Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views65 pages

Lecture ICS 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views65 pages

Lecture ICS 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

1

Introduction to Cyber Security

Prepared by
Dr. Abeer Hassan El Bakly
2

Methodology of working within this semester


1- the last 15 minute in our lecture will be quiz about the subject of our lecture.
2- each student is responsible about his mobile, internet for quiz, sending the quiz within
internet.
3- each student can take snapshot of quiz because the damage will be happened in
internet to save the absence. Because the absence is included in the quiz.
4- if the student doesn’t follow the instructions of quiz, his mark will be reduced with the
half (writing his name in Arabic and till fourth name, his student code).
5- all quizzes and others will be in the question bank.
6- the first assignment, second assignment and final exam will include three questions,
two of them are similar to the questions of the bank, the third one is different.
7- our credit hours are one and the maximum mark is 50, our marks will be classified as
following:
10 (first assignment) – 10 (second assignment) - 10 (our lecture activities) – 20 (final
exam)
Introduction to definition of cyber security
Outline
4

1- What is a cyber security?


2- History of cyber security
3- what is the Importance of cyber security?
4- the quiz on the lecture
1- What is a cyber security?
5

Cyber security is the protection of information systems (hardware,


software, and network), the data on them, and the services they provide,
from these items:
• unauthorized access
• General harm or misuse
• harm caused intentionally by the operator of the system
• accidentally as a result of failing to follow security procedures.
1- What is a cyber security?
6

The History of cyber security


1970s: ARAPNET and the Creeper
Cyber security began in the 1970s when researcher Bob Thomas created a computer
program called Creeper that could move across ARPANET’s network, leaving a
breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the
program Reaper, which chased and deleted Creeper. Reaper was the very first example
of antivirus software and the first self-replicating program, making it the first-ever
computer worm.
1- What is a cyber security?
7

The History of cyber security


1980s: Birth of the commercial antivirus
1987 was the birth year of commercial antivirus although there were competing claims for
the innovator of the first antivirus product. Andreas Lüning and Kai Figge released their first
antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer in
1987. Three Czechoslovakians created the first version of the NOD antivirus in the same
year and in the US, John McAfee founded McAfee and released VirusScan.
1- What is a cyber security?
8

The History of cyber security


1990s: The world goes online
With the internet becoming available to the public, more people began putting their
personal information online. Organized crime entities saw this as a potential source of
revenue and started to steal data from people and governments via the web. By the middle
of the 1990s, network security threats had increased exponentially so firewalls and
antivirus programs had to be produced on a mass basis to protect the public.
1- What is a cyber security?
9

The History of cyber security


2000s: Threats diversify and multiply
In the early 2000s crime organizations started to heavily fund professional cyber attacks
and governments began to clamp down on the criminality of hacking, giving much more
serious sentences to those culpable. Information security continued to advance as the
internet grew as well but, unfortunately, so did viruses.
1- What is a cyber security?
10

The History of cyber security


2021: The next generation
The cyber security industry is continuing to grow at the speed of light. The global
cyber security market size is forecast to grow highly by 2026. Ransomware is one
of the most common threats to any organization's data security and is forecast to
continue to increase.
1- What is a cyber security?
11

The importance of cyber security


• In today’s digital world, one cannot ignore cyber security. One single
security breach can lead to exposing the personal information of millions of
people. These breaches have a strong financial impact on the companies and
also loss of the trust of customers. Hence, cyber security is very essential to
protect businesses and individuals from spammers and cyber criminals.
• it protects all categories of data from theft and damage. The data includes
sensitive data, personally identifiable information (PII), protected health
information (PHI), personal information, intellectual property, and
governmental and industry information systems.
• Without a cyber security program, your organization cannot defend itself
against data breach campaigns, which makes it an irresistible target for
cybercriminals.
1- What is a cyber security?
12

