Information available in audio. Data Science PRESENTED BY Cyber security AWARENESS Tech reliance demands cybersecurity. 20TH MAY 2024
3 About Cyber Attack 4 Notable Impacts of Cyber Attacks 5 Types Of Cyber Attacks 7 Advice and Guidance 8 Security Checklist The increasing reliance on technology and the internet has made cybersecurity a critical concern for individuals, businesses, and governments. Agenda
Cyber Attack A set of actions by a third party to gain unauthorized access, steal data or cause damage to computers, computer networks, or other computing systems Attackers try to identify vulnerabilities in computer systems and exploit them
About Cyber Attacks Motivation Social or political cause International warfare, business competition, terrorist groups Self esteem, curiosity, accidental experiment Financial gains
Notable Impacts of Cyber Attacks Microsoft Exchange Remote Code Execution Attack in March 2021 on zero-day vulnerabilities affected 60,000 private businesses in US The WannaCry Ransomware Attack in 2017 affected 150 countries globally
Back to Agenda 1 Kaseya Ransomware Attack on a software update in July 2021 in US carried out by a Russian-based cybercrime group 2 Amazon AWS DDoS Attack in February 2020 had a global effect 3 Twitter Social Engineering Attack in July 2020. Attackers earned over $100,000.
Types of Cyber Attacks Ransomware Malware DOS & DDoS Attack Social Engineering Phishing Attack MITM{Man in the Middle)
Ransomware Attacker uses encryption to deny access to resources (especially files) and would ask for a ransom in exchange for the decryption code
Malware Attackers infect a computer system with malicious software. In most cases, the objective is to destroy, steal data or hijack a particular computer to enable further attacks
Types of Malware Worms (clone and infect computer systems) Botnet (zombies) Spyware) Adware attached to free software and browser plugins
Types of Malware Trojan (appear legitimate but carries bad data) Rootkits & Backdoors (enable remote file execution and remote control) M obile malware – Targets mobile devices via Apps or Messaging Services
DOS & DDOS ATTACK (Denial-of-Service). This attack is purely for sabotage purposes. By attacking a large number of systems multiple illegitimate service requests in order to deny users of a service
Social Engineering This attack relies heavily on human interaction and it is used in over 90% of successful attacks.
Phishing Attacks Attacker sends a message that appears to be trusted with the objective of obtaining sensitive information from a target (eg password)
MiTM (Man in the Middle) Attackers intercept data transmitted between networks, computers or users without being detected
Avice and Guidance MULTIFACTOR AUTHENTICATION – STRONG, LONG, COMPLEX PASSWORDS ENCRYPTED MESSAGING APPS DON’T SHARE ACCOUNTS KEEP DEVICES UPDATED BE AWARE OF PHISHING MAILS DON’T USE PERSONAL ACCOUNTS FOR OFFICIAL BUSINESS
Security Checklist
CYBER SECURITY WHAT HAVE YOU LEARNT? (POST TEST)
Question 1 You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?
Answer 1 No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation. Taking it off of your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it to their own machines.
Question 2 You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?
Answer 2 Do NOT click the link! Check the sender’s address and search the document for spelling/grammar mistakes. If you notice anything suspicious, the email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather than clicking any links.
Question 3 You’ve just settled into your new hotel room when you realize you need to transfer some funds from your savings account to your checking account. In order to do this, you will need to connect your laptop to the hotel’s public Wi-Fi and log in to your online bank. Should you risk it?
Answer 3 It depends. In general, it is never safe to transmit PII (Personally Identifiable Information), especially financial information, over a public network. If you find yourself in a situation where you may need to do so, first consider all your options, including using your mobile data or a VPN (Virtual Private Network) to help protect your browsing.
Question 4 You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can listen to your favorite music or podcast. However, when you check for social media updates around lunch, you find that your account has been hacked. What steps could you take to prevent your mobile device or laptop data from being compromised in the future?
Answer 4 •Turn off Wi-Fi and Bluetooth when not using them. These technologies leave you open to remote attacks. •Make sure the network is legitimate. Hackers love to create fake networks that mimic real ones, enticing unsuspecting users to log on. •Don’t connect. Though perhaps drastic, one near-certain way to circumvent the dangers of public Wi-Fi is simply to avoid using it whenever possible.
Question 5 Passwords often have complex requirements, and most online citizens will need to remember numerous different passwords to access their internet services. What is a way to help you keep track of all these different passwords?
Answer 5 •Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password. •Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password.