SlideShare uma empresa Scribd logo
1 de 51
Introduction to Cyber Security
Adri Jovin J J, M.Tech., Ph.D., B.G.L.,
Assistant Professor (Sl. Gr.), Department of Information Technology
Sri Ramakrishna Institute of Technology
Attack Trends
Introduction to Cybersecurity 2
Image source: 2016s1-160a Cyber Security - IoT and CAN Bus Security, University of Adelaide
Why Cyber Security?
13-07-2020
If you know the enemy, and know yourself, you
need not fear the result of 100 battles.
If you know yourself, but not the enemy, for every
victory gained, you'll also suffer defeat.
If you know neither the enemy nor yourself, you will
succumb in every battle.
-Sun Tzu in Art of War
CIA Model (CIA Triad) – The base of Information Security
13-07-2020 Introduction to Cybersecurity 3
Network
Security
Availability
CIA magnified
• Confidentiality
• Unauthorized access
• Disclosure
• Integrity
• Unauthorized modification
• Use
• Availability
• Disruption
• Destruction
13-07-2020 Introduction to Cybersecurity 4
Cyber Security
Privacy
Physical
Security
Contingency
planning &
Disaster
Recovery
Operational
Security
Personnel
Security
What is Cyber Security?
• Cyber security is a great umbrella term referring to protecting the confidentiality, integrity, and
availability of computing devices and networks, hardware, software, and most importantly,
data and information.
• Cyber security involves times when data or information is in transit, being processed, and at
rest.
• Cyber security is achieved through procedures, products, and people.
13-07-2020 Introduction to Cybersecurity 5
Key Terms
• Asset
• Threat
• Vulnerability
• Exploit
• Risk
• Attack
• Mitigation/Compensation Control
13-07-2020 Introduction to Cybersecurity 6
Asset
• Anything that need to be protected
• Information - Banking information, medical records
• Computer Systems – Defense systems, Critical Infrastructure
• Services – Websites, life safety systems
13-07-2020 Introduction to Cybersecurity 7
Threat
• A potential for violation of security, which exists when there is a circumstance, capability,
action, or event that could breach security and cause harm. That is, a threat is a possible
danger that might exploit a vulnerability.
• Some one wanting to do harm
• An insecure service
• A threat agent is anyone or anything that wants to do harm or harms an asset
• Hackers
• Hacktivists
13-07-2020 Introduction to Cybersecurity 8
Vulnerability
• A flaw or weakness in the design or implementation of an asset which could be utilized by a
threat or threat agent
• Incorrect configuration
• Open ports
• Poor backup strategy
• Poor coding
13-07-2020 Introduction to Cybersecurity 9
Exploit
• Any software or tools that are intentionally used to take advantage of a vulnerability on an
asset
• Metasploit
• Ophcrack
13-07-2020 Introduction to Cybersecurity 10
Risk
• Probability that a threat will take advantage of a vulnerability on an asset and cause harm
• Risk of losing data
• Risk of a personal photo collection
• Risk of banking data
13-07-2020 Introduction to Cybersecurity 11
Attack
• An assault on system security that derives from an intelligent threat; that is, an intelligent act
that is a deliberate attempt (especially in the sense of a method or technique) to evade
security services and violate the security policy of a system.
• Denial of service
• Data breach
• Physical destruction
13-07-2020 Introduction to Cybersecurity 12
Mitigation/Compensating Control
• Mitigation Control: Any tool, service or system that reduces the risk of attack
• Backup strategies
• Compensating Control: Any tool, service or system that takes lowers the risk of attack on an
asset by intentionally getting in the way of the threat
• Firewall
13-07-2020 Introduction to Cybersecurity 13
CIA Revisited
• Confidentiality
Preserving authorized restrictions on information access and disclosure, including means for
protecting personal privacy and proprietary information
Source: FIPS 199
• Industries try to keep information secret
• Intellectual Property (IP)
• Financial Information
• Government Secrets
• Student Data
• Day-to-day usage: Credit Cards, Website encryption, VPNs, Bitlocker
13-07-2020 Introduction to Cybersecurity 14
CIA Revisited
• Integrity
Guarding against improper information modification or destruction, and includes ensuring
information non-repudiation and authenticity
Source: FIPS 199
• Helps to verify data
• Credit card numbers
• IMEI numbers
• Aadhar
• Day-to-day usage: All packets in a network, Digital Signatures, Hashes
13-07-2020 Introduction to Cybersecurity 15
CIA Revisited
• Availability
Ensuring timely and reliable access to and use of information
Source: FIPS 199
• Day-to-day usage: RAID, Server clustering, load-balancing
• Why?