The importance of cyber security


• Widespread poor configuration of cloud services paired with increasingly
sophisticated cyber criminals means the risk that your organization suffers
from a successful cyber attack or data breach is on the rise.
• Business leaders can no longer solely rely on out-of-the-box cyber security
solutions like antivirus software and firewalls, cybercriminals are getting
smarter and their tactics are becoming more resilient to conventional cyber
defenses. It's important to cover all the fields of cyber security to stay well-
protected.
• Both inherent risk and residual risk are increasing, driven by global
connectivity and usage of cloud services, like Amazon Web Services, to store
sensitive data and personal information.
1- What is a cyber security?
13

The importance of cyber security


• In the age of the internet, organizations are heavily relying on IT infrastructure
to keep them safe from cyberattacks. As more and more organizations are
adopting digital transformation, the risk of cybercrime is increasing at a rapid
rate.
• The spreading of data breaches means that cybersecurity is not just relevant to
heavily regulated industries, such as healthcare. Even small businesses are at
risk of suffering irrecoverable reputational damage following a data breach.
• Businesses, individuals, and governments are investing heavily to reap the
benefits of cybersecurity in protecting their assets and data against hackers. For
any business to survive in today’s competitive world, it requires the right tools
and cyber security strategy.
Concepts of cyber security
What are concepts of a cyber security?
15

There are 5 concepts of cyber security:


• Authentication
• Authorization
• Confidentiality
• Integrity
• Availability
What are concepts of a cyber security?
16

There are 5 concepts of cyber security:


• Authentication
• Authorization
What are concepts of a cyber security?
17

There are 5 concepts of cyber security:


• Authentication
• Authorization
Authentication Authorization

In the authentication process, the in authorization process, the person’s or


identity of users are checked for user’s authorities are checked for
providing the access to the system. accessing the resources.

In the authentication process, users or in this process, users or persons are


persons are verified. validated.
Usually done before authorization Usually done after successful
authentication
What are concepts of a cyber security?
18

There are 5 concepts of cyber security:


• Authentication
• Authorization
Authentication Authorization

it needs the user’s privilege or security


It needs usually the user’s login details.
levels.

Authentication determines whether the it determines What permission does the


person is user or not. user have?

Generally, transmit information through Generally, transmit information through


an ID Token. an Access Token.
What are concepts of a cyber security?
19

There are 5 concepts of cyber security:


• Authentication
• Authorization
Authentication Authorization

The authorization permissions cannot


The authentication credentials can be be changed by user as these are
changed in part as and when required granted by the owner of the system
by the user. and only he/she has the access to
change it.

The user authentication is visible at user The user authorization is not visible at
end. the user end.
What are concepts of a cyber security?
20

There are 5 concepts of cyber security:


• Authentication
• Authorization
Authentication Authorization

The user authentication is identified The user authorization is carried out


with username, password, face through the access rights to resources
recognition, retina scan, fingerprints, by using roles that have been pre-
etc. defined.

Example: Employees in a company are Example: After an employee


required to authenticate through the successfully authenticates, the system
network before accessing their determines what information the
company email. employees are allowed to access.
What are concepts of a cyber security?
21

There are 5 concepts of cyber security:


Authentication Authorization

The OpenID Connect (OIDC) protocol is


The OAuth 2.0 protocol governs the
an authentication protocol that is
overall system of user authorization
generally in charge of user
process.
authentication process.

Popular Authentication Techniques- Popular Authorization Techniques-


•Password-Based Authentication •Role-Based Access Controls (RBAC)
•2FA/MFA (Two-Factor Authentication / •JSON web token (JWT) Authorization
Multi-Factor Authentication) •SAML Authorization
•Single sign-on (SSO) •OpenID Authorization
•Social authentication •OAuth 2.0 Authorization
What are concepts of a cyber security?
22

What is a protocol?
• In networking, a protocol is a standardized set of rules for formatting
and processing data.
• Protocols enable computers to communicate with one another.

