SlideShare a Scribd company logo
1 of 27
Download to read offline
The Emerging Threats Of
Cyber Security
John Patrick Lita
Information Security Consultant
For ICCT College Students
• What is Cyber Security
• What is Cyber Crime
• History of Security
• Threats and Crimes
AGENDA
• Cyber security is the
body of technologies,
processes and practices
designed to protect
networks, computers,
programs and data from
attack, damage or
unauthorized access. In
a computing context,
the term security implies
cyber security.
WHAT IS CYBER SECURITY?
Source: whatis.techtarget.com/definition/cybersecurity
• Computer crime, or
cybercrime, is crime that
involves a computer and a
network. The computer
may have been used in the
commission of a crime, or it
may be the target.
WHAT IS CYBER CRIME?
https://en.wikipedia.org/wiki/Cybercrime
• Let’s talk about a little throwback about the history of
security and how it develops day by day, from physical
security to digital security
THE HISTORY
THE STONE AGE
Caveman use rocks,
braches and other natural
resources to fight predators
over time, the tools used
evolved to spears, bows
and arrows,
• Guard dogs started to appear around 30,000 BC
THE STONE AGE
SECURITY EVOLVES 3150 BC
followed by a moat around a castle in 3150 BC
the industrial revolution
SECURITY EVOLVES 1760 - 1840
Between 1760 and 1840 the rise of the security
guards,
SECURITY EVOLVES 1850S
Which were surprisingly followed by home
security systems in the 1850's!!
SECURITY EVOLVES 1853
Electro-Magnetic Alarm - 1853
The first patent on electro-magnetic alarms was
filed in 1853.
SECURITY EVOLVES 18TH/19TH CENTURY
Cryptography: 18th and 19th Century
Cryptography made its presence felt in the 18 and 1900's,
where as vaults started appearing in the 18th and 19th
century.
SECURITY EVOLVES 1990S
Write protecting on floppy disc was prevalent in the 1990s, which
brings us to where we are today. the age of tokenization and
advanced cryptography that protects data at rest and data
transmit...
The Threats and crimes
• Phishing/Spoofing
• Blackmail/Extortion
• Accessing Stored Communications
• Electronic Harassment
• Child Pornography
• Fraud
• Drug Trafficking
• Prostitution
• Criminal Copyright Infringement
CYBER CRIME INCLUDES
AVAILABILITY OF HACKING TOOLS
• Cyberspace lies at the heart of modern society; it impacts our
personal lives, our businesses and our essential services. Cyber
security embraces both the public and the private sector and
spans a broad range of issues related to national security,
whether through terrorism, crime or industrial espionage.
• E-crime, or cyber crime, whether relating to theft, hacking or
denial of service to vital systems, has become a fact of
life. The risk of industrial cyber espionage, in which one
company makes active attacks on another, through
cyberspace, to acquire high value information is also very
real.
• Cyber terrorism presents challenges for the future. We have to
be prepared for terrorists seeking to take advantage of our
increasing internet dependency to attack or disable key
systems.
• CPNI works with the Cabinet Office and lead Government
departments and agencies to drive forward the UK's cyber
security programme to counter these threats.
CYBER THREAT'S
Source: http://www.cpni.gov.uk/threats/other-threats/
PHYSICAL THREATS
RANSOMWARE
Ransomware is a type of malware that can be covertly installed on a
computer without knowledge or intention of the user that restricts access
to the infected computer system in some way, and demands that the user
pay a ransom to the malware operators to remove the restriction.
Source: https://en.wikipedia.org/wiki/Ransomware
ESPIONAGE
Espionage (colloquially,
spying) is the obtaining of
information considered
secret or confidential
without the permission of
the holder of the
information. Espionage can
be committed by an
individual or a spy ring (a
cooperating group of
spies), in the service of a
government or a company,
or operating independently.
Source: https://en.wikipedia.org/wiki/Espionage
ADVANCE PERSISTENT THREAT (APT)
An advanced persistent
threat (APT) is a network
attack in which an
unauthorized person gains
access to a network and
stays there undetected for a
long period of time. The
intention of an APT attack is
to steal data rather than to
cause damage to the
network or organization.
Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
• Cyber crime is where the
computer is use to commit
crime.
• Criminal can hide their identity
on the internet, the power of
(Anonymity)
• Cyber Crime can rub a bank
without physical appearance
• Any can be a victim as long a
you are connected on the
internet
WHY SHOULD WE CARE?
• Basic information security education
• Never rely your safety with your anti-virus, be intelligent
and be a responsible internet user
• Never connect in public Wi-Fi,
• Download in a trusted website
HOW CAN WE PROTECT?
DEMONSTRATION OF EMAIL SPAMMING
USING A WEB APPLICATION
CYBER SECURITY AWARENESS VIDEO
https://www.youtube.com/watch?v=KK_M-BeIGGQ
• whatis.techtarget.com/definition/cybersecurity
• https://en.wikipedia.org/wiki/Cybercrime
• http://www.cpni.gov.uk/threats/other-threats/
• https://en.wikipedia.org/wiki/Ransomware
• Source: https://en.wikipedia.org/wiki/Espionage
• searchsecurity.techtarget.com/definition/advanced-
persistent-threat-APT
Youtube video:
• https://www.youtube.com/watch?v=KK_M-BeIGGQ
REFERENCES:
• John Patrick J. Lita
john.patrick.lita@owasp.org
THANK YOU FOR LISTENING

