Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

LEC 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Lecture 1

Data Security :
Fundamentals of Cyber
Security

Dr. Khaled Saada


2 You need a basic
understanding of …

Programming in
Basics of computer Basis of computer C/Java/Python
systems architecture Networks

– E.g., File systems, distributed

systems, networking,

operating
systems, ....
3 This course

• This course is an applied course covering
various topics in computer and network
security. We will investigate the theory, tools
and problems of contemporary security.
4 Course Topics
1. Introduction to Security
1. What is cyber Security
2. Cyber Security importance
3. Cyber Security goal
4. Cyber Security Terms
5. Security Threats
2. Firewall and Anti-virus
3. Classical Encryption Techniques
4. Encryption Algorithms stream and block
5. Symmetric Keys (DES, AES)
6. Encryption algorithms mode of operations
7. Asymmetric (Public-Key) (RSA, ElGamal )
8. Digital Signature
9. Message Authentication and Hash Functions
10. Cybersecurity Technologies: proxy and ips and ids,
security mail gateway ,sandbox, Antivirus and
Anti-Malware and cyber attacks
5 Course overview

Lectur 2 hours/week
2 hours/week Tut/Labs
e

marks

Quizzes: 5th & 10th 10%


project: 14th
10%
7th and 12th week exams: 40%
Final exam: 40%
Dr.Khaled Saada
6 1. Definition of
Cybersecurity:
Cybersecurity refers to the practice of protecting computer systems,
networks, and data from digital threats or attacks. These threats can
encompass a wide range of malicious activities, including
unauthorized access, data breaches, theft, malware infections, denial-
of-service attacks, and more. The main objective of cybersecurity is to
ensure the confidentiality, integrity, and availability of digital assets.

Key components of cybersecurity include:


•Protection: Implementing measures and technologies to
safeguard digital assets from threats.
•Detection: Identifying and monitoring for potential security
breaches or suspicious activities.
•Response: Developing strategies and procedures to mitigate the
impact of security incidents.
•Recovery: Ensuring that systems and data can be restored and
operations can resume after an incident.
7 2. Importance of
Cybersecurity:
The importance of cybersecurity has grown significantly in recent
years due to
several factors:

•Reliance on Technology: In the digital age, individuals, businesses,


and governments rely heavily on technology for communication,
commerce, healthcare, transportation, and more. As our dependence
on digital systems and data has increased, so has the potential
impact of cyberattacks.
•Data Protection: Personal, financial, and sensitive data are stored
and transmitted digitally. Protecting this data is crucial to prevent
identity theft, fraud, and privacy breaches.
•Economic Impact: Cyberattacks can have severe financial
consequences. Businesses can suffer significant losses due to
downtime, data theft, and damage to their reputation.
•National Security: Cyberattacks can be used as tools of espionage
and warfare. Protecting critical infrastructure and national security
interests is a top priority for governments.
•Global Connectivity: The interconnected nature of the internet
means that cyber threats can cross borders quickly. International
Cyber
Security
TERMS
CIA (Confidentiality, Integrity
and Availability)
 Confidentiality: Prevent the confidential data and
sensitive information
from reaching to Wrong People. (Encryption)

 Integrity: maintain the accuracy and


trustworthiness when Moved from point to
another (Hashing).

 Availability: ensure The Availability of the Data and


Services.
Policy

The Policy in CyberSecurity is guidelines


for transferring company data, accessing
private systems, etc..

the main goal of the policy is to Achieve


the Cyber Security goals(CIA

(Confidentiality, Integrity and


Availability).
Vulnerability
Vulnerability is a Flaw or weakness on System, Application or Configuration which can be
exploited by malicious Actors to gain unauthorized access to or perform unauthorized actions
on a computer system.

Exploit
An exploit is a code or Command that takes advantage of a software or a System vulnerability
to remotely access a system,
gain a privileges on the System, or run a malicious code on the system.

Patch
A patch is a set of changes to a system program or its supporting data designed to update, fix,
or improve it. This includes
fixing security vulnerabilities
Asset
any data, device, people, or other component of the environment that supports information-
related activities.

Threat
Malicious Actor that seek to Abuse Asset, damage or steal data, steal Credentials, or disrupt
digital life in general.

Breach
Malicious Actor was Succeeded to gain unauthorized Access to organization protected Systems
or Data which lead to system
damage, data loss, etc..
Malware
software that is specifically designed to disrupt, damage, or gain unauthorized
access to a computer system

Attacker\Bad Guy
The adversary that seek to gaining unauthorized access to you environment in order
to damage systems or data or steal sensitive
info.
Threat and Computer’s
Attacking Methods
Security
threats

12
Security
1. Interruption :threats
An asset of the system is destroyed or
becomes unavailable or unusable
This is an attack on availability.

2. Interception : An unauthorized party gains access to an


asset. This is an attack on confidentiality.

3. Modification : An unauthorized party not only gains


access to but tampers with an asset.
This is an attack on integrity.

4. Fabrication : An unauthorized party inserts counterfeit


objects into the system.
This is an attack on authenticity.

13
Security threats
Passive threats
Interception (secrecy)
Traffic analysis Release of
message
contents
Active threats
Interruptio
Fabrication Modificatio
n
authenticati( n
availabilit(
)ng )integrity(
)y

You might also like