Such as:
FTP: file transfer protocol
http: hyper text transfer protocol
https: hyper text transfer protocol
secure

What is a technique ?
It refers to a method which is used to enhance the security
What are concepts of a cyber security?
23

There are 5 concepts of cyber security:


• Authentication
• Authorization
• Confidentiality
• Integrity
• Availability
What are concepts of a cyber security?
24

There are 5 concepts of cyber security:


• Confidentiality CIA Triad is actually a security model that
• Integrity has been developed to help people think
• Availability about various parts of IT security.

Explanation of each principle:


Confidentiality: Ensuring data is only
accessible to authorized individuals
Integrity: Ensuring data remains
unchanged and trustworthy
Availability: Ensuring data and resources
are accessible when needed
What are concepts of a cyber security?
25

There are 5 concepts of cyber security:


Confidentiality
Confidentiality for ATM as example
• a PIN number which is unique and difficult
for others to guess.
• Do not associate your PIN with anything
personal such as birthdays, phone numbers
or other familiar numbers.
• Your PIN number should be kept
confidential, memorized and not recorded
anywhere.
• Arab Bank will never ever ask you to
disclose your PIN number to any one
• Avoid using ATMs in remote / unprotected
areas and avoid ATMs adjacent to obvious
hiding places.
• Protect account number and number card
• Using a locked door
What are concepts of a cyber security?
26

There are 5 concepts of cyber security:


Confidentiality
What are concepts of a cyber security?
27

There are 5 concepts of cyber security:


Confidentiality
• The data are protected against unauthorized or unintentional access.
• the ethical and legal need to protect sensitive information from
unauthorized access or disclosure.
• It pertains to using protective measures to prevent unauthorized
individuals from gaining access to sensitive information
• It refers to safeguarding sensitive information from unauthorized
access, disclosure, or exposure.
• It is determined the level of access the data.
• If a worker does not “need to know” the information to do his or her
job, then access is not granted to the data.
• It is implemented by the rights and privileges granted to the individual
computer users.
What are concepts of a cyber security?
28

There are 5 concepts of cyber security:


Confidentiality
Confidentiality for payroll system as
• an employee who edits a company’s social media
example
accounts probably does not need access to
corporate payroll information.
• It is not simply a matter of not trusting an
employee. Consider what would happen if that
user’s password is stolen.
• A hacker could login as the user and access
whatever data the employee has rights to view or
manage.
• It could even be another employee who steals the
password.
• Another way to incorporate confidentiality is
through encryption. Encryption converts the data
into a format that can only be read by the holder
of the decryption key. Encryption is covered
What are concepts of a cyber security?
29

There are 5 concepts of cyber security:


Integrity
Integrity for ATM as example • It provides data integrity by ensuring that
any transaction made via the machine is
reflected in the user’s bank account only.
• Integrity requirements include that data
must not be able to be altered during
processing.
• The integrity service ensures the correctness
of exchanged data, insertion, deletion and
modification of the new data
• Data like withdrawal amounts and pin
information needs to be accurately recorded
so that transactions are carried out as
intended without tampering.
The ATM network shall support granting • Protection of data integrity is used to protect
the integrity of stored and communicated ATM network user related information
data
What are concepts of a cyber security?
30

There are 5 concepts of cyber security:


Integrity
• This is an essential component of the CIA Triad and designed to protect
data from deletion or modification from any unauthorized party, and it
ensures that when an authorized person makes a change that should not
have been made the damage can be reversed.
• Integrity refers to the protection of information from unauthorized
changes or alterations.
• Data should not be tampered with by any person either accidentally or
maliciously. It should be maintained in a correct state.
• Integrity is the state of being complete or uncorrupted.
• This core principle ensures the data are not changed or altered without
permission to do so.
• information should not be altered without proper authorization and that
any changes must be recorded and documented
What are concepts of a cyber security?
31

There are 5 concepts of cyber security:


