Cyber security & Importance of Cyber Security

Mohammed Adam
Mohammed AdamSecurity Researcher
Cyber security
Presentation On
What is Cybersecurity?
♦ The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
♦ Cyber Security and Information Security differs only in its
response and Reduction/Prevention.
♦ Cyber security encompasses all aspects of security viz.,
Physical, Technical, Environmental, Regulations and
Compliance including Third Parties involved in delivering
an objective
♦ With an increasing amount of people getting connected to
Internet, the security threats that cause massive harm
are increasing also
Why Cybersecurity Is Important ?
• Our world today is ruled by technology and we can’t
do without it at all. From booking our flight tickets, to
catching up with an old friend, technology plays an
important role in it.
• However, the same technology may expose you when
it’s vulnerable and could lead to loss of essential data.
Cyber security, alongside physical commercial
security has thus, slowly and steadily, become one of
the most important topics in the business industry to
be talked about.
• Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.
Why Cybersecurity is Important?
♦ Cyber security becomes important as Business
are being carried now on Network of Networks.
Computer networks have always been the
target of criminals, and it is likely that the
danger of cyber security breaches will only
increase in the future as these networks
expand, but there are sensible precautions
that organizations can take to minimize losses
from those who seek to do harm.
Cyber Security Objectives
Confidentiality
♦ the property that information is not
made available or disclosed to
unauthorized individuals, entities, or
processes
Confidentiality
♦ Confidentiality refers to protecting information
from being accessed by unauthorized parties.
In other words, only the people who are
authorized to do so can gain access to
sensitive data.
♦ A failure to maintain confidentiality means that
someone who shouldn't have access has
managed to get it, through intentional
behavior or by accident. Such a failure of
confidentiality, commonly known as a breach
Integrity
the property of safeguarding the accuracy
and completeness of assets
Integrity
♦ Integrity refers to ensuring the authenticity of
information—that information is not altered,
and that the source of the information is
genuine.
♦ Imagine that you have a website and you sell
products on that site. Now imagine that an
attacker can shop on your web site and
maliciously alter the prices of your products,
so that they can buy anything for whatever
price they choose. That would be a failure of
integrity, because your information—in this
case, the price of a product—has been altered
and you didn't authorize this alteration
Availability
♦ The property of being accessible and
usable upon demand by an authorized
entity
Availability
♦ Availability means that information is
accessible by authorized users.
♦ Information and other critical assets are
accessible to customers and the
business when needed. Note,
information is unavailable not only when
it is lost or destroyed, but also when
access to the information is denied or
delayed
Cyberspace as a Battleground?
Each day, there is an increase in the number of threats
against our nation's critical infrastructures.
These threats come in the form of computer intrusion
(hacking), denial of service attacks, and virus
deployment.
In India DEITY-Dept., of Electronics & Information
Technology operating under MCIT-Ministry of
Communication & Information Technology is responsible
for Cyberspace security other than delivering Govt.,
services online and promoting the IT Sector.
The National Information Board (NIB) a policy making
body for cyber security operates independently and is
chaired by National Security Advisor (NSA)
CERT-In performs emergency cyber security functions and
releases annual reports on security incidents
Cyber attack
♦ A malicious attempt, using digital
technologies, to cause personal or property
loss or damage, and/or steal or alter
confidential personal or organizational data
Major security problems
♦ Virus
♦ Hacker
♦ Malware
♦ Trojan horses
♦ Password cracking
Viruses and worms