More Related Content

What's hot

10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]
10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]
10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]Search Engine Journal
 
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdf
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdfCreating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdf
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdfRichard Lawrence
 
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptx
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptxCarlos Meza BrightonSEO 2023 Is content king in modern SEO.pptx
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptxCarlos Meza
 
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides Kathryn Bevan
 
SmartRecruiters Recruiting Platform
SmartRecruiters Recruiting PlatformSmartRecruiters Recruiting Platform
SmartRecruiters Recruiting PlatformPaul Andre de Vera
 
SEO Predictions & Trends 2023.pptx
SEO Predictions & Trends 2023.pptxSEO Predictions & Trends 2023.pptx
SEO Predictions & Trends 2023.pptxSarah McDowell
 
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce Websites
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce WebsitesBrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce Websites
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce WebsitesDan Taylor
 
Proposal Training Motivasi pesantren ramadhan 2015
Proposal  Training Motivasi pesantren ramadhan 2015Proposal  Training Motivasi pesantren ramadhan 2015
Proposal Training Motivasi pesantren ramadhan 2015Namin AB Ibnu Solihin
 
Tech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | OverviewTech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | Overviewaccenture
 
SMX Session - State of Search 2023
SMX Session - State of Search 2023SMX Session - State of Search 2023
SMX Session - State of Search 2023Marcus Tober
 
Freddy Krueger's Guide to Scary Good Reporting
Freddy Krueger's Guide to Scary Good ReportingFreddy Krueger's Guide to Scary Good Reporting
Freddy Krueger's Guide to Scary Good ReportingGreg Gifford
 
Pitch Deck Teardown: Ageras's $36M Private Equity deck
Pitch Deck Teardown: Ageras's $36M Private Equity deckPitch Deck Teardown: Ageras's $36M Private Equity deck
Pitch Deck Teardown: Ageras's $36M Private Equity deckHajeJanKamps
 
[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018Thibaud Plaquet
 
Walmart Pitch Deck
Walmart Pitch DeckWalmart Pitch Deck
Walmart Pitch DeckXavierRoss4
 
10 Bold Predictions in Banking and Finance for 2024
10 Bold Predictions in Banking and Finance for 202410 Bold Predictions in Banking and Finance for 2024
10 Bold Predictions in Banking and Finance for 2024Liveplex
 
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...Taste
 
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...Isa Lavs
 
Promosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang GeriPromosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang GeriGeri Sugiran Abdul Sukur
 

What's hot (20)

10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]
10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]
10 Successful Ways To Improve Your SERP Rankings [With Ahrefs]
 
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdf
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdfCreating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdf
Creating Search Quality Algorithms - Richard Lawrence - BrightonSEO.pdf
 
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptx
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptxCarlos Meza BrightonSEO 2023 Is content king in modern SEO.pptx
Carlos Meza BrightonSEO 2023 Is content king in modern SEO.pptx
 
Garima Gupta - How AI can Change your online learning experience.pdf
Garima Gupta - How AI can Change your online learning experience.pdfGarima Gupta - How AI can Change your online learning experience.pdf
Garima Gupta - How AI can Change your online learning experience.pdf
 
