Download - Introduction to cyber security amos
![Page 1: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/1.jpg)
INTRODUCTION TO CYBER SECURITY
Presented by Amos Oyoo
![Page 2: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/2.jpg)
what is cyber security?
• Cybersecurity is the ability to protect or defend Cyberspace from an attacks – (National Institutes of Standards Technology –NIST)
• Cyber attack – an attack for disrupting, disabling, destroying or maliciously controlling a computer environment/infrastructure; or destroying the integrity of the data or stealing controlled information
![Page 3: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/3.jpg)
What is cyberspace?Cyberspace is where
online communication happens. If you've spent time chatting with friends
on the Internet, you've been in cyberspace.
Cyberspace is a world of information through the
internet. It can be said that anything
that is done via the use of internet, occurs within the confines of the cyberspace
![Page 4: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/4.jpg)
Why does cybersecurity matter?
•Cybersecurity is involved every time we touch a computer or a computing device
•Your cyber hygiene affects others
•Cyber security is a shared responsibility
![Page 5: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/5.jpg)
Why Cybersecurity Training?
•Status of the office•We already have:
• Management Controls
• Technical Controls
• Operational Controls
•We need:• Human Controls
![Page 6: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/6.jpg)
Who are the victims of cyber attacks?
• Businesses• Government• Financial
Institutions• Energy Companies• Educational
Institutions• Media outlets• You
![Page 7: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/7.jpg)
What do we stand to lose?•Money•Reputation •Personal information
![Page 8: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/8.jpg)
Who are the attackers?• Hackers • Cyber criminals• Cyber spies• Nation-States• Malicious Insiders• Hacktivists –
hackers with political motives
• Script Kiddies 76 Chinese Hackers Arrested in
Runda
![Page 9: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/9.jpg)
How are they attacking?• Network attack (Denial of service; man-in-
the middle attack; Brute force attack etc)• Malware Distribution – malicious software:
(through emails; infected documents; websites; QR codes; Crypto-locker)
• Social Engineering -psychological manipulation of people to divulge confidential information
• Data theft
![Page 10: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/10.jpg)
Who are our defenders?• ICT Team• Security Vendors – firewalls,
antivirus, Intrusion monitors and detections
• ICT Hardware/Software manufacturers
• The Government – laws, policies, prosecutions etc
• You, the User
![Page 11: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/11.jpg)
What are we protecting?
![Page 12: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/12.jpg)
What is information systems
• A computer information system is a system composed of people and computers that processes or interprets information.
• The software used to run a computerized database or to refer to only a computer system.
![Page 13: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/13.jpg)
Computer-Based Information Systems
![Page 14: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/14.jpg)
Quality information needs to possess the following attributes:
Without data and the ability to process it, an organization
could not successfully complete most business activities
![Page 15: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/15.jpg)
The Value of Information
• Value of information is directly linked to how it helps decision makers achieve their organization’s goals
• For example, value of information might be measured in:• Time required to make a decision• Increased profits to the company
![Page 16: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/16.jpg)
security VS Safety
Security: We must protect our computers and data in the same way that we secure the doors to our homes. Safety: We must behave in ways that protect us against risks and threats that come with technology.
![Page 17: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/17.jpg)
LEADING THREATS• Virus - A virus attaches itself to a program, file, or disk• Worm - Worms are more sophisticated viruses that can
replicate automatically and send themselves to other computers by first taking control of certain software programs on your PC, such as email.
• Trojan Horse / Logic Bomb• Phishing –acquire sensitive information such as usernames,
passwords, and credit card details often for malicious reasons, by masquerading as a trustworthy entity
• Social Engineering
![Page 18: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/18.jpg)
LOOMING THREATS• Cloud services• Ransomware• Spear phishing - is an email that
appears to be from an individual or business that you know.
• The Internet of Things
![Page 19: Introduction to cyber security amos](https://reader034.vdocument.in/reader034/viewer/2022042604/5873a0ae1a28ab85438b7703/html5/thumbnails/19.jpg)