Integrity
• Ensure data integrity by preventing malicious actors from altering,
deleting, or tampering with data.
Integrity for payroll system as
example • an employee in the payroll department should
not be able to change his or her own wage.
• Nor should such an employee be able to delete a
bad performance review for a friend.
• In both cases, doing so would lower the integrity
of the data.
What are concepts of a cyber security?
32

There are 5 concepts of cyber security:


Integrity for payroll system as Integrity
example • A practical example of ensuring integrity can be handled
using folder and file permissions.
• Figure shows the permissions settings for a user. Edward
Johnson has been given the Windows file permissions to
the payroll folder to view and read data. However, he
cannot make changes to fi les in this folder.
• In this way, he cannot affect the integrity of the data in the
folder.
• You will learn how to view and grant permissions. Another
key aspect of ensuring integrity is a process known as
nonrepudiation.
• In a nonrepudiation process, changes are tracked by which
user account made them. The user is unable to refuse to
accept changes that he or she made. Through the
nonrepudiation process, a historical reference shows which
accounts made which changes.
• The nonrepudiation process also is important in legal
issues. The historical record may be used to prove a user’s
actions in criminal or civil cases
What are concepts of a cyber security?
33

There are 5 concepts of cyber security:


Availability
Availability for ATM as example • Availability requirements include making sure
that customers able to have access to machines
virtually.
• If banks closed there needs to be a method for
withdrawing cash after hours that provides
security like the above mentioned scenario with
the bank card swipes.
• This also means it is expected that ATMs be
operational and promptly fixed. It is important
that customers feel like they can always depend
on the banks machines to always be there for
their use.
What are concepts of a cyber security?
34

There are 5 concepts of cyber security:


Availability
• Availability is the third principle in the CIA triad
• It means the data can be accessed when needed
• A problem such as a hardware failure or a hacking attack might prevent access to data.
• Security professionals must have solutions to ensure data can be accessed when a
problem such as one of these occur
What are concepts of a cyber security?
35

Cyber security aims to mitigate the risks associated with cyber threats,
including malware, phishing, hacking, and other forms of cybercrime, by
implementing proactive measures such as firewalls, encryption, access
controls, and security awareness training.
What are concepts of a cyber security?
36

Cyber security aims to mitigate the risks associated with cyber threats,
including malware, phishing, hacking, and other forms of cybercrime, by
implementing proactive measures such as firewalls, encryption, access
controls, and security awareness training.

mitigate Are produced from


Cyber security The risks

access controls malware


proactive To protect system
measures from them, we use cyber threats
phishing
encryption
firewalls
hacking Other forms of
cybercrime
security awareness training
What are concepts of a cyber security?
37

Risk
Risk is the possibility of adversity or loss, and refers to “uncertainty that
matters.” Consequently, risk management involves choosing among
alternatives to reduce the effects of risk.
What are concepts of a cyber security?
38

Principles of risk management in cybersecurity

1. Risk Identification
2. Risk Assessment:
3. Risk Mitigation
4. Risk Monitoring and Review
5. Risk Communication and Reporting:
6. Compliance and Regulatory Requirements
7. Integration with Business Objectives
What are concepts of a cyber security?
39

Principles of risk management in cybersecurity


Importance of using principles of risk
1- organizations can establish robust risk management practices that :
• protect their information assets
• maintain business continuity
• minimize the impact of security incidents.

2- Effective risk management is essential for safeguarding against


cybersecurity threats

3- ensuring the elasticity of the organization's information infrastructure.


