Uploaded by il2ehsed+studylib

Cybersecurity Essentials- A Team Approach Presentation ver 2

advertisement
Cybersecurity
Essentials:
A Team
Approach
Alan
Lorena
Marjorie
Cybersecurity
Essentials:
A Team Approach
+Introduction
+Recognising Common Vulnerabilities
and Attacks
+Integrating Security into the
Development Lifecycle
+Conclusion
2/2/20XX
CYBERSECURITY ESSENTIALS
2
Introduction
Did you know? –
In 2022

The UK had highest number of cyber crime
victims per million internet users at 4783 (up
40% from 2020)

1988 - First major cyber attack

The “Morris Worm” was one of first
major recorded cyber attacks

Intended purpose was to gauge the
size of the precursor “internet” of the
time – ARPANET

Infected 1000s of computers causing
denial of service (DoS)
USA had next highest number of victims per
million internet, with 1494 (13% decrease
over 2020).
https://aag-it.com/the-latest-cyber-crime-statistics/
26/10/2023
CYBERSECURITY ESSENTIALS
3
What is Cybersecurity?

The practice of protecting computer systems, networks, and
data from theft, damage, or unauthorized access.

Traditionally focussed on Network Security

But is software the real weak spot?
26/10/2023
CYBERSECURITY ESSENTIALS
4
Why is it important?



Increasing reliance on the digital world in all
spheres of our lives
Personal and sensitive information now stored
digitally
Increased risk of this data being accessed by “bad
actors”
2/2/20XX
CYBERSECURITY ESSENTIALS
5
What are the major Cybersecurity threats?


Data Breaches

Ransomware


Malware

2/2/20XX
Distributed Denial of
Service (DDoS)
Phishing (most
common)
Account Takeover
CYBERSECURITY ESSENTIALS
6
Cybersecurity & Software Development
Role of developers in ensuring the security of
software and applications.


developers are not just responsible for functionality
but also for security
poor coding practices can lead to vulnerabilities
and security breaches
2/2/20XX
CYBERSECURITY ESSENTIALS
7
Real Life Examples



Individual e.g. Wordpress/Stripe vulnerability
Organisations e.g. Healthcare
Political Agents e.g. current conflicts around the world
2/2/20XX
CYBERSECURITY ESSENTIALS
8
Conclusion
• The landscape of cyber threats is becoming increasingly complex
and sophisticated.
• No single person or team can handle all aspects of cybersecurity
effectively.
• A collaborative approach is not just desirable - it's essential.
• All stakeholders should be involved - developers, IT
professionals, security experts, and end-users.
2/2/20XX
CYBERSECURITY ESSENTIALS
9
Common Vulnerabilities and Attacks
Broken Access Control –

Restricting access and permission:
Only authorised users can access, read and edit application data and features.

Failure of these restricting systems, might give access to unverified users.

Two main components:
Authentication: Verify the identity of the user.
Authorization: Give permissions to the user.
https://www.cnet.com/tech/services-and-software/cybersecurity-awareness-month-time-for-a-cybersafety-check/
26/10/2023
CYBERSECURITY ESSENTIALS
10
Common Vulnerabilities and Attacks
Broken Access Control –

Restricting controls properly:
Don't use default credentials.
Deny by default.
Review issues that might allow users to escalate their privileges.
Enforce authentication and authorisation for all sensitive data.
26/10/2023
CYBERSECURITY ESSENTIALS
11
Common Vulnerabilities and Attacks
SQL Injection –

One of the most critical security threats.

Attackers might inject malicious code into an application

Used to retrieve data from SQL databases.

It can typically be prevented by sanitising and validating data inputs on entry
fields.
26/10/2023
CYBERSECURITY ESSENTIALS
12
Common Vulnerabilities and Attacks
Cryptographic failures –

Occurs when a cryptographic system, designed to secure information through encryption, fails to
perform its intended functions properly.

Can often be identified during code reviews.

Important:
Always encrypt passwords and other sensitive data – using robust algorithms.
Avoid including unnecessary sensitive data.
26/10/2023
CYBERSECURITY ESSENTIALS
13
Common Vulnerabilities and Attacks
Cross-Site Scripting (XSS) –

Attackers include malicious scripts into trusted websites. The script is executed when the users
loads the application.

