0% found this document useful (0 votes)
18 views

Lecture#3- Cyber Security Fundamentals

Uploaded by

qamar
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Lecture#3- Cyber Security Fundamentals

Uploaded by

qamar
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBER SECURITY

Lecture-3: Cyber Security Fundamentals

Dr. Shahid Naseem


Assistant Professor (IT)
[email protected]

University of Education, Lahore


System Based Attacks
These are the attacks which are intended to compromise a
computer or a computer network. Some of the important system-
based attacks are as follows-

University of Education, Lahore


System Based Attacks
1. Virus: It is a type of malicious software program that spread
throughout the computer files without the knowledge of a user. It is
a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when
executed. It can also execute instructions that cause harm to the
system.

University of Education, Lahore


System Based Attacks
2. Worm: It is a type of malware whose primary function is to
replicate itself to spread to uninfected computers. It works same as
the computer virus. Worms often originate from email attachments
that appear to be from trusted senders.

University of Education, Lahore


System Based Attacks
3. Trojan horse: It is a malicious program that occurs unexpected
changes to computer setting and unusual activity, even when the
computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some
malicious code will run in the background.

University of Education, Lahore


System Based Attacks
4. Backdoors: It is a method that bypasses the normal authentication
process. A developer may create a backdoor so that an application or
operating system can be accessed for troubleshooting or other
purposes.

University of Education, Lahore


System Based Attacks
5. Bots: A bot (short for "robot") is an automated process that
interacts with other network services. Some bots program run
automatically, while others only execute commands when they
receive specific input. Common examples of bots program are the
crawler, chatroom bots, and malicious bots.

University of Education, Lahore


Layers of Cyber Security
The 7 layers of cyber security should center on the mission critical
assets you are seeking to protect.

University of Education, Lahore


Layers of Cyber Security
1: Mission Critical Assets – This is the data you need to protect.

2: Data Security – Data security controls protect the storage and


transfer of data.

3: Application Security – Applications security controls protect access


to an application, an application’s access to your mission critical
assets, and the internal security of the application.

4: Endpoint Security – Endpoint security controls protect the


connection between devices and the network.

University of Education, Lahore


Layers of Cyber Security
5: Network Security – Network security controls protect an
organization’s network and prevent unauthorized access of the
network.

6: Perimeter Security – Perimeter security controls include both the


physical and digital security methodologies that protect the business
overall.

University of Education, Lahore


Layers of Cyber Security
7: The Human Layer – Humans are the weakest link in any cyber
security posture. Human security controls include phishing
simulations and access management controls that protect mission
critical assets from a wide variety of human threats, including cyber
criminals, malicious insiders, and negligent users.

University of Education, Lahore

You might also like