Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.
Size: 1.51 MB
Language: en
Added: Apr 11, 2023
Slides: 22 pages
Slide Content
INTRODUCTION Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Three main aspects we are trying to control, namely: Unauthorized Access Unauthorized Deletion Unauthorized Modification
The CIA triad- is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles. 1. Confidentiality- the protection of personal information. 2.Integrity- refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification. 3.Availability- refers to the ability of a user to access information or resources in a specified location and in the correct format.
HISTORY Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network. 1970- a number of security measures were developed, including encryption algorithms, firewalls, and access control systems. The development of the internet in the 1990s led to the creation of new security protocols, such as the Secure Sockets Layer (SSL) and Transport Layer Security (TLS), which are used to secure online communications and transactions. early 2000's- a number of high-profile cyberattacks, such as the Code Red and Nimda worms, highlighted the growing threat of cybercrime.
HISTORY Cybersecurity has been developed and advanced by a range of individuals and organizations over time. It is difficult to attribute the development of cybersecurity to any one person or group, as it has evolved as a response to the changing threat landscape and the growth of computer networks. OTHER CONTRIBUTORS: -Whitfield Diffie -Martin Hellman -Robert moris
HISTORY Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices and the various devices that constitute the ‘Internet of things’. 1970s: ARAPNET and the Creeper Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the programme Reaper, which chased and deleted Creeper.
HISTORY 1980s: Birth of the commercial antivirus 1987 was the birth year of commercial antivirus although there were competing claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of the NOD antivirus in the same year and in the US, John McAfee founded McAfee and released VirusScan. 1990s: The world goes online With the internet becoming available to the public, more people began putting their personal information online. Organised crime entities saw this as a potential source of revenue and started to steal data from people and governments via the web. By the middle of the 1990s, network security threats had increased exponentially and firewalls and antivirus programmes had to be produced on a mass basis to protect the public.
HISTORY 2000s: Threats diversify and multiply In the early 2000s crime organisations started to heavily fund professional cyberattacks and governments began to clamp down on the criminality of hacking, giving much more serious sentences to those culpable. Information security continued to advance as the internet grew as well but, unfortunately, so did viruses. 2021: The next generation The cybersecurity industry is continuing to grow at the speed of light. The global cybersecurity market size is forecast to grow to $345.4bn by 2026 according to Statista. Ransomware is one of the most common threats to any organisation's data security and is forecast to continue to increase.
DEFINITION Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. 5 types of cyber security: Critical infrastructure cyber security Network security Cloud security IoT (Internet of Things) security Application security
DEFINITION 1. Critical infrastructure cyber security -Critical infrastructure organisations are often more vulnerable to attack than others because SCADA (supervisory control and data acquisition) systems often rely on older software. 2. Network security -Network security involves addressing vulnerabilities affecting your operating systems and network architecture, including servers and hosts, firewalls and wireless access points, and network protocols. 3. Cloud security -Cloud security is concerned with securing data, applications, and infrastructure in the Cloud.
DEFINITION 4. IoT (Internet of Things) security -IoT security involves securing smart devices and networks connected to the IoT. IoT devices include things that connect to the Internet without human intervention, such as smart fire alarms, lights, thermostats, and other appliances. 5. Application security -Application security involves addressing vulnerabilities resulting from insecure development processes in designing, coding, and publishing software or a website.
EXAMPLES: LATEST TRENDS Examples of Network Security includes: Antivirus and Antispyware programs, Firewall that block unauthorized access to a network and VPNs (Virtual Private Networks) used for secure
EXAMPLES: LATEST TRENDS Latest Trends: Rise of Automotive Hacking Potential of Artificial Intelligence (AI) Mobile is the New Target Cloud is Also Potentially Vulnerable Data Breaches: Prime target IoT with 5G Network: The New Era of Technology and Risks Automation and Integration Targeted Ransomware State-Sponsored Cyber Warfare
NEWS RELATED ARTICLES Kimsuky Updates its Tactics to Target South Korean Experts Threat Actors (March 24, 2023) Cyware Alerts - Hacker News Black Magic APT Targets Ukraine with CommonMagic and PowerMagic Breaches and Incidents (March 24, 2023) Cyware Alerts - Hacker News
NEWS RELATED ARTICLES Hacktivists Increasingly Claim to Target and Impact OT NETWORK SECURITYCisco Patches High-Severity Vulnerabilities in IOS Software Hackers inject credit card stealers into payment processing modules
ADVANTAGES 1. Protects sensitive personal information -Cyber Security can prevent such attacks in the first place as it is a proactive approach. 2. Protect private and Business data -Cyber Security is a complete security package that can protect businesses and organisations from various threats. 3. Improves productivity -An effective Cyber Security strategy can give an early warning on when to expect attacks and give suggestions on how to respond.
ADVANTAGES 4. Provides a business continuity plan -Cyber Security uses Artificial Intelligence (AI) and machine learning to create a business continuity plan. 5. Improve the overall security of an organisation -Cyber Security is a one-stop solution for all security issues for businesses and organisations.
DISADVANTAGES 1. Regular Update -Businesses need to regularly update their software, hardware, and security strategy to be one step ahead of the attackers. 2. Needs Continuous learning -The threats are new and never-ending, and so is the learning process to keep up with the threats. 3. Complex to Setup -Setting up security architectures and tools like a firewall can be complicated and could take a long time.
DISADVANTAGES 4. Slower Systems -Over time, Systems tend to become sluggish as running these security applications takes up a lot of resources. 5. Constant Monitoring -An effective Cyber Security strategy involves continuous monitoring of new threats. 6. Talent Shortage -Cyber Security is vast, and there's a significant talent shortage in this field. 7. Expensive -Implementing Cyber Security can be very expensive as it is an ongoing process that requires consistent learning and spending.
SUMMARY Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external facing DNS server or an internal firewall, which in turn effects the data and infrastructure within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances and network that is used for communication.
CONCLUSION In conclusion, information is a critical part of any organization and investing on the right service provider keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and customized cyber security-driven business model includes disaster-recovery capabilities and secures data and the underlying infrastructure of the organization, thus building a safe barrier for the information even before it is attacked and saving the organization from a loss of billions of dollars that could result from the security threat.