SlideShare a Scribd company logo
Learning Outcomes
1. Understand network threat
2. Explain methods of attacks
3. Implement security measures to
protect networks
Introduction
• People use network to exchange sensitive
information with each other.
• Network security is a shared responsibility
that each person must accept when they
connect to the network.
• This chapter: you will learn about threats that
exist and how to protect your computer &
information.
Network Threat & Intrusion
Threats??
• Threat is a possible danger that might exploit
a vulnerability to breach security and cause possible
harm.
• Vulnerability is a weakness which allows attacker to
reduce a system's information assurance.
• “Ancaman”
Intrusion??
• Intrusion is an attacks to a network can be cause the
result in a loss of time and money due to damage or
theft of important information or assets.
• Intruders can hack the software vulnerabilities,
hardware attacks or any method to modifying software
or exploiting software vulnerabilities
• “Pencerobohan”
Types of Threats and Intrusions
Threats &
Intrusions
Malicious
Code
Hacking
Data Loss/
Manipulation
Disruption
of Service
Natural
Disaster
Theft
Information
Theft
Identity
Theft
Malicious Code (Malware/Malcode)
1. Malicious code is code causing damage to
a computer or system.
2. It also can get into networks and spread.
3. It can also send messages through email
and steal information.
4. Example: Virus, Trojan, Spyware, Adware,
and etc.
Hacking
1. Hacking is any technical effort to
manipulate the normal behavior of network
connections and connected systems.
2. Hackers gain access to the network and
may arise:
i. Data Loss / Data Manipulation
ii. Disruption of Service
Hacking (cont…)
Data Loss / Data Manipulation
• Breaking into a computer to destroy / alter
data records.
• Example of data loss:
– Sending virus the reformats a computer’s hard
drive.
• Example of data manipulation:
– Breaking into a records system to change
information such as price item.
Hacking (cont…)
Disruption of Service
• Preventing legitimate users from
accessing services to which they should
be entitled.
• Example:
– Disruption of PTSS user login to check
examination result system.
Natural Disaster
1. Natural disaster causes by flood, fire, storm
and etc.
2. Disaster recovery planning - how data
would be recovered.
3. Example of recovery planning:
• On-site standby – duplicate system/data
• Off-site standby – duplicate across the site
• Reciprocal agreements – hire the firm that
offer commercial recovery as a service
Theft
1. Theft is the taking of another
person's property without that person's
permission / crimes against property.
2. Types of Theft:
i. Information theft
ii. Identity theft
Theft (cont…)
Information Theft
• Breaking into a computer to obtain
confidential information.
• Information can be used or sold for
various purposes.
• Example:
– Stealing a organization’s proprietary
information such as design, research and
development info.
Theft (cont…)
Identity Theft
• A form of information theft where personal
information is stolen for the purpose of
taking over someone’s identity.
• Example:
– Stole information an individual to use her/his
legal documents.
– Apply credit and make unauthorized online
purchases.
Test your knowledge????
1
2
3
4
5
Sources of Network Intrusion
Source of network intrusion
Security threats from network intruders can come
from both internal and external sources
External Sources
• External threats arise from individuals
working outside of an organization.
• They do not have authorized access to the
computer systems or network.
• External attackers work their way into a
network mainly from the Internet, wireless
links or dialup access servers.
Internal Sources
• Internal threats occur when someone has
authorized access to the network through a
user account or have physical access to the
network equipment.
• The internal attacker knows the internal
politics and people.
• They often know what information is both
valuable and vulnerable and how to get to it.
Social Engineering
Social Engineering
• SE  methods of exploiting human
weaknesses.
• Social engineering is a term that refers to the
ability of something or someone to influence
the behavior of a group of people.
• SE is collection of techniques used to deceive
internal users into performing specific actions
or revealing confidential information.
Social Engineering (cont…)
Social Engineering (cont…)
• Attacker takes advantage of unsuspecting
legitimate users to gain access to internal
resources and private information, such as
bank account numbers or passwords.
• Three of the most commonly used techniques
in social engineering are: pretexting, phishing,
and vishing.
Continue Next Class…
I don’t stop when I’m tired.
I only stop when I’m done…
Group presentation
• Each group need to present about
threat and intrusion. From the topic
given, each group must prepare slide
presentation to describe detail about
the topic. Content in your slide follow
as above :
• 1. Definition
• 2. Advantage and disadvantage
• 3. Example

More Related Content

What's hot

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutirysefreed
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
Murray Security Services
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
primeteacher32
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
Preethi T G
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
Greater Noida Institute Of Technology
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
G Prachi
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Pratum
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
Rasheed Ur Rehman
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
kiran yadav
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
SHUBHA CHATURVEDI
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
O'leary Cyber Secutiry
O'leary Cyber SecutiryO'leary Cyber Secutiry
O'leary Cyber Secutiry
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .Hacking and protecting yourself from hackers .
Hacking and protecting yourself from hackers .
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Ethical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )RasheedEthical hacking-presentation-updated(1by )Rasheed
Ethical hacking-presentation-updated(1by )Rasheed
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Hackers
HackersHackers
Hackers
 
