Risks and Data Privacy Attacks PDF - Lecture 4
Document Details

Uploaded by LowCostSwamp4926
Tags
Summary
This document presents a lecture on risks and data privacy attacks, covering various topics such as threats, risks, mitigation strategies, and emerging risks. It talks about phishing, ransomware, data breaches, and other relevant topics. The content includes definitions, examples, and impacts of data privacy related issues.
Full Transcript
Risks and Data Privacy Attacks Understanding Threats, Risks, and Mitigation Strategies Lecture 4 – Week 4 Introduction to Data Privacy Definition: Data privacy refers to the protection of personal information from unauthorized access, use, or disclosure. Importance: - Pr...
Risks and Data Privacy Attacks Understanding Threats, Risks, and Mitigation Strategies Lecture 4 – Week 4 Introduction to Data Privacy Definition: Data privacy refers to the protection of personal information from unauthorized access, use, or disclosure. Importance: - Protects individuals from identity theft and financial fraud. - Safeguards sensitive corporate information. - Prevents misuse of personal data by malicious actors. Scope: - Covers digital and physical data. - Focus on risks, types of attacks, and defense mechanisms. Why Data Privacy Matters Trust: Builds confidence between users and organizations. - Users are more likely to engage with entities that value privacy. Compliance: - Mandated by laws such as GDPR (EU), HIPAA (USA), and CCPA (California). - Non-compliance can lead to hefty fines and penalties. Reputation: - Data breaches harm brand image and lead to financial losses. - Long-term damage to customer loyalty. Key Concepts in Data Privacy PII: Personally Identifiable Information. - Examples: Names, social security numbers, and bank details. Data Security vs. Privacy: - Security: Protects data from breaches. - Privacy: Ensures data is collected and used ethically. Anonymization: Removing identifiers from data sets to prevent tracing to individuals. Types of Data Privacy Risks Internal Threats: - Employees mishandling sensitive data intentionally or accidentally. - Example: Unauthorized sharing of customer details. External Threats: - Cybercriminals exploiting vulnerabilities in systems. - Example: Hacking into financial institutions. Accidental Exposure: - Misconfigured databases and weak access controls. - Example: Publicly accessible cloud storage with sensitive files. Common Data Privacy Attacks Overview: Methods attackers use to exploit vulnerabilities. Categories: - Phishing: Fraudulent attempts to steal sensitive information. - Ransomware: Malware that locks data until a ransom is paid. - Data Breaches: Unauthorized access to sensitive information. - Insider Threats: Employees or contractors misusing data. Phishing Attacks Definition: Fraudulent attempts to steal sensitive information. Example: Fake emails from trusted organizations asking for login credentials. Impact: - Loss of credentials and personal information. - Financial theft and unauthorized access to accounts. Ransomware Definition: Malware that locks data until a ransom is paid. Example: WannaCry attack 2017, which affected hospitals and businesses globally. Impact: - Operational disruption and financial losses. - Potential data loss even after ransom is paid. WannaCry attack Data Breaches Definition: Unauthorized access to sensitive information. Example: Equifax breach exposing 147 million records. Impact: - Loss of customer trust and legal consequences. - Regulatory fines and remediation costs. Insider Threats Definition: Employees or contractors misusing data intentionally or unintentionally. Example: Edward Snowden leaking classified NSA documents. Impact: - Exposure of classified or sensitive information. - Legal and reputational damage. Advanced Persistent Threats (APTs) Definition: Long-term targeted cyberattacks often conducted by nation-states. Example: SolarWinds attack targeting government and corporate entities. Impact: - Extensive data theft and operational disruption. - Long-term espionage and exploitation (8-9months). Social Engineering Attacks Definition: Manipulating individuals to reveal confidential information. Examples: - Pretexting: Impersonating authority to gain access. - Baiting: Leaving infected devices to tempt users to plug them in. Impact: - Compromised accounts and unauthorized access. - Financial and reputational damage. Denial of Service (DoS) Attacks Definition: Overloading systems to cause downtime or crashes. Example: Mirai botnet disrupting internet services. Impact: - Service