SlideShare a Scribd company logo
INTRODUCTION
TO
CYBER SECURITY
BY
Dr. Kailash Shaw
Introdcution to Cyber Security; Dr. Kailash Shaw 1
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and Spear Phishing
Attacks
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://www.timetoast.com/timelines/historia-web-44886443-6e77-4cc5-bc14-adf135ef51c1
Introdcution to Cyber Security; Dr. Kailash Shaw 2
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
Robert Morris
• Morris did not write the worm to cause damage
• Morris created it to highlight security flaws such as Unix
sendmail and weak passwords
• However, the code made the worm replicate excessively,
causing damages estimated around $100,000 to
$10,000,000
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998-2020: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and Spear Phishing
Attacks.
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://securityboulevard.com/2020/06/denial-of-service-dos-attacks-web-
based-application-security-part-7/Introdcution to Cyber Security; Dr. Kailash Shaw 3
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
1989: AIDS_Trojan
• Jospeh Popp creating the first ransomware attack
• virus only scrambs the names of the files and extort
money from People.
2000: ILOVEYOU Worm
1998-2020: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and Spear Phishing
Attacks.
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://www.slideshare.net/ManojKumarMishra15/ransomware-the-
clock-is-ticking
Introdcution to Cyber Security; Dr. Kailash Shaw 4
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
• The ILOVEYOU worm infected millions of computer
worldwide within a mere few hours of its release.
• The worm is one of the most damaging worms in history.
• Affected more than 500,000 systems in 2000 and
produced over $15 billion in damages, including $5.5
billion in the first week alone.
1998-2020: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and Spear Phishing
Attacks.
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://en.wikipedia.org/wiki/ILOVEYOU
Introdcution to Cyber Security; Dr. Kailash Shaw 5
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
• The first public discussions of SQL injection started
appearing at article in Phrack Magazine.
• SQL injection attack can result in confidential data
being deleted, lost or stolen; websites being defaced;
unauthorized access to systems or accounts and,
ultimately, compromise of individual machines or entire
networks
1987, 1995 , 2001-2019 Phishing and Spear Phishing
Attacks.
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://spanning.com/blog/sql-injection-attacks-web-based-application-security-part-4/
Introdcution to Cyber Security; Dr. Kailash Shaw 6
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS) Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and
Spear Phishing Attacks
1989 – 2020 Malware
Botnets
Cross-Site Scripting Attacks
https://ascensiongt.com/2019/12/29/spear-phishing/Introdcution to Cyber Security; Dr. Kailash Shaw 7
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS)
Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and
Spear Phishing Attacks
"APWG Phishing Attack Trends Reports". Retrieved May 5, 2019.
0
200,000
400,000
600,000
800,000
1,000,000
1,200,000
1,400,000
1,600,000
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Phishing Attacks
Botnets
Cross-Site Scripting Attacks
Introdcution to Cyber Security; Dr. Kailash Shaw 8
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS)
Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and
Spear Phishing Attacks
Malware
• (malicious software) is a term used to describe any
program or code that is created with the intent to do
harm to a computer, network, or server.
• In finance 7.5% atatcks are due to Malware
• Financial data Theft increases by 18.6%
• Studies shows that Company investing $6500 per hour
to deal with Malware.
Botnets
Cross-Site Scripting Attacks
https://www.cisecurity.org/blog/top-10-malware-september-
2019/
Introdcution to Cyber Security; Dr. Kailash Shaw 9
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS)
Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and
Spear Phishing Attacks
Malware
Botnets
• A network of private computers infected with malicious
software and controlled as a group without the owners'
knowledge
