(Class Note) Module 1 - Introduction To Cybersecurity
(Class Note) Module 1 - Introduction To Cybersecurity
Lecture 1
Introduction to
Cybersecurity
1
RMIT Classification: Trusted
Session Objectives
22
RMIT Classification: Trusted
What is cybersecurity?
33
RMIT Classification: Trusted
44
RMIT Classification: Trusted
55
RMIT Classification: Trusted
66
RMIT Classification: Trusted
77
RMIT Classification: Trusted
88
RMIT Classification: Trusted
IAAA
99
RMIT Classification: Trusted
IAAA (cont)
+
• Non-Repudiation - protection against denial by one of the parties
in a communication.
10
10
RMIT Classification: Trusted
11
11
RMIT Classification: Trusted
13
13
RMIT Classification: Trusted
14
14
RMIT Classification: Trusted
15
15
RMIT Classification: Trusted
Security Concepts …
17
17
RMIT Classification: Trusted
18
18
RMIT Classification: Trusted
https://www.sciencedirect.com/science/article/pii/S0167404813000801
19
19
RMIT Classification: Trusted
• Operator/user blunders.
• Hackers driven by intellectual challenge (or boredom).
• Insiders: employees or customers seeking revenge or gain
• Criminals seeking financial gain.
• Organized crime seeking gain or hiding criminal activities.
• Organized terrorist groups or nation states trying to influence
national policy.
20
20
RMIT Classification: Trusted
21
21
RMIT Classification: Trusted
Terminologies
22
22
RMIT Classification: Trusted
Terminologies (1)
23
23
RMIT Classification: Trusted
Terminologies (2)
24
24
RMIT Classification: Trusted
Terminologies (3)
25
25
RMIT Classification: Trusted
Terminologies (4)
26
26
RMIT Classification: Trusted
Terminologies (5)
27
27
RMIT Classification: Trusted
Asset
28
28
RMIT Classification: Trusted
Hardware assets
29
29
RMIT Classification: Trusted
30
30
RMIT Classification: Trusted
Software assets
31
31
RMIT Classification: Trusted
Information assets
34
34
RMIT Classification: Trusted
35
35
RMIT Classification: Trusted
36
36
RMIT Classification: Trusted
(Table is on page 87
in the textbook)
37
37
RMIT Classification: Trusted
Business assets
38
38
RMIT Classification: Trusted
Threat
39
39
RMIT Classification: Trusted
Threat (1)
40
40
RMIT Classification: Trusted
Threat (2)
41
41
RMIT Classification: Trusted
Sources of information
It is difficult to get reliable
Three important categories of
information on past events and
threat information sources are:
to assess future trends for a
variety of reasons, including:
In-house experience
Organizations are often reluctant to • An important source of information on
report security events in an effort to save threats is the experience an organization
corporate image, avoid liability costs,
has already had on identifying attempted
and, in the case of responsible and successful attacks on its assets
management and security personnel,
avoid career damage
Thus, keeping
informed on threats
is an ongoing and Security alert services
never-ending battle • These are concerned with detecting threats
Some attacks may be carried out or at
as they develop to enable organizations to
least attemped without being detected
patch code, change practices, or otherwise
by the victim until much later, if ever
react to prevent a threat from being
realized
42
42
RMIT Classification: Trusted
43
43
RMIT Classification: Trusted
This authoritative and highly The results in the 2018 report are
respected annual report is based on data from more than 53,000
perhaps the most important security incidents and over 2,200 data
source of information that an compromises from 65 countries and
organization can consult 67 organizations
44
44
RMIT Classification: Trusted
• The report also summarizes, with data, key aspects of the attack,
including:
• Actors
45
45
RMIT Classification: Trusted
• The report also summarizes, with data, key aspects of the attack,
including:
Other common factors
46
46
RMIT Classification: Trusted
47
47
RMIT Classification: Trusted
48
48
RMIT Classification: Trusted
Disruption
49
49
RMIT Classification: Trusted
Distortion
50
50
RMIT Classification: Trusted
Deterioration
52
52
RMIT Classification: Trusted
Kill chain
53
53
RMIT Classification: Trusted
55
55
RMIT Classification: Trusted
56
56
RMIT Classification: Trusted
57
57
RMIT Classification: Trusted
58
58
RMIT Classification: Trusted
59
59
RMIT Classification: Trusted
60
60
RMIT Classification: Trusted
Vulnerability
61
61
RMIT Classification: Trusted
Vulnerability (cont)
62
62
RMIT Classification: Trusted
Vulnerabilit Risk
y
Threat Asset
63
63
RMIT Classification: Trusted
Cyber Attack
64
64
RMIT Classification: Trusted
Origin of attacks
• Internal Security Threats
• employees with malicious intentions as they have details of
network, infrastructures , policies, and its confidential data.
• Because of direct access, Internal threats have the
potential damage than external threats.
65
65
RMIT Classification: Trusted
• Origin of attacks
• External Security Threats
• External threats are skilled attackers can exploit
vulnerabilities in networked devices
66
66
RMIT Classification: Trusted
a. Passive Attack
• attempts to learn or make use of information from the system but
does not affect system resources.
• Two types of passive attacks are:
Release of message contents
Traffic analysis.
67
67
RMIT Classification: Trusted
b. Active Attack
• Modification of the data stream or the creation of a false stream
• Four types of active attacks
Masquerade
Replay
Modification of messages
Denial of service.
68
68
RMIT Classification: Trusted
• Network Attacks
Packet sniffing - Passively monitoring and recording
transmission of password, cookie, session, information, etc
man-in-the-middle - Interception of packets between client and
server, and change the packets as they pass through
DNS hacking - Insert malicious routes into DNS tables to send
traffic for genuine sites to malicious sites
69
69
RMIT Classification: Trusted
• Web attacks
• Phishing -A digital form of social engineering that uses
authentic-looking—but bogus—emails to request information
from users or direct them to a fake website that requests
information.
• SQL Injection- Malicious SQL statements are inserted into
forms for execution. It can extract database contents of an
organization to the attacker
• Cross Site Scripting - a complex JavaScript program that steals
data left by other writing sites that you have visited in same
browsing session.
70
70
RMIT Classification: Trusted
71
71
RMIT Classification: Trusted
72
72
RMIT Classification: Trusted
Control
73
73
RMIT Classification: Trusted
Control (cont)
74
74
RMIT Classification: Trusted
A defence-in-depth implementation
75
75
RMIT Classification: Trusted
Types of Controls
76
76
RMIT Classification: Trusted
77
77
RMIT Classification: Trusted
78
78
RMIT Classification: Trusted
79
79