Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
49 views42 pages

CS Lecture 1

Uploaded by

Naima Naeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views42 pages

CS Lecture 1

Uploaded by

Naima Naeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Introduction to Cyber

Security
Understanding the Basics and Importance in Today's World
Shermeen Adnan
Course Overview

 What This Course Covers


 Understanding the core concepts of cyber security.
 Recognizing different types of cyber threats and attacks.
 Learning about the importance of protecting digital information.
 Gaining insight into real-world cyber security challenges.
 Developing practical skills for safeguarding systems and networks.
Overview of Cyber Security

 Definition
 Cyber security refers to the practices, technologies, and processes designed to
protect computers, networks, programs, and data from unauthorized access,
damage, or attacks.
 It covers a broad range of domains, including but not limited to network
security, information security, application security, and endpoint protection.
 Key Objectives
 Confidentiality: Ensuring that sensitive information is accessible only to those
authorized to view it.
 Integrity: Protecting data from being altered or tampered with by unauthorized
individuals.
 Availability: Guaranteeing that data and systems are available when needed by
authorized users.
Scope of Cyber Security

 It involves implementing multiple layers of protection across the


computing environment, including the hardware, software, and data.
 Cyber security measures are designed to prevent cyber threats like
hacking, malware, phishing, and ransomware from compromising
sensitive information and disrupting business operations.
Differentiating Cyber Security from
Information Security
 Information Security
 A broader concept that involves protecting all forms of data, whether in
digital or physical form, from unauthorized access, disclosure, alteration,
or destruction.
 It focuses on the protection of information assets within an organization,
regardless of how the data is processed, stored, or transmitted.
 Cyber Security
 A subset of information security specifically concerned with protecting
digital data and the systems that process it from cyber threats.
 Cyber security deals primarily with online or digital threats, whereas
information security encompasses both digital and physical security
measures.
Key Concepts and Terminologies

 Threats
 Potential sources of harm to a system or data, such as hackers, malware, or
insider threats.
 Example: A hacker attempting to gain unauthorized access to a network.
 Vulnerabilities
 Weaknesses or flaws in a system that can be exploited by a threat to gain
unauthorized access or cause harm.
 Example: An outdated software version that lacks security patches.
 Attacks
 Actual events where a threat exploits a vulnerability to cause damage or gain
unauthorized access.
 Example: A phishing attack where an employee is tricked into clicking a malicious
link, leading to a data breach.
Key Concepts and Terminologies

 Difference Between a Cyber Threat and a Cyber Attack


 Cyber Threat: A possible danger that could exploit a vulnerability to
breach security and cause harm.
 Example: The potential for ransomware to infect a network.
 Cyber Attack: A deliberate and malicious attempt to breach security,
often resulting in damage, data loss, or unauthorized access.
 Example: An actual ransomware attack that encrypts files and demands
payment for decryption.
Key Concepts and Terminologies

 Common Cyber Security Terms


 Malware: Malicious software designed to infiltrate, damage, or disable
computers and networks.
 Types: Viruses, worms, trojans, spyware, adware.
 Phishing: A deceptive method where attackers send fraudulent
communications, often via email, to trick individuals into divulging
sensitive information or installing malware.
 Ransomware: A type of malware that encrypts a victim's files, rendering
them inaccessible until a ransom is paid.
Core Areas of Cyber Security

 Network Security:
• Definition:
• Protecting the integrity and usability of networks and data during
transmission.
• Involves implementing hardware and software solutions like firewalls,
intrusion detection systems, and encryption.
• Importance:
• Ensures secure communication channels and protects against
unauthorized access, data breaches, and various forms of cyber attacks.
Core Areas of Cyber Security

 Information Security:
• Definition:
• Protecting data from unauthorized access, disclosure, alteration, and
destruction.
• Involves implementing data encryption, access controls, and data
masking.
• Importance:
• Ensures that sensitive information, such as personal data and intellectual
property, is safeguarded from cyber threats.
Core Areas of Cyber Security

 Application Security:
• Definition:
• Securing software applications from vulnerabilities that can be exploited
by attackers.
• Includes measures like secure coding practices, regular software updates,
and vulnerability assessments.
• Importance:
• Protects applications from being used as an entry point for cyber attacks,
ensuring that both the software and the data it handles remain secure.
Core Areas of Cyber Security