♦ Virus – malware attached to a carrier such as
an email message or a word processing
document
♦ A Virus is a “program that is loaded onto your
computer without your knowledge and runs
against your wishes
♦ Worm – malware can autonomously spread
itself without a carrier, using information
about connected computers
Solution
♦ Install a security suite that protects the
computer against threats such as
viruses and worms.
Hackers
♦ In common a hacker is a person who
breaks into computers, usually by
gaining access to administrative
controls.
Types of Hackers
♦ White Hat Hacker
♦ Grey Hat Hacker
♦ Black Hat Hacker
Whit Hat Hackers
♦ The term "white hat" in Internet slang
refers to an ethical computer hacker, or
a computer security expert, who
specializes in penetration testing and in
other testing methodologies to ensure
the security of an organization's
information systems.
Grey Hat Hackers
♦ The term "grey hat", "greyhat" or "gray
hat" refers to a computer hacker or
computer security expert who may
sometimes violate laws or typical ethical
standards, but does not have the
malicious intent typical of a black hat
hacker.
Black Hat Hackers
♦ A black hat hacker (or black-hat hacker)
is a hacker who "violates computer
security for little reason beyond
maliciousness or for personal gain".
How To prevent hacking
♦ It may be impossible to prevent
computer hacking, however effective
security controls including strong
passwords, and the use of firewalls can
helps.
Malware
♦ The word "malware" comes from the
term "MALicious softWARE."
♦ Software that has some malicious intent
and which is installed on a user’s
computer without that user’s consent.
♦ Key loggers – Software installed on a
computer that captures key strokes and
sends these to a remote system. Used
to try and get personal information to
gain access to sites such as banks
Malware Cont.
♦ Ransomware– Software that runs on a
user’s computer and demands that the
user pays some other organization. If
they don’t, the information on their
computer will be destroyed.
♦ Malware can usually spread itself from
one computer to another either as a
virus or as a worm
To Stop Malware
♦ Download an anti-malware program
that also helps prevent infections.
♦ Do not download from unknown sources
♦ Activate Network Threat Protection,
Firewall, Antivirus.
Trojan Horses
♦ Trojan horses are
email viruses that can
duplicate themselves,
steal information, or
harm the computer
system.
♦ These viruses are the
most serious threats
to computers
How to Avoid Trojans
♦ Security suites, such as Avast Internet
Security, will prevent you from
downloading Trojan Horses.
♦ Do not click unknown links.
Password Cracking
♦ Password attacks are attacks by
hackers that are able to determine
passwords or find passwords to different
protected electronic areas and social
network sites.
Securing Password
♦ Use always Strong password. Never use
same password for two different sites.
Insider attacks
♦ Attacks to an organization carried out
by someone who is inside that
organization either by himself or with
connivance of an outsider.
♦ • Difficult to counter using technical
methods as the insider may have valid
credentials to access the system
External attacks
♦ Attacks to an organisation carried out
by an external agent
♦ Requires either valid credentials or the
exploitation of some vulnerability to
gain access to the systems
Malicious and accidental damage
♦ Cybersecurity is most concerned with
– Cyber attacks
♦ Cyber-accidents – Accidental events
that can cause loss or damage to to an
individual, business or public body.
♦ Many of the same technologies used to
protect against external attack also
protect against cyber-accidents.
♦ However, sometimes protecting against
cyber attacks increases the probability
of cyber-accidents.
Analysis of Information Security
Threats
• WHO
– 98% from external
agents
– 4% from implicated
internal employees
– < 1% by Business
Partners &
– 58% of all data thefts
linked to activist
groups
• WHO
– 98% from external
agents
– 4% from implicated
internal employees
– < 1% by Business
Partners &
– 58% of all data thefts
linked to activist
groups
Latest Trends – Information
Security Threats
Hacktivism
- Hack + Activism = Hacktivism
- the use of legal and/or illegal digital tools in pursuit of a political /
