Chapter 1
Chapter 1
Chapter 1
INTRODUCTION TO
SECURITY
vs
cybersecurity
What is Cyber Security?
• Cyber security is the practice of protecting information and data
from outside sources on the Internet. Cybersecurity professionals
provide protection for networks, servers, intranets and computer
systems. It also ensures that only authorized people have access to
that information. In an office setting, one individual might go to
another’s computer, install a flash drive and copy confidential
information. This falls more under the category of information
security. If someone halfway across world manages to hack into
another company’s network and breach their system, this company
is in need of better cyber security.
What is Information Security?
• Information security is all about protecting information and
information systems from unauthorized use, assess, modification or
removal. It’s similar to data security, which has to do with protecting
data from being hacked or stolen. Data is classified as information
that means something. All information is data of some kind, but not
all data is information. When certain things are stored in a computer
system, they are considered data. It isn’t until it’s actually
processed that it becomes information. Once it becomes
information is when it needs protection from outside sources. These
outside sources may not necessarily be in cyberspace.
• Cybersecurity is a more general term that
includes InfoSec. ongoing effort to protect these
networked systems and all of the data from
unauthorized use or harm.
• Information security, often referred to as InfoSec, refers to the processes
and tools designed and deployed to protect sensitive business information
from modification, disruption, destruction, and inspection.
Your
mone
y
Why?
Your
identit
y
1.1.2: Goals of Security
AVAILABILITY - Mantaining equipment, performing hardware repairs, keeping operating
systems and
software up to date, and creating backups ensure the availability of the network and data to
the
authorized users. Plans should be in place to recover quickly from natural or man-made
disasters.
INTEGRITY - is accuracy, consistency, and trustworthiness of the data during its entire life
I
cycle.
Data must be unaltered during transit and not changed by unauthorized entities. File
permissions and
user access control can prevent unauthorized access.
CONFIDENTIALITY - Another term for confidentiality would be privacy. Company policies
should
C
A
restrict access to the information to authorized personnel and ensure that only those
authorized
individuals view this data. Methods to ensure confidentiality include data encryption,
username ID
and password, two factor authentication, and minimizing exposure of sensitive information.
Lets check your level....
https://www.mentimeter.com/s/cc217516285c6b070df79ad50bcae6fd/3aae6
fb00b6c
WHO
?
Attackers Hackers
1.1.3: Attackers vs Hackers
• Attackers - are individuals or groups who attempt to exploit
vulnerability for personal or financial gain. Attackers are interested
in everything, from credit cards to product designs and anything
with value.
• Hackers - This group of attackers break into computers or networks
to gain access. Depending on the intent of the break-in, these
attackers are classified as White, Grey, or Black hats.
How do you define a Hacker? Black,
White or Grey?
• The white hat attackers break into networks or computer systems to
discover weaknesses so that the security of these systems can be
improved. These break-ins are done with prior permission and any results
are reported back to the owner.
• Black hat attackers take advantage of any vulnerability for illegal personal,
financial or political gain.
• Grey hat attackers are somewhere between white and black hat attackers.
The grey hat attackers may find a vulnerability in a system. Grey hat
hackers may report the vulnerability to the owners of the system if that
action coincides with their agenda. Some grey hat hackers publish the
facts about the vulnerability on the Internet so that other attackers can
exploit it.
• Meet the right guys on the dark web. White hat hackers,
also known as ethical hackers are the cybersecurity
experts who help the Govt and organizations by
performing penetration testing and identifying loopholes in
their cybersecurity. They even do other methodologies
and ensure protection from black hat hackers and other
malicious cyber crimes.
• Simply stated, these are the right people who are on your
side. They will hack into your system with the good
intention of finding vulnerabilities and help you
remove virus and malware from your system.
• Taking credit for the negative persona around “hacking,” these guys
are your culprits. A black hat hacker is the type of hacker you
should be worried. Heard a news about a new cybercrime today?
One of the black hat hackers may be behind it.
• While their agenda may be monetary most of the time, it’s not
always just that. These hackers look for vulnerabilities in individual
PCs, organizations and bank systems. Using any loopholes they
may find, they can hack into your network and get access to your
personal, business and financial information.