 Operational Security:
• Definition:
• Protecting the day-to-day operations of organizations by ensuring that
processes and procedures are secure.
• Involves monitoring operational processes, securing communication
channels, and managing access controls.
• Importance:
• Prevents unauthorized access and disruptions to business operations,
maintaining the confidentiality, integrity, and availability of information.
Core Areas of Cyber Security

 Disaster Recovery & Business Continuity:


• Disaster Recovery:
• Planning and implementing procedures to recover from cyber incidents,
such as data breaches or system failures.
• Example: Regular data backups, disaster recovery sites, and business
continuity plans.
• Business Continuity:
• Ensuring that critical business operations can continue during and after a
cyber incident.
• Example: Having redundant systems and processes in place to minimize
downtime.
Core Areas of Cyber Security

 End-User Education:
• Definition:
• Training and educating users about the importance of cyber security and
the best practices to follow to protect against cyber threats.
• Topics Covered: Recognizing phishing attempts, using strong passwords,
and avoiding suspicious downloads.
• Importance:
• Users are often the first line of defense against cyber attacks; informed
users are less likely to fall victim to common threats like phishing or social
engineering.
Types of Cyber Attacks

 Phishing:
• Description:
• Deceptive attempts to steal sensitive information (like usernames,
passwords, and credit card numbers) by posing as a trustworthy entity.
• Example: A fraudulent email that appears to be from a bank, asking the
recipient to verify their account details.
• Prevention:
• Educating users on how to recognize phishing emails, using email filters,
and implementing two-factor authentication.
Types of Cyber Attacks

 Malware:
• Description:
• Malicious software designed to harm or exploit any programmable device,
service, or network.
• Types: Viruses, worms, trojans, spyware.
• Prevention:
• Installing and updating antivirus software, avoiding suspicious downloads,
and regularly patching software vulnerabilities.
Types of Cyber Attacks

 Ransomware:
• Description:
• A type of malware that encrypts a victim’s data and demands a ransom for
the decryption key.
• Example: The WannaCry ransomware that affected hundreds of
thousands of computers worldwide.
• Prevention:
• Regularly backing up data, using up-to-date security software, and
educating users about the dangers of unsolicited emails and downloads.
Types of Cyber Attacks

 Denial-of-Service (DoS):
• Description:
• Attacks that flood a system, server, or network with overwhelming traffic
to exhaust resources, making it unavailable to legitimate users.
• Example: A website being taken offline by a flood of malicious traffic.
• Prevention:
• Implementing traffic filtering, using DoS protection services, and ensuring
sufficient bandwidth to handle traffic spikes.
Types of Cyber Attacks

 Man-in-the-Middle (MitM):
• Description:
• Attackers intercept communication between two parties to steal or
manipulate data.
• Example: Eavesdropping on a conversation between a user and a website
to steal login credentials.
• Prevention:
• Using encryption (e.g., HTTPS), strong authentication methods, and
avoiding unsecured Wi-Fi networks.
Significance of Cyber Security in
Today's World
 Rise of Cyber Threats
 In today's interconnected world, cyber threats are more prevalent and
sophisticated than ever before.
 Cybercriminals employ a wide array of tactics, including malware,
phishing, ransomware, and social engineering, to exploit vulnerabilities.
Significance of Cyber Security in
Today's World
 Economic and Societal Impact
 Financial Losses: Businesses and individuals can suffer significant financial
harm from cyber attacks. This includes direct theft, fraud, and costs
associated with responding to and recovering from breaches.
 Reputation Damage: Companies that experience data breaches often face
severe reputational damage, leading to loss of customer trust and
business opportunities.
 Personal Impact: Individuals face risks such as identity theft, financial
fraud, and loss of privacy.
Significance of Cyber Security in
Today's World
 National and Global Security
 Critical Infrastructure: Protecting the infrastructure that societies depend
on, such as power grids, water supply, and communication networks, is
essential for national security.
 Cyber Warfare: Nation-states are increasingly engaging in cyber warfare,
targeting each other’s critical systems and infrastructure, posing a
significant global threat.
Significance of Cyber Security in
Today's World
 Everyday Relevance
 With the increasing reliance on digital technologies for everything from
banking to healthcare to communication, cyber security is relevant to
everyone, not just IT professionals.
 Personal data protection has become a crucial concern, with individuals
needing to adopt basic security practices such as using strong passwords,
enabling two-factor authentication, and being cautious with sharing
personal information online.
Interactive Discussion