personal objective
- Tools and Attacks are used for
- Web-site defacements
- Redirects
- Denial Of Service Attacks
- Identity Theft
- E-mail Bombing
- Web-Site Mirroring
- Doxing – To gather information using sourced on the internet
Web Site Defacement
♦ Web Site Defacements – Hacking and altering
the website of a company’s website.
Identity Fraud / Identity Theft
♦ Stealing someone's identity in which someone pretends
to be someone else by assuming that person's identity
Doxing
♦ Process of Gathering and releasing Personally
Identifiable information
Denial Of Service Attack
• Attempt to make a machine or network resource
unavailable to its intended users
• typically target sites or services hosted on high-profile
web servers such as banks, credit card payment
gateways, and even root nameservers.
Key Techniques Used
♦ Phishing - attempt to acquire sensitive information,
like bank account information or an account password,
by posing as a legitimate entity in an electronic
communication
 You get an email that looks like it comes from your
bank, credit card company, etc.
 Asking you to “update their records” may be due to
potential fraud, other reasons
 Provides a hyperlink to a web page where you enter
your personal information
 The link takes you to a thief’s website that is disguised
to look like the company’s.
Key Technique Used
• Step 1 - Preparation
– Setup fake website
• Step 2 - Luring the
users
– Send Email with fake
link
• Step 3 - Steal the
details
– User gives away
id/password
• Step 4 - Use the details
– Commit fraud
Real Web SiteReal Web Site
PhisherPhisher
VictimVictim
Phishing email
User’s response
(id/password)
Use of stolen (id/password)
information
Phishing How-to
Most common security mistakes
• Poor password management
• Not locking the computer while unattended
• Opening email attachments from unknown addressees
• Not running anti-virus programs
• Sharing information (and machines)
• Not reporting security violations
• Unattended Paper Documents
• Unprotected Electronic Data (while at rest and in
motion).E.g: Emails, USB’s, CD’s, etc..
• Improper Information Handling
• Passing of information over Phone.
Information Security Responsibilities
• Engage Information Security teams to support the line of business,
enabling secure solutions for new processes and technology
• Work with Information Security teams RISO, RISI to drive line of
business-specific information security metrics reporting
• Support Regional Information Security teams in mitigating security
risks from Internal Audit report findings
• Follow business continuity plans given by bank, in case of any
disaster/ emergency.
• Report Security Violations and security incidents
• Adhere to Bank’s Information Security Policy and guidelines
• Maintain and update Asset register of your office/dept
• Extend support to RISO during Risk Assessment and Business Impact
Analysis of your office/dept
• Implement and act in accordance with the organization’s information
security policies and procedures
• Protect assets from unauthorized access, disclosure, modification,
destruction, or interference
• Execute defined security processes or activities
• Report security events, potential events, or other security risks by
following approved processes
• Do not use systems or access information without authorization
• Adheres to controls put in place to protect assets
Standards & Regulations
 ISO 27001 (Information Security Management
System)
 ISO 22301 (Business Continuity Management
System)
 PCI- DSS (Payment Card Industry - Data Security
Standard)
 IT Act 2000 & ITAA 2008 (Information Technology
Act, India)
 RBI Guidelines (Reserve Bank of India)
Cyber Security Is Everyone’s
Responsibility
Robert Statica – Cybersecurity
India stands 10th in the cyber
crime in the world
Conclusion
♦ I hope that my presentation will be
helpful for my audience to improve their
knowledge about cyber security and to
overcome several security loopholes on
their computer operation. Also it helps
to spread awareness among normal
people about emerging security threats.
Simple and practical prevention
methods are explained in the Seminar
to protect the information assets.
Cyber security & Importance of Cyber Security
1 sur 48