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides
Kathryn Bevan - How To Ace Your Website Migration - Brighton SEO Slides
 
SmartRecruiters Recruiting Platform
SmartRecruiters Recruiting PlatformSmartRecruiters Recruiting Platform
SmartRecruiters Recruiting Platform
 
SEO Predictions & Trends 2023.pptx
SEO Predictions & Trends 2023.pptxSEO Predictions & Trends 2023.pptx
SEO Predictions & Trends 2023.pptx
 
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce Websites
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce WebsitesBrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce Websites
BrightonSEO October 2022 - Dan Taylor SEO - Indexing Ecommerce Websites
 
Proposal Training Motivasi pesantren ramadhan 2015
Proposal  Training Motivasi pesantren ramadhan 2015Proposal  Training Motivasi pesantren ramadhan 2015
Proposal Training Motivasi pesantren ramadhan 2015
 
Tech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | OverviewTech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | Overview
 
SMX Session - State of Search 2023
SMX Session - State of Search 2023SMX Session - State of Search 2023
SMX Session - State of Search 2023
 
Freddy Krueger's Guide to Scary Good Reporting
Freddy Krueger's Guide to Scary Good ReportingFreddy Krueger's Guide to Scary Good Reporting
Freddy Krueger's Guide to Scary Good Reporting
 
Pitch Deck Teardown: Ageras's $36M Private Equity deck
Pitch Deck Teardown: Ageras's $36M Private Equity deckPitch Deck Teardown: Ageras's $36M Private Equity deck
Pitch Deck Teardown: Ageras's $36M Private Equity deck
 
[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018
 
Walmart Pitch Deck
Walmart Pitch DeckWalmart Pitch Deck
Walmart Pitch Deck
 
10 Bold Predictions in Banking and Finance for 2024
10 Bold Predictions in Banking and Finance for 202410 Bold Predictions in Banking and Finance for 2024
10 Bold Predictions in Banking and Finance for 2024
 
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...
SEO Restart 2022: Pavel Ungr - Proč je projektové řízení v SEO důležitější ne...
 
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...
Brighton SEO Apr23 - Showing The Value of Digital PR beyond coverage and link...
 
Promosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang GeriPromosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang Geri
 
Yuga Labs Pitch Deck
Yuga Labs Pitch DeckYuga Labs Pitch Deck
Yuga Labs Pitch Deck
 

Viewers also liked

Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xssPotato
 
Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql InjectionPotato
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRFPotato
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesPotato
 
CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04Bilal Ahmed
 
Bab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanBab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanAgung Sakepris
 
~たり、~たりします
~たり、~たりします~たり、~たりします
~たり、~たりしますAlexanderSensei
 
CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18Bilal Ahmed
 
Projet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteProjet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteKévin Veyssière
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherBrad Hatcher
 
Benefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsBenefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsdewiparry
 
Age of exploration
Age of explorationAge of exploration
Age of explorationNeutron428
 
Didactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoolDidactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoollausansot
 

Viewers also liked (20)

Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xss
 
Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql Injection
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRF
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
 
Fibonacci
FibonacciFibonacci
Fibonacci
 
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
 
CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04
 
Bab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanBab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringan
 
Graf presentasi
Graf presentasiGraf presentasi
Graf presentasi
 
~たり、~たりします
~たり、~たりします~たり、~たりします
~たり、~たりします
 
Bab9 wan
Bab9 wanBab9 wan
Bab9 wan
 
CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18
 
Projet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteProjet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraite
 
Uniformes oficial
Uniformes oficialUniformes oficial
Uniformes oficial
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad Hatcher
 
Web 2ggg
Web 2gggWeb 2ggg
Web 2ggg
 
Benefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsBenefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questions
 
Age of exploration
Age of explorationAge of exploration
Age of exploration
 
Didactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoolDidactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschool
 

Similar to Emerging Cyber Security Threats

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 

Similar to Emerging Cyber Security Threats (20)

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Emerging Cyber Security Threats

