Cyber Security is the technology
and process that is designed to
protect networks and devices
from unauthorized access
The principles of confidentiality assert that
information and functions can be accessed
Confidentiality
only by authorized parties
Example: Military secrets
The principles of integrity assert that
information and functions can be added,
altered or removed only by authorized
CIA Integrity people
Incorrect date entered by a user in
Example:
the database
The principles of availability assert that
systems, functions and data must be
Availability
available on demand according to agreed
upon parameters based on levels of service
Computer assisted crimes
Example: Fraud, DOS
Computer as the target crimes
Types of Cybercrime
Example: Sniffing, Viruses
Computer incidental to the crimes
Example: List of customer for traffickers
Information theft and manipulating data
Creating fear and chaos by disrupting
critical infrastructure
Financial loss to the target
Motives behind Cybercrime
Protection of your business Achieving state's military objectives
Increased productivity Demanding ransom
Inspire customer confidence Advantages Damaging reputation of the target
Stops your website from crashing Propagating religious or political beliefs
Cybercrime
Protection of your customer or clients 1980's
MNC Database
(Pentagon and
IBM
DOS (Denial of Service)
1990's
Malware Attack
crackdown on criminals
National
Microsoft's NT operating system pierced
Man in the Middle Why Cyber Security ? Threats to CIA
2001
Phishing
Cybercriminals launched attacks against
eBay, Yahoo!, CNN.com, amazon and others
Drive by Attack Common attacks in Cyber
History of Cybercrime
Cross-site Scripting Attack Security 2007
Bank
hit by biggest ever hack. Swedish bank,
Nordea recorded nearly $1 Million has been
Password Attack
stolen in three months from 250 accounts
Eavesdropping Attack
2013
- 2.9 Million accounts stolen
Adobe
SQL Injection Attack
Cyber Security
Birthday Attack 2016
758 million malicious attacks occured
according to Kaspersky
Finding weakness
A Cyber Security expert is an individual
Monitoring systems Techniques employed by an organization to protect their Who is a Cyber Security expert ? Black Hat
data
Network breach Grey Hat
White Hat
CompTIA Security+ 501
Suicide Hacker
Certificate Ethical Hacker CEH Hacking Types of Hackers
Script Kiddle
Certified Information System Security
Professional CISSP Cyber Terrorist
Certified Information System Auditor CISA State Sponsored Hacker
Courses and certification in
Hacktivist
Certified Information Security Manager Cyber Security
CISM
1998
Certified in Risk and Information System
T Morris
Robert
Control CRISC
First internet worm
Certified Cloud Security Professional CCSP
1990
Lee
Kevin
Cyber Security Expert (Master's Program)
Hacked telephone lines of KIIS-FM (Los
Angeles)
History of Cybercrime Famous names in Cyber Security
1999
David
L Smith
virus
Created Melissa
2004
Adam
Botbyl
Steal credit card information
2-Way authentication
Secure passwords
Regular updates
How does Cyber Security works Antivirus
Security Computer
? Firewall
No Phishing
Cryptography (encryption)
Securing DNS
Asset Security
Security architecture and engineering
Communication and network security
Identity and access management
Domains in Cyber Security
Security operations
Security assessment and testing
Software development security
Security and risk management