• In 2019 as downtime from each attack is estimated to
exceed £140,000
Cross-Site Scripting Attacks
https://blog.emsisoft.com/en/27233/what-is-a-botnet/
Introdcution to Cyber Security; Dr. Kailash Shaw 10
Cyber Threats
Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However,
cybersecurity history dates back to the 70’s, before most people even had a computer.
1971: First Computer Worm
1989: The First Denial-of-Service (DoS)
Attack
1989: AIDS_Trojan
2000: ILOVEYOU Worm
1998: SQL Injection Attack
1987, 1995 , 2001-2019 Phishing and
Spear Phishing Attacks
Cross-Site Scripting Attacks
Malware
Cross-Site Scripting (XSS) attacks are a type of injection, in
which malicious scripts are injected into otherwise benign
and trusted websites. https://spanning.com/blog/cross-site-scripting-web-based-application-
security-part-3/
Introdcution to Cyber Security; Dr. Kailash Shaw 11
Cybersecurity
 Cybersecurity is the state or process of protecting and recovering computer systems, networks, devices, and
programs from any type of cyber attack.
 Cyber attacks are an increasingly sophisticated and evolving danger to your sensitive data, as attackers
employ new methods powered by social engineering and artificial intelligence to circumvent traditional
security controls.
Why is cybercrime increasing?
• To Easily Make Money with cyber attack with ransomware,
phishing, and spyware.
• To Steal Confidential Information of Organization or Country
• Gaining Access to Financial Information, Credit Card Number,
Bank Details.
• Spoiling the Organization Fame
Factors driving the growth in cybercrime include?
• The distributed nature of the Internet
• The ability for cybercriminals to attack targets outside their
jurisdiction making policing extremely difficult
• Increasing profitability and ease of commerce on the dark web.
• The proliferation of mobile devices and the Internet of Things.
Introdcution to Cyber Security; Dr. Kailash Shaw 12
Be Careful Be Safe
https://cybercrime.gov.in/pdf/Job%20Fraud%20Brochure%
20Final.pdf
https://cybercrime.gov.in/pdf/Matrimonial%20fraud%20brochu
re%20final.pdf
https://cybercrime.gov.in/pdf/Safe%20Use%20of%20social%2
0Media%20Platform%20Brochure%20final.pdf
https://cybercrime.gov.in/pdf/Financial%20Fraud%20Bro
chures%20final.pdf Introdcution to Cyber Security; Dr. Kailash Shaw 13
Common types of cybersecurity
Network Security protects network traffic by controlling
incoming and outgoing connections to prevent threats from
entering or spreading on the network.
Data Loss Prevention (DLP) protects data by focusing on the
location, classification and monitoring of information at rest, in
use and in motion.
Cloud Security provides protection for data used in cloud-
based services and applications.
Intrusion Detection Systems (IDS) or Intrusion Prevention
Systems (IPS) work to identify potentially hostile cyber activity.
Identity and Access Management (IAM) use authentication
services to limit and track employee access to protect internal
systems from malicious entities.
Encryption is the process of encoding data to render it
unintelligible, and is often used during data transfer to prevent
theft in transit.
Antivirus/anti-malware solutions scan computer systems for
known threats. Modern solutions are even able to detect
previously unknown threats based on their behavior.
https://www.sciencedirect.com/science/article/abs/pii/S10848045160
00102
Introdcution to Cyber Security; Dr. Kailash Shaw 14
Opportunity In Cyber Security
 Strong growth:
Expected to reach $170 billion by 2020 (Forbes)
 Corporates (and even SMEs)
Investing around 20% of budget on cybersecurity
 Consumer products (anti-virus, malware, etc)
Now commoditized
 For Enterprise Security is Key
 Cyber-attacks on businesses and governments
globally driving huge spend.
 Last year, NASSCOM reported that India
alone would need 1 million cyber security
professionals by 2020.
 Companies like KPMG have doubled the size
of their cyber security teams in recent years.
Network Security Engineer:
Cyber Security Analyst
Security Architect
Cyber Security Manager:
Chief Information Security Officer (CISO): Rs 2 crores to
4 crores
Rs 12 lakhs per annum
Rs 17 lakhs per annum
Rs 6 lakhs per annum
RS 4 to 8 lakhs per annum
Introdcution to Cyber Security; Dr. Kailash Shaw 15
THANK YOU
Introdcution to Cyber Security; Dr. Kailash Shaw 16

