0% found this document useful (0 votes)
47 views53 pages

Cyber Sec

Uploaded by

pallavi45bn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views53 pages

Cyber Sec

Uploaded by

pallavi45bn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 53

CYBER SECURITY

EVERYTHING IN CYBERSPACE WILL BE


COVERED BY A HIERARCHY OF
COMPUTERS!
Cell
Body
Continent Home
Region Car

Building
Campus
World
Fractal Cyberspace: a network
of … networks of … platforms
Original by Gordon Bell
DATA SCALES IN UNIT
Abbreviation Unit Value Size (in bytes)
B BIT 0 or 1 1/8 of a byte
B BYTES 8 bits 1 byte
KB KILOBYTES 1,000 bytes 1,000 bytes
MB MEGABYTE 1,000² bytes 1,000,000 bytes
GB GIGABYTE 1,000³ bytes 1,000,000,000 bytes
TB TERABYTE 1,000⁴ bytes 1,000,000,000,000 bytes

PB PETABYTE 1,000⁵ bytes 1,000,000,000,000,000 bytes

EB EXABYTE 1,000⁶ bytes 1,000,000,000,000,000,000 bytes

ZB ZETTABYTE 1,000⁷ bytes 1,000,000,000,000,000,000,000 bytes

YB YOTTABYTE 1,000⁸ bytes 1,000,000,000,000,000,000,000,000


bytes
DATA IN A DAY
500 MILLION TWEETS ARE SENT

294 BILLION EMAILS ARE SENT

4 PETABYTES OF DATA CREATED ON FACEBOOK

4 TERABYTES OF DATA CREATED FROM EACH CONNECTED


CAR

65 BILLION MESSAGES SENT ON WHATSAPP/ 5 BILLION


SEARCHES MADE

BY 2025, IT’S ESTIMATED THAT 463 EXABYTES OF DATA WILL


BE CREATED EACH DAY GLOBALLY – THAT’S THE
EQUIVALENT OF 212,765,957 DVDS PER DAY!
SOME BASICS…..
RISK : A POSSIBLE EVENT WHICH COULD CAUSE A LOSS
hacking, legal aspects, financial losses

THREAT : A METHOD OF TRIGGERING A RISK EVENT THAT IS


DANGEROUS
DDoS, DoS, malware, MITM

VULNERABILITY : A WEAKNESS IN A TARGET THAT CAN


POTENTIALLY BE EXPLOITED BY A THREAT
eternal blue

EXPLOIT : A VULNERABILITY THAT HAS BEEN TRIGGERED BY A


THREAT - A RISK OF 1.0 (100%)
wannacry
COUNTER MEASURE : A WAY TO STOP A THREAT FROM
TRIGGERING A RISK EVENT

DEFENSE-IN-DEPTH : NEVER RELY ON ONE SINGLE


SECURITY MEASURE ALONE

ASSURANCE : LEVEL OF GUARANTEE THAT A SECURITY


SYSTEM WILL BEHAVE AS EXPECTED

ASSETS
• DATA/INFORMATION (AT REST, IN TRANSIT, IN USE)
• APPLICATIONS
• SYSTEMS / NETWORK
THE DILEMMA OF SECURITY
THE PROBLEM THAT WE CANNOT GET AWAY FROM IN
COMPUTER SECURITY IS THAT WE CAN ONLY HAVE
GOOD SECURITY IF EVERYONE UNDERSTANDS WHAT
SECURITY MEANS AND AGREES WITH THE NEED FOR
SECURITY.

SECURITY IS A SOCIAL PROBLEM, BECAUSE IT HAS NO


MEANING UNTIL A PERSON DEFINES WHAT IT MEANS
TO THEM.

