Cyber Security Unit 1
Cyber Security Unit 1
CYBER SECURITY
Conheleo ialtysn
TÁe teim on fidntiaiby means
autbott Zed
|authosi estrc ans aclesS nd s cbsure,
Propriatany n btmatog.
mens data is
omplele, tuslaorty and has nt mhfed as
been
acidentally altesed an nauthotsed ser.
Eaauptoa
he poess ol
models
obsnaton ordata by sing matheratial
Sciamble 1t in &ch a the
Can
who have -he to
it
Partes
acess 1t
ky
Cybersecumty managemeat
iovolves
the stietegte poning. epatons, trplermen
and moniorling bton,
an Caganí3aton
Gybeasecuiby pactes wrlbin
Avalablte
Aatabihty meanS and selabe
acess to an d use
aycs ot
Thde ale. Seven aye The
Huran layc
Pesmetes Seaaity
Weboosk
seasity
tgont Secrity
Applcadon secaiky
Data secstty
Mssion CItbcal Assels
2
Pro tected.
his focuses assets that
to ar ongonizatons pevators and
Cucial
Conlinutty
bustness
|2- Data
Seants pioteets the
he Data
to an gptation
Ht piotects acess
handles the Crdical assets ond
lhieh mision
the applitaton.
inteinal selity Sotlwate and
* his ocuses on keeping
layes
device ree thteats.
Iik any
|ybe Seaity Pastre. tumen secorty contiol includes
Phshing sim wlators Gnd actessrarmgement
Cone
that otect missan Xital assets Bom a oide
ot hman
voíehy 0f threats, inliolirg yboa ininak,
malicios nsides and negligent ustS
Vneiaihtyi
Valretabites Yefer to
helnevabitiesi
refey to Phus that make
Vlnc ta bii tes
designes and
|Sottare act or even
ioterd t
it tos
dev lapas not
pect.
2. Nelok Vulaca bilhties i
A Aetscrk Vulnea bilty a
lophole o go
nekosk hat Can treoten the notral
n cons he nehsog k.
3. unan Yalnata bt kties:
Hunan Valneo bi lhties ae creafed by User errot
hat an Cpese netos ks, hardave, and
Senstlive data malctous c
tors.
Physioal ulnoabth hes:
Physical Valneabrhtes aVe brondly Valnera bihties
that Presen Ce to enploit.
Eronpe. locts -thot are ce ked
rot are
valoesbihy
mettads.
| operlral
for franpe
2. fassurd potecol
|2
Tianig PC edu.
Threati
qyboseanby acts perforree
threat
by individals witA hl
oita otent, whase
goal is to steal ata, cause. damge te
-to otsnyt onutig ystens.
-heats are secrity incideats
e
CitCumstantes wA rotential to have
negative Cettome fex yeur
Oher mmnagcment Systems.
Exaple
* Phishing
atfacks,
Tntexnet Govnance
* Dotesnet fovernance Ators
foxohl Ats
Hotnfel octs in Can fom
eladiely Sinpk aitions Iike phishing nd malaia
gorinance here
are Some
Points.
Toluy
Dordrt
Ston dads nd Poto cols
2 Coor
dinato od o
laboiation
Capactty Buibhing.
There ove multple acos Jhith
are jovolved fn
in One
Gnolher he govetnonce
Jotenel.
Tottret coqpo
taton tor Asigntd larmcs
an d
Ahmbis (CANI)
| Totnt engincaing Task Fotte CIETE)
Zotenet Teleconuniatoa nien (21u)
Jo arld Totelectuat Proprxty oiganitatoa (wr)
9
îhtenet Gorernan te forum (GF).
Computer Cininals i
yber Goioaßs, also knoon backas, cen use
Compate gtors to gain acess bsiness ttade
n feration
Secrets and asoral
posonal for naliciou
and Brplotve papaes.
ackes ohrcuet to tidents
|* are steny
On tolh irshvioal level ohe
to lheiy Varizs Sey measu res Sech
Plonies an d renyotty neticerts KKick tert hs
an
d pootect fkeiý
ypes
hee cl:reot of
Ctinnias
1. Scdertity Thieves
D
Doteoct stalters
3. phishing siammas
4.
Cybo Tennists.