Recommandé

Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityBhandari Hìmáñßhü
13K vues22 diapositives
Introduction to cyber security par
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
40.1K vues21 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityHarsh verma
13.9K vues11 diapositives
Cyber security ppt par
Cyber security pptCyber security ppt
Cyber security pptDebrajKarmakar
25.8K vues36 diapositives
Cyber Security par
Cyber SecurityCyber Security
Cyber SecurityVivek Agarwal
11K vues22 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityRishav Sadhu
5.8K vues16 diapositives

Contenu connexe

Tendances

Cyber crime and security ppt par
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
603.4K vues22 diapositives
Cybersecurity 2 cyber attacks par
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attackssommerville-videos
15.2K vues20 diapositives
Cyber Security Presentation par
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
4.1K vues8 diapositives
Cyber Crime and Security Presentation par
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
34.5K vues26 diapositives
Cyber security par
Cyber securityCyber security
Cyber securityvishakha bhagwat
4.5K vues17 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives

Tendances(20)

Cyber crime and security ppt par Lipsita Behera
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera603.4K vues
Cyber Security Presentation par HaniyaMaha
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha4.1K vues
Cyber Crime and Security Presentation par Preethi Kumaresh
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh34.5K vues
Cyber crime and security par Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vues
Cyber Crime And Security par ritik shukla
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla4.9K vues
Cyber crime and security par Akash Dhiman
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman2.9K vues
Cyber security par Pihu Goel
Cyber securityCyber security
Cyber security
Pihu Goel3.9K vues
Cyber security and its advantages par Radhika Sharma
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
Radhika Sharma9.2K vues
Cyber Security in Society par Rubal Sagwal
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal5.9K vues
Cyber security presentation par Parab Mishra
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra8.7K vues
Cyber security presentation par Bijay Bhandari
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari542.9K vues

Similaire à Cyber security & Importance of Cyber Security

Implications of Misuse and Cyber Security.pdf par
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
120 vues34 diapositives
Cyber Security.docx par
Cyber Security.docxCyber Security.docx
Cyber Security.docxTanushreeChakraborty27
121 vues5 diapositives
Cyber Security Company.docx par
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
12 vues2 diapositives
CYBER SECURITY par
CYBER SECURITY CYBER SECURITY
CYBER SECURITY Ashish prashar
361 vues33 diapositives
Ethical Hacking par
Ethical HackingEthical Hacking
Ethical HackingChetanmalviya8
142 vues20 diapositives
SAMPLE ATTACKS PRESENTATION.pdf par
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
17 vues13 diapositives

Similaire à Cyber security & Importance of Cyber Security(20)

Implications of Misuse and Cyber Security.pdf par srtwgwfwwgw
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
srtwgwfwwgw120 vues
SAMPLE ATTACKS PRESENTATION.pdf par ssusera0b94b
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b17 vues
Introduction to Cyber Security-- L01.pptx par somi12
Introduction to Cyber Security-- L01.pptxIntroduction to Cyber Security-- L01.pptx
Introduction to Cyber Security-- L01.pptx
somi1215 vues
Cyber Security Awareness Session for Executives and Non-IT professionals par Krishna Srikanth Manda
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security PPT.pptx par MBRoman1
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman151 vues
Information &amp; cyber security, Winter training ,bsnl. online par SumanPramanik7
Information &amp; cyber security, Winter training ,bsnl. onlineInformation &amp; cyber security, Winter training ,bsnl. online
Information &amp; cyber security, Winter training ,bsnl. online
SumanPramanik7111 vues

Plus de Mohammed Adam

Android Penetration Testing - Day 3 par
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3Mohammed Adam
51 vues51 diapositives
Android Penetration testing - Day 2 par
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2Mohammed Adam
72 vues67 diapositives
Android Penetration Testing - Day 1 par
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1Mohammed Adam
45 vues58 diapositives
Wireless Penetration Testing par
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration TestingMohammed Adam
90 vues62 diapositives
Network Penetration Testing par
Network Penetration TestingNetwork Penetration Testing
Network Penetration TestingMohammed Adam
98 vues51 diapositives
Basic Foundation For Cybersecurity par
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
31 vues76 diapositives

Plus de Mohammed Adam(20)

