CHAPTER 1.pptx
Document Details
Uploaded by GraciousSpatialism8152
TAR UMT
Tags
Related
- 0-WISP Old Station ~ Security Slides.pdf
- Network Security Fundamentals Exam 212-82 PDF
- Gramm-Leach-Bliley Act (GLBA) & GDPR PDF
- CCF-Session-1-v4-Regular-2023-lec-clsu-1 PDF - Information Security Fundamentals
- Information Assurance and Security PDF
- Legal and Privacy Issues in Information Security PDF (Chapter 1)
Full Transcript
AMIS1003 INTRODUCTION TO CYBERSECURITY About Me Main Campus (KL) Guidelines in the class ecture & Tutorial Attend tutorial & lecture. Prepare the answers of tutorial and practical question Be prepared for questions in the middle of the class! ttendance is important! ...
AMIS1003 INTRODUCTION TO CYBERSECURITY About Me Main Campus (KL) Guidelines in the class ecture & Tutorial Attend tutorial & lecture. Prepare the answers of tutorial and practical question Be prepared for questions in the middle of the class! ttendance is important! Course Information Coursework Final Exam (60%) (40%) Test (24%) Conducted in Assignment Physical Mode (24%) Quiz (12%) Course Learning Outcome CLO 1: Describe the fundamental security components, various security terminology, and security attacks. CLO2: Discuss the importance of keeping information and data secure, common data/privacy protection, retention and control principles. CLO3: Discuss on communication security issues that can arise from using e-mail, social AMIS1003 INTRODUCTION TO CYBERSECURITY CHAPTER 1 LECTURER: MOHD NUR RAHMAT BIN MOHD TAAT OBJECTIVES In this lecture, you will understand: 01 Data Threat 02 Theft & Attack 03 Hacking 04 Value of Information 05 Personal Security 06 Biometric Security 06 File Security 07 Encryption Discussion Who needs How does cybersecurity? cybersecurity affect us? What What industries cybersecurity need meant to you? cybersecurity? Cybersecuri ty Understanding Cybersecurity Data Threat Data vs Information DATA INFORMATION A collection of facts, Information is data that is figures and statistics organized and related to an object. processed to give it Data can be processed to more meaning and create useful information. context. Data is raw and Data is like pieces of a unorganized facts and puzzle, information is like figures. a completed puzzle that shows a final picture to the user Internet Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institution & individuals. --------- Statistics about Cybercrime Incidents Globally Every year, hundreds of thousands of cybercrime incidents are reported worldwide, and many more go unnoticed. The financial loss through cybercrime globally reached approximately $2 trillion in 2023 alone, suggesting a significant surge compared to previous years. DARK WEB DARK WEB Major Cyberattacks and Their Impact CYBERCRIME HACKING An offence that Hacking involves involves using the using computer Internet or a expertise to gain computer to carry out access to a illegal activities, often computer system for financial or without authorization. personal gain. The hacker may wish Examples include to tamper with identity theft and programs and data social engineering. on the computer, use the computer’s resources, or just prove they can access the computer. Key Threats & Vulnerability Natural Disaster Accidental Threats Malicious Threats Natural Disasters Accidental Threats It’s caused by user mistakes or by system itself. Frequently resulting from poor training and improper use of tools. Possible results include unintentional damage to the system, modification or destruction of user programs or data, disclosure of sensitive information, or residual data that the user or management cannot find. Malicious Threats There is a hacker attack after every 39 seconds (on an average) on a computer connected with the Internet. (University of Maryland, Research Report). That means any computer connected to the Internet sustains 2,244 malicious attacks every day! Let us have a look at the most common types of techniques adopted in day-to-day cyberattacks on networks and computers. Malicious Threats Malware 01 02 Social Engineering Phishing Attack 03 04 Password Attack Malicious Threats Virus The hackers To get the To gain Worm use the social information unauthorized Spyware engineering The hackers To about get the the access To gain to the Adware tactics use theto force social Credential information user system. unauthorized Trojan engineering you to follow the about Information. the access to the Ransomware instructions tactics to force Credential user system. theytogive you you.the follow Information. instructions they give you. Malware Social Engineering Phishing Attack Password Attack Note: Will be discuss in detail on Chapter 2 Theft & Attack Cause & Effect Data & Identity Theft Financial Losses Confidence & Trust Vulnerabilities Hacking What is Hacking? Type of attack includes any attempt of unauthorized access to the system. This includes cracking passwords, elevating privileges, breaking into a server. Type of Hacker White Hat Black Hat A hacker who Someone who does not break Grey Hat uses hacking the law; often A hacker who usually skills for synonymous obeys the law but in malicious and with ethical some instances will illegal purposes hacker. cross the line into black hat hacking. Hacker methodologies Backdoors Webshells Value of Information Basic Cybersecurity The short definition of cybersecurity is, “The protection of software, hardware, and data resources connected and stored on the Internet is known as the cybersecurity”. From an individual to a large corporation, everybody is concerned about the security of their online data, software, and information. The goals of protecting are based on CIA Triad. CIA Triad We want our information to: Only be changed by authorized people or process Be read by only Be available to The right read and use people whenever we want CIA orization, and Accounting (AAA) AA Information gathering Importance of information gathering in cybersecurity Importance of information gathering in cybersecurity Personal Information Any information about individuals, for example bank details or forms of ID such as driver’s licenses and etc. User often share their personal information with others to prove who they are, or to access services. Personal Information Contact Employment Medical Criminal Credentials Identification Location Bank Details Details History History Convitions Person in Possession of Personal Data Must Ensure That: Personal data is processed in a fair and lawful manner. Good practice is always used to process personal data. The collection of personal data can only be for legitimate and explicitly stated purposes. Personal data shall not be processed if it is not compatible with the purpose for which the information