1.Tdeotby Thieves ;
Tdentty tieves are yber cininals wbo fry
to qain their Victims' pe/scnal
access to
gain
inomaton - nome, adoress , phone numbeY: pace
ch Employment, bank aceunt
, Ctedkt
Cotd in fotntion ond Soral Secutty Oumbe.
2- Datainet staltas;
otenet stalkess ate inadtvduals
ihdividals ho
3. phísbiog Scamnas:
|Phishers are Cyber cininal; Iho atterrpt
sensrbve
get ahold ot pasonal
infoomatin hugh
vtelino's Cbmpufs.
phishing ybti- attoc k that uses Paudu
Ronsomwate cvolution
loT Theats
AL Expansion
2. Ransomusane Evoluton
malwate
Ransomre is a
Eype of
ohta on, Vic tin's rs locke
Computer
the a
land snecutives.
Ronsomwore attacks grouong
he acas ot day by
day ybrine.
2 Blockchaio voltion i
Blec kehaio teckrekoy
techrnclgy
is the mest rperlart
iovntin in tompadng
hizley
kove
have o geruiney native
that we
mdhun Peer-to- peer Value eyckorge
The vast gohal patar
blcckchain is a
paries to do
mcre a
3. DoT Thieats
îcT Thuats stans fer Sotetnet of Things.
is a Syslen ot iotetrelated rhysicnl
Can be acressible though
devíces
-he inlanet
onnected physical devites have
The
unique iden tife CUD)
kave lhe abshty to tionsfes data
Cnd
netoork witkait Yeguiement et
- to Computer
the humon-to- hun hyman
inetoeton.
4 ! Expansion
A| shost on is
Axtitcial irlealiynte
ot oputes stíente
ok t
an
deation intelligent rachines
is humons.
-lhat clo wort an d tert Itee
os
Cloud infastucte Cloud
On bhck end Seute
Such gongle funetion, Ama Zon
AS
-lhat Combines
Triad is a Romeuork
he CA Principlks
threa
fo fbnotton Secriy
key
onfidentalttyy in tguy and avla bi
piovícks Sopk ard erplete
|The CA tniad
Checklist for evaluadng an gonieateat
Moie lhon an io felrotin Secirity famaor k,
the CIA tria d heps b1gonitations ypgtade and
mainlain
era bling
statf to retlan tasts Ite dato
Coll ec din, Custond Servie an d genaal nranafmr
-Confidentiolity CoNFIDENTAUTY
C.I.A
TRIAD
AVAlLABILITY TNTEGRITY
-Aajlabl; ty
. Confrdetialtty
Sotve data
Confidentiakty hvolves pbteting
Rtorn
Piate and 'safe urathozed accesS.
2.
ntegrity
dbta
e and busincs s
business aalysts
nale Sute dala
a
actesshg acunte fnation.
3. Availabtlt ty
tefrs to the
bullebilh hy idea that he people
o
who neeg
nect actess data Can get t Ortheit
whout atectng ts Contrent iolity or
indegrily
Vaficus thieats
These assets Can cCempas a LOtde
of lems, fncluoing
dato, Systems,
netoor ks, hascuae, sottsae and even
Feople.
Lypes ol Acsets
Data
psystems and ehor ks
Dakostachare
Pecple
Active attacts
actve ctlack s a
hek a hactes attacks ond modihes
syslen ond a
Man-itte midle
LanSomware
Passive Attoti
|Passive Attock is a
Sendes Peceives
8ends Receive
tMessoge
Mesnge obsavirg
Attackt
TassiVE ATACE.
ACTIVE ATTACk
Softuare atack
A
Sofluaie. atock is teless to maftcious,
activiy
epbiaton ot velara bil:lies
wWitiin solluase applaions, system ,
netoos ks to
Cormpsomise S Secatity gain
Lnathortzed aCleSs, ausG hotn to
cs tomputa Systms
9. Mallat thcks
2 Explerts a velnetobshty tacts
3
Dos Athc ks dar DDOs Attacks.
phishiag and SpeaY phis bing Atlacts.
S:
Man- in-he - Midd le Atacks,
avalatle bt boes not modhy he ineoralon.
