ASSIGNMENT CYBER SECURITY ppt.pptx

1,808 views 25 slides Jan 25, 2023
Slide 1
Slide 1 of 25
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25

About This Presentation

intenet


Slide Content

QN. 01 Review cyber-security and its cost to the world economy .

PART 1. INTRODUCTION Cyber security Is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access .

SECURITY FUNDAMENTALS. Confidentiality Is about preventing the disclosure of data to unauthorized parties. Its Standard measures to establish confidentiality include: Data encryption Two-factor authentication Biometric verification Security tokens

Integrity : Refers to protecting information from being modified by unauthorized parties. Standard measures to guarantee integrity include: Cryptographic checksums, Using file permissions Uninterrupted power supplies, Data backups

Availability Is making sure that authorized parties are able to access the information when needed. Standard measures to guarantee availability include: Backing up data to external drives Implementing firewalls Having backup power supplies Data redundancy

Why is cyber security important? This is due to Cyber-attacks which can be extremely expensive for businesses to endure. Cyber-attacks can be classified into the following categories: Web-based attacks System-based attacks

  Web-based attacks 1. Injection attacks It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information. Example- SQL Injection, code Injection, log Injection, XML Injection etc

Web-based attacks cont…. 2. Phishing Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication

Web-based attacks cont.…. 3. Denial of Service. It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending information that triggers a crash. It uses the single system and single internet connection to attack a server

Web-based attacks cont…. 4. Man in the middle attacks. It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.

System-based attacks 1. Virus It is a type of malicious software program that spread throughout the computer files without the knowledge of a user.

System-based attacks cont… 2. Worm . It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.

System-based attacks cont… 3. Trojan horse . It is a malicious program that occurs unexpected changes to computer setting and unusual activity , even when the computer should be idle. It misleads the user of its true intent . It appears to be a normal application but when opened/executed some malicious code will run in the background.

System-based attacks cont… 4. Backdoors. It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.

System-based attacks cont… 5. Bots A bot (short for "robot") is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.

PART 2. The above mentioned cyber-security attacks cost the world economy as follows. 1.Size of company The more employees you have the more opportunities for a cyber-attack to occur (more computers, workstations, and devices are vulnerable to attacks ). L arger organizations tend to require more in their cyber security spending than smaller businesses. Example, Large enterprises like Microsoft spend $1 billion to drive cybersecurity initiatives The financial industry spends 10% of its information Technology (IT) budget average on cybersecurity. Cyber-crime cost businesses in the United States more than $3.5 billion in internet-related cyber crimes and damages according to a 2019 FBI report.

Cyber security cost factors Cont.… 2. Type of data Businesses that collect more sensitive data will need additional security layers to ensure they are compliant with industry-standard legal compliance. M ore money will be required to protect data that comes under compliance For example, you need a bigger budget if your data falls under Health Insurance Portability and Accountability act (HIPAA ) or Businesses in commerce, Payment Card Industry (PCI) to ensure privacy and prevent breaches G eneral business may need to allocate 0.2% to 0.9% of its annual revenues to drive cybersecurity initiatives.

Cyber security cost factors Cont.… 3. Products and Services The more protection you have in the form of products and services, the higher the cost. Example Firewalls range in prices between $400 and $6,000. Businesses that choose both cyber security products and services should expect to pay more than if they just select products . For example, a bank may need 24/7 monitoring to identify and track threats . Example , The volume of cyber security services you use, like antivirus , will determine your cost. According to Kaspersky, such a setup can cost a business $54,300 on average per year. In addition, companies also need to pay one-time costs of around $3,000. Using cloud-based security solutions can incur $33,500 annually on cybersecurity

Cyber security cost factors Cont.… 4. Self-Install vs. Professional Install Cyber security companies can sell security products to set up yourselves, or to contact a security vendor to help install the product (usually for additional setup fees). A dedicated chief information security officer (CISO) can increase prices/cost An average firewall configuration costs between $450 and $2,500. Expected cost for a vulnerability assessment: $1,500 – $6,000 for a network with 1-3 servers and $5,000 – $10,000 for a network with 5-8 servers.

Cyber security cost factors Cont.… 5. Professional Audits Organizations can periodically conduct third-party audits to ensure they are updated with the latest security and compliance standards. this involve hire personnel or rely on cybersecurity provider for added costs. Audit reveal that, the latest forecast is for global ransomware damage costs to reach $20 billion by 2021 .

QN. 02 Explain Cyber security index, ranking of African Countries and position of Tanzania.

THE CYBER SECURITY INDEX Is a sentiment-based measure of the risk to the corporate, industrial, and governmental information infrastructure from a spectrum of cybersecurity threats. T o raise awareness of the importance and different dimensions of the issues has classified African’s Member States into three categories:- Leading stage: refers to the 6 countries (i.e., GCI score in the 50 th percentile and higher) that demonstrate high commitment. Maturing stage: refers to the 11 countries (i.e., GCI score between the 20 th and 49 th percentile) that have developed complex commitments, and engage in cybersecurity programs and initiatives. Initiating stage: refers to the 27 countries (i.e., GCI score less than the 20 th percentile) that have started to make commitments in cybersecurity.

TANZANIA POSITION IN CYBERSECURITY INDEX Cyber security has improved dramatically in Tanzania over the last three years apparently due to a conducive legal and regulatory framework, according to the 2018 Global Cyber Security Index. Tanzania is now one of the 11 leading African countries; ranking 5 th in the maturing stage; up from being 12 th in 2017. The table below show the Global Cyber Security Index for Africa states ;-

To wind up , Better accounting for cybersecurity will be essential for the digital world into which we are moving to ensure return of technological investment THE END