0% found this document useful (0 votes)
20 views11 pages

Cyber Part2

The document outlines key concepts in cybersecurity, focusing on the CIA Triad (confidentiality, integrity, availability), the importance of authenticity, and risk management. It discusses various roles in cybersecurity, the nature and impact of cybercrime, and the significance of cyber activism. Additionally, it details typologies of cybercrime, emerging threats, and strategies for identification, risk assessment, and mitigation.

Uploaded by

vidushiwadhawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views11 pages

Cyber Part2

The document outlines key concepts in cybersecurity, focusing on the CIA Triad (confidentiality, integrity, availability), the importance of authenticity, and risk management. It discusses various roles in cybersecurity, the nature and impact of cybercrime, and the significance of cyber activism. Additionally, it details typologies of cybercrime, emerging threats, and strategies for identification, risk assessment, and mitigation.

Uploaded by

vidushiwadhawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBER SECURITY:OBJECTIVES

THE CIA TRIAD

The CIA Triad is one of the most fundamental concepts in cybersecurity. It


stands for confidentiality, integrity, and availability, and it represents the
three main goals of cybersecurity.

 Confidentiality refers to the need to protect information from


unauthorized access.
 Integrity refers to the need to ensure that information is accurate and
complete.
 Availability refers to the need to ensure that information is accessible to
authorized users when they need it.

Authenticity
Cyber security strives to verify the authenticity of users, devices, and data
within digital environments. Through techniques like multi- factor
authentication, biometrics, and certificate authorities, it ensures that entities
are who they claim to be, thus preventing identity theft, spoofing, or
impersonation attacks.

Risk Management
Cyber security plays a crucial role in helping organizations meet regulatory
requirements, industry standards, and best practices. It also helps mitigate the
risks associated with cyber threats, such as financial losses, reputational
damage, and legal liabilities.
ROLES IN CYBER SECURITY
There are many different roles in cybersecurity, each with its own specific
focus. Some of the most common cybersecurity roles are:

Chief Information Security officer (CISO) : The CISO is responsible for


developing, implementing, and overseeing an organization's overall cyber
security strategy and policies.
Security Analyst : Security analysts monitor and analyze network traffic,
identify potential threats, and investigate security incidents.
Penetration Tester : Penetration testers simulate cyber attacks to identify
vulnerabilities in an organization's systems and networks, helping to improve
security measures.
Incident Response Specialist : These professionals are
responsible for responding to and mitigating the impact of
security incidents, such as data breaches or malware infections.
Cryptographer : Cryptographers design and implement secure encryption
algorithms and protocols to protect sensitive data.
Security Engineers : Security engineers develop, deploy, and maintain
secure systems, applications, and infrastructure.
Security Auditor : Security auditors assess an organization's compliance
with security standards, identify vulnerabilities, and recommend
improvements.
Cyber Security Educator : These professionals train and educate employees
on cyber security best practices, awareness, and response procedures.
Unit: 2
 Cyber Crime and Cyber Activism: An Overview
 Typologies of Cyber Crimes: Generic Cyber Crimes, Advanced
Persistent Threats (APTs), Cyber Threat in Mobile Technology, Cloud
Computing and BYOD
 Cyber Crime Identification, Risk Assessment, Management and Control

Overview

In the digital age, where technology permeates every aspect of society, the
rise of Cybercrime presents a rampant threat in today's digital world. Cyber
criminals leverage advanced tactics to exploit vulnerabilities, steal sensitive
information, disrupt services, and inflict widespread harm. Understanding the
nature of cyber crime, implementing effective mitigation strategies, and
enhancing control mechanisms are essential in combating this pervasive threat.
This Chapter Provide insights into the overview of Cyber crime and cyber
activism. Further the Typologies of the cyber crime is provided in detail and
then Identification management and Control Measures has been discussed.

Cyber crime poses a significant threat to individuals, businesses, and


governments worldwide. By gaining insights into the evolving threat
landscape, implementing effective mitigation strategies, and enhancing
control mechanisms through legislation, regulation, international cooperation,
and public-private partnerships, stakeholders can bolster their defenses and
mitigate the impact of cyber crime. In a digital world where the stakes are
high, proactive efforts to combat cyber crime are essential to safeguarding the
integrity, privacy, and security of cyberspace.
CYBER CRIME
This term refers to the illegal activities conducted in cyberspace that
targets or uses computers, networks, and digital devices.
These activities includes stealing data, disrupting operations, or extorting
money hacking, identity theft, phishing, and spreading malware or viruses.
Cybercriminals are like digital outlaws who exploit vulnerabilities for
personal gain.

MOTIVATIONS : Cybercriminals can be individuals, organized groups, or


even nation-states. Their motivations vary widely, from financial gain through
stealing sensitive information or extorting money to ideological or political
reasons. Some engage in cybercrime for the thrill of breaking into secure
systems or for the challenge it presents.

TARGETS : Anyone can fall victim to cybercrime, including individuals,


businesses, governments, and even critical infrastructure like power grids or
transportation systems. Small businesses are often targeted due to their weaker
security measures compared to larger corporations.