INTRODUCTION TO SECURITY
INTRODUCTION TO SECURITYINTRODUCTION TO SECURITY
INTRODUCTION TO SECURITY
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 

Similar to Topic 5.0 basic security part 1

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
EndAlk15
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
SubhadipDutta36
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
MsVaishaliKumar
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
BilalMehmood44
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
Royalzig Luxury Furniture
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
ZeeshanMajeed15
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
deepakbharathi16
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
Dibyesh1
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
Yasmeen Shaikh
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breaches
DeepakDeepu503835
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
DrPraveenKumar37
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
perweeng31
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 

Similar to Topic 5.0 basic security part 1 (20)

Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Network security
Network securityNetwork security
Network security
 
Data Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breachesData Breaches and Prevention of the Data breaches
Data Breaches and Prevention of the Data breaches
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber securityCyber Sequrity.pptx is life of cyber security
Cyber Sequrity.pptx is life of cyber security
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 

More from Atika Zaimi

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
Atika Zaimi
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
Atika Zaimi
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking media
Atika Zaimi
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
Atika Zaimi
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
Atika Zaimi
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
Atika Zaimi
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
Atika Zaimi
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devices
Atika Zaimi
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networking
Atika Zaimi
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
Atika Zaimi
 

More from Atika Zaimi (10)

Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking media
 
Topic 2.4 network services
Topic 2.4 network servicesTopic 2.4 network services
Topic 2.4 network services
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Topic 2.2 network protocol
Topic 2.2 network protocolTopic 2.2 network protocol
Topic 2.2 network protocol
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devices
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Topic 5.0 basic security part 1

  • 1.
  • 2. Learning Outcomes 1. Understand network threat 2. Explain methods of attacks 3. Implement security measures to protect networks
  • 3. Introduction • People use network to exchange sensitive information with each other. • Network security is a shared responsibility that each person must accept when they connect to the network. • This chapter: you will learn about threats that exist and how to protect your computer & information.
  • 4. Network Threat & Intrusion
  • 5. Threats?? • Threat is a possible danger that might exploit a vulnerability to breach security and cause possible harm. • Vulnerability is a weakness which allows attacker to reduce a system's information assurance. • “Ancaman”
  • 6. Intrusion?? • Intrusion is an attacks to a network can be cause the result in a loss of time and money due to damage or theft of important information or assets. • Intruders can hack the software vulnerabilities, hardware attacks or any method to modifying software or exploiting software vulnerabilities • “Pencerobohan”
  • 7. Types of Threats and Intrusions Threats & Intrusions Malicious Code Hacking Data Loss/ Manipulation Disruption of Service Natural Disaster Theft Information Theft Identity Theft
  • 8. Malicious Code (Malware/Malcode) 1. Malicious code is code causing damage to a computer or system. 2. It also can get into networks and spread. 3. It can also send messages through email and steal information. 4. Example: Virus, Trojan, Spyware, Adware, and etc.
  • 9. Hacking 1. Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. 2. Hackers gain access to the network and may arise: i. Data Loss / Data Manipulation ii. Disruption of Service
  • 10. Hacking (cont…) Data Loss / Data Manipulation • Breaking into a computer to destroy / alter data records. • Example of data loss: – Sending virus the reformats a computer’s hard drive. • Example of data manipulation: – Breaking into a records system to change information such as price item.
  • 11. Hacking (cont…) Disruption of Service • Preventing legitimate users from accessing services to which they should be entitled. • Example: – Disruption of PTSS user login to check examination result system.
  • 12. Natural Disaster 1. Natural disaster causes by flood, fire, storm and etc. 2. Disaster recovery planning - how data would be recovered. 3. Example of recovery planning: • On-site standby – duplicate system/data • Off-site standby – duplicate across the site • Reciprocal agreements – hire the firm that offer commercial recovery as a service
  • 13. Theft 1. Theft is the taking of another person's property without that person's permission / crimes against property. 2. Types of Theft: i. Information theft ii. Identity theft
  • 14. Theft (cont…) Information Theft • Breaking into a computer to obtain confidential information. • Information can be used or sold for various purposes. • Example: – Stealing a organization’s proprietary information such as design, research and development info.
  • 15. Theft (cont…) Identity Theft • A form of information theft where personal information is stolen for the purpose of taking over someone’s identity. • Example: – Stole information an individual to use her/his legal documents. – Apply credit and make unauthorized online purchases.
  • 17. Sources of Network Intrusion
  • 18. Source of network intrusion Security threats from network intruders can come from both internal and external sources
  • 19. External Sources • External threats arise from individuals working outside of an organization. • They do not have authorized access to the computer systems or network. • External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.
  • 20. Internal Sources • Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. • The internal attacker knows the internal politics and people. • They often know what information is both valuable and vulnerable and how to get to it.
  • 22. Social Engineering • SE  methods of exploiting human weaknesses. • Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people. • SE is collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.
  • 24. Social Engineering (cont…) • Attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords. • Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.
  • 26. I don’t stop when I’m tired. I only stop when I’m done…
  • 27. Group presentation • Each group need to present about threat and intrusion. From the topic given, each group must prepare slide presentation to describe detail about the topic. Content in your slide follow as above : • 1. Definition • 2. Advantage and disadvantage • 3. Example