More Related Content

What's hot

Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
Rama Reddy
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
RONIKMEHRA
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
Kanishka Ramyar
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
Mark Gibson
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
NRC
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Jay Moliya
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 

What's hot (20)

Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 

Similar to Introduction to Cyber Security

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
PrashantShukla778928
 
Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
PrashantShukla778928
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
PhD Assistance
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
NitishChoudhary23
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
AkshayKumar Kavar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
Prachi ranpura
 

Similar to Introduction to Cyber Security (20)

54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
 
Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Recently uploaded

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Introduction to Cyber Security

  • 1. INTRODUCTION TO CYBER SECURITY BY Dr. Kailash Shaw Introdcution to Cyber Security; Dr. Kailash Shaw 1
  • 2. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://www.timetoast.com/timelines/historia-web-44886443-6e77-4cc5-bc14-adf135ef51c1 Introdcution to Cyber Security; Dr. Kailash Shaw 2
  • 3. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack Robert Morris • Morris did not write the worm to cause damage • Morris created it to highlight security flaws such as Unix sendmail and weak passwords • However, the code made the worm replicate excessively, causing damages estimated around $100,000 to $10,000,000 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998-2020: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks. 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://securityboulevard.com/2020/06/denial-of-service-dos-attacks-web- based-application-security-part-7/Introdcution to Cyber Security; Dr. Kailash Shaw 3
  • 4. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan • Jospeh Popp creating the first ransomware attack • virus only scrambs the names of the files and extort money from People. 2000: ILOVEYOU Worm 1998-2020: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks. 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://www.slideshare.net/ManojKumarMishra15/ransomware-the- clock-is-ticking Introdcution to Cyber Security; Dr. Kailash Shaw 4
  • 5. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm • The ILOVEYOU worm infected millions of computer worldwide within a mere few hours of its release. • The worm is one of the most damaging worms in history. • Affected more than 500,000 systems in 2000 and produced over $15 billion in damages, including $5.5 billion in the first week alone. 1998-2020: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks. 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://en.wikipedia.org/wiki/ILOVEYOU Introdcution to Cyber Security; Dr. Kailash Shaw 5
  • 6. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack • The first public discussions of SQL injection started appearing at article in Phrack Magazine. • SQL injection attack can result in confidential data being deleted, lost or stolen; websites being defaced; unauthorized access to systems or accounts and, ultimately, compromise of individual machines or entire networks 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks. 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://spanning.com/blog/sql-injection-attacks-web-based-application-security-part-4/ Introdcution to Cyber Security; Dr. Kailash Shaw 6
  • 7. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks 1989 – 2020 Malware Botnets Cross-Site Scripting Attacks https://ascensiongt.com/2019/12/29/spear-phishing/Introdcution to Cyber Security; Dr. Kailash Shaw 7
  • 8. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks "APWG Phishing Attack Trends Reports". Retrieved May 5, 2019. 0 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000 1,600,000 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Phishing Attacks Botnets Cross-Site Scripting Attacks Introdcution to Cyber Security; Dr. Kailash Shaw 8