IMPACT: The impact of cybercrime can be devastating. It can lead to


financial losses, reputational damage, loss of sensitive data, disruption of
services, and even physical harm in cases where critical infrastructure is
targeted. Beyond the immediate effects, cybercrime can erode trust in online
systems and hinder technological innovation.

GLOBAL NATURE : Cybercrime knows no borders. Criminals can operate


from anywhere in the world and target victims in distant locations. This
presents challenges for law enforcement agencies, as jurisdictional issues and
differing legal frameworks can complicate investigations and prosecution.

LEGAL FRAMEWORKS: Governments around the world are enacting laws


and regulations to combat cybercrime. These include laws addressing hacking,
data breaches, online fraud, and the protection of personal information.
International cooperation is also essential for tackling cybercrime effectively.
EMERGING THREATS: As technology evolves, so do the tactics of
cybercriminals. Emerging threats include the rise of ransomware-as-a-service,
sophisticated phishing attacks, exploitation of Internet of Things (IoT)
devices, and the use of artificial intelligence for both defensive and offensive
purposes.

Protecting Yourself:
o Don't click on suspicious links or attachments in
emails.

o Use strong passwords and update them regularly.


o Install security software and keep it up to date.
o Be wary of online offers that seem too good to be true.
o Regularly back up your important data to a secure
location

CYBER ACTIVISM :

Cyber activism refers to the use of digital tools and platforms to promote and
advocate for social, political, economic and environmental causes. It is also
known as online activism or digital activism. It uses the power of the internet,
social media, and technology to effect change on a global scale. In an
increasingly interconnected world, cyber activism has emerged as a powerful
force for social justice and democratic participation.

 One of the key characteristics of cyber activism is its ability to


reach aglobal audience almost instantaneously.
 Twitter, Facebook, & Instagram provide activists with powerful
tools toraise awareness, mobilize supporters, & organize protests or
campaigns.
 Hashtags, viral videos, and online petitions can quickly gain
traction andspark conversations that transcend geographical
boundaries.
Forms of Cyber Activism
Raising Awareness : Social media campaigns can effectively spread
information about social injustices, environmental issues, or human rights
violations.
Mobilizing Action : Online petitions can garner millions of signatures, while
calls to action can encourage participation in protests or boycotts.

Crowdfunding : Online platforms like Kickstarter and GoFundMe enable


activists to raise funds for their causes, supporting legal battles, humanitarian
efforts, or independent media projects.
Challenging Power Stuctures: Hacktivist groups uses hacking techniques to
target government or corporate websites to expose corruption or disrupt their
operations (be aware that hacktivism can be illegal).
Online Harassment : Online harassment is the use of digital technologies to
harass or intimidate an individual or group. It can take many forms, including
cyberbullying, hate speech, and threats of violence.

Benefits of Cyber Activism


Benefits of Cyber Activism :
• There are many benefits to cyber activism,
including: It is a low-cost way to reach a large
audience.
• Raises awareness of important issues & hold
those in power accountable. Activists and
ordinary individuals can document and share
news, events, and human rights violations in real-
time.
• Information can be disseminated instantly across
borders, bypassing traditional media gatekeepers
and reaching a vast audience.
Challenges of Cyber Activism
There are also some challenges associated with cyber activism, including:
1. False information can spread rapidly online, making it difficult to
discerntruth from fiction.
2. Authoritarian regimes may suppress online activism by
monitoringcommunications and censoring dissent.
3. Social media algorithms can create echo chambers where users
are primarily exposed to information that confirms their
existing beliefs.
4. It can be difficult to avoid online harassment and other forms
of abuse.
5. It can be difficult to measure the impact of cyber activism.

TYPOLOGIES OF CYBER CRIME :

The ever-expanding digital landscape presents a vast playing field for


cybercriminals. To effectively defend ourselves, we need to understand the
different types of attacks they employ. Here's a breakdown of some key
cybercrime typologies:

GENERIC CYBER CRIMES :


Generic cyber crimes are common types of cyber crimes that affect
individuals and organizations. They often rely on tricking victims into
compromising their security. They include:

1) Cyberbullying: Harassment, intimidation, or


humiliation of individuals using online platforms.

2) Identity Theft: Unauthorized access and use of


someone else's personal information for fraudulent purposes.

3) Phishing: Deceptive techniques to acquire sensitive information such as


usernames, passwords, and credit card details.

4) Malware: Malicious software designed to disrupt, damage, or gain


unauthorized access to computer systems.

5) Denial-of-Service (DoS) Attacks: Flooding a network or server with


excessive traffic to render it unavailable to users.

6) Ransomware: Encrypting files or systems and demanding payment for


their release.

7) Online Fraud: Cybercriminals engage in various fraudulent activities,


including credit card fraud, auction fraud, and investment schemes.

ADVANCED PERSISTENT THREATS (APTS)


These are highly sophisticated attacks targeting high-value targets like
governments, financial institutions, and critical infrastructure.
These attacks involve a high level of planning and persistence.
APTs are meticulous and long-term, often employing
custom tools and techniques to evade detection.
APTs often employ multiple attack vectors and exploit
vulnerabilities over an extended period, making them challenging to
detect and mitigate.