THE HARSH REALITY IS THE FOLLOWING: IN PRACTICE,


MOST USERS HAVE LITTLE OR NO UNDERSTANDING OF
SECURITY. THIS IS OUR BIGGEST SECURITY HOLE.
SECURITY LIES IN TRUST
 EVERY SECURITY PROBLEM HAS THIS QUESTION IT
NEEDS TO ANSWER FIRST: WHOM OR WHAT DO WE
TRUST?
ON OUR DAILY LIVES, WE PLACED SOME SORT OF
TECHNOLOGY BETWEEN US AND THE “THINGS” WE
DON’T TRUST. FOR EXAMPLE LOCK THE CAR, SET THE
HOUSE ALARM, GIVE CREDIT CARD NUMBER ONLY TO
THE CASHIER, ETC.
SO WE DECIDED TO TRUST SOMEBODY/SOMETHING
TO HAVE SOME SORT OF SECURITY (TRUST THE LOCK,
TRUST THE POLICE, TRUST THE CASHIER).
WE HAVE TO HAVE THE SAME SCENARIO FOR
COMPUTER & NETWORK SYSTEMS WE USE TODAY.
ACCESS V/S SECURITY
WHEN CONSIDERING SECURITY IT IS IMPORTANT TO
REALIZE THAT IT IS IMPOSSIBLE TO OBTAIN PERFECT
SECURITY. SECURITY IS NOT AN ABSOLUTE. INSTEAD
SECURITY SHOULD BE CONSIDERED A BALANCE BETWEEN
PROTECTION AND AVAILABILITY.

IT IS POSSIBLE TO HAVE UNRESTRICTED ACCESS TO A


SYSTEM, SO THAT THE SYSTEM IS AVAILABLE TO ANYONE,
ANYWHERE, ANYTIME, THROUGH ANY MEANS. HOWEVER,
THIS KIND OF RANDOM ACCESS POSES A DANGER TO THE
INTEGRITY OF INFORMATION.

ON THE OTHER HAND COMPLETE SECURITY OF AN


INFORMATION SYSTEM WOULD NOT ALLOW ANYONE
ACCESS AT ANY GIVEN TIME.
Figure 7
SECURITY ACCESS

BALANCING SECURITY AND ACCESS- TOO MUCH


SECURITY MIGHT MAKE ACCESS HARD TO GET AND
PEOPLE WILL STOP USING THE SYSTEM. ON THE OTHER
HAND, A TOO EASY ACCESS PROTOCOL, MIGHT BE A
SECURITY HOLE FOR THE NETWORK. A BALANCE MUST BE
ACHIEVED BETWEEN THOSE TWO MAJOR “PLAYERS”
THE NEED FOR SECURITY
 TO PROTECT THE ORGANIZATION’S ABILITY TO
FUNCTION.

 TO ENABLE THE SAFE OPERATION OF


APPLICATIONS IMPLEMENTED ON THE
ORGANIZATION’S IT SYSTEMS.

 TO PROTECT THE DATA THE ORGANIZATION


COLLECTS AND USES.

 TO SAFEGUARD THE TECHNOLOGY ASSETS IN USE


AT THE ORGANIZATION.
INFORMATION SECURITY
TOOLS SUCH AS POLICY, AWARENESS, TRAINING,
EDUCATION AND TECHNOLOGY ARE NECESSARY FOR
THE SUCCESSFUL APPLICATION OF INFORMATION
SECURITY.

MODEL OF INFORMATION SECURITY IS KNOWN AS


THE C.I.A. TRIANGLE
Figure 5 Hardware
Software

People

Procedures

Data

COMPONENTS OF AN INFORMATION SYSTEM


C.I.A. TRIAD
PEOPLE ARE THE BIGGEST THREAT TO INFORMATION
SECURITY!!! (WHY? – BECAUSE WE ARE THE WEAKEST
LINK)
SOCIAL ENGINEERING . IT IS A SYSTEM THAT
MANIPULATES THE ACTIONS OF PEOPLE IN ORDER TO
OBTAIN INFORMATION ABOUT A SYSTEM IN ORDER
TO OBTAIN ACCESS.
PROCEDURES ARE WRITTEN BLUEPRINTS FOR
ACCOMPLISHING A SPECIFIC TASK; STEP-BY-STEP
DESCRIPTIONS.
THE OBTAINMENT OF THE PROCEDURES BY AN
UNAUTHORIZED USER WOULD CONSTITUTE A THREAT
TO THE INTEGRITY OF THE INFORMATION.
INTERNET
Figure 6

COMPUTER AS SUBJECT OF CRIME

COMPUTER AS OBJECT OF CRIME

HACKER REMOTE SYSTEM


CYBER SECURITY
 BRANCH OF COMPUTER
SECURITY RELATED TO ALL IT
EQUIPMENT'S WORKING IN
STANDALONE AND NETWORK
ENVIRONMENT.