• Grey hat hackers fall somewhere in between white hat and black
hat hackers. While they may not use their skills for personal gain,
they can, however, have both good and bad intentions. For
instance, a hacker who hacks into an organization and finds some
vulnerability may leak it over the Internet or inform the organization
about it.
• It all depends upon the hacker. Nevertheless, as soon as hackers
use their hacking skills for personal gain they become black hat
hackers. There is a fine line between these two. So, let me make it
simple for you.
• Because a grey hat hacker doesn’t use his skills for personal
gain, he is not a black hat hacker. Also, because he is
not legally authorized to hack the organization’s cybersecurity,
he can’t be considered a white hat either.
1.2:
Security
Threats
1.2.1: Security Threats
a. Malicious code
b. Hacking
c. Natural disaster
d. Theft
a. Malicious Code
• Malicious code/malware refers to a broad category of programs that can
cause damage or undesirable effects to computers or networks.
• Potential damage can include modifying, destroying or stealing data,
gaining or allowing unauthorised access to a system, bringing up
unwanted screens, and executing functions that a user never intended.
• Examples of malicious code include computer viruses, worms, Trojan
horses, logic bombs, spyware, adware and backdoor programs. Because
they pose a serious threat to software and information processing
facilities, users and administrators must take precautions to detect and
prevent malicious code outbreaks.
• Computer viruses are still the most common form of malicious code.
• Spyware – This malware is design to track and spy on the user. Spyware often
includes activity trackers, keystroke collection, and data capture. In an attempt to
overcome security measures, spyware often modifies security settings. Spyware
often bundles itself with legitimate software or with Trojan horses.
• Adware – Advertising supported software is designed to automatically deliver
advertisements. Adware is often installed with some versions of software. Some
adware is designed to only deliver advertisements but it is also common for
adware to come with spyware.
• Bot – From the word robot, a bot is malware designed to automatically perform
action, usually online. While most bots are harmless, one increasing use of
malicious bots are botnets. Several computers are infected with bots which are
programmed to quietly wait for commands provided by the attacker.
• Ransomware – This malware is designed to hold a computer system or the data it contains captive
until a payment is made. Ransomware usually works by encrypting data in the computer with a key
unknown to the user. Some other versions of ransomware can take advantage of specific system
vulnerabilities to lock down the system. Ransomware is spread by a downloaded file or some
software vulnerability.
• Scareware – This is a type of malware designed to persuade the user to take a specific action based
on fear. Scareware forges pop-up windows that resemble operating system dialogue windows. These
windows convey forged messages stating the system is at risk or needs the execution of a specific
program to return to normal operation. In reality, no problems were assessed or detected and if the
user agrees and clears the mentioned program to execute, his or her system will be infected with
malware.
• Rootkit – This malware is designed to modify the operating system to create a backdoor. Attackers
then use the backdoor to access the computer remotely. Most rootkits take advantage of software
vulnerabilities to perform privilege escalation and modify system files. It is also common for rootkits to
modify system forensics and monitoring tools, making them very hard to detect. Often, a computer
infected by a rootkit must be wiped and reinstalled.
• Virus - A virus is malicious executable code that is attached to other executable files,
often legitimate programs. Most viruses require end-user activation and can activate at a
specific time or date. Viruses can be harmless and simply display a picture or they can be
destructive, such as those that modify or delete data. Viruses can also be programmed to
mutate to avoid detection. Most viruses are now spread by USB drives, optical disks,
network shares, or email.
• Trojan horse - A Trojan horse is malware that carries out malicious operations under the
guise of a desired operation. This malicious code exploits the privileges of the user that
runs it. Often, Trojans are found in image files, audio files or games. A Trojan horse differs
from a virus because it binds itself to non-executable files.
• Worms – Worms are malicious code that replicate themselves by independently exploiting
vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires
a host program to run, worms can run by themselves. Other than the initial infection, they
no longer require user participation. After a host is infected, the worm is able to spread
very quickly over the network. Worms share similar patterns. They all have an enabling
vulnerability, a way to propagate themselves, and they all contain a payload.
