You are on page 1of 7

LETS DISCUSS SECURITY>>>

4.TRENDING TOPICS

 The IoT is a weak link


 Be proactive about ransomware

 AI and machine learning can boost cyber defenses


 MELTDOWN AND SPECTRE
 Future of cybersecurity 2020

5.discussing cybersecurity topics

 Exploits,viruses,threats..
 THE IOT IS A WEAK LINK: We’re rolling out more and more sensor-packed, internet-connected
devices, but the Internet of Things remains a major weak point for defenses. All too often these
devices lack basic security features, or they aren’t properly configured and rely upon default
passwords that can give attackers easy access. This in turn is giving rise to botnets, which can be
used for volumetric attacks, to exfiltrate stolen data, to identify further vulnerabilities, or for
brute force attacks. We need to properly secure the IoT or it will continue to be a big issue in
2018. 

 AI : As artificial intelligence and machine learning gathers pace, and starts to impact
more and more industries, it’s sure to play a bigger role in cybersecurity. Because the
battle with cyber criminals moves so quickly, machine learning models that can predict
and accurately identify attacks swiftly could be a real boon for InfoSec professionals. In
the year ahead, these models need to be trained and honed. However, there is also a risk
that AI and machine learning may be exploited by attackers. 
 RAMSOMWARE: Ransomware has been a growing threat for the last few years, but it continues
to claim high profile victims. It’s not yet clear what everyone learned from the
WannaCry ransomware attacks, but we hope that it highlighted the need to back up regularly,
keep patching and updating systems, and strengthen your real-time defenses. If organizations
took these simple steps, we could dramatically reduce the impact of ransomware.
 Meltdown breaks the most fundamental isolation between user applications and the
operating system. This attack allows a program to access the memory, and thus also the
secrets, of other programs and the operating system
 Spectre breaks the isolation between different applications. It allows an attacker to trick
error-free programs, which follow best practices, into leaking their secrets. In fact, the
safety checks of said best practices actually increase the attack surface and may make
applications more susceptible to Spectre is harder to exploit than Meltdown, but it is also
harder to mitigate. However, it is possible to prevent specific known exploits based on
Spectre through software patches.

FUTURE OF CS: The CLTC's five scenarios for 2020

Based on their findings, the CLTC research team came up with five scenarios for cybersecurity
in 2020.

Scenario 1: The following bullets describe what the CLTC researchers speculate will be the new
normal.

 Internet users in 2020 assume their data will be stolen and their personal information
broadcast.
 Law enforcement struggles to keep pace as large-scale cyberattacks continue, with small-scale
cyberattacks becoming commonplace.
 Governments are hamstrung by a lack of clarity regarding jurisdiction in digital-crime cases.
 Hackers prove adept at collaborating across geographies, while law enforcement agencies are
not.
 Individuals and institutions respond in diverse ways: a few choose to go offline, some make their
data public before it can be stolen, and others fight back.

…..more scenario to be selected.

OPEN DEBATE QUESTIONS:

 WHAT DO U THINK ABOUT AI THAT TRACK US?


 Is saving our data ethical?
 Does DATA is valuable?
 Any idea about stopping wanna cry Ramsomware?

 Do u think by 2020 all of our data will be sold?

 Should we implement CYBERCRIMES LAW?

 How can we secure IOT?


HOW HACKERS ACCESS OUR PHONES, COMPUTERS,
etc.….?
https://computer.howstuffworks.com/zombie-computer3.html

\\START WITH CLAME(COMPUTER SECURITY) THEN EXPLAIN ABOUT COMPUTER


HACKING ->VULNERABILITY

 1st of all hacker search for weaknesses in the software(Vulnerability)an


attacker
must have at least one applicable tool or technique that can connect
to a system weakness in this frame.
 Example OF VUL Buuferoverflow ,Sqlinjection,ramsomware,DDOS..etc\\EXPLAIN MORE
 So this an example of android attack --HERE I SHOW PICS AND EXPLAIN IT
 Same thing for the pc

##############################################################################
####

• How can we stop hackers from hacking us > \\START WITH CLAME
• Use strong password's
• Ensure robust user authentication and firewall protection
• Get the right security software
• Safe browsing
• Consider moving data to the cloud
• Keep offline backups
• 2 STEP VER
• Make sure you're on an official website when entering passwords
• Avoid jailbreaking (or rooting) your phone or side-loading apps
• Encrypt your hard drive
• Back up your data frequently.
• Avoid clicking suspicious links or responding to unknown emails.
• Enable a firmware password.
• Disable remote access.
• install antivirus software on your computer
• Use secured wireless networks.
• Download programs only from reputable sites.
• Avoid file sharing services.
• Shop only on secure sites
• Keep personal information off social media

WHY RELIABILITY IS IMPORTANT?


• System reliability is an aspect of system
dependability, however, it’s more complex than
system security. If a system is dependable, then it’s
also reliable. System dependability holds the
attributes of the CIA group of system security,
adding to it also Reliability. Reliability can be
summarized as ensuring the “continuity of correct
service”. Reliability could be achieved and classified
by two techniques. First, fault prevention is to
insure the system operations are operating without
faults. Second, fault tolerance technique which is
calculating the possibility of the errors within the
system by detecting errors and fault mistaking.
System Reliability in general is the probability of
components of a system, its parts, and the system
as a whole to perform the right functions for the
right period of time without failure. Thus, system
reliability is defined as “the difference between
normal and abnormal functionality” in a system.
System reliability expects that the system will not
be affected by unforeseen forces not enumerated
in the system specifications.

• Since system security and system reliability have the


same objective which is making the system available,
system reliability is closely interrelated to security.
To make a system reliable, the system should be
secure. Security measures are applied to a system to
ensure reliability, if security in a system has
disrupted by attack, then the availability will fail
where reliability ensure the availability.
Consequently, security measures are considered as
reliability requirements, where there are many
similarities in the requirements for both reliability
and security, systems cannot be reliable if security
measures are not considered as a part of a system.

• As systems are growing day by day, both security


and reliability are becoming increasingly complex
and important topics. Systems are not merely
becoming more complex on their own, they are
being interconnected, or used as building blocks to
construct even larger systems. To discuss security
and reliability, one must not assume that large
systems will inherit the attributes of the smaller
constituent systems even if they are all both secure
and reliable. Therefore it is important to discuss
both system security and reliability as supporting
each other in the design, implementation, and
integration of systems.

You might also like