• October 21, 2016 – Mass denial of service launched against DynDNS (Tens of millions of
addresses coordinated to attack the key infrastructure on the internet)
13-07-2020 Introduction to Cybersecurity 16
NIST Cybersecurity Framework
Identify
Protect
DetectRespond
Recover
13-07-2020 Introduction to Cybersecurity 17
Identify
• Inventory
• Access Control
• Background checks
• Individual user account
• Policy and Procedure
13-07-2020 Introduction to Cybersecurity 18
Protect
• Limit employee access
• Install surge protectors and UPS
• Update OS and applications regularly
• Install and activate firewalls
• Secure wireless access points
• Setup web and email filters
• Encrypt sensitive information
• Train employees
13-07-2020 Introduction to Cybersecurity 19
Detect
• Install and update anti-virus, anti-spyware etc.
• Maintain and monitor logs
• Train your employees
13-07-2020 Introduction to Cybersecurity 20
Respond
• Develop a plan for disasters and security incidents
• Roles and responsibilities
• Whom to call
• What type of activity constitutes a security incident
13-07-2020 Introduction to Cybersecurity 21
Recover
• Maintain full backups
• Test your backups
• Cyber Insurance
13-07-2020 Introduction to Cybersecurity 22
Some better practices
• Train your employee
• Phishing
• Social Media
• Clean Machines
• Update security software, browsers, OS
• Use firewalls
• Mobile Devices
• Passwords
• Avoid public networks
• Report if lost or stolen
13-07-2020 Introduction to Cybersecurity 23
Some better practices (Contd…)
• Maintain Backups
• Automatic
• Weekly
• Store off-site or on cloud
• User account for each employee
• Strong passwords
• Admin privileges limited
• Secure your Wi-fi
• Encrypt
• Do not broadcast network name
13-07-2020 Introduction to Cybersecurity 24
Some better practices (Contd…)
• Payment Cards
• Use trusted and validated tools
• Check https
• Limit Access
• No one has access to all
• Role based system
• Software installation must require permission
• Strong passwords
• Try changing every 3 months
• Have at least 12 characters
• Multifactor authentication
13-07-2020 Introduction to Cybersecurity 25
CASE STUDIES
13-07-2020 Introduction to Cybersecurity 26
Heartbleed Bug
• Vulnerability in OpenSSL cryptographic software library
• Allows stealing of information by the SSL/TLS encryption
• SSL/TLS- security and privacy over the internet for most applications
• Discovered by Riku, Antti and Matti at Codenomicon and Neel Mehta
of Google Security and reported on April, 2014
• Allows attackers to
 eavesdrop on communications
 steal data directly from the services and users and
 impersonate services and users
Introduction to Cybersecurity 27
} Release of message content
Masquerading
13-07-2020
Why heartbleed?
Bug discovered in the heartbeat extension of TLS
Exploitation leaked contents from server to client and from client to server
Left a large amount of private keys and other secrets exposed to the internet
Is the protocol specification wrong???
No….problem with implementation…a programming mistake
Introduction to Cybersecurity 2813-07-2020
What’s wrong with implementation???
Heartbeat message structure:
Introduction to Cybersecurity 29
struct
{
HeartbeatMessageType type;
uint16 payload_length;
opaque payload[HeartbeatMessage.payload_length];
opaque padding[padding_length];
} HeartbeatMessage;
/* Read type and payload length first */
hbtype = *p++;
n2s(p, payload);
pl = p;
Incoming Heartbeat message:
/* Enter response type, length and copy payload */
*bp++ = TLS1_HB_RESPONSE;
s2n(payload, bp);
memcpy(bp, pl, payload);
Response Heartbeat message:
hbtype = *p++;
n2s(p, payload);
if (1 + 2 + payload + 16 > s->s3->rrec.length)
return 0; /* silently discard per RFC 6520 sec. 4 */
pl = p;
Fixed Incoming Heartbeat message:
13-07-2020
What is leaked?
