Cyber Security
Landscape
Dilip Tikle
Technology driven business Knowledge Series Lectures
December 3, 2024
Cyber Security
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
• It's also known as information technology security or electronic
information security or Digital Information Security.
• Bob Thomas (1970) an American computer scientist who is widely
regarded as the father of cybersecurity. "I'M THE CREEPER: CATCH
ME IF YOU CAN."
Categories
1. Network security
2. Application security
3. Information security
4. Operational security
5. End device security
6. Cloud Security
7. IoT Security
8. End-user education
9. Disaster recovery and business continuity
Types of Cyber Crime
1. Cybercrime - Single actors or groups targeting systems for financial gain or to
cause disruption.
2. Cyber-attack – Are politically motivated information gathering or flooding
3. Cyberterrorism - disruptive attacks by recognised terrorist organisations against
computer systems with the intent of generating alarm, panic, or the physical
disruption of the information system.
4. Cyber War – Occupation of cyber space by state or non-state actors that
constitute a serious threat to a nation's security or are conducted in response to
a perceived threat against a nation's security.
Channels of Cyber attacks I of
II
• Malware - Malware means malicious software. One of the most common cyber threats, malware
is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s
computer. Often spread via an unsolicited email attachment or legitimate-looking download,
malware may be used by cybercriminals to make money or in politically motivated cyber-attacks.
• There are a number of different types of malware, including:
• Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer system,
infecting files with malicious code.
• Trojan A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading
Trojans onto their computer where they cause damage or collect data.
• Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this
information. For example, spyware could capture credit card details.
• Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a
ransom is paid.
• Adware: Advertising software which can be used to spread malware.
• Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without
the user’s permission.
Channels of Cyber attacks II of
II
• SQL injection - An SQL (structured language query) injection is a type of cyber-
attack used to take control of and steal data from a database.
• Phishing – In Phishing cybercriminals target victims with emails that appear to be
from a legitimate company asking for sensitive information. Phishing attacks are
often used to dupe people into handing over credit card data and other personal
information.
• Man-in-the-middle attack - A man-in-the-middle attack is a type of cyber threat
where a cybercriminal intercepts communication between two individuals in order
to steal data. For example, on an unsecure WiFi network, an attacker could
intercept data being passed from the victim’s device and the network.
• Denial-of-service attack - A denial-of-service attack is where cybercriminals
prevent a computer system from fulfilling legitimate requests by overwhelming the
networks and servers with traffic.
Latest Threats trends in Cyber
Security
• Dridex malware - In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an
organized cyber-criminal group for their part in a global Dridex malware attack. This malicious campaign
affected the public, government, infrastructure and business worldwide.
• Dridex is a financial trojan with a range of capabilities. Affecting victims since 2014, it infects computers
though phishing emails or existing malware. Capable of stealing passwords, banking details and personal
data which can be used in fraudulent transactions, it has caused massive financial losses amounting to
hundreds of millions. In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises
the public to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.
• Romance scams - In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that
cybercriminals commit using dating sites, chat rooms and apps. Perpetrators take advantage of people
seeking new partners, duping victims into giving away personal data. The FBI reports that romance cyber
threats affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.
• Emotet malware - In late 2019, The Australian Cyber Security Centre warned national organizations
about a widespread global cyber threat from Emotet malware. Emotet is a sophisticated trojan that can
steal data and also load other malware. Emotet thrives on unsophisticated password: a reminder of the
importance of creating a secure password to guard against cyber threats.
End User Protection
1. Update your software and operating system: This means you benefit from the latest security
patches.
2. Use anti-virus software: Security solutions antivirus will detect and removes threats. Keep
your software updated for the best level of protection.
3. Use strong passwords: Ensure your passwords are not easily guessable.
4. Do not open email attachments from unknown senders: These could be infected with
malware.
5. Do not click on links in emails from unknown senders or unfamiliar websites: This is a
common way that malware is spread.
6. Avoid using unsecure WiFi networks in public places: Unsecure networks leave you
vulnerable to man-in-the-middle attacks.
7. Using comprehensive email security solutions for protection against phishing attacks.
8. Avoid Sharing files using Wi Fi channels like BT, NFC Wi MAX etc
9. Training employees
Cyber Security Mantra
Pillars of Cyber Security Three C’s of Cyber Security
• Confidentiality • Comprehensive
• Integrity • Consolidated
• Availability • Collaborative
• Authenticity
• Non-repudiation of user data
DDoS
• A distributed denial-of-service (DDoS) attack attempts to
overwhelm its target with large amounts of data.
• A DDoS attack is like a traffic jam clogging up a freeway, preventing
regular traffic from reaching its destination.
Zones of Cyber Attacks
• User Level actions
• System configuration based actions
• Cyber attacks
• New modes of operandi
Cyber Security motives
1. Financial: Motivated by financial gain. They might try to steal
money or sensitive information they can sell on the dark web.
2. Political: Motivated by political reasons. They might want to
harm a company or organization because of their beliefs or
views.
3. Revenge: Motivated by revenge. There is a possibility that the
organization might have wronged them that they are attacking
and want to get back at them.
4. Curiosity: Motivated by curiosity. They might be interested in
seeing what they can do or how they can disrupt a system.
Cyber
Security
Framewor
k
Objectives
1. Protecting sensitive data (customer information, intellectual property,
financial records).
2. Maintaining customer trust and loyalty.
3. Legal and regulatory compliance.
4. Preserving business continuity
5. Prevent Financial losses
6. Prevent Reputation damage
7. Prevent Legal consequences
8. Prevent Business disruption
9. Ensure Business Continuity
Incident
Handlin
g Plan
Prevention better than cure
• ISO 27001 and 27002 - a comprehensive analysis and review of
your IT infrastructure
• Vulnerability Assessment & Penetration Testing (VAPT) is a security
testing methodology in which the IT systems such as computers,
mobiles and networks, and software such as operating systems and
application software are scanned in order to identify the presence
of known and unknown vulnerabilities.
• A forensic audit is an analysis and review of the financial records of
a company or person to extract facts, which can be used in a court
of law.
Cyber
Securit
y Tools
Its all war time …
Let’s Play
Always