What are concepts of a cyber security?
40

cyber threat
A cyber threat is an activity intended to compromise the security of an
information system by altering the availability, integrity, or
confidentiality of a system or the information it contains, or to disrupt
digital life in general.
What are concepts of a cyber security?
41

cyber threat
The cyber threat environment is the online space where cyber threat
actors conduct malicious cyber threat activity. It includes the networks,
devices, and processes that are connected to the Internet and can be
targeted by cyber threat actors, as well as the methods threat actors use
to target those systems.
What are concepts of a cyber security?
42

cyber threat
Cyber threat actors are groups or individuals who aim malicious intent to
exploit weaknesses in an information system or exploit its operators to gain
unauthorized access to otherwise affect victims’ data, devices, systems, and
networks, including the authenticity of the information that flows to and
from them . The globalized nature of the Internet allows threat actors to be
physically located anywhere in the world and still affect the security of
information systems in Canada.
What are concepts of a cyber security?
43

Types of cyber threat actors and their motivations


Cyber threat actors can be categorized by

their motivations their sophistication

• Threat actors value access to devices and networks for different


reasons, such as
• manipulating information,
• degrading the network’s performance
• extorting the owner.
• In general, each category of cyber threat actor has a primary
motivation.
What are concepts of a cyber security?
44

Types of cyber threat actors and their motivations


What are concepts of a cyber security?
45

Malware

• Malware, or malicious software, is computer code intentionally written


to cause some form of harm, from stealing or destroying data to
collecting information or allowing remote access to a system.
• Malware is a significant source of threats to computers and systems.
• A threat is something that takes a vulnerability to a level where the
flaws can be exploited.
What are concepts of a cyber security?
46

Malware
Attack Vector: Malware attacks involve the delivery of malicious software, such as
viruses, worms, trojans, or ransomware, to target systems or networks. Malware can
be delivered through various means, including email attachments, infected websites,
or removable media.
Entry Points: Malware exploits vulnerabilities in software or operating systems to
gain unauthorized access to systems or execute malicious activities. Vulnerabilities in
outdated software, unpatched systems, or insecure configurations can serve as entry
points for malware attacks.
What are concepts of a cyber security?
47

Malware
Malware Examples:
What are concepts of a cyber security?
48

phishing
A phishing attack is a type of cybersecurity threat or a form of social engineering that
targets users directly through email, text, or direct messages, social media posts, voice
communications, and other media. During one of these scams, the attacker will use as
a trusted contact to steal data like logins, account numbers, and credit card
information.
What are concepts of a cyber security?
49

Phishing
How Does Phishing Work?

• In a typical attack, the criminal or chase gets the contact information of


one or many targets and then starts sending phishing messages via email
or text message.
• The email appears to be sent from Chase, with the Chase logo embedded
in the email. The email explains how there is an urgent issue with the
individual's account, instructing her to click on a link to address the
matter right now. which motivates the victim to either reply with
sensitive data or click on a link.
• If the victim clicks the link, they’re brought to a fake website
specifically designed for identity theft or to enable the attacker to gain
access to restricted data by entering the username and password in the
fake website
What are concepts of a cyber security?
50
Phishing
How Does Phishing Work?
The cybercriminal may use a combination of several factors to trick
their targets:
• A realistic email address used by the attacker, such as one that appears to
have the same or similar domain as a trusted company
• A website that looks like one belonging to a legitimate business
• A well-worded, grammatically clean email complete with realistic logos or
other branding collateral
What are concepts of a cyber security?
51

Phishing
For example,
• one of the most common phishing campaigns involves an attacker
creating a website that looks almost exactly like that of a financial
institution.
• After the victim clicks on a link, they have no idea they’re falling for a
phishing scam, especially because the site looks so authentic.
What are concepts of a cyber security?
52

Phishing
Types of phishing
What are concepts of a cyber security?
53

Phishing
1. Spear Phishing
Where general email attacks use spam-like tactics to blast thousands at a
time, spear phishing attacks target specific individuals within an organization.
In this type of scam, hackers customize their emails with the target’s name,
title, work phone number, and other information in order to trick the recipient
into believing that the sender somehow knows them personally or
professionally.
What are concepts of a cyber security?
54

1. Spear Phishing Phishing


is used for
organizations
with the
resources to
research and
implement this
more
sophisticated
form of attack.
What are concepts of a cyber security?
55