1. Primary key material
2. Secondary key material
3. Protected content
4. Collateral
Introduction to Cybersecurity 3013-07-2020
Leaked primary key material and recovery
Leakage
• Encryption keys
• Leaked key allows attacker to decrypt any past or future traffic to protected services and impersonate
Recovery
• Requires vulnerability patch
• Revocation of compromised keys
• Reissuing/redistribution of new keys
Introduction to Cybersecurity 3113-07-2020
Leaked secondary key material and recovery
Leakage
• User credentials used in vulnerable services
Recovery
• Restore trust
• Users can change their password and possible encryption keys
• Session keys and session cookies should be invalidated
Introduction to Cybersecurity 3213-07-2020
Leaked protected content and recovery
Leakage
• Actual content handled by the vulnerable service (e.g.)personal/financial details
Recovery
• Provider should inform users of the leakage
• Restore trust to the primary and secondary key material
Introduction to Cybersecurity 3313-07-2020
Leaked collateral and recovery
Leakage
• Other details exposed to the attacker in the leaked memory content
• Technical details such as memory addresses and security measures such as canaries
Recovery
• Can be fixed using patch
Introduction to Cybersecurity 3413-07-2020
Vulnerability of OpenSSL
• OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable
• OpenSSL 1.0.1g is NOT vulnerable
• OpenSSL 1.0.0 branch is NOT vulnerable
• OpenSSL 0.9.8 branch is NOT vulnerable
Introduction to Cybersecurity 3513-07-2020
Vulnerable Operating Systems
• Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4
• Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11
• CentOS 6.5, OpenSSL 1.0.1e-15
• Fedora 18, OpenSSL 1.0.1e-4
• OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012)
• FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013
• NetBSD 5.0.2 (OpenSSL 1.0.1e)
• OpenSUSE 12.2 (OpenSSL 1.0.1c)
Introduction to Cybersecurity 3613-07-2020
Non-vulnerable Operating Systems
• Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14
• SUSE Linux Enterprise Server
• FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013
• FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013
• FreeBSD 10.0p1 - OpenSSL 1.0.1g (At 8 Apr 18:27:46 2014 UTC)
• FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC)
Introduction to Cybersecurity 3713-07-2020
Zoom
Introduction to Cybersecurity 38
• Cloud-based Video Conferencing Service
• Founded: 2011
• Founder: Eric Yuan
13-07-2020
Privacy issues – The timeline
March 26, 2020
• Investigation by Motherboard revealed that Zoom App (iOS) was sending user analytics data to Facebook
March 27, 2020
• Zoom removed Facebook data collection features
March 30, 2020
• Investigation by Intercept found Zoom call data was sent back to the company without end-to-end encryption
• Two more bugs discovered: (i) Malicious actor can gain control over user microphone or webcam
(ii) Vulnerabilities that allow Zoom to gain root access on MacOS desktop
• Zoom violated California’s new data protection law
• Zoombombing – led FBI to issue public warning about Zoom security vulnerabilities
Introduction to Cybersecurity 3913-07-2020
The timeline…
April 1, 2020
• SpaceX bans Zoom
• Motherboard reported the leakage of data such as email addresses and photos to strangers through a feature which
operated as company directory
April 2, 2020
• Automated tool, zWarDial was able to find 100 Zoom meeting IDs, which were left unprotected by password, in an
hour
• New York Times reported that the data-mining feature of Zoom had secret access to Linkedin profile data of other
users
Introduction to Cybersecurity 4013-07-2020
The timeline…
April 3, 2020
• Investigation by The Washington Post found thousands of recordings of Zoom video calls left unprotected and viewable in
open web
• Plans for Zoomraids by attackers
April 5, 2020
• Some video calls were mistakenly routed through two Chinese Whitelisted servers
April 6, 2020
• New York’s Department of Education urged schools to switch to Microsoft Teams
• Zoom accounts found on the dark web (352 accounts)
• Third class action lawsuit filed against Zoom in California (3 issues: Facebook data-sharing, incomplete end-to-end encryption,
vulnerability which allows actors to access webcams)
Introduction to Cybersecurity 4113-07-2020
The timeline…
April 7, 2020
• Taiwan bans Zoom from government use
April 8, 2020
• Fourth lawsuit for falsely asserting that the service was end-to-end encrypted
• Google bans Zoom
• Sales of Zero-day exploits of Zoom by hackers for USD 5,000 TO USD 30,000, reported by Motherboard
• New update removing meeting ID from title bar for ongoing meetings to slow attackers who circulate screenshots
• AI Zoombombing
Introduction to Cybersecurity 4213-07-2020
The timeline…
April 9, 2020
• US Senate informs members not to use Zoom
• Singapore teachers banned from using Zoom
• German Ministry of Foreign Affairs in a circular told employees to stop using Zoom due to security concerns
April 10, 2020
• Pentagon restricts Zoom usage
April 13, 2020
• Cyble discovered that over 500,000 Zoom accounts are being sold on the dark web and hacker forums
• Zoom users advised to change their passwords and to check the data breach notification site https://haveibeenpwned.com/
Introduction to Cybersecurity 4313-07-2020
The timeline…
April 14, 2020
• Lawsuit against Facebook and Linkedin for eavesdropping on Zoom users’ personal data
• Zoom introduces new privacy option for paid users
April 15, 2020
• Two critical exploits, one for Windows and one for MacOS that could allow someone to spy Zoom calls for sale in underground
market for USD 500000
April 16, 2020
• Security researcher discovered two new crucial privacy vulnerabilities in Zoom
i. found a way to access and download a company's videos previously recorded to the cloud through an unsecured link
ii. discovered that previously recorded user videos may live on in the cloud for hours, even after being deleted by the user
• Zoom hired Luta security to revamp its bug bounty program allowing white hat hackers to identify security flaws
Introduction to Cybersecurity 4413-07-2020
Security and Privacy implications
Three basic problems
a. Bad privacy practices
b. Bad security practices
c. Bad user configurations
Introduction to Cybersecurity 4513-07-2020
Privacy issues
• Spies user for personal profits
• Collects data including user name, physical address, email address, phone number, job information, Facebook profile
information, computer or phone specs, IP address, and any other information you create or upload
• Uses data for profit against your interest
• On March 29, 2020, Zoom rewrote its privacy policy as
“We do not sell your personal data. Whether you are a business or a school or an individual user, we do not sell your data. ….. We do not use data we obtain from your use of
our services, including your meetings, for any advertising. We do use data we obtain from you when you visit our marketing websites, such as zoom.us and zoom.com. You
have control over your own cookie settings when visiting our marketing websites.”
