Uploaded by Marlon Maddara

CHAPTER 1

advertisement
CHAPTER 1:
The Need for
Cybersecurity
Introduction to Cybersecurity v2.1
Chapter 1: The Need for Cybersecurity
Today's Presentation
POINTS OF DISCUSSION
1.1 Personal Data
1.2 Organizational Data
1.3 Attackers and Cybersecurity Professionals
1.4 Cyberwarfare
Chapter 1: The Need for Cybersecurity
Learning Objectives
1.1 Define personal data.
Identify the types of personal data.
Explain the value of personal data.
1.2 Define organizational data.
Identify the types of organizational data.
Explain the value of organizational data.
1.3 Describe the characteristics of attackers and cybersecurity professionals.
Explain the motives of cybercriminals.
Discuss the role of cybersecurity professionals.
1.4 Define cyberwarfare
Explain the purpose of cyberwarfare
Chapter 1: The Need for Cybersecurity
Introduction
CYBERSECURITY
The subset of information security that
addresses information and information
systems that store and process data in
electronic form.
CYBERSPACE
The notional environment in which
communication over computer networks
occurs.
Chapter 1: The Need for Cybersecurity
Introduction
OFFLINE IDENTITY
Your identity in the physical world.
ONLINE IDENTITY
or Internet Identity is the identity that an
internet user establishes in online communities
and websites. Only a limited amount of
information should be revealed about you.
Chapter 1: The Need for Cybersecurity
1.1 Personal Data
Chapter 1: The Need for Cybersecurity
Personal Data
Personal data is any information that is
related to an identified or identifiable
natural person.
Medical Records
Electronic Health Records (EHR)
Prescriptions
Educational Records
Grades, test scores, courses, awards, and degrees
Employment and Financial Records
Income and expenditure
Tax records
Employment history and performance
How is data stored?
PHYSICAL
DIGITAL
Data may be stored in a
variety of non-electronic
forms including paper
documents, artworks,
photographs, computer
printouts.
Hard or floppy disks, CDROMs, tapes, drives, cloud
storage devices
Chapter 1: The Need for Cybersecurity
Personal Data as a
Target
Billions of records of personal information are stolen
every year in data breaches.
Why do criminals want your data?
To sell it to other criminals on the dark web
Identity theft
ex. file a fake tax return, obtain loans, open
credit card accounts
Phishing and extortion
To harm companies
Chapter 1: The Need for Cybersecurity
Personal Data as a
Target
Billions of records of personal information are stolen
every year in data breaches.
How do criminals get your money?
Online Credentials
Creative Schemes
ex. Tricking you into wiring money to friends or
family
Chapter 1: The Need for Cybersecurity
1.2 Organizational Data
Chapter 1: The Need for Cybersecurity
Organizational Data
Organizational data describe central
characteristics of organizations, their
internal structures and processes as well
as their behavior as corporate actors in
different social and economic contexts.
Types of Organizational Data
Traditional Data
Big Data
Chapter 1: The Need for Cybersecurity
Organizational Data
Types of Organizational Data
Traditional Data
Personnel - information about current and
former employees, contractors, partners
ex. payroll, employee agreements, offer letter,
application materials
Intellectual - intangible assets
ex. patents, trademarks, product plans, trade
secrets
Financial - information related to the financial
health of a business
ex. income statements, balance sheets,
cashflow statements
Chapter 1: The Need for Cybersecurity
Organizational Data
Types of Organizational Data
Big Data
IoT (Internet of Things) - describes physical
objects that connect and exchange data with
other devices and systems over the internet or
other communications networks.
Traditional
Data
Generated in enterprise level
Volume ranges from
Gigabytes to Terabytes.
Traditional database system
deals with structured data.
Traditional data is generated
per hour or per day or more.
Big Data
Generated outside enterprise
level.
Volume ranges from
Petabytes to Zettabytes or
Exabytes.
Big data system deals with
structured, semi-structured
and unstructured data.
Big data is generated more
frequently mainly per
seconds.
Chapter 1: The Need for Cybersecurity
Security Breach
Any incident that results in unauthorized
access to computer data, applications,
networks or devices.