 What comes to mind when you hear the term ‘Cyber Security’?
 Personal Experiences
 The Role of Social Media
 Cyber Security in Daily Life
Real-World Examples of Cyber
Attacks
 WannaCry Ransomware Attack (2017):
• Overview:
• A global ransomware attack that affected more than 200,000 computers in
over 150 countries.
• Impact: Encrypted files on infected systems and demanded ransom
payments in Bitcoin.
• Affected Organizations: National Health Service (NHS) in the UK, FedEx,
and Telefónica, among others.
• Lesson Learned:
• The importance of applying security patches promptly, as WannaCry
exploited a known vulnerability for which a patch had already been
released.
Real-World Examples of Cyber
Attacks
 SolarWinds Supply Chain Attack (2020):
• Overview:
• Attackers compromised the software updates of SolarWinds’ Orion
platform, affecting thousands of organizations, including U.S. government
agencies.
• Impact: Gained unauthorized access to sensitive data and networks,
leading to widespread espionage.
• Lesson Learned:
• The critical need for robust supply chain security and the importance of
monitoring for unusual activity even in trusted software.
Real-World Examples of Cyber
Attacks
 Equifax Data Breach (2017):
• Overview:
• A data breach at Equifax, one of the largest credit reporting agencies,
exposed the personal information of approximately 147 million people.
• Impact: Stolen data included Social Security numbers, birth dates, and
addresses.
• Lesson Learned:
• The necessity of patching known vulnerabilities and implementing strong
data encryption measures to protect sensitive information.
Importance of Cyber Security in Today's
World : The Evolving Threat Landscape

 Rapid Technological Advancements Leading to New


Vulnerabilities:
• Innovation and Technology:
• Technological advancements such as cloud computing, artificial intelligence
(AI), and the Internet of Things (IoT) offer numerous benefits but also
introduce new vulnerabilities.
• New technologies often come with unknown security weaknesses that can be
exploited by cybercriminals.
• Emerging Vulnerabilities:
• Example: The rise of smart devices (IoT) has introduced numerous entry
points for attackers, including poorly secured connected devices.
• Example: Cloud services, while providing scalability and flexibility, have
introduced new risks related to data breaches and misconfigurations.
Importance of Cyber Security in
Today's World : The Evolving Threat
Landscape
 Increase in the Frequency and Sophistication of Cyber
Attacks:
• Frequency:
• Cyber attacks are becoming increasingly common, with new incidents
reported daily across various sectors.
• Statistics: According to recent reports, there is a cyber attack every 39
seconds on average.
• Sophistication:
• Attackers are employing advanced techniques such as AI-driven attacks,
multi-vector attacks, and zero-day exploits.
• Example: Ransomware attacks have become more sophisticated, using
encryption algorithms to hold data hostage and demanding high ransoms.
Importance of Cyber Security in Today's
World : Impact of Cyber Attacks

