Outline
•Overview of Cyber Security
•Internet Governance –Challenges and Constraints
•Cyber Threats
•Cyber Warfare
•Cyber Crime
•Cyber Terrorism
•Cyber Espionage
•Need for a Comprehensive Cyber Security Policy
•Need for a Nodal Authority
•Need for an International convention on Cyberspace
Cyber Space
•Cyberspaceisavirtualspacewithnomass,gravityor
boundaries.Itistheinterconnectedspacebetweennetworksof
computersystems.BitsandBytes-Zeroesandonesareusedto
defineCyberspace.
•Itisadynamicenvironmentwherethesevalueschange
continuously.
Importance of CyberSecurity
•The Internet allows an attacker to work from anywhere on the
planet.
•Risks caused by poor security knowledge and practice:
•Identity Theft
•Monetary Theft
•Legal Ramifications (for yourself and your organization)
•Sanctions or termination if policies are not followed
•According to the SANS Institute, the top vectors for vulnerabilities
available to a cyber criminal are:
•Web Browser
•IM Clients
•Web Applications
•Excessive UserRights
Classification of Cyber Crimes
•The cyber criminal could be internal or external to the organization
facing the cyber attack.
1.Insider Attack
2.Outsider Attack
•Ahackerthatisnotnecessarily
maliciousbutblursthelinebetween
blackandhathacker.
•Theyusetheirtalentsinthesameas
whitehathackersbutwithoutthe
permissionoftheircompany.
•Once they discover weaknesses they
willoffertosellthembacktothe
hacked party..
45
Hacker Cracker
Peoplewhogainunauthorized
accesstocomputersystemfor
knowledgeortodiscover
Someone who breaks into
computers , often does harmful
thingssuchasstealcredentials.
Doesnotworkagainstlawand
does not damage data
intentionally
Workagainstthelawand
damagesdataintentionally
ReferredasWhiteHats ReferredasBlackHats
Havegoodethics,improveand
makesystemadvance.
Havepoorethics,shutdownor
Harmsystems 46
What cause vulnerabilities
•Vulnerabilitiescanarisefromawidevarietyofsources.
•Misconfigurations,bugs,orunauthorizedusearemorelikelyincomplexsystems.
•Consistency−Attackersmaybeabletopredictandexploitflawsinwidelyused
code,operatingsystems,hardware,andsoftware.
•Connectivitymakesgadgetsmoresusceptibletosecurityflaws.
•Weakorrepeatedpasswordsincreasetheriskofmultipledatabreaches.
•OperatingSystemFlaws−Operatingsystemsarenotimmunetohavingproblems.
Operatingsystemsthataren'tproperlyprotectedbydesignare
vulnerabletovirusesandmalwaresincetheyprovideusers
unrestrictedaccess.
•Spywareandadware-thatmaybeautomaticallyplacedoncomputerscanbefound
allovertheinternet.
•BugsinSoftwareDevelopment-Itisnotuncommonforprogrammersto
inadvertentlyintroduceasecurityflaw.
•Uncheckeduserinput−Ifapieceofsoftwareorawebsitetreatsalluserinputas
trustworthy,itmayexecuteanaccidentalSQLinjection.
•Mostcompaniesfacetheirgreatestsecurityriskfromtheiremployees,making
socialengineeringatopconcern.Thissuggeststhatpeoplecanbeamajor
sourceofdanger.
What cause vulnerabilities
Hardware Vulnerability
•A hardware vulnerability is a weakness which can used to attack the system
hardware through physically or remotely.
•Forexamples:
1.Oldversionofsystemsordevices
2.Unprotectedstorage
3.Unencrypteddevices,etc.
Software Vulnerability
•A software error happen in development or configuration such as the execution
of it can violate the security policy.
•For examples:
1.Lack of input validation
2.Unverified uploads
3.Cross-site scripting
4.Unencrypted data, etc.
Network Vulnerability
•A weakness happen in network which can be hardware or software.
•For examples:
1.Unprotected communication
2.Malware or malicious software (e.g.: Viruses, Keyloggers, Worms,
etc)
3.Social engineering attacks
4.Misconfigured firewalls
Procedural Vulnerability
•A weakness happen in an organization operational methods.
•For examples:
1.Password procedure –Password should follow the standard password
policy.
2.Trainingprocedure–Employeesmustknowwhichactionsshouldbetaken
andwhattodotohandlethesecurity.Employeesmustneverbeaskedfor
usercredentialsonline.Maketheemployeesknowsocialengineeringand
phishingthreats.
•UseaVirtualPrivateNetwork
VPN connection can mask IP address by bouncing it through a private
server.Andencryptwebdata.
•Forceencryption
Accessonly HTTPSwebsites
•Usestrongroutercredentials
Tochangedefaultsecurity credentialofrouters.
97
Cyber Espionage
•Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry
out against a business or government entity.
•The goal of cyber espionage, also referred to as cyber spying, is to provide attackers
with information that gives them advantages over rival companies or governments.
•Cyberspiestry to gain access to the following resources:
1.Data and activities related to research and development
2.IP related to academic research, such as product specifications or designs
3.Salaries, compensation structures, and other sensitive financial and operational data of
the organization
4.Lists of clients or customers and payment methods
5.Corporate objectives, strategic plans, and marketing strategies
6.Strategies, allegiances, and communications in politics
7.Military information
Difference between Cyberwarand
Cyberespionage
•The terms cyber espionage and cyberwarfareare similar, but they are not the same.