 OBJECTIVE IS TO ESTABLISH
RULES AND MEASURE TO USE
AGAINST CYBER ATTACKS.
TYPES OF CYBER SECURITY

• PHYSICAL SECURITY

• SOFTWARE SECURITY

• HARDWARE SECURITY

• NETWORK SECURITY
PHYSICAL SECURITY
 ACCESSCONTROL: ONLY AUTHORIZED ACCESS TO
MACHINE/EQPTS

 PC NOT TO LEAVE UN-ATTENDED IN ON CONDITION

 REPAIRS IN PRESENCE OF TECHNICAL STAFF ONLY AND DO


NOT LET THEM CARRY MULTIMEDIA MOBILES WHILE IN
OFFICE

 NOT TO GIVE ANY STORAGE MEDIA TO OUTSIDERS.

 BLOCKING/SEALING THE USB PORT PHYSICALLY


 NEVER EVER KEEP ANY OFFICIAL MATTER ON
PERSONAL COMPUTER/LAPTOP CONNECTED WITH
INTERNET.

………AND A LOT MORE


SOFTWARE SECURITY
 ANTIVIRUS
– USE IT AND KEEP IT UP TO DATE.
– THOUSANDS OF NEW VIRUSES BEING GENERATED
EVERY MONTH

 PASSWORD
- USE HARD-TO-GUESS PASSWORDS.
- USE THREE TIER PASSWORD SECURITY( BIOS
P/W, SYSTEM P/W, ADMIN/USER P/W, FILE AND
FOLDER P/W)
- NEVER SHARE PASSWORD EVEN WITH YOUR
COLLEAGUES.
FIREWALLS
 A COMBINATION OF HARDWARE AND SOFTWARE
RESOURCES POSITIONED BETWEEN THE LOCAL
(TRUSTED) NETWORK AND AN UNTRUSTED
NETWORK.

 TO PROTECT THE COMPUTERS FROM INTERNET


INTRUDERS.

Inside Outside
VPN TECHNOLOGIES
 A VIRTUAL PRIVATE NETWORK (VPN)

 PRIVATE DATA NETWORK

 MAKES USE OF THE PUBLIC TELECOM INFRA


 MAINTAINING PRIVACY THROUGH THE USE OF A
TUNNELING PROTOCOL AND SECURITY
PROCEDURES.
OTHER PRECAUTIONS
 DON'T OPEN UNKNOWN, UN-SCANNED OR
UNEXPECTED EMAIL ATTACHMENTS.

 DISCONNECT FROM THE INTERNET WHEN NOT IN


USE.

 BACK UP YOUR COMPUTER DATA PERIODICALLY.

 DON'T RESPOND TO HARASSING OR NEGATIVE


MESSAGES

 GET OUT OF UNCOMFORTABLE OR HOSTILE


SITUATIONS QUICKLY
 REGULARLY DOWNLOAD SECURITY PROTECTION
UPDATE "PATCHES".

 CHECK YOUR SECURITY ON A REGULAR BASIS.


UNDERSTAND THE RISKS AND USE MEASURES TO
MINIMIZE YOUR EXPOSURE.

 SHARE SECURITY TIPS WITH FAMILY MEMBERS, CO-


WORKERS AND FRIENDS.

 NEVER EVER GIVE YOUR PERSONAL DETAILS


WITHOUT KNOWING TO WHOM EXACTLY YOU ARE
SHARING IT.
HARDWARE SECURITY
 PHYSICAL ON SITE SECURITY- LOCK AND KEY, GUARDING
THE PLACE

 CABINET LOCK AND KEY IN COMPUTERS

 SURGE PROTECTORS AGAINST ELECTRICAL SPIKES AND


DROPS AND PROPER EARTHING

 PHYSICAL SEALING/LOCKING OF PORTS

 BIOMETRIC AUTHENTICATION
NETWORK SECURITY
 FIREWALLS

 ANTIVIRUS SOFTWARES

 ENCRYPTION DEVICES

 STATIC IP ADDRESSES

 VPN
BENEFITS OF CYBER SECURITY
 DEFEND THE USER FROM CRITICAL ATTACKS.

 IT HELPS US TO BROWSE SAFELY.