JavaScript and other client-side languages are the most vulnerable.

Common technique used in phishing attacks.
26/10/2023
CYBERSECURITY ESSENTIALS
14
Common Vulnerabilities and Attacks
Security Misconfiguration –
Causes:

Security controls and app settings are not correctly defined, configured or implemented.

Use of incomplete or outdated security configurations.
Possible solution:
Implement an automated template to deploy tests and developments – Reducing human error.
26/10/2023
CYBERSECURITY ESSENTIALS
15
Implications of a security attack
•
Reputational Cost.
•
Financial and Legal Implications.
•
Service Disruption.
•
Human Cost.
https://www.metacompliance.com/blog/data-breaches/5-damaging-consequences-of-a-databreach#:~:text=A%20data%20breach%20can%20easily,accounts%20or%20making%20unauthorised%20purchases.
2/2/20XX
CYBERSECURITY ESSENTIALS
16
Best practices for Mitigating Risks
Code Reviews –

Vital step after the architectural stage of software development.

Tend to take place in the form of merge/pull requests.

Unbiased, independent reviews might be the most helpful.

Identify common vulnerabilities and logic-level vulnerabilities.

Automated scanning tools can be very effective – Not infallible.
https://www.cnet.com/tech/services-and-software/cybersecurity-awareness-month-time-for-a-cybersafety-check/
26/10/2023
CYBERSECURITY ESSENTIALS
17
Best practices for Mitigating Risks
Code Reviews –
Areas to review:

Client-side Code.

APIs and Public-facing APIs.

Dependencies: libraries, frameworks, databases...

Remaining codebase.
26/10/2023
CYBERSECURITY ESSENTIALS
18
Best practices for Mitigating Risks
Securing API Design and Third-Party Usage –

APIs can increase the vulnerability of applications if they are not secured effectively:
Good practices of working with APIs:

Authentication and validation.

Data validation.

Input validation.

Output encoding.

HTTPS protocol.

Phase out older versions.

Error handling.

Assess 3rd party API's security posture.
https://medium.com/@aggarwalapurva89/api-security-practices-730fbd4b4a5
26/10/2023
CYBERSECURITY ESSENTIALS
19
Best practices for Mitigating Risks
Regular software updates and patch management –

Regular software updates are issued to fix potential vulnerability holes and strengthen defences against external
threats.

By installing the necessary updates, it is ensured that your system is secured against potential emerging threats.

Updates often fix bugs that might cause the software to malfunction, reducing potential issues that might compromise
cybersecurity.

Using up-to-date software, ensures security in the wider ecosystem – minimise potential large-scale attacks.
https://medium.com/@vampireinfinite/the-importance-of-regular-software-updates-keeping-your-systems-secure-82ae678217f4
26/10/2023
CYBERSECURITY ESSENTIALS
20
Security in Agile and DevOps:
Strategies for Implementation

Implementing Security Measures in Agile and DevOps

Continuous Security Testing and Automation

Collaborative Security Reviews in Agile Sprints
26/10/2023
CYBERSECURITY ESSENTIALS
21
Identifying and Managing Risks
Through Threat Modeling

Understanding Threat Modeling Concepts

Identifying Potential Security Threats

Creating Mitigation Strategies Based on Threat Models
26/10/2023
CYBERSECURITY ESSENTIALS
22
Developer Training, Awareness,
and Secure Deployment Practices

Importance of Security Training for Developers

Secure Coding Guidelines and Best Practices

Ensuring Developer Accountability for Security Practices
26/10/2023
CYBERSECURITY ESSENTIALS
23
Interactive Session:
Tools, Resources, and Q&A

Introduction to Security Tools and Libraries

Overview of Security Certifications and Training

Open Floor for Questions and Answers from the Audience
26/10/2023
CYBERSECURITY ESSENTIALS
24
Cybersecurity
Essentials:
A Team
Approach
• Recap
• Keep an ear to the ground
• Q&A
Download