Introduction to Cybersecurity 4613-07-2020
Security issues
• Last year, a researcher discovered that a vulnerability in the Mac Zoom client allowed any malicious website to enable
the camera without permission.
• Zoom designed its service to bypass browser security settings and remotely enable a user's web camera without the
user's knowledge or consent.
• Zoom patched this vulnerability last year.
• It only provides link(not end-to-end) encryption, which means everything is unencrypted on the company's servers
• Uses AES-128…ECB [Schneier quotes this as “there is no one at the company who knows anything about
cryptography”]
Introduction to Cybersecurity 4713-07-2020
Bad User Configuration
• If the meeting is not configured appropriately, it open to all sort of mischief.
• A common one: Zoombombing
• Even without screen sharing, people are logging in to random Zoom meetings and disrupting them
• Meeting ID not long enough to prevent someone from randomly trying them
“Instead of making the meeting IDs longer or more complicated -- which it should have done -- it enabled meeting passwords by default. Of
course most of us don't use passwords, and there are now automatic tools for finding Zoom meetings”
-Checkpoint Research
Introduction to Cybersecurity 4813-07-2020
Some guidelines
If usage of Zoom is unavoidable….
• Do not share meeting ID more that how much you have to
• Use password in addition to meeting ID
• Use waiting room if you can
• Pay attention to the permissions granted to users
• Advisory provided by Ministry of Home Affairs, Government of India
Introduction to Cybersecurity 4913-07-2020
References
• Bishop, M. A. (2002). The art and science of computer security.
• Vaudenay, S. (2006). A classical introduction to cryptography: Applications for communications
security. Springer Science & Business Media.
• Internet Security Glossary (RFC 2828), Internet Society
• Radack, S. M. (2004). Federal Information Processing Standard (FIPS) 199, standards for security.
• The Heartbleed Bug “https://heartbleed.com/”
• What is the Heartbleed bug, how does it work and how was it fixed?
“https://www.csoonline.com/article/3223203/what-is-the-heartbleed-bug-how-does-it-work-and-
how-was-it-fixed.html”
• Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug
“https://www.theregister.co.uk/2014/04/09/heartbleed_explained/”
Introduction to Cybersecurity 5013-07-2020
• Zoom: Two new security exploits uncovered “https://www.cnet.com/news/zoom-every-
security-issue-uncovered-in-the-video-chat-app/”
• Security and Privacy Implications of Zoom
“https://www.schneier.com/blog/archives/2020/04/security_and_pr_1.html”
• More on Zoom and privacy “https://blogs.harvard.edu/doc/2020/03/28/more-zoom/”
• EPIC Files Complaint with FTC about Zoom “https://epic.org/2019/07/epic-files-complaint-
with-ftc-.html”
• Zoom-Zoom: We Are Watching You “https://research.checkpoint.com/2020/zoom-zoom-we-
are-watching-you/”
13-07-2020 Introduction to Cybersecurity 51

Mais conteúdo relacionado

Mais procurados

Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 

Semelhante a Introduction to Cybersecurity

Security Operations Center SOC OCTUBRE 2023
Security Operations Center SOC OCTUBRE 2023Security Operations Center SOC OCTUBRE 2023
Security Operations Center SOC OCTUBRE 2023DavidOrjedaSinche1
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDebra Baker, CISSP CSSP
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveAvinantaTarigan
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik SecurityRofiq Fauzi
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Brian Bissett
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture Vrince Vimal
 

Semelhante a Introduction to Cybersecurity (20)

DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
Security Operations Center SOC OCTUBRE 2023
Security Operations Center SOC OCTUBRE 2023Security Operations Center SOC OCTUBRE 2023
Security Operations Center SOC OCTUBRE 2023
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Cybersecurity Risk from User Perspective
Cybersecurity Risk from User PerspectiveCybersecurity Risk from User Perspective
Cybersecurity Risk from User Perspective
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik Security
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 

Mais de Adri Jovin

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsAdri Jovin
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER DiagramsAdri Jovin
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management SystemsAdri Jovin
 
Neural Networks
Neural NetworksNeural Networks
Neural NetworksAdri Jovin
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic AlgorithmAdri Jovin
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logicAdri Jovin
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksAdri Jovin