 WATCH ON ALL THE INCOMING AND OUTGOING DATA


ON OUR COMPUTER TO SAFE GUARD THE NETWORK.

 SECURITY WILL DEFEND FROM HACKS AND VIRUS.

 ASSURES THE SAFETY TO THE VITAL/CONFIDENTIAL


INFORMATION AND DATA.

 SAFEGUARDS THE INTEREST OF THE ORGANISATION


AND IN TURN OF THE NATION.
LEGAL FRAMEWORK
 IT ACT 2000(ELECTRONIC RECORDS/DIGITAL
SIGNATURES/ CYBER CRIMES AND PENALTIES)

 IT(AMENDMENT) BILL 2006- DATA PROTECTION


AND COMPUTER CRIMES

 IT(AMENDMENT) BILL 2008- PORNOGRAPHY

 INDIAN COMPUTER EMERGENCY RESPONSE


TEAM(CERT)- ACTION ON ANY BREACH OF CYBER
SECURITY
7-LAYER SECURITY OPTIONS
1) USE BEST PRACTICES
2) WIRELESS ROUTER W/
HARDWARE FIREWALL

3) ZONE ALARM
SOFTWARE FIREWALL

Data 4) SPYBOT W/ TEA TIMER

5) SUPER ANTI SPYWARE

6) ANTI VIRUS SOFTWARE

7) BACKUP DATA

OPTIONAL: CREATE USER ACCOUNTS


BEST PRACTICES
 TREAT YOUR PC/LAPTOP AS THOUGH IT WERE A
WALLET OR PURSE WHEN AWAY FROM HOME

 BACKUP REGULARLY

 DON’T CONDUCT FINANCIAL TRANSACTIONS ONLINE


ON NON-ENCRYPTED SITES

(LOOK FOR HTTPS:// OR THE PADLOCK ICON)


ENCRYPTED WEBSITES

Look for
BEST PRACTICES
 BE PARANOID ABOUT E-MAIL ATTACHMENTS

 NO SUCH THING AS A “SAFE” WEBSITE

 ANALYSIS OF DOMAINS BY SYMANTEC REVEALED


THAT 90% OF INFECTED WEBSITES ARE
LEGITIMATE SITES THAT HAD BEEN
COMPROMISED WITHOUT THE OWNERS
KNOWLEDGE.
WEB BEST PRACTICES
 SEE IF THE SITE IS USING A SECURE CONNECTION
(SSL) - LOOK FOR A LOCK ICON TO THE LEFT OF THE
SITE’S URL IN THE ADDRESS BAR

 SSL IS A PROTOCOL THAT PROVIDES AN ENCRYPTED


TUNNEL BETWEEN YOUR COMPUTER AND THE SITE
YOU’RE VIEWING. SITES CAN USE SSL TO PREVENT
THIRD PARTIES FROM INTERFERING WITH THE
INFORMATION TRAVELING THROUGH THE TUNNEL.

 AVOID ENTERING SENSITIVE INFORMATION SUCH AS


USERNAMES AND PASSWORDS ON THE SITE WHICH
IS NOT USING SSL.
BEST PRACTICES
 DON’T OPEN OBVIOUS SPAM – DELETE IT

 NEVER TRUST UNSOLICITED E-MAILS

 DON’T CLICK ON LINKS IN E-MAIL – TYPE THEM IN

 USE STRONG PASSWORDS

 WATCH URLS TO KNOW WHERE YOU ARE

 TURN COMPUTER OFF WHEN NOT IN USE

 NOTHING IS FOOLPROOF – BE PREPARED


READ THE FINE PRINT
 WHEN YOU CLICK ON THE BOX,
YOU ARE SIGNING A LEGAL
CONTRACT.

 READ BEFORE AGREEING

 KEEP A COPY (PAPER OR


DIGITAL) ESP IF MONEY IS
INVOLVED.
USE GOOD PASSWORDS
 GREAT INTERNET
SECURITY MEANS
NOTHING IF THE BAD
GUYS CAN GUESS YOUR
PASSWORDS

 USE STRONG PASSWORDS


WHEN DEALING WITH
GOLDEN RULES
• MINIMUM 8 CHARACTERS LONG

• AS MEANINGLESS AS POSSIBLE
• USE UPPERCASE /LOWERCASE LETTERS AND NUMBERS,
E.G., XK28LP97.
• CHANGE PW REGULARLY, AT LEAST ONCE IN A MONTH.