  • 1. The Emerging Threats Of Cyber Security John Patrick Lita Information Security Consultant For ICCT College Students
  • 2. • What is Cyber Security • What is Cyber Crime • History of Security • Threats and Crimes AGENDA
  • 3. • Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. WHAT IS CYBER SECURITY? Source: whatis.techtarget.com/definition/cybersecurity
  • 4. • Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. WHAT IS CYBER CRIME? https://en.wikipedia.org/wiki/Cybercrime
  • 5. • Let’s talk about a little throwback about the history of security and how it develops day by day, from physical security to digital security THE HISTORY
  • 6. THE STONE AGE Caveman use rocks, braches and other natural resources to fight predators over time, the tools used evolved to spears, bows and arrows,
  • 7. • Guard dogs started to appear around 30,000 BC THE STONE AGE
  • 8. SECURITY EVOLVES 3150 BC followed by a moat around a castle in 3150 BC the industrial revolution
  • 9. SECURITY EVOLVES 1760 - 1840 Between 1760 and 1840 the rise of the security guards,
  • 10. SECURITY EVOLVES 1850S Which were surprisingly followed by home security systems in the 1850's!!
  • 11. SECURITY EVOLVES 1853 Electro-Magnetic Alarm - 1853 The first patent on electro-magnetic alarms was filed in 1853.
  • 12. SECURITY EVOLVES 18TH/19TH CENTURY Cryptography: 18th and 19th Century Cryptography made its presence felt in the 18 and 1900's, where as vaults started appearing in the 18th and 19th century.
  • 13. SECURITY EVOLVES 1990S Write protecting on floppy disc was prevalent in the 1990s, which brings us to where we are today. the age of tokenization and advanced cryptography that protects data at rest and data transmit...
  • 14. The Threats and crimes
  • 15. • Phishing/Spoofing • Blackmail/Extortion • Accessing Stored Communications • Electronic Harassment • Child Pornography • Fraud • Drug Trafficking • Prostitution • Criminal Copyright Infringement CYBER CRIME INCLUDES
  • 17. • Cyberspace lies at the heart of modern society; it impacts our personal lives, our businesses and our essential services. Cyber security embraces both the public and the private sector and spans a broad range of issues related to national security, whether through terrorism, crime or industrial espionage. • E-crime, or cyber crime, whether relating to theft, hacking or denial of service to vital systems, has become a fact of life. The risk of industrial cyber espionage, in which one company makes active attacks on another, through cyberspace, to acquire high value information is also very real. • Cyber terrorism presents challenges for the future. We have to be prepared for terrorists seeking to take advantage of our increasing internet dependency to attack or disable key systems. • CPNI works with the Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter these threats. CYBER THREAT'S Source: http://www.cpni.gov.uk/threats/other-threats/
  • 19. RANSOMWARE Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Source: https://en.wikipedia.org/wiki/Ransomware
  • 20. ESPIONAGE Espionage (colloquially, spying) is the obtaining of information considered secret or confidential without the permission of the holder of the information. Espionage can be committed by an individual or a spy ring (a cooperating group of spies), in the service of a government or a company, or operating independently. Source: https://en.wikipedia.org/wiki/Espionage
  • 21. ADVANCE PERSISTENT THREAT (APT) An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
  • 22. • Cyber crime is where the computer is use to commit crime. • Criminal can hide their identity on the internet, the power of (Anonymity) • Cyber Crime can rub a bank without physical appearance • Any can be a victim as long a you are connected on the internet WHY SHOULD WE CARE?
  • 23. • Basic information security education • Never rely your safety with your anti-virus, be intelligent and be a responsible internet user • Never connect in public Wi-Fi, • Download in a trusted website HOW CAN WE PROTECT?
  • 24. DEMONSTRATION OF EMAIL SPAMMING USING A WEB APPLICATION
  • 25. CYBER SECURITY AWARENESS VIDEO https://www.youtube.com/watch?v=KK_M-BeIGGQ
  • 26. • whatis.techtarget.com/definition/cybersecurity • https://en.wikipedia.org/wiki/Cybercrime • http://www.cpni.gov.uk/threats/other-threats/ • https://en.wikipedia.org/wiki/Ransomware • Source: https://en.wikipedia.org/wiki/Espionage • searchsecurity.techtarget.com/definition/advanced- persistent-threat-APT Youtube video: • https://www.youtube.com/watch?v=KK_M-BeIGGQ REFERENCES:
  • 27. • John Patrick J. Lita john.patrick.lita@owasp.org THANK YOU FOR LISTENING