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft ComputingAdri Jovin
 
Creative Commons
Creative CommonsCreative Commons
Creative CommonsAdri Jovin
 
Image based security
Image based securityImage based security
Image based securityAdri Jovin
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain TechnologiesAdri Jovin
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdri Jovin
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case studyAdri Jovin
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyAdri Jovin
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyAdri Jovin
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal CryptosystemAdri Jovin
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAdri Jovin
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureAdri Jovin
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of CryptographyAdri Jovin
 

Mais de Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Image based security
Image based securityImage based security
Image based security
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Introduction to Cybersecurity

  • 1. Introduction to Cyber Security Adri Jovin J J, M.Tech., Ph.D., B.G.L., Assistant Professor (Sl. Gr.), Department of Information Technology Sri Ramakrishna Institute of Technology
  • 2. Attack Trends Introduction to Cybersecurity 2 Image source: 2016s1-160a Cyber Security - IoT and CAN Bus Security, University of Adelaide Why Cyber Security? 13-07-2020 If you know the enemy, and know yourself, you need not fear the result of 100 battles. If you know yourself, but not the enemy, for every victory gained, you'll also suffer defeat. If you know neither the enemy nor yourself, you will succumb in every battle. -Sun Tzu in Art of War
  • 3. CIA Model (CIA Triad) – The base of Information Security 13-07-2020 Introduction to Cybersecurity 3 Network Security Availability
  • 4. CIA magnified • Confidentiality • Unauthorized access • Disclosure • Integrity • Unauthorized modification • Use • Availability • Disruption • Destruction 13-07-2020 Introduction to Cybersecurity 4 Cyber Security Privacy Physical Security Contingency planning & Disaster Recovery Operational Security Personnel Security
  • 5. What is Cyber Security? • Cyber security is a great umbrella term referring to protecting the confidentiality, integrity, and availability of computing devices and networks, hardware, software, and most importantly, data and information. • Cyber security involves times when data or information is in transit, being processed, and at rest. • Cyber security is achieved through procedures, products, and people. 13-07-2020 Introduction to Cybersecurity 5
  • 6. Key Terms • Asset • Threat • Vulnerability • Exploit • Risk • Attack • Mitigation/Compensation Control 13-07-2020 Introduction to Cybersecurity 6
  • 7. Asset • Anything that need to be protected • Information - Banking information, medical records • Computer Systems – Defense systems, Critical Infrastructure • Services – Websites, life safety systems 13-07-2020 Introduction to Cybersecurity 7
  • 8. Threat • A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability. • Some one wanting to do harm • An insecure service • A threat agent is anyone or anything that wants to do harm or harms an asset • Hackers • Hacktivists 13-07-2020 Introduction to Cybersecurity 8
  • 9. Vulnerability • A flaw or weakness in the design or implementation of an asset which could be utilized by a threat or threat agent • Incorrect configuration • Open ports • Poor backup strategy • Poor coding 13-07-2020 Introduction to Cybersecurity 9
  • 10. Exploit • Any software or tools that are intentionally used to take advantage of a vulnerability on an asset • Metasploit • Ophcrack 13-07-2020 Introduction to Cybersecurity 10
  • 11. Risk • Probability that a threat will take advantage of a vulnerability on an asset and cause harm • Risk of losing data • Risk of a personal photo collection • Risk of banking data 13-07-2020 Introduction to Cybersecurity 11
  • 12. Attack • An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. • Denial of service • Data breach • Physical destruction 13-07-2020 Introduction to Cybersecurity 12
  • 13. Mitigation/Compensating Control • Mitigation Control: Any tool, service or system that reduces the risk of attack • Backup strategies • Compensating Control: Any tool, service or system that takes lowers the risk of attack on an asset by intentionally getting in the way of the threat • Firewall 13-07-2020 Introduction to Cybersecurity 13
  • 14. CIA Revisited • Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information Source: FIPS 199 • Industries try to keep information secret • Intellectual Property (IP) • Financial Information • Government Secrets • Student Data • Day-to-day usage: Credit Cards, Website encryption, VPNs, Bitlocker 13-07-2020 Introduction to Cybersecurity 14