Mantctine Ba ckdoors
- f maluwase o oth es
Penetratne puvpOse
Peneane pYpase
PsychoSic
Spectrom o pSychosG Sqectun
The Schizophrenia spechYU dis ordes
nomeouspsychoh
there
VaioUS attuckS.
Taxonomy
termate colegot'gaon
a Sgs
AHacK takonoy tneiy chesaclee Ishey
Based
attee ks
kongets.
aY
te chnige
evoe De attek
A ttack taxonomies foundatn
Seyve a
meh
incident relpone, volnaablity mungneut.
Secoiy a
whnos Progtane, enasling
Bettc, ondesland Ond rioritye
ganiekong to
theit Secuity de lenseg Pased o
Jne revalen9
Exomples attoek
vaay he
At tack ta xonontes dependng
Cund he organizatar usig dhen te is
Context
gener al Cornroon Codegoses
Malware attecks+
Viuse uorhs, Tvoyany
Rootits nd BacKoor
web Based atacks
CvOSSsite Scripiny (xss
SQL lojecton. Rogery csRF)
CYOSS
Sit gest
phishing
Socicl. Engneg
Attaeks to qettn os
Buffea veatlo attecks
Privilege es calcon attacks
tkeanel evel atacks
2e0 -douy eaploits.
mobile attacks
wiveleK cund
Spoofyt
adre spoofng, refey
Tp Spog Rsotocal P) Packets
Creaio) tnleanet
to the
to Impsonabe
wi a lase Source iP addrey
Comastg Systero.
arathes out.
Cubee cimials to Cag
spooting alaws Cyhe
cheteehorn.
maliCioos
actong, ofteo usthout
include Ste atin yau dala in fech
This mgut
device malware
Sesvel
tec hoigue oflen By Bad aclere
spony
tnside Jhe Pecset,
dhe Souree
a dcntges 4 this Proces
talke
Marcioos hackels
theit Cddes
ordes to hide
enecoting tasgats.
attackS
davice
do Jhis to Rool he tget
Hackr
Jhe Source
rs to
nto acthtey.
Conduet hei hacany
yourself
ne to Projeat
enyps to taf
a
Pantey
lacws) spooed
Packet
St:Patne
ds vickm.
Method de jenge
attecks eguineg
Dehnginy against ybe vahious melhods
dnat Combines
approach
layeadec netiorKs and dasa.
chnologies to Proteet
sgsles,
te
and Poeo cedoves
Rro teatine
By impemerthng esponse (vDR),endot
deteehon and
NehoYK analsge
and esponse CeDR) to idenify
deteeton petwor :.
eport inciteos dhut
and
nekoork Seeurity
Rre uwall
i. Rre walsE
cind Concol inlorniney
ices
devices that monte
dnat
on perdkemined Security
traffhc Bosed
Intenal etoKS
ules.Thy aut ad a Besie inkanet
cy the
n
enenal netoY ks, Such malieious
Blocr
Prevent anaioorged acce
trafie.
Deteetorn Syse (10s) and inshusio)
a. oshuson
Prevete Systern.
fex Signs
IOS
Ios and PS oehr ttotic
K
105
attack PattenS.
know
Supicious achity aboot Potential
alents adminishretorg
de tecs and
Scoity Breache, whle
Preet mali ciouS traffic
taget
Aothnaloal SoftwoSe.
,
Andvius cntmakoase
and Softae deteet gU tne. an
ViYuse eosos,
and renore malicioUS neSottsa n
TYopns and ounsoane
Rsorn Ssler and. etoks.
tiansfo nS data in
a Seccore lalgori th
g)
Encvypion ma
Rornat osing crpotogsa phie algoshng kng it
Unreadele to Un auoized
Acces Conhio)
Tmpementhng stong Contols Such a least
Contol (AGnc),
role ied alces
USe Cund Syslers ony bave aec es o
ense dhat
deda ne sscy Po dher volej.
he eYeg Cn
Pa teh
manceyenet
e
data Corrupon.
dhus dcng dhe
wilson mohel
Clark
Designed apieaons, this moel
emphases he
inley an Consiskny datan
jdenieaor!
riSK maag cment ts identthiying
The Airst step affeet
dhat Coold dne oigonzahon.
otenal dhreds(such ay
yhe atHaeks
idenikyng
This nvolve
o eru)
hurnan emot) and vulnesatg
disastey,
natal y those dhrets.
