intention of an APT attack is
to steal data rather than to
cause damage to the
network or organization.
Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
22. • Cyber crime is where the
computer is use to commit
crime.
• Criminal can hide their identity
on the internet, the power of
(Anonymity)
• Cyber Crime can rub a bank
without physical appearance
• Any can be a victim as long a
you are connected on the
internet
WHY SHOULD WE CARE?
23. • Basic information security education
• Never rely your safety with your anti-virus, be intelligent
and be a responsible internet user
• Never connect in public Wi-Fi,
• Download in a trusted website
HOW CAN WE PROTECT?