  • 15. CIA Revisited • Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity Source: FIPS 199 • Helps to verify data • Credit card numbers • IMEI numbers • Aadhar • Day-to-day usage: All packets in a network, Digital Signatures, Hashes 13-07-2020 Introduction to Cybersecurity 15
  • 16. CIA Revisited • Availability Ensuring timely and reliable access to and use of information Source: FIPS 199 • Day-to-day usage: RAID, Server clustering, load-balancing • Why? • October 21, 2016 – Mass denial of service launched against DynDNS (Tens of millions of addresses coordinated to attack the key infrastructure on the internet) 13-07-2020 Introduction to Cybersecurity 16
  • 18. Identify • Inventory • Access Control • Background checks • Individual user account • Policy and Procedure 13-07-2020 Introduction to Cybersecurity 18
  • 19. Protect • Limit employee access • Install surge protectors and UPS • Update OS and applications regularly • Install and activate firewalls • Secure wireless access points • Setup web and email filters • Encrypt sensitive information • Train employees 13-07-2020 Introduction to Cybersecurity 19
  • 20. Detect • Install and update anti-virus, anti-spyware etc. • Maintain and monitor logs • Train your employees 13-07-2020 Introduction to Cybersecurity 20
  • 21. Respond • Develop a plan for disasters and security incidents • Roles and responsibilities • Whom to call • What type of activity constitutes a security incident 13-07-2020 Introduction to Cybersecurity 21
  • 22. Recover • Maintain full backups • Test your backups • Cyber Insurance 13-07-2020 Introduction to Cybersecurity 22
  • 23. Some better practices • Train your employee • Phishing • Social Media • Clean Machines • Update security software, browsers, OS • Use firewalls • Mobile Devices • Passwords • Avoid public networks • Report if lost or stolen 13-07-2020 Introduction to Cybersecurity 23
  • 24. Some better practices (Contd…) • Maintain Backups • Automatic • Weekly • Store off-site or on cloud • User account for each employee • Strong passwords • Admin privileges limited • Secure your Wi-fi • Encrypt • Do not broadcast network name 13-07-2020 Introduction to Cybersecurity 24
  • 25. Some better practices (Contd…) • Payment Cards • Use trusted and validated tools • Check https • Limit Access • No one has access to all • Role based system • Software installation must require permission • Strong passwords • Try changing every 3 months • Have at least 12 characters • Multifactor authentication 13-07-2020 Introduction to Cybersecurity 25
  • 27. Heartbleed Bug • Vulnerability in OpenSSL cryptographic software library • Allows stealing of information by the SSL/TLS encryption • SSL/TLS- security and privacy over the internet for most applications • Discovered by Riku, Antti and Matti at Codenomicon and Neel Mehta of Google Security and reported on April, 2014 • Allows attackers to  eavesdrop on communications  steal data directly from the services and users and  impersonate services and users Introduction to Cybersecurity 27 } Release of message content Masquerading 13-07-2020
  • 28. Why heartbleed? Bug discovered in the heartbeat extension of TLS Exploitation leaked contents from server to client and from client to server Left a large amount of private keys and other secrets exposed to the internet Is the protocol specification wrong??? No….problem with implementation…a programming mistake Introduction to Cybersecurity 2813-07-2020
  • 29. What’s wrong with implementation??? Heartbeat message structure: Introduction to Cybersecurity 29 struct { HeartbeatMessageType type; uint16 payload_length; opaque payload[HeartbeatMessage.payload_length]; opaque padding[padding_length]; } HeartbeatMessage; /* Read type and payload length first */ hbtype = *p++; n2s(p, payload); pl = p; Incoming Heartbeat message: /* Enter response type, length and copy payload */ *bp++ = TLS1_HB_RESPONSE; s2n(payload, bp); memcpy(bp, pl, payload); Response Heartbeat message: hbtype = *p++; n2s(p, payload); if (1 + 2 + payload + 16 > s->s3->rrec.length) return 0; /* silently discard per RFC 6520 sec. 4 */ pl = p; Fixed Incoming Heartbeat message: 13-07-2020
  • 30. What is leaked? 1. Primary key material 2. Secondary key material 3. Protected content 4. Collateral Introduction to Cybersecurity 3013-07-2020
  • 31. Leaked primary key material and recovery Leakage • Encryption keys • Leaked key allows attacker to decrypt any past or future traffic to protected services and impersonate Recovery • Requires vulnerability patch • Revocation of compromised keys • Reissuing/redistribution of new keys Introduction to Cybersecurity 3113-07-2020
