0% found this document useful (0 votes)
60 views35 pages

Lecture 01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views35 pages

Lecture 01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Topic: Introduction to Cyber Security

Presented By:

Rakib Hossen
Lecturer and Chairman (Acting)
Dept. of Cyber Security Engineering (CySE), BDU
What is security?
• In general, security is “the quality or state of being
secure—to be free from danger.”
• A successful organization should have the following
multiple layers of security:-
 Physical security
 Personnel security
 Operations security
 Communications security
 Network security
 Information security
What is Cyber security
 We can divide cybersecurity into two parts:
 Cyber: refers to the technology that includes systems,
networks, programs, and data.
Security: means the protection of systems,
networks, applications, and information.

• Also called electronic information security or information


technology security.
What is Cyber security
 Cyber security is the protection of internet-connected
systems such as hardware, software and data from cyber
threats

 Cyber security is the practice of protecting systems,


networks, and programs from cyber attacks and
unauthorized access

 The technique of protecting internet-connected systems


such as computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks is
known as cyber security
What is Cyber security
 "Cyber Security is the body of technologies, processes, and
practices designed to protect networks, devices,
programs, and data from attack, theft, damage,
modification or unauthorized access.“

 "Cyber Security is the set of principles and practices


designed to protect our computing resources and online
information against threats."
History of Cyber security
• 1968, Maurice Wilkes discusses password security in Time-
Sharing Computer Systems.

• 1975, The Federal Information Processing Standards (FIPS)


examines Digital Encryption Standard (DES) in the Federal
Register.

• 1979, Dennis Ritchie publishes “On the Security of UNIX” and


“Protection of Data File Contents,” discussing secure user IDs
and secure group IDs, and the problems inherent in the systems.

• Today, the Internet brings millions of unsecured computer


networks into continuous communication with each other.
Three Pillars of Cyber security
The Cyber security Process
Five major Elements of Cyber Security
Cyber Security Goals
The objective of Cyber Security is to protect information from
being stolen, compromised or attacked. Cyber Security can
be measured by at least one of three goals-

 Protect the confidentiality of data.


 Preserve the integrity of data.
 Promote the availability of data
for authorized users.
Why Does Cyber security Matter?
 Protecting sensitive information
 Defending against cyber threats
 Maintaining the security of critical infrastructure
 Ensuring business continuity
 Enhancing network security
 Collaborating with security analysts
 Adhering to regulatory compliance
 Addressing insider threats
 Evaluating and implementing Cyber Security solutions
Principles of Cyber Security (CIA Triad)
 Cyber Security's main objective is to ensure data protection.
 The security community provides a triangle of three related
principles to protect the data from cyber-attacks. This
principle is called the CIA triad.

Figure 1.1 Taxonomy of security goals


What are the key goals of Cyber security?
CIA Triad(Con..)
Confidentiality
 Confidentiality is probably the most common aspect of information
security.
 It also equivalent to privacy and avoids the unauthorized
disclosure of information
 We need to protect our confidential information.
 It involves the protection of data, providing access for those who
are allowed to see it while disallowing others from learning
anything about its content.
 It prevents essential information from reaching the wrong people
while making sure that the right people can get it.
Tools for Confidentiality
Integrity
 Information needs to be changed constantly. Integrity means

that changes need to be done only by authorized entities and

through authorized mechanisms.

 Integrity refers to the methods for ensuring that data is real,

accurate and safeguarded from unauthorized user modification.

 It is the property that information has not be altered in an

unauthorized way, and that source of the information is genuine.


Tools for Integrity
Availability
 The information created and stored by an organization needs
to be available to authorized entities.
 Information needs to be constantly changed, which means it
must be accessible to authorized entities.
Tools for Availability
 Physical Protections
 Computational Redundancies
Authentication
Verifying the identity of users or systems to ensure they are
who they claim to be.
Authorization
Granting or denying access to resources based on a user’s
permissions or privileges limits what actions they can perform.
Non Repudiation
Providing proof that a specific action or transaction occurred,
makes it difficult for individuals to deny their involvement.
Why is cyber security important?
Cyber Security for business:
Here are the 11 key advantages of Cyber Security for business:

 Protects personal data


 Helps preserves reputation
 Enhances productivity
 Assists the remote workspace
 Regulation compliance
 Improves cyber posture
 Better data management
 Helps educate and train the workforce
 Helps maintain trust and credibility
 Streamline access control
 Supports the IT team
What are the benefits of cyber security?
The benefits of implementing and maintaining cyber security practices include:

 Business protection against cyber-attacks and data breaches.

 Protection for data and networks.

 Prevention of unauthorized user access.

 Improved recovery time after a breach.

 Protection for end users and endpoint devices.

 Business continuity.

 Regulatory Compliance.

 Improved confidence in the company’s reputation and trust for developers,

partners, customers, stakeholders, and employees.


Cyber security vendors and tools
Vendors in the cyber security field typically offer a variety of security
products and services. Common security tools and systems include:
 Identity and access management (IAM)
 Firewalls
 Endpoint protection
 Antimalware/Antivirus
 Intrusion prevention/detection systems (IPS/IDS)
 Data loss prevention (DLP)
 Endpoint detection and response
 Security information and event management (SIEM)
 Encryption tools
 Vulnerability scanners
 Virtual private networks (VPNs)
 Cloud workload protection platform (CWPP)
 Cloud access security broker (CASB)
What are the career opportunities in cyber security?
Types of Cyber Security
 Network Security: secure a computer network from unauthorized access, intruders,
attacks, disruption, and misuse.
 Application Security: Protecting the software and devices from unwanted threats.
 Information or Data Security: maintain the integrity and privacy of data, both in
storage and in transit.
 Identity management: It deals with the procedure for determining the level of
access that each individual has within an organization.
 Operational Security: It involves processing and making decisions on handling and
securing data assets.
 Mobile Security: securing the organizational and personal data stored on mobile
devices such as cell phones, computers, tablets, and other similar devices against
various malicious threats.
 Cloud Security: protecting the information stored in the digital environment or
cloud architectures for the organization.
What is Cyber Crime?
• Cybercrime means the use of a computer as an instrument to
further illegal ends, such as committing fraud, trafficking in
child pornography and intellectual property, stealing
identities, or violating privacy.
It Includes:
Illegal access
Illegal Interception
System Interference
Data Interference
Misuse of devices
Fraud
Types of Cyber Crime?
What is Cyber Attack?
• A threat in cybersecurity is a malicious activity by an
individual or organization to corrupt or steal data,
gain access to a network, or disrupt digital life.

• Common Cyber attacks are:


Hacker
• A hacker is a person who breaks into a computer system.
• The reasons for hacking can be many: installing malware,
stealing or destroying data, disrupting service, and more.
• Hacking can also be done for ethical reasons, such as trying to
find software vulnerabilities. so they can be fixed. Some
common types of hacker are:
Why Cyber Security?
How to ensure Cyber Security
1. User education: Human error is the leading cause of data breaches.
Therefore, you must equip staff with the knowledge to deal with the
threats they face.
2. Application security: Web application vulnerabilities are a common
point of intrusion for cybercriminals.
3. Network security: Network security is the process of protecting the
usability and integrity of your network and data. This is achieved by
conducting a network penetration test, which assesses your network for
vulnerabilities and security issues.
4. Leadership commitment: Leadership commitment is key to cyber
resilience. Without it, it is tough to establish or enforce effective
processes.
5. Password management: Almost half of the UK population uses
‘password’, ‘123456’ or ‘qwerty’ as their password. You should implement
Thank You

You might also like