IntroCyberv2.1 Chp1 Instructor Supplemental Material
IntroCyberv2.1 Chp1 Instructor Supplemental Material
Cybersecurity
Instructor Materials
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Personal Data
Introduction to Personal Data
What is Cybersecurity?
• Offline Identity
• Your identity that interacts on a regular basis at home,
school or work
• Online Identity
• Your identity while you are in cyberspace
• Should only reveal a limited amount of information about you
• Username or alias
• Should not include any personal information
• Should be appropriate and respectful
• Should not attract unwanted attention
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Personal Data
Introduction to Personal Data
Your Data
• Medical Records
• electronic health records (EHR) – physical, mental, and
other personal information
• prescriptions
• Education Records
• Grades, test scores, courses taken, awards and degrees rewarded
• Attendance
• Disciplinary reports
• Employment and Financial Records
• Income and expenditures
• Tax records – paycheck stubs, credit card statements,
credit rating and banking statement
• Past employment and performance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Personal Data
Introduction to Personal Data
Where is Your Data?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Personal Data
Personal Data as a Target
How do the criminals get your money?
• Online credentials
• Gives thieves access to your accounts
• Creative schemes
• Trick into wiring money to your friends or family
• Long-term profits
• Medical benefits
• File a fake tax return
• Open credit card accounts
• Obtain loans
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
1.2 Organizational Data
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Organizational Data
Introduction to Organizational Data
Types of Organizational Data
• Traditional Data
• Personnel – application materials, payroll, offer letter, employee agreements
• Intellectual – patents, trademarks, product plans, trade secrets
• Financial – income statements, balance sheets, cash flow statements
• Internet of Things and Big Data
• IoT – large network of physical objects, such as sensors
• Big Data – data from the IoT
• Confidentiality – privacy
• Integrity – accuracy and trustworthiness of the information
• Availability – information is accessible
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Organizational Data
The Impact of a Security Breach
The Consequences of a Security Breach
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The Profile of a Cyber Attacker
Types of Attackers
Amateurs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
The Profile of a Cyber Attacker
Internal and External Threats
Internal Security Threats
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
1.4 Cyberwarfare
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Overview of Cyberwarfare
What is Cyberwarfare
What is Cyberwarfare?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Overview of Cyberwarfare
The Purpose of Cyberwarfare
Use to gain advantage over adversaries, nations or
competitors
• Can sabotage the infrastructure of other nations
• Give the attackers the ability to blackmail
governmental personnel
• Citizens may lose confidence in the government’s
ability to protect them.
• Affect the citizens’ faith in their government without
ever physically invading the targeted nation.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16