  • 32. Leaked secondary key material and recovery Leakage • User credentials used in vulnerable services Recovery • Restore trust • Users can change their password and possible encryption keys • Session keys and session cookies should be invalidated Introduction to Cybersecurity 3213-07-2020
  • 33. Leaked protected content and recovery Leakage • Actual content handled by the vulnerable service (e.g.)personal/financial details Recovery • Provider should inform users of the leakage • Restore trust to the primary and secondary key material Introduction to Cybersecurity 3313-07-2020
  • 34. Leaked collateral and recovery Leakage • Other details exposed to the attacker in the leaked memory content • Technical details such as memory addresses and security measures such as canaries Recovery • Can be fixed using patch Introduction to Cybersecurity 3413-07-2020
  • 35. Vulnerability of OpenSSL • OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable • OpenSSL 1.0.1g is NOT vulnerable • OpenSSL 1.0.0 branch is NOT vulnerable • OpenSSL 0.9.8 branch is NOT vulnerable Introduction to Cybersecurity 3513-07-2020
  • 36. Vulnerable Operating Systems • Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4 • Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11 • CentOS 6.5, OpenSSL 1.0.1e-15 • Fedora 18, OpenSSL 1.0.1e-4 • OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012) • FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013 • NetBSD 5.0.2 (OpenSSL 1.0.1e) • OpenSUSE 12.2 (OpenSSL 1.0.1c) Introduction to Cybersecurity 3613-07-2020
  • 37. Non-vulnerable Operating Systems • Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14 • SUSE Linux Enterprise Server • FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013 • FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013 • FreeBSD 10.0p1 - OpenSSL 1.0.1g (At 8 Apr 18:27:46 2014 UTC) • FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC) Introduction to Cybersecurity 3713-07-2020
  • 38. Zoom Introduction to Cybersecurity 38 • Cloud-based Video Conferencing Service • Founded: 2011 • Founder: Eric Yuan 13-07-2020
  • 39. Privacy issues – The timeline March 26, 2020 • Investigation by Motherboard revealed that Zoom App (iOS) was sending user analytics data to Facebook March 27, 2020 • Zoom removed Facebook data collection features March 30, 2020 • Investigation by Intercept found Zoom call data was sent back to the company without end-to-end encryption • Two more bugs discovered: (i) Malicious actor can gain control over user microphone or webcam (ii) Vulnerabilities that allow Zoom to gain root access on MacOS desktop • Zoom violated California’s new data protection law • Zoombombing – led FBI to issue public warning about Zoom security vulnerabilities Introduction to Cybersecurity 3913-07-2020
  • 40. The timeline… April 1, 2020 • SpaceX bans Zoom • Motherboard reported the leakage of data such as email addresses and photos to strangers through a feature which operated as company directory April 2, 2020 • Automated tool, zWarDial was able to find 100 Zoom meeting IDs, which were left unprotected by password, in an hour • New York Times reported that the data-mining feature of Zoom had secret access to Linkedin profile data of other users Introduction to Cybersecurity 4013-07-2020
  • 41. The timeline… April 3, 2020 • Investigation by The Washington Post found thousands of recordings of Zoom video calls left unprotected and viewable in open web • Plans for Zoomraids by attackers April 5, 2020 • Some video calls were mistakenly routed through two Chinese Whitelisted servers April 6, 2020 • New York’s Department of Education urged schools to switch to Microsoft Teams • Zoom accounts found on the dark web (352 accounts) • Third class action lawsuit filed against Zoom in California (3 issues: Facebook data-sharing, incomplete end-to-end encryption, vulnerability which allows actors to access webcams) Introduction to Cybersecurity 4113-07-2020
  • 42. The timeline… April 7, 2020 • Taiwan bans Zoom from government use April 8, 2020 • Fourth lawsuit for falsely asserting that the service was end-to-end encrypted • Google bans Zoom • Sales of Zero-day exploits of Zoom by hackers for USD 5,000 TO USD 30,000, reported by Motherboard • New update removing meeting ID from title bar for ongoing meetings to slow attackers who circulate screenshots • AI Zoombombing Introduction to Cybersecurity 4213-07-2020
  • 43. The timeline… April 9, 2020 • US Senate informs members not to use Zoom • Singapore teachers banned from using Zoom • German Ministry of Foreign Affairs in a circular told employees to stop using Zoom due to security concerns April 10, 2020 • Pentagon restricts Zoom usage April 13, 2020 • Cyble discovered that over 500,000 Zoom accounts are being sold on the dark web and hacker forums • Zoom users advised to change their passwords and to check the data breach notification site https://haveibeenpwned.com/ Introduction to Cybersecurity 4313-07-2020
