Cyber Security
Cyber Security
Introduction
Overview of Cybersecurity
1. Definition and Importance: Cybersecurity is the practice of
protecting systems, networks, and data from digital attacks,
unauthorized access, or damage. It is crucial because:
Increasing Threats: With more sophisticated and frequent
cyber-attacks, maintaining security is essential to protect
sensitive information and maintain trust.
Regulatory Compliance: Many industries are governed by
regulations requiring robust cybersecurity measures.
Business Continuity: Effective cybersecurity ensures that
business operations are not disrupted by security incidents.
2. Historical Context:
Early Threats: Early viruses like the Creeper virus (1970s) were
simple and often experimental.
Modern Threats: Evolved to include ransomware, advanced
persistent threats (APTs), and sophisticated phishing schemes.
Major Incidents: Highlight notable breaches like the Equifax
breach (2017) or the Solar Winds attack (2020) to show the
evolution and impact of cyber threats.
3. Current Trends and Future Directions:
AI and Machine Learning: Increasing use of AI to detect and
respond to threats.
Zero Trust Architecture: Moving from traditional perimeter-
based security to a model where no entity is trusted by
default.
Cybersecurity Skills Gap: Growing demand for skilled
professionals in the field.
Cybersecurity Fundamentals
1. Confidentiality, Integrity, and Availability (CIA Triad):
Confidentiality: Ensures data is accessible only to those
authorized to view it. Techniques include encryption and access
controls.
o Malware:
Viruses: Malicious code that attaches to legitimate programs
and spreads. Example: The ILOVEYOU virus (2000).
Worms: Self-replicating malware that spreads across networks.
Example: The Wanna Cry ransomware (2017).
Trojans: Malware disguised as legitimate software. Example:
Emotet Trojan.
Ransomware: Encrypts files and demands payment for
decryption. Example: Crypto Locker.
o Phishing and Social Engineering:
Phishing: Fraudulent attempts to obtain sensitive
information by pretending to be a trustworthy entity.
Methods include email phishing and spear-phishing.
Social Engineering: Manipulating individuals into
divulging confidential information. Techniques include
pretexting and baiting.
o Denial-of-Service (DoS) and Distributed Denial-of-Service
(DDoS) Attacks:
DoS: Overwhelms a system or network with traffic to make it
unavailable. Example: The 2016 DDoS attack on Dyn.
DDoS: Uses multiple systems to launch a coordinated attack,
amplifying the effect. Example: Mirai Botnet attack.
o Threat Actors and Motives
Hacktivists: Individuals or groups using hacking to promote
political agendas or social causes. Example: Anonymous group.
Cybercriminals: Actors seeking financial gain through illegal
activities such as data theft or fraud. Example: Ransomware
gangs.
Nation-States: Governments conducting cyber-espionage or
cyber-warfare for political or economic advantage. Example:
APT28 (Fancy Bear).
Insider Threats: Employees or contractors who misuse their
access for malicious purposes or through negligence. Example:
Edward Snowden's NSA leaks.