CYBER THREATS IN MOBILE TECHNOLOGY


The widespread use of mobile devices has opened up new avenues for
cybercriminals. Mobile-specific cyber threats include:

1) Malicious Apps : Downloaded from unofficial app stores, these apps can
steal data, track user activity, or display intrusive ads.

2) phishing : This is a form of phishing that involves sending fraudulent


text messages to trick individuals into revealing personal information.

3) Mobile Malware: Designed to steal information, track location, or


disrupt phone functionality.

4) Unsecured Wi-Fi Networks : Public Wi-Fi networks are often exploited


to intercept data transmissions and launch attacks on connected devices.

CYBER THREATS IN CLOUD COMPUTING

Cloud computing has revolutionized the way businesses operate. As


businesses increasingly rely on cloud services for data storage and
processing, new vulnerabilities emerge. Common threats include:

1) Data Breaches : Hackers can exploit weaknesses in cloud


security to access sensitive data stored by businesses.

2) Insecure APIs : Application Programming Interfaces (APIs)


that connect cloud services can be exploited to access or manipulate data.

3) Data Loss : Accidental deletion or destruction of cloud-hosted data,


sometimes caused by service provider errors or infrastructure failures.

4) Account Hijacking : Unauthorized access to cloud accounts through


stolen credentials or social engineering techniques.

BYOD SECURITY RISKS :


BYOD abbreviates to Bring Your Own Device. It refers to the practice when
employees use personal devices for work purposes. It can introduce security
challenges for organizations, Such as –

1) Data Leakage : Sensitive corporate data may be exposed if devices are


lost or stolen.

2) Malware Infection: Personal devices may not have the same level of
security as corporate devices, making them more susceptible to malware
infections.

3) Unauthorized Access: Weak authentication or device control


mechanisms can allow unauthorized individuals to gain access to corporate
resources.

CYBER CRIME IDENTIFICATION


Cyber crime identification is the process of detecting and investigating
various forms of illegal activities conducted in cyberspace.
This is essential for law enforcement agencies, cybersecurity professionals,
and organizations to effectively respond to and mitigate cyber threats. It
involves a variety of techniques, Such as :
Digital Forensics: Digital forensics involves the collection, preservation,
analysis, and presentation of digital evidence to investigate cybercrimes.
Forensic experts use specialized tools and techniques to examine digital
devices, networks, and systems to identify traces of malicious activities.

Incident Response: Incident response teams are responsible for


detecting, analyzing, and mitigating cybersecurity incidents. They employ a
range of detection mechanisms, such as intrusion detection systems (IDS),
security information and event management (SIEM) tools, and
threat intelligence feeds to identify cyber threats in real-time.

Threat Intelligence: Threat intelligence involves gathering and


analyzing information about cyber threats, including tactics,
techniques, and procedures (TTPs) used by threat actors. By understanding
the tactics employed by cybercriminals, organizations can better identify and
defend against potential attacks.

ML and AI: Machine learning (ML) and artificial intelligence (AI)


technologies are increasingly being used to enhance cybercrime identification
capabilities. These technologies can analyze vast amounts of data to detect
patterns and anomalies associated with cyber threats, enabling faster and
more accurate identification of malicious activities.

COMMON SIGNS OF CYBER CRIME

1) Unusual System Activity: A sudden spike in network traffic, unauthorized


login attempts, Missing files or corrupted data can be red flags.
2) Performance Issues: Slowdowns, crashes, or unexpected behavior of your
devices or software can be signs of malware infection.
3) Suspicious Emails: Phishing attempts or messages containing malicious
attachments can be a gateway for cyberattacks.
4) Unexpected Installs: If new software or apps appear on your device
without your knowledge, it could be a sign of a malware infection.
5) Security Alerts: Antivirus, anti-malware, and intrusion detection systems
can generate alerts when suspicious activity is detected.
RISK ASSESSMENT
Risk assessment is the process of identifying, analyzing, and evaluating
potential risks to information assets, systems, and operations.
It plays a crucial role in developing effective cybersecurity strategies and
prioritizing resource allocation for organizations to mitigate risks.
Key steps for conducting a cyber risk assessment are :

1) Asset Identification : The first step in risk assessment is identifying and


cataloging the assets that are at risk of cyber attack, such as computer systems,
software, data, and intellectual property.

2) Threat Identification : This involves identifying the threats that could


potentially damage the assets, such as hackers, malware, technical failures and
natural disasters.

3) Assess Vulnerabilities : Evaluate your systems and processes to identify


weaknesses that attackers could exploit. This includes outdated software, weak
passwords, and unsecured networks.

4) Risk Analysis : Risk analysis involves evaluating the likelihood and


impact of the threats. This involves assessing factors such as the probability of
occurrence, severity of consequences, and effectiveness of existing controls.

5) Risk Mitigation : Risk mitigation involves implementing measures to


reduce the risk of cyber attack, such as implementing security controls, policies,
training employees, and backing up data or as per the need after assesment.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy