Cyber Security Mind Mapping Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Cyber Security is the technology

and process that is designed to


protect networks and devices
from unauthorized access

The principles of confidentiality assert that


information and functions can be accessed
Confidentiality
only by authorized parties
Example: Military secrets

The principles of integrity assert that


information and functions can be added,
altered or removed only by authorized
CIA Integrity people

Incorrect date entered by a user in
Example:
the database

The principles of availability assert that


systems, functions and data must be
Availability
available on demand according to agreed
upon parameters based on levels of service

Computer assisted crimes


Example: Fraud, DOS

Computer as the target crimes


Types of Cybercrime

Example: Sniffing, Viruses


Computer incidental to the crimes


Example: List of customer for traffickers

Information theft and manipulating data

Creating fear and chaos by disrupting


critical infrastructure

Financial loss to the target


Motives behind Cybercrime


Protection of your business Achieving state's military objectives

Increased productivity Demanding ransom

Inspire customer confidence Advantages Damaging reputation of the target

Stops your website from crashing Propagating religious or political beliefs


Cybercrime
Protection of your customer or clients 1980's

MNC Database
(Pentagon and
IBM
DOS (Denial of Service)

1990's
Malware Attack
crackdown on criminals
National

Microsoft's NT operating system pierced


Man in the Middle Why Cyber Security ? Threats to CIA

2001
Phishing

Cybercriminals launched attacks against


eBay, Yahoo!, CNN.com, amazon and others
Drive by Attack Common attacks in Cyber

History of Cybercrime
Cross-site Scripting Attack Security 2007
Bank
hit by biggest ever hack. Swedish bank,
Nordea recorded nearly $1 Million has been
Password Attack
stolen in three months from 250 accounts

Eavesdropping Attack
2013

- 2.9 Million accounts stolen
Adobe
SQL Injection Attack

Cyber Security
Birthday Attack 2016

758 million malicious attacks occured


according to Kaspersky
Finding weakness

A Cyber Security expert is an individual


Monitoring systems Techniques employed by an organization to protect their Who is a Cyber Security expert ? Black Hat
data
Network breach Grey Hat

White Hat
CompTIA Security+ 501
Suicide Hacker
Certificate Ethical Hacker CEH Hacking Types of Hackers
Script Kiddle
Certified Information System Security
Professional CISSP Cyber Terrorist

Certified Information System Auditor CISA State Sponsored Hacker


Courses and certification in
Hacktivist
Certified Information Security Manager Cyber Security
CISM
1998
Certified in Risk and Information System
T Morris
Robert
Control CRISC

First internet worm


Certified Cloud Security Professional CCSP


1990

Lee
Kevin
Cyber Security Expert (Master's Program)

Hacked telephone lines of KIIS-FM (Los


Angeles)
History of Cybercrime Famous names in Cyber Security

1999
David
L Smith

virus
Created Melissa

2004
Adam
Botbyl

Steal credit card information


2-Way authentication

Secure passwords

Regular updates

How does Cyber Security works Antivirus


Security Computer
? Firewall

No Phishing

Cryptography (encryption)

Securing DNS

Asset Security

Security architecture and engineering

Communication and network security

Identity and access management


Domains in Cyber Security
Security operations

Security assessment and testing

Software development security

Security and risk management

You might also like