is collected. Person in Possession of Personal Data Must Ensure That: Processed personal data is both adequate and relevant. There will be no unnecessary processing of personal data. Personal data that is processed is accurate and up to date. Personal data is not kept for a period longer than is necessary Personal Security Personal Security Personal Information is any information about individuals, for example bank details or forms of ID such as driver’s licenses and etc. Hacker use technique to get users to give up the personal information needed to gain access to a target system. What are the tactics used by Hacker? Social Engineering Method of Social Engineering Phone Calls Text Message Social Engineering Phishing Shoulder Surfing Note: Will be discuss in detail on Chapter 2 Identity Theft and Its Implications Millions of accounts and passwords are being compromised annually. Identity theft is when someone deliberately impersonates and uses another person’s identity. This is usually done for financial gain or to obtain credit and/or other benefits using someone else’s name. Initial Implication - The amount of time and money needed to re-establish your identity and credit history and to clear your name. Biometric Security Biometric System Biometrics systems use unique biological characteristics as Authenticators. The use of Biometric is becoming a new standard for the Password. The use of Biometric makes password more secure and reliable. Biometric System Some examples of biological characteristics used as biometric data include: Fingerprints Iris/retina patterns Facial features Voice patterns File Security File Security Files are crucial asset to protect: Contain business personal information. Contain system and configuration data. How do you can make sure your documents are not be violated? Enabling and Disabling Macro Security Setting. Macro Security Setting Macros are used to automate repetitive or frequently-used tasks in Microsoft Office applications. A person with malicious intent could potentially create destructive macros, which can spread viruses. Therefore, macros are a potential security threat. Users can disable macros automatically and enable them only when they trust that source of the file. Encrypt File with Password Use passwords to help prevent unauthorized users from opening and modifying your documents, workbooks, and presentations. Passwords are strings of letters, numbers and /or special characters that are used to verify your identity. Encryption Concept of Encryption Encryption, the process of scrambling a message or other information so that only authorized parties can read it. Also called Plaint Text to Cipher Text. Done by using encryption algorithm, a formula used to turn Plain Text to Cipher Text with it’s corresponding key(s). Used to achieve confidentiality Type of Encryption Encryption and Decryption use same Encryption and Decryption use key. different key, a Public Key and a Private Key. Symmetric encryption Symmetric encryption is a type of encryption where the same key is used for both encrypting and decrypting data. It is also known as secret-key encryption or shared-key encryption. Here are the key aspects of symmetric encryption: 1. Key Usage: Symmetric encryption uses a single key to both encrypt and decrypt data. This key must be kept secret and known only to the parties that need to communicate securely. 2. Algorithm: There are various symmetric encryption algorithms, such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), and 3DES (Triple DES), among others. T Symmetric encryption 4. Speed: Symmetric encryption algorithms are generally faster than asymmetric encryption algorithms. This efficiency makes them suitable for encrypting large amounts of data and real-time communication. 5. Security: The security of symmetric encryption relies heavily on the strength of the key used and the algorithm's resistance to attacks such as brute-force attempts to guess the key. The key should be sufficiently long and randomly generated to resist such attacks. 6. Key Distribution: One challenge in symmetric encryption is securely distributing the key to the parties that need to communicate. If an adversary intercepts the key during transmission, they could decrypt the encrypted messages. 73 Asymmetric encryption Asymmetric encryption, also known as public-key encryption, is a cryptographic technique that uses a pair of keys for secure communication: a public key and a private key. Here are the key aspects of asymmetric encryption: 1.Key Pair: Asymmetric encryption uses a pair of mathematically related keys: 1.Public Key: This key is widely distributed and known to everyone. It is used for encrypting data or verifying digital signatures. 2.Private Key: This key is kept secret and known only to the owner. It is used for decrypting data or creating digital signatures. 2.Encryption and Decryption: When someone wants to send encrypted data to another party: 1.They obtain the recipient's public key. 2.They encrypt the data using the recipient's public key. Asymmetric encryption 3. Security: Asymmetric encryption provides stronger security guarantees compared to symmetric encryption in terms of key distribution: -Public keys can be freely distributed and used by anyone to encrypt data. -Private keys are kept secret and never shared, ensuring that only the intended recipient can decrypt messages or verify signatures. 4. Performance: Asymmetric encryption is computationally more intensive than symmetric encryption, making it less suitable for encrypting large volumes of data. Therefore, it is often used in combination with symmetric encryption (hybrid encryption) where asymmetric encryption is used for key exchange and symmetric encryption is used for bulk data encryption. Symmetric vs Asymmetric Which one is better ? Although symmetric encryption Asymmetric key encryption is faster, it is not as secure as requires far more computation to asymmetric encryption since the both encrypt and decrypt the key might be stolen and used to content of the message. decode the communication. As a result, the procedure is However, due to its speed, it is delayed. frequently utilized for e- commerce transactions. It has the ability to share the data without sharing the same encryption key. Hash Hash A hash is a mathematical function that converts an input of arbitrary length into an encrypted output of a fixed length. Thus,regardless of the original amount of data or file size involved, its unique hash will always be the same size. known as one way encryption where it should be Also computationally impractical to reverse the process and obtain the original input from the hash value It used for achieving data integrity Examples: SHA-256 and MD5 Hash Thank You