Cyber Myths vs reality :- Way Forward Practical Approach
nasirsyed
27 views
41 slides
Aug 18, 2024
Slide 1 of 41
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
About This Presentation
Cyber Security Myth or Reality
Size: 23.39 MB
Language: en
Added: Aug 18, 2024
Slides: 41 pages
Slide Content
Cyber Security Myths Vs Reality Dr. Syed Nasir Mehmood Shah [email protected]
Computer Security “Protection afforded to an automated information system in order to attain the applicable objectives of preserving the confidentiality, integrity and availability of information system resources ( includes hardware, software, firmware, information/data , and telecommunications ).” (NIST Computer Security Handbook) 3
Cyber Security ?? P ractice of protecting critical systems and sensitive information from digital attacks. https://www.ibm.com/topics/cybersecurity
Goals of Information Security 5
Security Model Adapted from Stallings and Brown
Pakistan Scenarios NADRA Pakistan Election Commission of Pakistan Telco Industries of Pakistan Safe City Project Electronics Industry IT industry National Health System
Cybercriminals are outsiders . Risks are well-known My industry is safe Attack vectors are contained
15 Myths & Realities
1) Myth: Our passwords are strong Reality: Strong passwords are only the start. You need two-factor authentication and data monitoring https://www.stealthlabs.com/blog/infographic-top-15-cybersecurity-myths-vs-reality/
2) Myth: Cybercriminals don’t target small businesses. Reality: Small businesses lack advanced security solutions, making them a softer target for cybercriminals
3) Myth: We are unlikely to experience a cyberattack Reality: Any business with sensitive information is highly likely to witness a cyberattack at some stage
4) Myth: Anti-virus/anti-malware software is enough Reality: Software won’t be able to detect/prevent all types of cyber attacks
5) Myth: Cyber threats are only external Reality: Insider threats are equally dangerous and need equal attention as external threats
6) Myth: IT department is responsible for cybersecurity Reality: It is the responsibility of every employee to keep the organization cyber safe
7) Myth: Password protected Wi-Fi networks are secure Reality: All public Wi-Fi networks can be compromised, even with a password
8) Myth: You’ll know immediately if your system is compromised Reality: It can take months or even years to realize that your system has been compromised
9) Myths: BYOD (Bring your own device) is secure and safe Reality: All personal devices, including smartphones, laptops, and wearables, can put a company’s network at risk
10) Myth: We have achieved complete cybersecurity Reality: You must continuously adopt new cybersecurity strategies as new threats emerge
11) Myth: Sophisticated security tools keep your business secure Reality: Security tools should be appropriately configured, monitored, and integrated with overall security operations
12) Myth: Regular penetration tests are enough Reality: Penetrations tests work only when the discovered vulnerabilities are rectified in time
13) Myth: Compliance equates to a robust security strategy Reality: Merely complying with regulations does not mean you have a robust security strategy
14) Myth: A third-party security provider will take care of security Reality: Despite partnering with a security provider, you have a legal and ethical responsibility to secure critical assets
15) Myth: We have never experienced a breach, so our security is strong Reality: New, sophisticated cyberattacks evolve daily, so be prepared always
Som e Case Studies
PEGASUS
“Developed by Israeli Cyber Arms Company firm , NSO Group” PEGASUS Pegasus is designed to infiltrate devices running Android, Blackberry, iOS and Symbian operating systems and turn them into surveillance devices . Pegasus can theoretically harvest any data from the device and transmit it back to the attacker. Not dependent on single entry point for destruction. Infection entry point include clicking links, the Photos app, the Apple Music app, and iMessage. Some of the exploits Pegasus uses are zero-click — that is, they can run without any interaction from the victim.
PEGASUS run arbitrary code extract contacts call logs, messages , photos, web browsing history, settings, gather information from apps including but not limited to iMessage , Gmail, Viber, Facebook, WhatsApp, Telegram, and Skype . Once installed, Pegasus is able to Myth Buster IOS / Blackberry is more secure. It is safe to keep sensitive data on my phone, because I’ve locked it.
Demo
Myth Buster Open Source software is more secure. Open Clinic The open source platform is used by a number of clinics and hospitals to manage lab and pharmacy workflows, manage administrative, clinical, and financial needs, and a range of in-patient and out-patient tasks. A hacker can access patient protected health information Open-source health records management software No version of Open Clinic available that does not suffer from the identified vulnerabilities
Solar Wind
Solar Wind
Nobelium: Hackers who Compromised Solar Wind Supply chain attack was used to insert malicious code the Orion system The third-party software, in this case the SolarWinds Orion Platform , creates a backdoor through which hackers can access and impersonate users and accounts of victim organizations. The malware could also access system files and blend in with legitimate SolarWinds activity without detection, even by antivirus software. Myth Buster Latest Patch/update would always increase the existing level of security. SolarWinds was a perfect target for this kind of supply chain attack b ecause their Orion software is used by many multinational companies and government agencies , all the hackers had to do was install the malicious code into a new batch of software distributed by SolarWinds as an update or patch.
Zero trust security strategy
A Zero Trust Strategy assumes compromise and sets up controls to validate every user, device and connection into the business for authenticity and purpose.