  • 44. The timeline… April 14, 2020 • Lawsuit against Facebook and Linkedin for eavesdropping on Zoom users’ personal data • Zoom introduces new privacy option for paid users April 15, 2020 • Two critical exploits, one for Windows and one for MacOS that could allow someone to spy Zoom calls for sale in underground market for USD 500000 April 16, 2020 • Security researcher discovered two new crucial privacy vulnerabilities in Zoom i. found a way to access and download a company's videos previously recorded to the cloud through an unsecured link ii. discovered that previously recorded user videos may live on in the cloud for hours, even after being deleted by the user • Zoom hired Luta security to revamp its bug bounty program allowing white hat hackers to identify security flaws Introduction to Cybersecurity 4413-07-2020
  • 45. Security and Privacy implications Three basic problems a. Bad privacy practices b. Bad security practices c. Bad user configurations Introduction to Cybersecurity 4513-07-2020
  • 46. Privacy issues • Spies user for personal profits • Collects data including user name, physical address, email address, phone number, job information, Facebook profile information, computer or phone specs, IP address, and any other information you create or upload • Uses data for profit against your interest • On March 29, 2020, Zoom rewrote its privacy policy as “We do not sell your personal data. Whether you are a business or a school or an individual user, we do not sell your data. ….. We do not use data we obtain from your use of our services, including your meetings, for any advertising. We do use data we obtain from you when you visit our marketing websites, such as zoom.us and zoom.com. You have control over your own cookie settings when visiting our marketing websites.” Introduction to Cybersecurity 4613-07-2020
  • 47. Security issues • Last year, a researcher discovered that a vulnerability in the Mac Zoom client allowed any malicious website to enable the camera without permission. • Zoom designed its service to bypass browser security settings and remotely enable a user's web camera without the user's knowledge or consent. • Zoom patched this vulnerability last year. • It only provides link(not end-to-end) encryption, which means everything is unencrypted on the company's servers • Uses AES-128…ECB [Schneier quotes this as “there is no one at the company who knows anything about cryptography”] Introduction to Cybersecurity 4713-07-2020
  • 48. Bad User Configuration • If the meeting is not configured appropriately, it open to all sort of mischief. • A common one: Zoombombing • Even without screen sharing, people are logging in to random Zoom meetings and disrupting them • Meeting ID not long enough to prevent someone from randomly trying them “Instead of making the meeting IDs longer or more complicated -- which it should have done -- it enabled meeting passwords by default. Of course most of us don't use passwords, and there are now automatic tools for finding Zoom meetings” -Checkpoint Research Introduction to Cybersecurity 4813-07-2020
  • 49. Some guidelines If usage of Zoom is unavoidable…. • Do not share meeting ID more that how much you have to • Use password in addition to meeting ID • Use waiting room if you can • Pay attention to the permissions granted to users • Advisory provided by Ministry of Home Affairs, Government of India Introduction to Cybersecurity 4913-07-2020
  • 50. References • Bishop, M. A. (2002). The art and science of computer security. • Vaudenay, S. (2006). A classical introduction to cryptography: Applications for communications security. Springer Science & Business Media. • Internet Security Glossary (RFC 2828), Internet Society • Radack, S. M. (2004). Federal Information Processing Standard (FIPS) 199, standards for security. • The Heartbleed Bug “https://heartbleed.com/” • What is the Heartbleed bug, how does it work and how was it fixed? “https://www.csoonline.com/article/3223203/what-is-the-heartbleed-bug-how-does-it-work-and- how-was-it-fixed.html” • Anatomy of OpenSSL's Heartbleed: Just four bytes trigger horror bug “https://www.theregister.co.uk/2014/04/09/heartbleed_explained/” Introduction to Cybersecurity 5013-07-2020
  • 51. • Zoom: Two new security exploits uncovered “https://www.cnet.com/news/zoom-every- security-issue-uncovered-in-the-video-chat-app/” • Security and Privacy Implications of Zoom “https://www.schneier.com/blog/archives/2020/04/security_and_pr_1.html” • More on Zoom and privacy “https://blogs.harvard.edu/doc/2020/03/28/more-zoom/” • EPIC Files Complaint with FTC about Zoom “https://epic.org/2019/07/epic-files-complaint- with-ftc-.html” • Zoom-Zoom: We Are Watching You “https://research.checkpoint.com/2020/zoom-zoom-we- are-watching-you/” 13-07-2020 Introduction to Cybersecurity 51