•The biggest difference is that the primary goal of a cyberwarfareattack is to disrupt the
activities of a nation-state, while the primary goal of a cyber espionage attack is for the
attacker to remain hidden for as long as possible in order to gather maximum
intelligence.
•Even though cyber espionage and cyberwarfareare two distinct concepts, they are often
used together.
•For example, cyber espionage can be used to build intelligence that will help a nation-
state prepare for a physical or cyberwar.
Need for a Comprehensive Cyber Security Policy:
RationaleforaComprehensiveCyberSecurityPolicy:
Theincreasingfrequencyandsophisticationofcyberattackshighlightthecriticalneedfor
organizationstoestablishcomprehensivecybersecuritypolicies.
Acomprehensivepolicyensuresthatallaspectsofanorganization'sdigitalenvironmentare
adequatelyprotected,fromnetworksandsystemstodataandpersonnel.
Ithelpsmitigaterisks,maintainoperationalcontinuity,safeguardcustomertrust,andcomply
withregulatoryrequirements.
Elements of an Effective Cyber Security Policy:
ThreatAssessmentandRiskManagement:
Organizationsmustconductthoroughassessmentstoidentifypotentialcyberthreatsandvulnerabilities.
Riskmanagementinvolvesevaluatingtheimpactandlikelihoodofthreatsanddecidinghowtomitigate,
transfer,oracceptthoserisks.
Thiselementhelpsorganizationsallocateresourceseffectivelyandprioritizesecuritymeasures.
IncidentResponseandRecoveryPlans:
Incidentresponseplansoutlinethestepsanorganizationshouldtakeintheeventofacyberincident,such
asadatabreachorcyberattack.
Theseplansdetailrolesandresponsibilities,communicationstrategies,containmentprocedures,and
recoveryprocesses.
Havingawell-definedplanminimizesdamage,reducesdowntime,andhelpsanorganizationresume
normaloperationsswiftly.
Elements of an Effective Cyber Security Policy:
EmployeeTrainingandAwareness:
Employeesareoftenthefirstlineofdefenseagainstcyberthreats,buttheycanalsobevulnerabilitiesif
unawareofbestpractices.
Comprehensivepoliciesemphasizeongoingemployeetrainingandawarenessprogramstoeducatestaff
aboutsecurityrisks,phishing,safebrowsing,andsocialengineering.
Educatedemployeescontributetoastrongsecuritycultureandpreventunintentionalsecuritybreaches.
CollaborationwithLawEnforcement:.
Incasesofcybercrimesorseriousincidents,collaborationwithlawenforcementagenciesiscrucial.
Comprehensivepoliciesestablishprotocolsforworkingwithlawenforcementtogatherevidence,
prosecutecybercriminals,andrecoverstolenassets.
Suchcollaborationenhancesthelikelihoodofsuccessfulcybercrimeinvestigationsandconvictions.
Case Studies:
TheImpactofComprehensivePolicies:
Real-worldexamplesoforganizationsthathavesuccessfullyimplementedcomprehensivecyber
securitypoliciescanhighlightthebenefits.
Youcoulddiscussinstanceswherepoliciesledtoeffectivethreatdetection,timelyincident
response,andminimizeddamage.
Casestudiescanalsodemonstratethefinancialandreputationalrepercussionsoflackinga
comprehensivepolicy.
Need for an International Convention on Cyberspace:
TheGlobalNatureofCyberspace:
Cyberspacetranscendsgeographicalboundariesandconnectspeople,organizations,and
governmentsworldwide.
Digitalinteractionsoccuracrossjurisdictions,makingitchallengingtoaddresscyberthreats
solelythroughnationalregulations.
Theinterconnectednatureoftheinternetunderscorestheneedforinternationalcooperation
toensuresecurityandstability.
ChallengesinRegulatingCyberspaceInternationally:
Nationallawsandregulationsoftenstruggletoaddresscyberthreatsthatoriginateortraverse
multiplecountries.
Attributionofcyberattackscanbecomplexduetotheuseofanonymizingtechnologiesandtacticsthat
maskthetrueoriginsofattacks.
Disparitiesinlegalsystems,culturalnorms,andpoliticalinterestsamongnationshinderuniform
enforcementofcyberregulations.
Need for an International Convention on Cyberspace:
BenefitsofanInternationalConvention:
Aninternationalconventiononcyberspacewouldprovideastandardizedframeworkforaddressingcyber
threatsonaglobalscale.
Itwouldfacilitatecollaborationamongnations,leadingtoconsistentregulations,cooperativecybercrime
investigations,andsharedthreatintelligence.
Aconventioncouldenhancethepredictabilityofinternationalresponsestocyberincidentsandpromote
stabilityincyberspace.
EffortsandInitiativestowardsInternationalCybersecurityCooperation:
Variousinternationalorganizations,suchastheUnitedNations,haveinitiateddiscussionsoncyberspace
regulationsandnorms.
TheBudapestConventiononCybercrime,adoptedbytheCouncilofEurope,aimstoharmonizelawsand
facilitateinternationalcooperationincombatingcybercrime.
InitiativesliketheGlobalForumonCyberExpertise(GFCE)andtheParisCallforTrustandSecurityin
Cyberspacedemonstrateeffortstobuildconsensusamonggovernments,industry,andcivilsociety.