• NEVER GIVE OUT YOUR PASSWORD TO ANYONE!

• SHOULD NOT BE TOO HARD TO REMEMBER

• STORE THE PASSWORD IN A SAFE PLACE


MORE PASSWORDS

henearkrxern
USB MALWARE
 FLASH DRIVES BANNED BY US
ARMY IN 2008 DUE TO
MALWARE ISSUES.

 BAN LIFTED IN 2010

 LOTS OF MALWARE IS
WRITTEN TO MOVE ON A
FLASH DRIVE
USB FLASH DRIVE W/ READ-ONLY
 ‘READ-ONLY’ OR
‘WRITE-PROTECT’
SWITCH PREVENTS
MALWARE BEING
WRITTEN TO THE
FLASH DRIVE

 USEFUL IF USING
MULTIPLE
UNFAMILIAR
COMPUTERS
UPDATE YOUR OPERATING SYSTEM
 INSTALL ALL
SECURITY
PATCHES

 GO TO
WINDOWS
UPDATE WEBSITE

windowsupdate.microsoft.com/
7-Layer Security Options
1) USE BEST PRACTICES
2) HARDWARE ROUTER
W/ FIREWALL
3) ZONE ALARM
SOFTWARE FIREWALL
Data
4) SPYBOT W/ TEA TIMER

5) SUPER ANTI SPYWARE

6) ANTI VIRUS SOFTWARE

7) BACKUP DATA

OPTIONAL: CREATE USER ACCOUNTS


HARDWARE ROUTER W/FIREWALL
 FIRST LAYER OF
DEFENSE

 MOST WIRELESS
ROUTERS HAVE A
FIREWALL

 PROTECTS AGAINST
INCOMING ATTACKS
7-LAYER SECURITY OPTIONS
1) USE BEST PRACTICES
2) WIRELESS ROUTER W/
HARDWARE FIREWALL

3) ZONE ALARM
SOFTWARE FIREWALL

Data 4) SPYBOT W/ TEA TIMER

5) SUPER ANTI SPYWARE

6) ANTI VIRUS SOFTWARE

7) BACKUP DATA

OPTIONAL: CREATE USER ACCOUNTS


7-LAYER SECURITY OPTIONS
1) USE BEST PRACTICES
2) WIRELESS ROUTER W/
HARDWARE FIREWALL

3) ZONE ALARM
SOFTWARE FIREWALL

Data 4) SPYBOT W/ TEA TIMER

5) SUPER ANTI SPYWARE

6) ANTI VIRUS SOFTWARE

7) BACKUP DATA

OPTIONAL: CREATE USER ACCOUNTS


BACKUP YOUR DATA
 WHY BACKUP?

 DATA LOSS OR CORRUPTION

 HUMAN ERROR, FIRE,


FLOOD, MALWARE

 BACKING UP IS CHEAPER,
EASIER THAN RE-CREATING
THE DATA
USER ACCOUNTS
 THE WINDOWS DEFAULT IS TO RUN IN
ADMINISTRATOR MODE - ALLOWS EASY
INSTALLATION OF OTHER PROGRAMS – EVEN
MALWARE

 A SAFER OPTION IS TO CREATE A USER ACCOUNT


WITHOUT ADMIN PRIVILEGES.

 USE ADMIN ACCOUNT ONLY WHEN INSTALLING


SOFTWARE.
CONCLUSION
 COMMON SENSE, SOME SIMPLE RULES AND A FEW
PIECES OF TECHNOLOGY CAN HELP PROTECT YOUR
COMPUTER SYSTEMS FROM UNAUTHORIZED USE

 IT IS IMPORTANT TO REMEMBER THAT BY


PROTECTING YOUR OWN COMPUTER SYSTEM,
YOU'RE ALSO DOING YOUR PART TO PROTECT
COMPUTERS THROUGHOUT THE ORGANIZATION.

 BE SECURITY CONSCIOUS WHILE WORKING IN


DIGITAL SCENARIO.
THANK YOU
Address: Contact Number: Email id:
STS BSF TIGRI Mobile No : 8866585647 naunianil33@gmail.com

Contact Me

You might also like