Cewld be enploied
Dssessanet
hane been identiedhy
are sesed
risK
likelihood OCeorenee and
to deleamine the
Potental Impoact the Grgangato.
Pyiocihge Base dreiy Siqnifcanee
Risrs
and po
kotal imact on he ogan jaon's
objecties. Risks wdh highe Iikel:hood and
Potenkal impact gven highes
Jeate atern thion
cund regune iomediat
Cund resoceg
Qisk mihgeont
,
have oeen identfiec assessed and
iskS
, niigatian measores
Priorhyed appropriake
imglerseotec to redce the
nvove mparntny
Nsks.
his This mqy
Count neasug to prevent
Contols, aPegrads,
respond to even
detet
RisK onaunicaten
Commiae) riskS and
Efeehve ensue
esenHal
managemel staegies Is
awre Polenihal thrats
dnat stale holdeg
ord ndustan the osgan'aors appreh to
This Cormoonicain
rnanag therm. incldes
ong proges o
asses ment
iHgin plng and updates
Seni managmab Gostoment
heleven Panteg.
Cybeg dhreals and ybed
Softwane
to inflkrale
desianed Ao
malwaNet MalicioUS
intormaton
,o Stea
dearnage
yglerns.
Compta
to tick ndiiag
audulent aternpts
Phishing
8enstive
'oto weasi tey
decephve emals
d
Distibole
Sevice (oos) anc
Denial of
At+acks
Sesuice (o0os) aojdh
ne twoks
tageted Sylens Umava lebe.
Oveuheln Jhem
vendeing
tafc
oy
that pts
encxpts l eg oY
RonsONwaLe malee
Out
Pold
hadicios a
ctions Secoriy
Inside Tneat
ut inviduc
Reacheg CoSied
(ontraclors
Cgangaion, Suc ernplyee
Bebind Cybeg Trecdst
Modivahons
minimise dircet
cend Irmpieaken
4.
chalcnies
Peapetadors gbet
lden tyney Jhe
Atibohon dhe anonymihy
chalongingy due to
be
attaeky Cen mating
s ophis teutier
aiackey
Cnd
to hold
Scalattoo Rr
potentia calate
have dhe
ottaeks
Cybe
betuwoon naton lea ding to retaliato
Con Aie ts
Qun undesmiig
acion
Csicot
cny Cyininel
Cybes Cime
totey place
tohleb odhey IT
Cornputes Tnanet
is nost ComNoN
Cybeg
moTen
Pleuys vey teo role
Ciminals
not eny cauny
dhe Socichy cnd 9ovesnment Bt hey
ide nlty to gveat
Ho hide che en ten t
clsie
achuithes done
Thene nombeg (rima nu
(iminal
cre intanet dhogh
Inenet and lompukas in
oreatlng .Tntesnal
daily re, ubes c
Cine in
Bot hag
Convini ence to Jhe
frodes oo
deuk
Cnmes
Some nuoly emegy
cyba staling
Haceing
Ermail Bomby
Cybeg Terorsm
Data Theft ele
LUmole Cetoe
data and applieukon
Unauthozed s
Compots viruS malse.
sprescniy
wiy
Digtally dshiboting child porngephy.
reel oney
uebsite to look
Deslgnlny fake
money viruS.
Con denal deta
Compooy and inanef.
Chbey teaoris is
a teu orist
a
CeLse ybes
Actal
Commnd.
CENTCoM,- U.S
SPYWARE.
CENTCOM fnfe cted ith
Tn a00t, lot.
Payting.
dyive wal lett
A
plgged into his
Solde to
wokStch, Jhus Introducing pyae
CE NTcOH
networ
Signikceut Secority Beacn and
Tbis daumoged is
mvch deta was
houw
know0.
Compsks
Decembeg 004, Hac kens Broke into
Tn pl ans
Secret deyense
Sysemg Stole tte
and
Sootth korea
place and
Sngle
Jheiy issueg
Cubeg E
spiog
cybes esionge
,
adtemps
ohich nauthoed
Cybeaattack oY inlclleduc
cs casifd
ClassiRied dota
acces Sosihve
nsie
o
Compolitte adantage
eLonoic ain
Ropety
poic Heal meascoN.