2 - Introduction - Week 2
2 - Introduction - Week 2
Cyber
Security
Dr. Arshad Farhad
1
2
Aspects of Security
Security Attack
any action that compromises the security of
information owned by an organization
often threat & attack used to mean same thing
Threat: A person, thing, event, or idea which poses
some danger to an asset in terms of that asset's
confidentiality, integrity, availability.
Attack: A realization of a threat; Any action that
attempts to compromise the security of the
information owned by an organization/person
Attacks
Nature of attacks
Active attacks
Passive attacks
Categorization of attacks
Interruption
Interception
Modification
Fabrication
5
Passive Attacks
6
Active Attacks
8
Security Service
enhance security of data processing systems and
information transfers of an organization
intended to counter security attacks
using one or more security mechanisms
9
Security Mechanisms
Confidentiality:
Unauthorized parties cannot
access information (->Secret Data Privacy in
Key Encryption) communication … Bill
Authenticity: Ensuring that Services & Mechanisms
the actual sender is the Confidentiality
claimed sender. (->Public Joe
Key Encryption)
Bill Authenticity
Integrity: Ensuring that the
Joe (Actually Bill)
message was not modified in
transmission. (->Hashing) Ann
Nonrepudiation: Ensuring
Ann
that sender cannot deny Integrity
sending a message at a later Joe Non-Repudiation
time. (->Digital Signature) Joe
Bill
Ann
Ann
12
Statistics
According the certain estimates by McAfee &
Kapersky Lab, the cost of information security
breaches that took place in 2018 was worth $600
billion.
Globally, information security breaches have
witnessed a steep increase of 67% in the last five
years
In last quarter of 2018, a single incident of
cyberattack on Private Bank operating in Pakistan
resulted in the loss of $6 million in just 23 minutes
17
Malware Count
18
https://www.hackmageddon.com/
19
https://www.hackmageddon.com/
20
https://www.imperva.com/blog/malware-analysis-mirai-ddos-botnet/?utm_campaign=Incapsula-moved
23
http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.html
http://www.securityevaluators.com/iphone/ 2
26
http://www.calyptix.com/top-threats/top-7-network-attack-types-in-2015-so-far/
27
28
Mobile
threats
2014
32
1 Trojan-SMS.AndroidOS.Stealer.a 18.0%
2 RiskTool.AndroidOS.MimobSMS.a 7.1%
3 DangerousObject.Multi.Generic 6.9%
4 RiskTool.AndroidOS.SMSreg.gc 6.7%
5 Trojan-SMS.AndroidOS.OpFake.bo 6.4%
Mass-scale Organizational Targeted
33
Attacks (MOTAs)
Bagle mass-mailer
worm campaign
between January 1,
2014, and April 29,
2014
Recent Trends
Malware, worms, and Trojan horses
spread by email, instant messaging, malicious or infected websites
Botnets and zombies
improving their encryption capabilities, more difficult to detect
Scareware – fake/rogue security software
Attacks on client-side software
browsers, media players, PDF readers, etc.
Ransom attacks
malware encrypts hard drives, or DDOS attack
Social network attacks
Users’ trust in online friends makes these networks a prime target.
Trends
36