  • 9. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks Malware • (malicious software) is a term used to describe any program or code that is created with the intent to do harm to a computer, network, or server. • In finance 7.5% atatcks are due to Malware • Financial data Theft increases by 18.6% • Studies shows that Company investing $6500 per hour to deal with Malware. Botnets Cross-Site Scripting Attacks https://www.cisecurity.org/blog/top-10-malware-september- 2019/ Introdcution to Cyber Security; Dr. Kailash Shaw 9
  • 10. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks Malware Botnets • A network of private computers infected with malicious software and controlled as a group without the owners' knowledge • In 2019 as downtime from each attack is estimated to exceed £140,000 Cross-Site Scripting Attacks https://blog.emsisoft.com/en/27233/what-is-a-botnet/ Introdcution to Cyber Security; Dr. Kailash Shaw 10
  • 11. Cyber Threats Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the 70’s, before most people even had a computer. 1971: First Computer Worm 1989: The First Denial-of-Service (DoS) Attack 1989: AIDS_Trojan 2000: ILOVEYOU Worm 1998: SQL Injection Attack 1987, 1995 , 2001-2019 Phishing and Spear Phishing Attacks Cross-Site Scripting Attacks Malware Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. https://spanning.com/blog/cross-site-scripting-web-based-application- security-part-3/ Introdcution to Cyber Security; Dr. Kailash Shaw 11
  • 12. Cybersecurity  Cybersecurity is the state or process of protecting and recovering computer systems, networks, devices, and programs from any type of cyber attack.  Cyber attacks are an increasingly sophisticated and evolving danger to your sensitive data, as attackers employ new methods powered by social engineering and artificial intelligence to circumvent traditional security controls. Why is cybercrime increasing? • To Easily Make Money with cyber attack with ransomware, phishing, and spyware. • To Steal Confidential Information of Organization or Country • Gaining Access to Financial Information, Credit Card Number, Bank Details. • Spoiling the Organization Fame Factors driving the growth in cybercrime include? • The distributed nature of the Internet • The ability for cybercriminals to attack targets outside their jurisdiction making policing extremely difficult • Increasing profitability and ease of commerce on the dark web. • The proliferation of mobile devices and the Internet of Things. Introdcution to Cyber Security; Dr. Kailash Shaw 12
  • 13. Be Careful Be Safe https://cybercrime.gov.in/pdf/Job%20Fraud%20Brochure% 20Final.pdf https://cybercrime.gov.in/pdf/Matrimonial%20fraud%20brochu re%20final.pdf https://cybercrime.gov.in/pdf/Safe%20Use%20of%20social%2 0Media%20Platform%20Brochure%20final.pdf https://cybercrime.gov.in/pdf/Financial%20Fraud%20Bro chures%20final.pdf Introdcution to Cyber Security; Dr. Kailash Shaw 13
  • 14. Common types of cybersecurity Network Security protects network traffic by controlling incoming and outgoing connections to prevent threats from entering or spreading on the network. Data Loss Prevention (DLP) protects data by focusing on the location, classification and monitoring of information at rest, in use and in motion. Cloud Security provides protection for data used in cloud- based services and applications. Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) work to identify potentially hostile cyber activity. Identity and Access Management (IAM) use authentication services to limit and track employee access to protect internal systems from malicious entities. Encryption is the process of encoding data to render it unintelligible, and is often used during data transfer to prevent theft in transit. Antivirus/anti-malware solutions scan computer systems for known threats. Modern solutions are even able to detect previously unknown threats based on their behavior. https://www.sciencedirect.com/science/article/abs/pii/S10848045160 00102 Introdcution to Cyber Security; Dr. Kailash Shaw 14
  • 15. Opportunity In Cyber Security  Strong growth: Expected to reach $170 billion by 2020 (Forbes)  Corporates (and even SMEs) Investing around 20% of budget on cybersecurity  Consumer products (anti-virus, malware, etc) Now commoditized  For Enterprise Security is Key  Cyber-attacks on businesses and governments globally driving huge spend.  Last year, NASSCOM reported that India alone would need 1 million cyber security professionals by 2020.  Companies like KPMG have doubled the size of their cyber security teams in recent years. Network Security Engineer: Cyber Security Analyst Security Architect Cyber Security Manager: Chief Information Security Officer (CISO): Rs 2 crores to 4 crores Rs 12 lakhs per annum Rs 17 lakhs per annum Rs 6 lakhs per annum RS 4 to 8 lakhs per annum Introdcution to Cyber Security; Dr. Kailash Shaw 15
  • 16. THANK YOU Introdcution to Cyber Security; Dr. Kailash Shaw 16