The Consequences of Security Breaches
Financial Loss
Reputational Damage
Operational Downtime
Legal Action
Loss of Sensitive Data
Chapter 1: The Need for Cybersecurity
Security Breach
Example 1. LastPass, An online password
manager
On June 15, 2015, LastPass posted a blog post
indicating that the LastPass team had
discovered and halted suspicious activity on
their network.
Account email addresses, password reminders,
server per user salts, and authentication hashes
were compromised.
Chapter 1: The Need for Cybersecurity
Security Breach
Example 2. QRS, Inc., A health IT and EHR
software company
QRS began notifying its clients of a cyberattack
that exposed the PII and PHI of nearly 320,000
individuals. The attack occurred between August
23 and August 26, 2021, when a hacker accessed
one QRS dedicated patient portal server.
names, birth dates, addresses, social security
numbers, portal usernames, medical treatment
and diagnosis information, and patient
identification numbers were stolen.
Chapter 1: The Need for Cybersecurity
1.3 Attackers and
Cybersecurity Professionals
Chapter 1: The Need for Cybersecurity
Cyber attackers
Types of cyber attackers
Script Kiddies
Amateur hackers with little to no skill
Use hacking tools found on the internet
Hackers
Have skill and experience to break into computers to gain
access
White hats - ethical hackers who help the government and
organizations by performing penetration testing and
identifying loopholes in their cybersecurity.
Gray hats - hackers who compromise systems without
permission
Black hats - hackers who take advantage of any
vulnerability for illegal personal, financial or political gain
Chapter 1: The Need for Cybersecurity
Cyber attackers
Types of cyber attackers
Hackers (cont'd)
Green hats - newbies who have a desire to become fullblown hackers and are very curious to learn.
Blue hats - another form of novice hackers whose main
agenda is to take revenge on anyone who makes them
angry.
Red hats - hackers who halt the acts of black hat hackers.
They are ruthless when it comes to dealing with black hat
hackers.
Organized Hackers
Networks of cyber criminals who work in collaboration to
pull off massive heists over the internet.
Chapter 1: The Need for Cybersecurity
Cyber attackers
Internal and External Threats
Internal Security Threats
Insiders
Can intentionally or unintentionally cause great damage
to the system
Mishandle confidential data
Accidentally invite malware onto the network through
malicious email or websites
Facilitate outside attacks by connecting infected USB
media into the corporate computer system
External Security Threats
Amateurs, hackers, organized hackers
Exploit vulnerabilities in network or computing devices
Chapter 1: The Need for Cybersecurity
1.4 Cyberwarfare
Chapter 1: The Need for Cybersecurity
Cyberwarfare
Involves the actions by a nation-state or
international organization to attack and
attempt to damage another nation's
computers or information networks
The Purpose of Cyberwarfare
To gain advantage over adversaries, nations, or
competitors
To sabotage the infrastructure of nations
To blackmail governmental personnel
To affect the citizens’ faith in their government
and their ability to protect them
Chapter 1: The Need for Cybersecurity
Cyberwarfare
Types of Cyberwarfare attacks
Espionage - use of botnets and spear phishing attacks to
compromise sensitive computer systems before exfiltrating
sensitive information.
Distributed denial-of-service (DDoS) attacks - prevent legitimate
users from accessing targeted computer networks or devices
Propaganda or disinformation campaigns - used to expose
embarrassing truths, spread lies to make people lose trust in
their country, or side with their enemies.
Viruses, phishing, computer worms and malware
Chapter 1: The Need for Cybersecurity
Cyberwarfare
Examples
Stuxnet Virus - a worm that attacked the Iranian nuclear
program. It is among the most sophisticated cyber attacks in
history. According to most reports, the attack seriously
damaged Iran’s ability to manufacture nuclear weapons.
Fancy Bear - the Russian organized cybercrime group Fancy
Bear targeted Ukrainian rocket forces and artillery between
2014 and 2016. The malware was spread via an infected
Android application used by the D-30 Howitzer artillery unit
to manage targeting data.
Chapter 1: The Need for Cybersecurity
END
Download