PGD in Cyber Security & Cyber Threat: Week#7
PGD in Cyber Security & Cyber Threat: Week#7
Cyber Threat
Module 01
Week#7
Today’s Topic:
Cyber Security Principles
• Integrity:
• Assurance that the information is trustworthy and
accurate.
• Availability:
• The guarantee of reliable access to the information by
authorized people.
Cyber Security Principle Definitions
• Accountability:
• Is an assurance that an individual or an organization
will be evaluated on their performance or
behaviour related to something for which they are
responsible.
• Auditability:
• A security audit is a systematic evaluation of the
security of a company’s information system by
measuring how well it conforms to a set of
established criteria.
Cyber Threats
Cyber Threat
• A Cyber threat is any malicious act that attempts
to gain access to a computer network without
authorization or permission from the owners.
• Funding: Negligible.
• Funding: Available.
Iran
• Stuxnet is a computer worm discovered in June 2010
• It initially spreads via Microsoft Windows, and targets Siemens industrial
software and equipment
• Took the control of functioning of a nuclear power plant
Sony Pictures Hack
On November 24, 2014, a hacker group which identified itself by the name
"Guardians of Peace" (GOP) leaked a release of confidential data from the
film studio Sony Pictures. The data included personal information about
Sony Pictures employees and their families, e-mails between employees,
information about executive salaries at the company, copies of then-
unreleased Sony films
Multiple reports suggest the attack is tied to the North Korean
government, who expressed outrage over the Sony-backed film "The
Interview," an action-comedy centered on an assassination plot against
North Korean leader Kim Jong Un.
Estonia – Cyber Riot
The Most Notable Cybersecurity Breaches
Uber :57 million user accounts were hacked in 2016. Uber paid two hackers to
destroy the stolen data.
Damage: Uber fired chief security officer Joe Sullivan and his deputy;
Company valuation dropped by 30 percent.
Damage: CEO, CIO and CISO resigned immediately after the news broke;
Stock prices slumped by 35 percent in a week . The 2017 third-quarter profit
declined by 27 percent compared with last year; The company has incurred
$87 million in cost related to the breach.
The Most Notable Cybersecurity Breaches
Yahoo : 3 billion user accounts were hacked in 2013. Number wasn’t disclosed
until October 2017.
LinkedIn: 117 million user accounts were hacked in 2012. The scale of the
breach was first reported at 6.5 million. The actual number was found when a
Russian hacker began selling 117 million emails and passwords for bitcoin on
a dark web marketplace in May 2016.
The breach affected about 50 million users, allowing hackers to take over
their accounts.
Watch out for imposter scams. With access to your Facebook account,
hackers can get a lot of information about you
http://www.HaveIbeenpwned.com
Section - 3
INFORMATION STEALING
TECHNIQUES
Causes of Compromised Security
02 Lost/Stolen of Computers
03 Disgruntle Employees
04 Insufficient Funding
Recognizing Security Threats & Attacks
Social Engineering
Phishing
Malware
Wireless Access
Identity Theft
Ransomware
Social Engineering
It is much easier to fool someone into giving you their password rather
than for you to try hacking them.
Social Engineering
Social Engineering
Social Engineering
Do not share secret Pay attention to the Make good use of Foreign offers are
information URL of website shredder fake
Phishing
65
Malware
Mode of Operation.
– Lock files on your computer or mobile device
remotely.
– Communicate with user via pop-up messages.
– Restrict access to computer or mobile device until
paid.
1) The user receives an 2) Once the user opens the 3) This malicious
email with an attached file, a malicious software blocks access
attachment. software is installed to the system, until the
unknowingly on the system. hackers receive money.
Ransomware
How it Looks?
Corona Virus Ransomware
Warning Signs
– A shop assistant takes your card out of your sight in order to
process your transaction
– You are asked to swipe your card through more than one
machine
– You notice something suspicious about the card slot on an ATM
(e.g. an attached device)
– You notice unusual or unauthorized transactions on your
account or credit card statement
Identity Theft
How Does Identity Theft Happen?
• Backdoor:
• Method of bypassing normal authentication
and gaining access in OS or application.
Types of Cyber Attacks Continued
• Phishing:
• Phishing is a type of cyber attack which
involves contacting someone through email,
phone, websites, or text message.
• Man-in-the-middle Attack
• This attack intercepts and relays messages
between two parties who are communicating
directly with each other.
Types of Cyber Attacks Continued
• SQL injection:
• A very common exploited web application
vulnerability that allows malicious hacker to
steal and alter data in website’s database.
• Zero-day exploit:
• A vulnerability in a system or device that has
been disclosed but is not yet patched.
Impacts of Cyber Attacks
• If you were to insert this unknown flash drive into your device, you
could cause great harm to your system and your network!
8
Image Credit:
Cyberseek (2018)
8
There are many
more security
positions and it is
8
Security Analyst
• Security analysts play a key role in keeping an
organization’s sensitive information secure.
8
Penetration
Testers are also
called “ethical
Penetration Tester
hackers” as they
use their talents in
hacking to secure
• The responsibilities of a Penetration Tester involve finding organizations.
8
Bug Bounty Hunter
8
Bug Bounty Hunter Continued
This program is also set out to the public where
anyone could part take in the program.
– Sites like HackerOne provide an easy way to find
companies with the bug bounty program.
– Companies that are involved with HackerOne
include: Android, Buzzfeed, Facebook, etc.
8
Security Architect
• Security Architects are responsible for designing,
testing, and implementing security systems
within an organization’s network.
9
Application Security Engineer
9
Application Security Engineer vs
Penetration Tester
• This position can be very similar to that of a
Penetration Tester.
9
Remember, there
are a lot of ways
to get into cyber
9
Any
Questions?
Raise your hand !!!
39