Cyber Security PDF
Document Details
Uploaded by NiftySard3188
جامعة الزيتونة الأردنية
Tags
Summary
This presentation covers the key aspects of cyber security, including security threats, vulnerabilities, and protective measures. It explains the different types of attacks, such as malware, hacking, and denial-of-service attacks. The presentation also describes strategies for protecting information and systems.
Full Transcript
Cyber Securitiy Learning Objectives Security threats to data hardware and users, common types of hacking, protective measures Slide 2 Definition Cybersecurity is the practice of protecting systems, networks, devices, and data from digital atta...
Cyber Securitiy Learning Objectives Security threats to data hardware and users, common types of hacking, protective measures Slide 2 Definition Cybersecurity is the practice of protecting systems, networks, devices, and data from digital attacks, unauthorized access, damage, or theft. It involves implementing technologies, processes, and controls to safeguard information and ensure the confidentiality, integrity, and availability of data in the face of evolving cyber threats. Slide 3 IT Security IT security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. Slide 4 IT Security IT security performs four important functions for an organization: Protects the organization’s ability to function Enables the safe operation of applications implemented on the organization’s IT systems Protects the data the organization collects and uses Safeguards the technology assets in use at the organization Slide 5 IT Security: Features Confidentiality:- Assurance that information is shared only among authorized persons or organizations. Integrity:- Assurance that the information is authentic and complete. Maintaining and assuring the accuracy and consistency of data over its entire life-cycle. Availability:- Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. Slide 6 Vulnerabilities A vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. Slide 7 Vulnerabilities Vulnerabilities are classified according to the asset class they are related to:- Hardware:- Susceptibility to humidity/dust ; Unprotected storage; Over-heating. Software:- Insufficient testing; insecure coding; lack of audit trail; Design flaw. Network:- Unprotected communication lines; Insecure network architecture. Personnel:- Inadequate recruiting process; Inadequate security awareness; insider threat Physical site:- Area subject to natural disasters (e.g. flood, earthquake); interruption to power source Organizational:- Lack of regular audits; lack of continuity plans; Slide 8 Threats A threat is a potential negative action or event facilitated by a vulnerability that results in an unwanted impact to a computer system or application. Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. A countermeasure is any step you take to ward off a threat to protect user, data, or computer from harm. Various Security threats:- Users:- Identity Theft; Loss of Privacy; Exposure to Spam; Physical Injuries. Hardware:- Power-related problems; theft; vandalism; and natural disasters. Data:- Malwares; Hacking; Cybercrime; and Cyber-terrorism. Slide 9 A countermeasure A countermeasure is any step you take to ward off a threat to protect user, data, or computer from harm. Slide 10 Threats(Keywords) Spam:-Unsolicited commercial e-mail/Junk e-mail Cookie:- Small text file that a Web server put on computer Web Bugs:-a small gif embedded in webpage/email Malwares:-Malicious Software Virus(require Some executables), Worms(Self executables), Spyware, Trojan Horses, Botnet (Robot Network) Shoulder Surfing Hacking:- Sniffing:- finding user’s password(Password Sharing, Password Guessing or Password Capture Social Engineering:- Dumpster Diving, Phishing(Email) & Vishing(Phone Calls) Spoofing DDoS:-Distributed Denial of Services. Cybercrime; and Cyber-terrorism. Slide 11 Threats(Keywords) Hacking:- Sniffing:- finding user’s password(Password Sharing, Password Guessing or Password Capture Social Engineering:- Dumpster Diving, Phishing(Email) & Vishing(Phone Calls) Spoofing DDoS:-Distributed Denial of Services. Cybercrime; and Cyber-terrorism. Slide 12 Attacks An attack is the deliberate act that exploits vulnerability It is accomplished by a threat-agent to damage or steal an organization’s information or physical asset An exploit is a technique to compromise a system A vulnerability is an identified weakness of a controlled system whose controls are not present or are no longer effective An attack is then the use of an exploit to achieve the compromise of a controlled system Slide 13 Attack Descriptions Denial-of-service (DoS) – attacker sends a large number of connection or information requests to a target so many requests are made that the target system cannot handle them successfully along with other, legitimate requests for service may result in a system crash, or merely an inability to perform ordinary functions Distributed Denial-of-service (DDoS) - an attack in which a coordinated stream of requests is launched against a target from many locations at the same time Slide 14 Attack Descriptions Distributed Denial-of-service (DDoS) - an attack in which a coordinated stream of requests is launched against a target from many locations at the same time Slide 15 Slide 16 Attack Descriptions Spoofing - technique used to gain unauthorized access whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host Man-in-the-Middle - an attacker sniffs packets from the network, modifies them, and inserts them back into the network Slide 17 Slide 18 Protective Measures 1. Bolster Access Control by using a strong password system. You should have a mix of uppercase and lower case letters, numbers, and special characters. Also, always reset all default passwords. Finally, create a strong access control policy.. Slide 19 Protective Measures 2. Keep All Software Updated From anti-virus software to computer operating systems, ensure your software is updated. When a new version of software is released, the version usually includes fixes for security vulnerabilities. Manual software updates can be time-consuming. Use automatic software updates for as many programs as possible. Slide 20 Protective Measures 3. Standardize Software Keep your systems protecting by standardizing software like Operating system, Browser, Media player, Plug-in. Ensure that users cannot install software onto the system without approval. 4. Use Network Protection Measures Install a firewall Ensure proper access controls Use IDS/IPS to track potential packet floods Use network segmentation Use a virtual private network (VPN) Conduct proper maintenance Slide 21 Protective Measures 5. Employee Training Sometimes external threats are successful because of an insider threat. The weakest link in data protection can be your own employees. Ensure your employees understand network security. Employees should be able to identify threats. They should also know who to contact to avoid a security breach 6. Schedule backups You can schedule backups to external hard drives or in the cloud in order to keep your data stored safely. The right frequency is weekly but you can do incremental backups every few days. Slide 22 Acts of Human Error or Failure Includes acts done without malicious intent Caused by: Inexperience Improper training Incorrect assumptions Other circumstances Employees are greatest threats to information security – They are closest to the organizational data Slide 23 Acts of Human Error or Failure Employee mistakes can easily lead to the following: revelation of classified data entry of erroneous data accidental deletion or modification of data storage of data in unprotected areas failure to protect information Many of these threats can be prevented with controls Slide 24 Compromises to Intellectual Property Intellectual property is “the ownership of ideas and control over the tangible or virtual representation of those ideas” Many organizations are in business to create intellectual property trade secrets copyrights trademarks patents Slide 25 Slide 26 Malicious Code This kind of attack includes the execution of viruses, worms, Trojan horses, and active web scripts with the intent to destroy or steal information Slide 27 Prevention: Stopping Malicious Code from Entering the System The goal is to block malicious code before it infects devices or networks. Firewalls: Filters incoming and outgoing traffic to block known malicious sources. Email Security Filters: Prevent phishing attempts and malicious attachments from reaching users. Web Filtering: Blocks access to malicious websites or downloads containing harmful code. Slide 28 Takeaways and Final Thoughts Best Practices: Regularly update all security tools and systems.Educate employees on recognizing and avoiding cyber threats. Next Steps: Assess your current cybersecurity infrastructure.Implement or enhance protective measures to address vulnerabilities. Call to Action:"Cybersecurity is not just a tool but a mindset—secure your systems today for a safer tomorrow." Slide 29 Takeaways and Final Thoughts Why Cybersecurity Matters" Key Points: Cybersecurity is a shared responsibility: Everyone has a role to play in protecting digital assets. Prevent, Detect, Respond: Strong cybersecurity is about proactive prevention and quick recovery. Lifelong Learning: Stay updated as technologies and threats evolve. Slide 30