WEEK 1
Introduction Cyber Security
Overview of Computer/Cyber Security and
Current threat report summary
Na Sambathchatovong
[email protected]
012561046
2023
CONTENTS
I. WHAT IS CYBER SECURITY?
II. GOALS OF INFORMATION SECURITY
III. WHAT ARE THE CHALLENGES?
IV. WHAT DO WE NEED?
V. THE HARSH REALITY IN FIGURES
VI. RECOMMENDATIONS
VII. BEST PRACTICE FOR TARGETED
ORGANIZATION
WHAT IS CYBER SECURITY?
CYBER SECURITY: Protection of the cyberspace against cyber threats and
vulnerabilities
CYBER SPACE: Complex of activities carried out through networks of
computers; more precisely it's a cyber ecosystem (computer systems and devices,
critical infrastructures, entire economic processes, and users, their data, their
interests).
It's not just computers or smart phones, it's not just the Internet, it's the network of
small computers and its sensors in your car, it's your pace-maker sending
information to your doctor, it's the network of controllers regulating industrial
control systems etc.
WHAT IS CYBER SECURITY?
CYBER THREAT: typical threats include unauthorized access, destruction, system overrun
and takeover, propagation of malicious code, data thieving and fabrication, … The attacks
are "cyber" themselves.
E.g., if your computer is stolen, that's not a breach of cyber security. If anybody manages to
access data on your stolen computer, that is an issue for cyber security.
CYBER VULNERABILITY: the presence of weaknesses or loopholes in systems which
may lead (systematically) to cyber attacks.
GOALS OF INFORMATION SECURITY
CONFIDENTIALITY
Confidentiality: Protects information and system from unauthorized access.
Disclosure attacks seek to undermine confidentiality.
Confidentiality Control:
Access Control Restrict
Encryption
Steganography: Hide information within images or other files.
INTEGRITY
Integrity: Protects information and systems from unauthorized modification.
Alteration attacks seek to undermine integrity.
Sources of Integrity failures:
Intentional Alteration
User Error
Software or Hardware Error
Acts of Nature
Integrity Control:
Hash functions (MD5) if any change make to file detection
Digital Signature: Achieve goal of non-repudiation
AVAILABILITY
Availability: Ensures that information and systems are available for authorized users when
needed.
Denial attacks seek to undermine availability.
Availability Failure:
Malicious attackers
Component failure
Application failures
Utility failures
Availability Controls:
Redundant Components
High availability
Fault Tolerance
OS and application patch also enhance availability
WHAT ARE THE CHALLENGES?
Rather than mentioning a few specific problems, it is convenient to put in focus the fact that
the organization of our society and our lives are by now largely computer-supported, and this
creates a very significant vulnerability to all sorts of attacks to very different aspects of what
we do. For instance, it concerns
NATIONAL SECURITY: attacks to critical infrastructures such as Transport, Energy and
Communications can have devastating effects, and are now regular part of warfare and terrorist
scenarios;
GOVERNMENT AND PUBLIC BODIES: the robustness to intrusion and tamper of electronic
services, which typically hold very sensitive information;
THE ECONOMIC PROCESSES: the protection of industrial secrets and practices, the
confidentiality of business information and tenders; the viability of the network economy, just
think of the banking
system.
THE CITIZEN: the privacy and legitimate use of personal data against de-anonymisation and
impersonation attacks from all sources; the challenged from cybercrime.
WHAT ARE THE CHALLENGES?
Government says that a lot can be achieved by educating users. Similarly, Government
points out that Cyber Security is a board level responsibility for companies.
Yet, to put the burden on the end-users is somehow unfair. The issue we face can be
extraordinarily complex and subtle.
WHAT DO WE NEED?
Carry out the research to come up with systematic countermeasure, with security
frameworks and infrastructures able to react quickly to new attacks.
Identify and develop the cyber security professionals to go our there on the network and
patrol it, to be the good guys in the cyberspace.
EDUCATION is an EMERGENCY.
The legal framework is important too.
All this in the respect of the rights of the citizen. The risk of falling into hyper-restrictive
regulations exists. That is why I believe that research (both in Law and technical) will
help also in this respect, by empowering us.
THE HARSH REALITY IN FIGURES (MANDIANT 2011)
UPDATED DATA (2012)
A MOST SHOCKING FIGURE
MORE TRENDS (2013)
Advanced attack groups are
increasingly taking advantage of
outsourcing relationships to gain
access to the organizations they are
targeting.
Attackers can steal data faster when
they know what they want
Observable relationship between
strategic priorities of some states,
their state-owned enterprises, and
data stolen thru cyber intrusion
Attackers shift from spear phishing
attacks to exploits on websites used
by targets, to install, malware and
gain access to systems
UPDATED DATA (2013)
UPDATED DATA (2013)
UPDATED DATA (2014)
UPDATED DATA (2014)
UPDATED DATA (2015)
UPDATED DATA (2015)
UPDATED DATA
RECOMMENDATIONS
BEST PRACTICE FOR TARGETED ORGANIZATION
1. employ dedicated “cyber incident” handler team — even if one person only!—
whose full time job is to chase intruders.
2. equip the team with tools to collect and analyze network data.
3. understand that this is a daily job, count the number of incidents, measure the
response time.
4. establish “incident team” partnership with other relevant organizations.
Q&A