How to Defend?
A few simple steps can help defend
against all forms of malware:
• Antivirus Program
• Up-to-Date Software
b. Hacking
• Typically, hackers are people who believe that working inside a
computer network is a lot more powerful than working outside of it.
They often have a rebellious streak, and they hack based on their
own ideas of how the world should work.
• Hackers/predators are programmers who victimize others for their
own gain by breaking into computer systems to steal, change, or
destroy information as a form of cyber-terrorism. These online
predators can compromise credit card information, lock you out of
your data, and steal your identity.
b. hacking
• Hacking started in the ‘60s with phone freaking (or phreaking)
which refers to using various audio frequencies to manipulate
phone systems.
• In the mid-‘80s, criminals used computer dial-up modems to
connect computers to networks and used password-cracking
programs to gain access to data.
• Nowadays, criminals are going beyond just stealing information.
Criminals can now use malware and viruses as high tech weapons.
Modern Hacking
Term
c. Natural Disaster
• Keeping data secure begins with knowing the natural risks to your
business facility and if your company uses Internet-based storage,
any threats to your data centre.
• Hurricanes, tornados, floods, fires and earthquakes regularly
feature in our news reports.
• Your company’s emergency plans should be conscious of these
data center preparations so that you can stay operational,
well-stocked and ready for prolonged disruption.
• The right disaster planning will include secure data copies,
evacuation plans, trained staff, power redundancy and the
necessary stores of supplies for extended emergency conditions.
Here are a couple of key areas to be aware of after a natural disaster.
And some about your physical data protection as well.
• Be aware of the risks of using open Wi-Fi connections and ways to lessen the risk
• Hackers love to exploit disasters. Be aware and train your employees in safe practices during disasters.
• Let’s not forget your physical data. The Federal Trade Commission gives this advice for taking care of physical
sensitive information:
• Take stock. Create an inventory of the personal information you have. That way, if your files are destroyed or lost in a natural
disaster, you’ll know what information is involved.
• Scale down. Collect only what you need. For example, if there’s no business reason why you have to have someone’s Social
Security number, don’t ask for it in the first place. Keep records only as long as you have a reason to maintain them. Don’t hold
onto customer credit card information unless you have a business need for it.
• Lock it. Store personal information in the safest part of your building. If information is missing after a natural disaster, contact
law enforcement. If possible – this is where your inventory helps – contact affected individuals so they can place a fraud alert on
their credit reports.
• Pitch it. Properly dispose of what you no longer need. Shred, burn or pulverize paper records before discarding. If you use
consumer credit reports for a business purpose, you may also be subject to the FTC’s Disposal Rule.
d. Theft
• Data theft is the act of stealing information stored on computers,
servers, or other devices from an unknowing victim with the intent
to compromise privacy or obtain confidential information.
• Data theft is a growing problem for individual computer users as
well as large corporations and organizations.
• Data theft occurs both outside and inside companies, and reducing
the risk of insider data theft at the corporate level is anything but
easy.
Example theft activities:-
i. Credit Card Number Theft
ii. ATM Spoofing
iii. PIN Capturing
iv. Database Theft
v. Electronic Cash
ATM Spoofing
PIN Capturing
Database
Theft
Electronic Cash
TIPS FOR PREVENTING DATA THEFT:
i. Vishing
ii. Phishing
iii. Impersonation (Pretexting/Pretending)
iv. Smishing
Pretexting
• Pretexting is another form of social engineering where
attackers focus on creating a good pretext, or a
fabricated scenario, that they can use to try stealing their
victims’ personal information.
• These attacks commonly take the form of a scammer
pretending to need certain information from their target in
order to confirm their identity.
Phishing
• Phishing attacks use email or malicious web sites to
solicit personal, often financial, information.
• Attackers may send email seemingly from a reputable
credit card company or financial institution that requests
account information, often suggesting that there is a
problem.
• When users respond with the requested information,
attackers can use it to gain access to the accounts
Vishing