Phishing
2. Whaling
• Whaling is a variant of spear
phishing that targets executives
("whales").
• As such individuals typically have
unfettered access to sensitive
corporate data, the risk-reward is
dramatically higher.
• Whaling is used for advanced
criminal organizations that have the
resources to execute this form of
attack.
What are concepts of a cyber security?
56

Phishing
3. BEC (Business Email Compromise) attacks
are designed to impersonate senior executives and trick employees,
customers, or vendors into wiring payments for goods or services to
alternate bank accounts.
What are concepts of a cyber security?
57

Phishing
4. Clone Phishing
In this type of attack, the scammer creates an almost-identical replica of an
authentic email, such as an alert one might receive from one's bank, in
order to trick a victim into sharing valuable information. The attacker
swaps out what appears to be an authentic link or attachment in the
original email with a malicious one. The email is often sent from an address
that resembles that of the original sender, making it harder to spot.
What are concepts of a cyber security?
58

Phishing
5. Vishing
• Also known as voice phishing, in vishing, the scammer displays the real
telephone number of a well-known, trusted organization, such as a
bank , on the victim’s caller ID in order to entice the recipient to
answer the call.
• The scammer then impersonates an executive or official and uses social
engineering or intimidation tactics to demand payment of money
purportedly owed to that organization.
• Vishing can also include sending out voicemail messages that ask the
victim to call back a number; when the victim does so, the victim is
tricked into entering his or her personal information or account details.
What are concepts of a cyber security?
59

Phishing
5. Vishing
What are concepts of a cyber security?
60

Phishing
6. Snowshoeing
• In a snowshoeing scheme, attackers attempt to circumvent traditional email
spam filters.
• They do this by pushing out messages via multiple domains and IP
addresses, sending out such a low volume of messages that reputation- or
volume-based spam filtering technologies can’t recognize and block
malicious messages right away.
• Some of the messages make it to the email inboxes before the filters learn
to block them.
What are concepts of a cyber security?
61

Phishing
How to Protect Yourself from Phishing?
Below are some ways for your organization to protect its employees and its network from
phishing attacks. While well-trained employees are an organization's best defense, there are
still some preventative actions an organization can take.
What are concepts of a cyber security?
62

Phishing
How to Protect Yourself from Phishing?
1. Use a Spam Filter
the most basic organizations can defense by it. Most email programs (e.g., Outlook, G Suite)
include spam filters that can automatically detect known spammers.
2. Update Security Software Regularly
Organizations should make sure that all of their security patches have been updated. This can
detect and remove malware or viruses that may have accidentally entered an employee's PC
via a phishing scheme. Further, security policies should be updated to include password
expiration and complexity.
3. Use Multi-factor authentication
MFA requires multiple pieces of information for someone to be able to log in and gain access.
This is important in the event a scammer already has stolen the credentials of some
employees. With MFA in place, especially if it includes biometric authentication, scammers
are blocked.
What are concepts of a cyber security?
63

Phishing
How to Protect Yourself from Phishing?
4. Back Up Your Data
All data should be encrypted and backed up, which is critical in the event of a
breach or compromise.
5. Don't Click on Links or Attachments
As described in the previous section, educate employees about how to spot
questionable links and attachments, and instruct them to avoid clicking on or
downloading something from a source they do not trust.
6. Block Unreliable Websites
A web filter can be used to block access to malicious websites in the event an
employee inadvertently clicks on a malicious link
What are concepts of a cyber security?
64

Principles of risk management in cybersecurity

1. Risk Identification
2. Risk Assessment:
3. Risk Mitigation
4. Risk Monitoring and Review
5. Risk Communication and Reporting:
6. Compliance and Regulatory Requirements
7. Integration with Business Objectives
What are concepts of a cyber security?
65

Principles of risk management in cybersecurity


1. Risk Identification
This involves identifying potential threats, vulnerabilities, and risks to the
organization's information assets.
It includes understanding the organization's assets, the potential threats they face,
and the vulnerabilities that may be exploited by threat actors.

You might also like