Cyber Security Fundamentals - V2
Cyber Security Fundamentals - V2
FUNDAMENTALS FOR
BUSINESS LEADERS
RICHA DWIVEDI
AGENDA
Topic 3.
Topic 1. Topic 2.
Risk Management
Cyber Security –Why, What, Threat, Threat Actors, Attack Framework
Who, Where , How ? Vectors
BIA, BCP, DRP, IMR
Source: Sophos
• According to National Cyber Security Alliance 60% of small and medium businesses once hacked are out of business in less
than 6 months
• Cyber Crime to cost $6 Trillion in 2021
• Healthcare ransomware attacks will quadruple
WHAT?
Availability
Deliberate
Non
Deliberate
Environmental Socio
Political
Threat Actors
A threat actor or malicious actor is a person or entity that is responsible for an event or incident that impacts or
has the potential to impact the safety or security of another entity.
Example: Script Kiddies, Hacktivists, Organized Crimes, Insiders, Competitors, Nation States APT
WHERE?
Physical
Data
Data
Network
Application
Host Perimeter
HOW?
Identify
Action
1. Identify: Assets and risk associated with it
2. Analyse: Assess risk. Qualitative , Quantitative
3. Action: Develop a risk management plan, Implement Control
4. Monitor: Review effectiveness of Controls
Control 5. Control: Re-evaluate the risk
Monitor
RISK RESPONSE
Avoid
Accept
INHERENT RISK AND RESIDUAL RISK
Asset
As is without Controls : Inherent Risk
s
Endangered by
Threat Agent
BIA
BCP !=DRP
• BIA is a systematic process to determine and evaluate the
BCP potential effects of an interruption to critical business
operations.
• BCP is having a plan to deal with major disruptions
• While
DRP • DRP is an organization’s ability to recover from a disaster
RP
• Mirrored Site
• Hot Site
• Warm Site
• Cold Site
STORIE
S
In August 2018, Russian hackers made millions selling credit
card details stolen from almost 245,000 British Airways
customers.
HISTORY OF CYBER ATTACKS
RECENT RANSOMEWARE ATTACKS
Source: MicroSoft
IaaS