 On Individuals:
• Identity Theft:
• Attackers steal personal information such as Social Security numbers, credit card
details, and login credentials, leading to identity theft.
• Example: Data breaches at major retailers and financial institutions have exposed
millions of individual records.
• Financial Loss:
• Victims may suffer financial losses due to fraudulent transactions, unauthorized
charges, and theft of funds.
• Example: Phishing scams can trick individuals into transferring money or revealing
sensitive financial information.
• Privacy Breaches:
• Unauthorized access to personal data can lead to privacy violations, including the
exposure of sensitive personal information.
• Example: Unauthorized access to personal health records or private
communications.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Businesses:
• Financial Loss:
• Cyber attacks can result in significant financial losses due to theft, fraud, and the
costs associated with recovery and remediation.
• Example: The 2017 Equifax breach cost the company over $4 billion in damages
and settlements.
• Reputational Damage:
• Businesses face reputational harm when customer data is compromised, leading to
a loss of customer trust and confidence.
• Example: The 2013 Target breach damaged the company’s reputation and led to a
decline in customer trust.
• Legal Consequences:
• Companies may face legal penalties and regulatory fines for failing to protect
customer data or comply with data protection laws.
• Example: The General Data Protection Regulation (GDPR) imposes heavy fines for
non-compliance with data protection requirements.
Importance of Cyber Security in
Today's World : Impact of Cyber
Attacks
On Governments:
• National Security Threats:
• Cyber attacks can target critical infrastructure, government agencies, and national
security systems, posing a threat to national security.
• Example: The 2020 SolarWinds attack compromised multiple U.S. government
agencies and was attributed to state-sponsored actors.
• Loss of Public Trust:
• Government breaches erode public confidence in the ability of authorities to
safeguard sensitive information.
• Example: The 2015 OPM breach exposed personal data of over 21 million federal
employees, affecting public trust in government agencies.
• Economic Impact:
• Cyber attacks can have broader economic implications, affecting trade, financial
markets, and national economies.
• Example: Disruptions to critical infrastructure can lead to significant economic
losses and operational disruptions.
Why Cyber Security is a Global
Concern
 Global Interconnectivity and the Need for International
Cooperation:
• Interconnected Systems:
• Global interconnectedness means that cyber threats can easily cross
borders and affect multiple countries simultaneously.
• International Cooperation:
• Cyber security requires collaborative efforts between countries,
organizations, and institutions to address threats and share information.
• Example: International agreements and partnerships such as the
Budapest Convention on Cybercrime aim to enhance global cyber security
efforts.
Why Cyber Security is a Global
Concern
 The Role of Cyber Security in Critical Infrastructure:
• Energy Sector:
• Securing power grids and energy systems to prevent disruptions and
attacks that could impact millions of people.
• Healthcare Sector:
• Protecting medical records and healthcare systems from breaches that
could jeopardize patient privacy and safety.
• Transportation Sector:
• Ensuring the security of transportation systems, including aviation and
public transit, to prevent disruptions and attacks.
Emerging Trends and Challenges

 Artificial Intelligence and Machine Learning in Cyber Security:


• AI and ML Applications:
• AI and machine learning are being used to detect and respond to cyber
threats more effectively by analyzing large volumes of data and identifying
patterns.
• Challenges:
• AI can also be used by attackers to automate attacks and evade detection,
requiring ongoing advancements in defensive technologies.
Emerging Trends and Challenges

 The Rise of the Internet of Things (IoT) and Associated Risks:


• IoT Vulnerabilities:
• The proliferation of connected devices introduces new attack vectors and
challenges for securing IoT ecosystems.
• Challenges:
• Ensuring that IoT devices are properly secured, monitored, and updated to
prevent exploitation.
Emerging Trends and Challenges

 Importance of a Proactive Cyber Security Strategy:


• Proactive Measures:
• Adopting a proactive approach involves continuous monitoring, threat
intelligence, and regular security assessments to anticipate and mitigate
potential risks.
• Strategy Development:
• Organizations should develop comprehensive cyber security strategies
that include risk management, incident response, and employee training.
The Role of Individuals in Cyber
Security
 Importance of Strong Passwords:
• Creating Strong Passwords:
• Using complex passwords with a mix of letters, numbers, and special
characters to enhance security.
• Example: Avoiding common passwords and using password managers to
generate and store unique passwords.
The Role of Individuals in Cyber
Security
 Recognizing Phishing Attempts:
• Phishing Awareness:
• Educating individuals to identify and avoid phishing emails, messages, and
phone calls that attempt to steal personal information.
• Example: Checking email addresses for authenticity, avoiding clicking on
suspicious links, and verifying requests for sensitive information.
The Role of Individuals in Cyber
Security
 Staying Informed:
• Ongoing Education:
• Keeping up-to-date with the latest cyber threats and best practices for
protecting personal and professional information.
• Example: Following cyber security news, attending training sessions, and
participating in awareness programs.
The Role of Individuals in Cyber
Security
 The Concept of "Cyber Hygiene":
• Definition:
• Cyber hygiene refers to practices and steps that individuals can take to
maintain and improve their cyber security.
• Examples: Regularly updating software, using multi-factor authentication,
and being cautious with online activities.
Task

 In upcoming class Students will individually analyze and elaborate on


recent real-world examples of cyber attacks.

You might also like