Android Penetration Testing - Day 3 par Mohammed Adam
Android Penetration Testing - Day 3Android Penetration Testing - Day 3
Android Penetration Testing - Day 3
Mohammed Adam51 vues
Android Penetration testing - Day 2 par Mohammed Adam
 Android Penetration testing - Day 2 Android Penetration testing - Day 2
Android Penetration testing - Day 2
Mohammed Adam72 vues
Android Penetration Testing - Day 1 par Mohammed Adam
Android Penetration Testing - Day 1Android Penetration Testing - Day 1
Android Penetration Testing - Day 1
Mohammed Adam45 vues
Basic Foundation For Cybersecurity par Mohammed Adam
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam31 vues
Golden Ticket Attack - AD - Domain Persistence par Mohammed Adam
Golden Ticket Attack - AD - Domain PersistenceGolden Ticket Attack - AD - Domain Persistence
Golden Ticket Attack - AD - Domain Persistence
Mohammed Adam168 vues
Evading Antivirus software for fun and profit par Mohammed Adam
Evading Antivirus software for fun and profitEvading Antivirus software for fun and profit
Evading Antivirus software for fun and profit
Mohammed Adam29 vues
Introduction to Network Fundamentals par Mohammed Adam
Introduction to Network FundamentalsIntroduction to Network Fundamentals
Introduction to Network Fundamentals
Mohammed Adam81 vues
Breaking out of crypto authentication par Mohammed Adam
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
Mohammed Adam117 vues
Cybersecurity Awareness Session by Adam par Mohammed Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam456 vues
Career Guidance on Cybersecurity by Mohammed Adam par Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
Mohammed Adam212 vues
Introduction to null villupuram community par Mohammed Adam
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
Mohammed Adam240 vues
BugBounty Roadmap with Mohammed Adam par Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam735 vues
Webinar On Ethical Hacking & Cybersecurity - Day2 par Mohammed Adam
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam1.6K vues
OSINT - Open Soure Intelligence - Webinar on CyberSecurity par Mohammed Adam
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam985 vues
Android Application Penetration Testing - Mohammed Adam par Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam3.3K vues
Vulnerability assessment &amp; Penetration testing Basics par Mohammed Adam
Vulnerability assessment &amp; Penetration testing Basics Vulnerability assessment &amp; Penetration testing Basics
Vulnerability assessment &amp; Penetration testing Basics
Mohammed Adam2K vues
What is SSL ? The Secure Sockets Layer (SSL) Protocol par Mohammed Adam
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam699 vues

Dernier

Zero to Automated in Under a Year par
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
15 vues23 diapositives
Uni Systems for Power Platform.pptx par
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
56 vues21 diapositives
"Node.js Development in 2024: trends and tools", Nikita Galkin par
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
11 vues38 diapositives
Network Source of Truth and Infrastructure as Code revisited par
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
27 vues45 diapositives
Vertical User Stories par
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
14 vues16 diapositives
MVP and prioritization.pdf par
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
31 vues8 diapositives

Dernier(20)

"Node.js Development in 2024: trends and tools", Nikita Galkin par Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays11 vues
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf par Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors par sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 vues
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 par IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... par TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive

Cyber security & Importance of Cyber Security

  • 2. What is Cybersecurity? ♦ The term cyber security is used to refer to the security offered through on-line services to protect your online information. ♦ Cyber Security and Information Security differs only in its response and Reduction/Prevention. ♦ Cyber security encompasses all aspects of security viz., Physical, Technical, Environmental, Regulations and Compliance including Third Parties involved in delivering an objective ♦ With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also
  • 3. Why Cybersecurity Is Important ? • Our world today is ruled by technology and we can’t do without it at all. From booking our flight tickets, to catching up with an old friend, technology plays an important role in it. • However, the same technology may expose you when it’s vulnerable and could lead to loss of essential data. Cyber security, alongside physical commercial security has thus, slowly and steadily, become one of the most important topics in the business industry to be talked about. • Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.
  • 4. Why Cybersecurity is Important? ♦ Cyber security becomes important as Business are being carried now on Network of Networks. Computer networks have always been the target of criminals, and it is likely that the danger of cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm.
  • 6. Confidentiality ♦ the property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  • 7. Confidentiality ♦ Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. ♦ A failure to maintain confidentiality means that someone who shouldn't have access has managed to get it, through intentional behavior or by accident. Such a failure of confidentiality, commonly known as a breach
  • 8. Integrity the property of safeguarding the accuracy and completeness of assets
  • 9. Integrity ♦ Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. ♦ Imagine that you have a website and you sell products on that site. Now imagine that an attacker can shop on your web site and maliciously alter the prices of your products, so that they can buy anything for whatever price they choose. That would be a failure of integrity, because your information—in this case, the price of a product—has been altered and you didn't authorize this alteration
  • 10. Availability ♦ The property of being accessible and usable upon demand by an authorized entity
  • 11. Availability ♦ Availability means that information is accessible by authorized users. ♦ Information and other critical assets are accessible to customers and the business when needed. Note, information is unavailable not only when it is lost or destroyed, but also when access to the information is denied or delayed
  • 12. Cyberspace as a Battleground? Each day, there is an increase in the number of threats against our nation's critical infrastructures. These threats come in the form of computer intrusion (hacking), denial of service attacks, and virus deployment. In India DEITY-Dept., of Electronics & Information Technology operating under MCIT-Ministry of Communication & Information Technology is responsible for Cyberspace security other than delivering Govt., services online and promoting the IT Sector. The National Information Board (NIB) a policy making body for cyber security operates independently and is chaired by National Security Advisor (NSA) CERT-In performs emergency cyber security functions and releases annual reports on security incidents
  • 13. Cyber attack ♦ A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organizational data
  • 14. Major security problems ♦ Virus ♦ Hacker ♦ Malware ♦ Trojan horses ♦ Password cracking
  • 15. Viruses and worms ♦ Virus – malware attached to a carrier such as an email message or a word processing document ♦ A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes ♦ Worm – malware can autonomously spread itself without a carrier, using information about connected computers
  • 16. Solution ♦ Install a security suite that protects the computer against threats such as viruses and worms.
  • 17. Hackers ♦ In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
  • 18. Types of Hackers ♦ White Hat Hacker ♦ Grey Hat Hacker ♦ Black Hat Hacker
  • 19. Whit Hat Hackers ♦ The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.
  • 20. Grey Hat Hackers ♦ The term "grey hat", "greyhat" or "gray hat" refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
  • 21. Black Hat Hackers ♦ A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
  • 22. How To prevent hacking ♦ It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
  • 23. Malware ♦ The word "malware" comes from the term "MALicious softWARE." ♦ Software that has some malicious intent and which is installed on a user’s computer without that user’s consent. ♦ Key loggers – Software installed on a computer that captures key strokes and sends these to a remote system. Used to try and get personal information to gain access to sites such as banks
  • 24. Malware Cont. ♦ Ransomware– Software that runs on a user’s computer and demands that the user pays some other organization. If they don’t, the information on their computer will be destroyed. ♦ Malware can usually spread itself from one computer to another either as a virus or as a worm
  • 25. To Stop Malware ♦ Download an anti-malware program that also helps prevent infections. ♦ Do not download from unknown sources ♦ Activate Network Threat Protection, Firewall, Antivirus.
  • 26. Trojan Horses ♦ Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. ♦ These viruses are the most serious threats to computers
