Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
107 views

A Report On Introduction To Security, Cyberspace, Cybercrime and Cybersecurity

This document provides an overview of key concepts related to cybersecurity including: 1. It defines cybersecurity as focusing on protecting computers, networks, programs and data from unauthorized access, change or destruction. 2. Cybersecurity aims to ensure the security properties of confidentiality, integrity and availability for organizations and users' assets in cyberspace. 3. The concepts of cyberspace, cybercrime and threats like hacking, phishing and hacktivism are introduced as challenges to cybersecurity. Collaboration between all users is emphasized as important to strengthen cyber defenses.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views

A Report On Introduction To Security, Cyberspace, Cybercrime and Cybersecurity

This document provides an overview of key concepts related to cybersecurity including: 1. It defines cybersecurity as focusing on protecting computers, networks, programs and data from unauthorized access, change or destruction. 2. Cybersecurity aims to ensure the security properties of confidentiality, integrity and availability for organizations and users' assets in cyberspace. 3. The concepts of cyberspace, cybercrime and threats like hacking, phishing and hacktivism are introduced as challenges to cybersecurity. Collaboration between all users is emphasized as important to strengthen cyber defenses.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

A REPORT ON INTRODUCTION TO

SECURITY, CYBERSPACE,
CYBERCRIME AND CYBERSECURITY
BY

ISMAIL BASHIR TUKUR

U2/16/CSC/0091
OVERVIEW

• Brainstorming
• Definition Security
• Security Features
• Concept of Cyberspace
• Concept of Cybercrime
• Concept of Cybersecurity
• The way forward
INTRODUCTION

• Cyber security, also referred to as information technology security, focuses on protecting


computers, networks, programs and data from unintended or unauthorized access,
change or destruction. The state of being protected against the criminal or unauthorized
use of electronic data, or the measures taken to achieve this. Some people have argued
that the threat to cybersecurity has been somewhat inflated’
• Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets
BRAINSTORMING
BRAINSTORMING

• What is Security?
Security according to two boys of 10 years old
BRAINSTORMING

• What is Security?
Security According to Junior High School ICT teacher
DEFINITION SECURITY
DEFINITION SECURITY

• There is no clear cut definition


DEFINITION SECURITY

• Security is a process, not an end state.


DEFINITION SECURITY

• Security is the process of maintaining an acceptable level of perceived risk.


DEFINITION SECURITY

No organization can be considered "secure" for any time beyond the last
verification of adherence to its security policy.
If your manager asks, "Are we secure?"
you should answer, "Let me check."
If he or she asks, "Will we be secure tomorrow?
" you should answer, "I don't know."
Such honesty will not be popular, but this mind-set will produce greater success for
the organization in the long run.
SECURITY FEATURES
• Security has three features
SECURITY FEATURES

Confidentiality
• Confidentiality is roughly equivalent to privacy. Measures undertaken to
ensure confidentiality are designed to prevent sensitive information from
reaching the wrong people, while making sure that the right people can in
fact get it:
• Confidentiality Assurance that information is shared only among authorized
persons or organizations.
SECURITY FEATURES

Integrity
• Assurance that the information is authentic and complete.
• In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle
SECURITY FEATURES

Availability
• Assurance that the systems responsible for delivering, storing and processing information are
accessible when needed, by those who need them.
• Availability of information refers to ensuring that authorized parties are able to access the
information when needed
CONCEPT OF CYBERSPACE
CONCEPT OF CYBERSPACE

• Cyberspace
Cyberspace is "the environment in which communication over computer networks occurs

And almost everybody in one way or the other is connected to it


CONCEPT OF CYBERSPACE

• Ladies in the market are connected to is to run their businesses


CONCEPT OF CYBERSPACE

• Shepherds are connected to locate their cattle


CONCEPT OF CYBERSPACE

• Hunters are connected to it to locate their prey


CONCEPT OF CYBERSPACE
CONCEPT OF CYBERSPACE
CONCEPT OF CYBERSPACE
CONCEPT OF CYBERCRIME
CONCEPT OF CYBERCRIME
CONCEPT OF CYBERCRIME

• Cyber Crime
Computer crime, or cybercrime, is any crime that involves a computer and a network.
The computer may have been used in the commission of a crime, or it may be the target
CONCEPT OF CYBERCRIME
CONCEPT OF CYBERCRIME

Commonwealth Bank, Australia - March 2011:


Automatic teller machines (ATMs) spat out
tens of thousands of free dollars in Sydney
Tuesday after a computer glitch turned into a
nightmare for the Commonwealth Bank. IT
Security Believe that it is a the consequence of
hacking.
CONCEPT OF CYBERCRIME

• Phishing
Phishing is a cybercrime in which scammers send a malicious email to individual(s) or mass
users of any organization by impersonating a known individual or a business partner or a
service provider.
CONCEPT OF CYBERCRIME

• Some types of phishing


1. Email Spoofing – Name Impersonation
2. Mass Target – Brand Impersonation
3. Pop-Up Messages: In-Session Phishing
CONCEPT OF CYBERCRIME

• Hacktivism

Hacktivism is the act of misusing a computer system or network for a socially or politically motivated
reason. Individuals who perform hacktivism are known as hacktivists.

A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and
bring attention to a political or social cause. For example, hacktivists might leave a highly visible message on
the homepage of a website that gets a lot of traffic or embodies a point-of-view that is being opposed.
Hacktivists also often use denial-of-service (DoS) attacks to disrupt traffic to a particular site.
CONCEPT OF CYBERCRIME

• Stuxnet is an extremely sophisticated computer worm that exploits multiple previously


unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose
was not just to infect PCs but to cause real-world physical effects. Specifically, it targets
centrifuges used to produce the enriched uranium that powers nuclear weapons and
reactors.
• Stuxnet was first identified by the infosec community in 2010, but development on it
probably began in 2005
CONCEPT OF CYBERSECURITY
CONCEPT OF CYBERSECURITY

• Cyber security, also referred to as information technology security, focuses on protecting


computers, networks, programs and data from unintended or unauthorized access,
change or destruction.
University of Maryland University College
• The state of being protected against the criminal or unauthorized use of electronic
data, or the measures taken to achieve this.
Oxford Dictionary
CONCEPT OF CYBERSECURITY

• Cybersecurity is the collection of tools, policies, security concepts, security safeguards,


guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets. Organization and user’s assets include connected computing devices,
personnel, infrastructure, applications, services, telecommunications systems, and the
totality of transmitted and/or stored information in the cyber environment
CONCEPT OF CYBERSECURITY

• Cybersecurity strives to ensure the attainment and maintenance of the security


properties of the organization and user’s assets against relevant security risks in the
cyber environment.
• The general security objectives comprise the following:
o Availability
o Integrity, which may include authenticity and non-repudiation
o Confidentiality
CONCEPT OF CYBERSECURITY

Based in the realities of the world, Are MAC and LINUX computer SECURED
more than Windows Computers?
THE WAY FORWARD

• ICT is a single point of failure to Businesses.


• IS Security is Achilles heels of ICT
• Your security depends on mine and mine depends on yours,
• Let us come together and protect our cyberspace is creating and managing a CSIRT
HOW?

You might also like