SlideShare a Scribd company logo
1 of 28
INTRODUCTION TO IT SECURITY
OKONKWO UZONNA
Overview Of IT Security
• Security
• Concepts of Security
• Categories of Security
• Proffer solution to security lapses
• IT security (Attacks Threats & Breaches)
Definition
 Security
Is the degree of resistance –to or protection from-harm.
Categories Of Security
1. IT Environment
2. Political Environment
3. Monetary Environments
4. Physical Environment
The Concept Of Security
1. Assurance
2. Countermeasure
3. Defense in depth
4. Risk
5. Threat
6. Vulnerability
7. Exploit
Solution To Security Lapses
 Security and System design
 Detailed Security measures
a. Threat Prevention
b. Detection
c. Response
• Research on reducing vulnerabilities.
• Detailed Security Architecture.
INTRODUCTION TO IT SECURITY
 Information technology (IT) is the application of
computers and telecommunications equipment to store,
retrieve, transmit and manipulate data in business or other
enterprise.
 Security Is the degree of resistance –to or protection from-
harm.
INTRODUCTION TO IT SECURITY
 Technology is all around us and it keeps evolving. The
‘Internet of things’ brings with it new challenges. Like
Attacks, Threats & Breaches.
Threat
 It is a communicated intent to inflict harm or loss
Breaches
Are gaps in standard operating procedure or failing to
observe standard rules, written policies, guidelines and
routines, a law, agreement, or code of conduct.
History of Threats and Breaches
 1997 – Viruses & Worms
• 2004 – Adware & Spywares
History of Threats and Breaches
 2007 – DDOs & APTs
(Distributed Denial Of service & Advanced Persistent
Attack)
DDOs.
Its simply a malicious attempt to make a server or a
network resource(i.e., website, email, voice or a whole
network) unavailable to users, usually by interrupting or
suspending the services of a host connected to the Internet.
History of Threats and Breaches
APTs
is a network attack in which an unauthorized person gains access
to a network and stays there undetected for a long period of time.
The purpose of an APT attack is to steal data rather than to cause
damage.
History of Threats and Breaches
 2010 – 2014 – Dill Date
RANSOMWARE
This is simply a type of malware which
restricts access to the computer system that
it infects, and demands a ransom paid to the
creator(s) of the malware in order for the
restriction to be removed.
History of Threats and Breaches
HACTIVISIM
This is the use of computers and computer networks as a
means of protest to promote personal or political ideas,
gains and ends. E.g. Anonymous & GOP.
STATE SPONSORED INDUSTRIAL ESPIONAGE
Next Gen APTS & Utilizing Web Infrastructure
Sony attack by GOP (Guardians of Peace)
IT SECURITY
Organization everywhere are been attacked and
breached. The list is endless.
• Large corporation
• Governments
• Non profits
• Retail companies
• Social Networks
How Do These Attacks Happen.
Any modern attack comprises of three (3) Parts.
a. Social Engineering.
b. Malware Injection
c. Remote Control
How Do These Attacks Happen
a. Social Engineering.
* Identity Target
* Gather information
* Lunch attack
How Do These Attacks Happen
b. Malware Injection
* Attack Arrives
* User Clicks
* Exploits Executes
How Do These Attacks Happen
c. Remote Control
* Malware installed
* Computer controlled
* Wait for Instruction
A Bots
1. Uploading data to remote servers
2. Changes local configuration systems
3. Executes hardware- software compatibility
4. Propagates malware to other machines and even
participates in coordinating attacks against the
controllers chosen target.
Summary
Effect of Attacks & Breaches on
Customers and Clients
 Data loss
 Business interruption & loss of man-hour
 Hurting of the organization’s public image
 Cost (billions of dollars)
Notable Attacks & Breaches
Lets talk specifics
1. In 2007, American Apparel and home company, TJX was a
victim of “unauthorized computer system intrusion”. The
hacker gained access to the Data store which held credit card,
debits card, cheques value and transactions.
2. Global Surveillance Disclosures in 2013.
3. Target Stores & Home Depot Breaches by Rescator
QUESTION
HOW DO WE MITIGATE THESE ATTACKS, THREATS
AND BREACHES……..?
For me its,
* Understanding the IT industry.
* IT security solution.
THANK YOU

More Related Content

What's hot

Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and AbuseAlbrecht Jones
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computererashmi1234
 

What's hot (20)

Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Network security
Network securityNetwork security
Network security
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
06. security concept
06. security concept06. security concept
06. security concept
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
System Vulnerability and Abuse
System Vulnerability and AbuseSystem Vulnerability and Abuse
System Vulnerability and Abuse
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Basic Security Computere
Basic Security ComputereBasic Security Computere
Basic Security Computere
 

Similar to Presentation 1 security

Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptwaleejhaider1
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdfVarinSingh1
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyMohammad Febri
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 

Similar to Presentation 1 security (20)

Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management Technology
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Presentation 1 security

  • 1. INTRODUCTION TO IT SECURITY OKONKWO UZONNA
  • 2. Overview Of IT Security • Security • Concepts of Security • Categories of Security • Proffer solution to security lapses • IT security (Attacks Threats & Breaches)
  • 3. Definition  Security Is the degree of resistance –to or protection from-harm.
  • 4. Categories Of Security 1. IT Environment 2. Political Environment 3. Monetary Environments 4. Physical Environment
  • 5. The Concept Of Security 1. Assurance 2. Countermeasure 3. Defense in depth 4. Risk 5. Threat 6. Vulnerability 7. Exploit
  • 6. Solution To Security Lapses  Security and System design  Detailed Security measures a. Threat Prevention b. Detection c. Response • Research on reducing vulnerabilities. • Detailed Security Architecture.
  • 7.
  • 8. INTRODUCTION TO IT SECURITY  Information technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data in business or other enterprise.  Security Is the degree of resistance –to or protection from- harm.
  • 9. INTRODUCTION TO IT SECURITY  Technology is all around us and it keeps evolving. The ‘Internet of things’ brings with it new challenges. Like Attacks, Threats & Breaches.
  • 10. Threat  It is a communicated intent to inflict harm or loss
  • 11. Breaches Are gaps in standard operating procedure or failing to observe standard rules, written policies, guidelines and routines, a law, agreement, or code of conduct.
  • 12. History of Threats and Breaches  1997 – Viruses & Worms • 2004 – Adware & Spywares
  • 13. History of Threats and Breaches  2007 – DDOs & APTs (Distributed Denial Of service & Advanced Persistent Attack) DDOs. Its simply a malicious attempt to make a server or a network resource(i.e., website, email, voice or a whole network) unavailable to users, usually by interrupting or suspending the services of a host connected to the Internet.
  • 14. History of Threats and Breaches APTs is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The purpose of an APT attack is to steal data rather than to cause damage.
  • 15. History of Threats and Breaches  2010 – 2014 – Dill Date RANSOMWARE This is simply a type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.
  • 16. History of Threats and Breaches HACTIVISIM This is the use of computers and computer networks as a means of protest to promote personal or political ideas, gains and ends. E.g. Anonymous & GOP. STATE SPONSORED INDUSTRIAL ESPIONAGE Next Gen APTS & Utilizing Web Infrastructure Sony attack by GOP (Guardians of Peace)
  • 17. IT SECURITY Organization everywhere are been attacked and breached. The list is endless. • Large corporation • Governments • Non profits • Retail companies • Social Networks
  • 18.
  • 19. How Do These Attacks Happen. Any modern attack comprises of three (3) Parts. a. Social Engineering. b. Malware Injection c. Remote Control
  • 20. How Do These Attacks Happen a. Social Engineering. * Identity Target * Gather information * Lunch attack
  • 21. How Do These Attacks Happen b. Malware Injection * Attack Arrives * User Clicks * Exploits Executes
  • 22. How Do These Attacks Happen c. Remote Control * Malware installed * Computer controlled * Wait for Instruction
  • 23. A Bots 1. Uploading data to remote servers 2. Changes local configuration systems 3. Executes hardware- software compatibility 4. Propagates malware to other machines and even participates in coordinating attacks against the controllers chosen target.
  • 25. Effect of Attacks & Breaches on Customers and Clients  Data loss  Business interruption & loss of man-hour  Hurting of the organization’s public image  Cost (billions of dollars)
  • 26. Notable Attacks & Breaches Lets talk specifics 1. In 2007, American Apparel and home company, TJX was a victim of “unauthorized computer system intrusion”. The hacker gained access to the Data store which held credit card, debits card, cheques value and transactions. 2. Global Surveillance Disclosures in 2013. 3. Target Stores & Home Depot Breaches by Rescator
  • 27. QUESTION HOW DO WE MITIGATE THESE ATTACKS, THREATS AND BREACHES……..? For me its, * Understanding the IT industry. * IT security solution.