  • 27. How to Avoid Trojans ♦ Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses. ♦ Do not click unknown links.
  • 28. Password Cracking ♦ Password attacks are attacks by hackers that are able to determine passwords or find passwords to different protected electronic areas and social network sites.
  • 29. Securing Password ♦ Use always Strong password. Never use same password for two different sites.
  • 30. Insider attacks ♦ Attacks to an organization carried out by someone who is inside that organization either by himself or with connivance of an outsider. ♦ • Difficult to counter using technical methods as the insider may have valid credentials to access the system
  • 31. External attacks ♦ Attacks to an organisation carried out by an external agent ♦ Requires either valid credentials or the exploitation of some vulnerability to gain access to the systems
  • 32. Malicious and accidental damage ♦ Cybersecurity is most concerned with – Cyber attacks ♦ Cyber-accidents – Accidental events that can cause loss or damage to to an individual, business or public body. ♦ Many of the same technologies used to protect against external attack also protect against cyber-accidents. ♦ However, sometimes protecting against cyber attacks increases the probability of cyber-accidents.
  • 33. Analysis of Information Security Threats • WHO – 98% from external agents – 4% from implicated internal employees – < 1% by Business Partners & – 58% of all data thefts linked to activist groups • WHO – 98% from external agents – 4% from implicated internal employees – < 1% by Business Partners & – 58% of all data thefts linked to activist groups
  • 34. Latest Trends – Information Security Threats Hacktivism - Hack + Activism = Hacktivism - the use of legal and/or illegal digital tools in pursuit of a political / personal objective - Tools and Attacks are used for - Web-site defacements - Redirects - Denial Of Service Attacks - Identity Theft - E-mail Bombing - Web-Site Mirroring - Doxing – To gather information using sourced on the internet
  • 35. Web Site Defacement ♦ Web Site Defacements – Hacking and altering the website of a company’s website.
  • 36. Identity Fraud / Identity Theft ♦ Stealing someone's identity in which someone pretends to be someone else by assuming that person's identity
  • 37. Doxing ♦ Process of Gathering and releasing Personally Identifiable information
  • 38. Denial Of Service Attack • Attempt to make a machine or network resource unavailable to its intended users • typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
  • 39. Key Techniques Used ♦ Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity in an electronic communication  You get an email that looks like it comes from your bank, credit card company, etc.  Asking you to “update their records” may be due to potential fraud, other reasons  Provides a hyperlink to a web page where you enter your personal information  The link takes you to a thief’s website that is disguised to look like the company’s.
  • 40. Key Technique Used • Step 1 - Preparation – Setup fake website • Step 2 - Luring the users – Send Email with fake link • Step 3 - Steal the details – User gives away id/password • Step 4 - Use the details – Commit fraud Real Web SiteReal Web Site PhisherPhisher VictimVictim Phishing email User’s response (id/password) Use of stolen (id/password) information Phishing How-to
  • 41. Most common security mistakes • Poor password management • Not locking the computer while unattended • Opening email attachments from unknown addressees • Not running anti-virus programs • Sharing information (and machines) • Not reporting security violations • Unattended Paper Documents • Unprotected Electronic Data (while at rest and in motion).E.g: Emails, USB’s, CD’s, etc.. • Improper Information Handling • Passing of information over Phone.
  • 42. Information Security Responsibilities • Engage Information Security teams to support the line of business, enabling secure solutions for new processes and technology • Work with Information Security teams RISO, RISI to drive line of business-specific information security metrics reporting • Support Regional Information Security teams in mitigating security risks from Internal Audit report findings • Follow business continuity plans given by bank, in case of any disaster/ emergency. • Report Security Violations and security incidents • Adhere to Bank’s Information Security Policy and guidelines • Maintain and update Asset register of your office/dept • Extend support to RISO during Risk Assessment and Business Impact Analysis of your office/dept
  • 43. • Implement and act in accordance with the organization’s information security policies and procedures • Protect assets from unauthorized access, disclosure, modification, destruction, or interference • Execute defined security processes or activities • Report security events, potential events, or other security risks by following approved processes • Do not use systems or access information without authorization • Adheres to controls put in place to protect assets
  • 44. Standards & Regulations  ISO 27001 (Information Security Management System)  ISO 22301 (Business Continuity Management System)  PCI- DSS (Payment Card Industry - Data Security Standard)  IT Act 2000 & ITAA 2008 (Information Technology Act, India)  RBI Guidelines (Reserve Bank of India)
  • 45. Cyber Security Is Everyone’s Responsibility Robert Statica – Cybersecurity
  • 46. India stands 10th in the cyber crime in the world
  • 47. Conclusion ♦ I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Simple and practical prevention methods are explained in the Seminar to protect the information assets.