Introduction To Cyber Security
Introduction To Cyber Security
It’s Importance
CIA & DAD
Cyber Security-
overview
Asset, Types of
Vulnerability Cyber
Risk & Threat Security
Agenda Hacking
vs Types of
Hackers
Ethical
Hacking
Essential
Cyber Terms &
Threats Standards &
Key Challenges
Cyber Space
What is Cyber Space?
► Communication
► Entertainment
► Health Industry
► Education
► Travelling
► Sports
► Banking
If we see the current market trend, cyber security has taken one of the most important
place. Day by day every thing is getting digitalized from online transaction to online
shopping, so with that cyber attack or digital attack is also increasing. To safe guard this,
cyber security has come to protect computer system, program and network. Just as the
physical security protects a building, cyber security safe guards digital technologies from
digital dangers. This is a challenging field and there is a huge scope in the upcoming
days.
Cyber Security refers to the practice of protecting computer systems, networks and
digital information from unauthorised access, theft, damage or any other malicious
activity and digital attacks that could compromise their integrity and availability.
Why do we need
Security for
Cyberspace?
Why do we need Cyber Security?
The main purpose of Cyber Security is to safeguard all types of data against theft and
loss.
Sensitive data, protected health information, personal information, intellectual
property, data and government and business information systems are all included.
The scope and opportunities of cyber security in future are vast and growing as more
and more organizations and individuals rely on digital technologies and the internet.
Here are some of the key areas where cyber security is likely to play a critical role –
Cyber Security and Information Security are related concepts that are often used
interchangeably, but there are some key differences between them.
Information Security is a broad term that refers to the protection of all forms of
sensitive data, including physical and electronic data, from unauthorised access, use,
disclosure, disruption, modification or destruction. It encompasses various measures
and controls, such as access controls, encryption, backup and recovery, security
policies and awareness training.
Cyber Security on the other hand is a subset of Information Security that specially
focuses on the protection of digital assets, including networks, devices, systems and
applications, from cyber threats. Cyber Threats may include malware, phishing
attacks, social engineering, DOS attacks and other types of malicious activities
carried out by hackers and cyber criminals.
An asset can be defined as any device, system, application or data that has value to
an organization and requires protection from potential threats. For example –
hardware, software, data, network, cloud, human etc.
Vulnerability
Threats are a constant and ever evolving danger that can cause harm to an
organization’s systems, networks or data. Threats can come from a wide range of
sources including external attackers, insider threats, natural disasters and human
error.
Risk
Risk is the measure of the potential harm or loss to an organization resulting from a
security breach. For example – Malware attack, Ransomware attack etc
Types of Cyber Security
Offensive Security
Defensive Security
Compliance Security (Proactive Cyber Security and Reactive Cyber Security)
Offensive Security
This involves protecting an organization’s systems and networks from cyber attacks.
Defensive Security professionals use techniques like firewalls and security information
and event management to protect against attacks.
Techniques Used – Access Control List, Zero Trust.
Compliance Security
This involves meeting regulatory requirements and standards such as GDPR, PCI DSS
etc. Compliance Cyber Security professionals ensure that an organization’s systems
and processes comply with these regulations to avoid legal and financial penalties.
Proactive Cyber Security – This involves taking measures to prevent cyber attacks
from occurring in the first place. This may include implementing security controls,
providing cyber security training to employees and conducting regular risk
assessments.
Reactive Cyber Security - This involves responding to cyber attacks, after they
have occurred. This may include disaster recovery, business continuity planning.
Compliance Security – Standards and Benchmarks
Compliance Cyber Security standards and benchmarks provide guidance and best
practices to organizations for securing their IT systems and infrastructure. Here are
some of the most widely recognized standards and benchmarks –
Payment Card Industry Data Security Standard (PCI DSS) – This standard is
designed to help organizations that handle credit card data to protect against data
breaches and theft.
General Data Protection Regulation (GDPR) – This regulation sets out rules for the
protection of personal data of individuals in the European Union.
CIS Benchmarks – The Center for Internet Security Benchmarks provide a set of
best practices for securing systems and networks.They cover a wide range of
technologies, including operating systems, cloud environments and mobile devices.
ISO 20000 – This benchmark is a standard for IT service management that focuses
on delivering quality IT services to customers.
Well known Security Standards/Guidelines
Reference Standards to perform Security Testing
How do
Organisations Protect
Themselves?
Organizational aspect of Cyber Security – PEOPLE, PROCESS AND
TECHNOLOGY
Each of these elements plays an essential role in protecting an organization from cyber
threats.
People – The first line of defence against cyber threats is people. Employees must
be trained and educated on cyber security best practices. Cyber security training
should be ongoing and updated regularly to keep up with the latest threats.
Process – Effective cyber security requires a structured and organized approach to
risk management. So processes should be designed to ensure that all assets are
secured and that potential threats are identified and addressed in a timely manner.
Technology – Cyber Security technology includes tools such as firewalls, antivirus
softwares etc .These tools are designed to protect against cyber threats and are an
essential component of an organization’s cyber security strategy.
By focusing on all the three elements, organizations can improve their overall cyber
security posture and reduce the risk of cyber attacks.
“
Attack = Motive + Method + Vulnerability
Common Cyber Threats
Cyber threats are any type of malicious activity that targets computers, networks and
digital devices with the intent of causing harm or stealing sensitive data. Some of the
most common cyber threats are –
Phishing Attacks – An attacker tries to trick the victim into clicking on a link or
downloading an attachment that contains malware. This attack often use email or
social media as a means of communication.
Malware – A type of software designed to harm or exploit digital devices. Malware can
include viruses, worms, trojans, ransomware and spyware. Malware can be used to
steal sensitive data, damage systems or take control of devices.
Password Attacks – This involve attempting to crack passwords in order to gain
access to a system or network. This kind of attack can include brute-force attacks, in
which an attacker tries every possible combination of characters, until the correct
password is found.
► The art to exploit system vulnerabilities and compromising security controls to gain
unauthorized or inappropriate access to the system resource
► Actually, it is the art of modifying system or application features to achieve a goal outside of
the creator’s original purpose
01 02 03 04
05 06 07 08
Cyber State
Script Kiddies Sponsored Hacktivist
Terrorists
Hackers
► It involves the use of hacking tools, tricks, and techniques to identify vulnerabilities so as to
ensure system security
► Ethical hacker performs security assessment of an organisation with the permission of the
concerned authorities
5 February 2024
Scanning target on
basis of info
gathered during
footprinting
Ethical Hacking – Phases
Retaining ownership
of the compromised
system or application