unavailability and financial losses. - Loss of customer trust in the affected service. Emerging Data Privacy Risks IoT Vulnerabilities: Lack of robust security in smart devices. Example: Unauthorized access to connected home systems. AI Misuse: Use of AI for unethical data collection or biased decisions. Example: AI profiling in hiring processes. Quantum Computing:Potential to break current encryption standards. Systems like RSA and Diffie-Hellman rely on the computational difficulty of factoring or discrete logarithms, which quantum computers can solve quickly. Calls for quantum-resistant cryptography. Risk Assessment Framework Steps to Assess Risks: Identify Assets: Recognize sensitive data and critical systems. Assess Threats: Understand potential attack vectors. Evaluate Vulnerabilities: Identify system weaknesses. Mitigate Risks: Develop plans to reduce vulnerabilities. Tools Used: NIST Cybersecurity Framework: is a set of voluntary guidelines designed to help organizations assess and improve their ability to prevent, detect, and respond to cybersecurity risks. Developed by the U.S. National Institute of Standards and Technology (NIST), the framework was initially published in 2014 for critical infrastructure sectors but has since been widely adopted across various industries ISO 27001 Risk Assessment Guidelines. Data Privacy Best Practices Encryption: Secure sensitive data during storage and transmission. Example: Use of AES for strong encryption. Advanced Encryption Standard (AES), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). Access Controls: Restrict access to data on a need-to-know basis. Example: Role-based access control (RBAC). Regular Audits: Conduct assessments to ensure compliance. Example: Review system logs for unusual activity. Mitigation Strategies Employee Training: Educate employees about phishing, social engineering, and security hygiene. Incident Response Plan: Define procedures for handling data breaches and attacks. Include communication plans and recovery strategies. Secure Configurations: Ensure proper configuration of systems and networks. Example: Disable default passwords on devices. Anonymization Techniques K-Anonymity: Ensures individual records cannot be distinguished in a dataset. Example: Aggregating demographic data. Differential Privacy: is a mathematically rigorous framework for releasing statistical information about datasets while protecting the privacy of individual data subjects Example: Used in official statistics (e.g., U.S. Census). Impact: Balances data utility with privacy. Threat Detection and Monitoring Tools: SIEM (Security Information and Event Management) system: It collects information from various security devices, monitors and analyzes this information, and presents the results in a manner that is relevant to the enterprise using it. IDS/IPS (Intrusion Detection/Prevention Systems): constantly watch your network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators Methods: Behavior-based anomaly detection is essential to your network security as they help your IT professionals to notice any unusual behavior. Real-time monitoring of system activity periodically running vulnerability scans to identify potential security gaps Impact: Enables early identification and response to potential threats. Cyber Insurance Definition: A cyber insurance policy helps an organization pay for any financial losses they may incur in the event of a cyberattack or data breach Benefits: Coverage for data recovery, legal costs, and fines. Encourages businesses to adopt better cybersecurity measures. Challenges: High premiums due to evolving threats. Difficulty in assessing risk accurately. The Role of AI in Data Privacy Benefits: Enhanced threat detection through pattern recognition. Automated responses to common security incidents. Challenges: Bias in training datasets. Potential misuse in mass surveillance. Future Trends: AI-driven tools for privacy-preserving data analytics. Industry Trends Privacy-First Design: Embedding privacy measures at the design stage. Example: Apple’s privacy-focused app features. Zero Trust Architecture: Always verify user and device identity before granting access. Decentralization: Use of blockchain for secure, transparent data sharing. Future Challenges Evolving Threats: Increasing sophistication of cyberattacks (e.g., AI-driven attacks). Global Regulations: Fragmented laws create compliance challenges for multinational companies. Balancing Innovation and Privacy: Finding the equilibrium between technological progress and ethical practices.