SlideShare a Scribd company logo
INFORMATION SECURITY BASICS
IS165 – Networking
Fundamentals
Information Security Basics.pptx
Information Security Basics.pptx
CYBER SECURITY THREAT OR RISK
1. Human Nature
2. Malware
3. Phishing Attacks and Social Engineering
4. Formjacking
5. Inadequate Patch Management
6. Outdated Hardware and Software
7. Man-in-the-Middle Attacks
HUMAN NATURE
• Capital One recently had more than 100 million customer accounts
compromised in a data breach. But, not by a random hacker or even an
employee.
• Capital One uses Amazon Web Services (AWS) for their cloud hosting and
a former AWS employee exploited a misconfigured firewall to gain access
to 140,000 Social Security numbers, 1 million Canadian Social Insurance
numbers and 80,000 bank account numbers, plus an undisclosed number
of people’s names, addresses, credit scores, credit limits, balances, and
other information.
• Capital One expects to face $100-150 million in costs, including customer
notifications, credit monitoring, tech costs, and legal support due.
• Not to mention any potential company stock value losses.
MALWARE
• Center for Internet Security
PHISHING ATTACKS AND SOCIAL ENGINEERING
• Phishing is a fraudulent attempt to elicit sensitive information from a
victim in order to perform some type of action.
• Phishing comes in many forms:
• General phishing
• Spear phishing
• CEO fraud
• Smishing
• Vishing
• Clone phishing
• Domain spoofing
• URL phishing
• Watering hole phishing
• Evil twin phishing
• Social Engineering
FORMJACKING
• British Airways formjacking attack resulted in more than 380,000
credit cards being stolen at an estimated loss of $17 million, plus
£183 million fine levied by the EU for the lack of GDPR
compliance.
• Attackers injected malicious JavaScript code onto Ticketmaster’s
website after compromising the chatbot used for customer
support on Ticketmaster websites. The attackers altered the JS
code to capture payment card data from customers and send it to
their servers. The malicious code may have been on the
Ticketmaster website for almost a year.
Information Security Basics.pptx
INADEQUATE PATCH MANAGEMENT
• EternalBlue is an exploit allegedly developed by NSA.
• It exploits Microsoft vulnerabilities and led to worldwide attacks that
included the Petya and WannaCry ransomware.
• Microsoft released patches for EternalBlue, but many organizations
didn’t apply the patch and remained vulnerable or they were using old
systems past their end-of-life period.
• The National Healthcare System (NHS) in the UK had thousands of
appointments and surgeries cancelled, which cost NHS more than £100
million.
• Two years after the WannaCry attacks, EternalBlue continues to impact
systems around the world.
OUTDATED SYSTEMS
• Data breaches and other security incidents result from
outdated or unpatched technologies.
• Equifax’s 2017 data breach that exploited a patchable
vulnerability that wasn’t patched is an example.
MAN-IN-THE-MIDDLE ATTACKS
• A notable example of a MitM attack occurred when a group of
agents from Russia’s GRU tried to hack into the office of the
Organization for the Prohibition of Chemical Weapons.
• They used a Wi-Fi spoofing device to try to get the results of an
investigation.
• The attack failed, but evidences that no one — not even
governments — are exempt from being MitM attack targets.
THREATS
• A Threat is a negative event that can lead to an undesired
outcome, such as damage to, or loss of, an asset.
• Threats become dangerous because of a vulnerability in a
system.
• Threat is used interchangeably with both Attack and Threat
Actor, and is often substituted for a Danger.
THREAT ACTORS
• Threat Actors are the person, actor, entity, or organization that is
initiating a given scenario, such as a hack attempt.
• Threat Actors include:
• Hacktivists
• Cybercriminals
• Disgruntled insiders
• Nation States
• Careless employees
• Nature
VULNERABILITIES
• Vulnerabilities are weaknesses in a system that make threats possible.
• A Vulnerability is a weakness exploited by a Threat Actor to do Harm.
• Examples of Vulnerabilities include:
• Lack of proper building access control
• Cross-site Scripting (XSS)
• SQL Injection
• Cleartext transmission of sensitive data
• Failure to check authorization to sensitive resources
• Failure to encrypt sensitive data at rest
RISK
• A Risk is the chance that something bad may happen including
the Harm if it does happen.
• The result of combining Probability and Impact:
risk = probability x impact
SUMMARY
• A Threat is a negative scenario you want to avoid
• A Threat Actor is the agent that makes a Threat happen
• A Vulnerability is a weakness that can be exploited in order to attack you
• A Risk is a negative scenario you want to avoid, combined with its
probability and its impact
• The difference between a Threat and a Risk is a Threat is a negative
event by itself, where a Risk is the negative event combined with its
probability and its impact.

More Related Content

PPTX
SIEM Fundamentals-Session 1 presentations
PPTX
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
PPTX
Zero Trust.pptx
PPTX
An An Exploration Into the Cyber Security
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
PPTX
2. Pengantar Keamanan Sistem Informasi 2024.pptx
PPTX
Brooks18
PPTX
FCT UNIT 5 Foundation of computing technologies.pptx
SIEM Fundamentals-Session 1 presentations
HCA 530, Week 2, Introduction to cyber threats and opportunities online cours...
Zero Trust.pptx
An An Exploration Into the Cyber Security
Event: George Washington University -- National Security Threat Convergence: ...
2. Pengantar Keamanan Sistem Informasi 2024.pptx
Brooks18
FCT UNIT 5 Foundation of computing technologies.pptx

Similar to Information Security Basics.pptx (20)

PPTX
Cyber security # Lec 1
PPTX
Cybersecurity Training
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Computer Security Presentation
PDF
File000119
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PDF
Protecting Your Business From Cybercrime
PDF
20101012 isa larry_clinton
PPTX
Unit 1.pptx
PPTX
securing_information_systems_._lec6.pptx
PPTX
Cyber Security
PPTX
Vulenerability Management.pptx
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PDF
Solvay secure application layer v2015 seba
PDF
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
InfoSec_Awareness_Training_chat_gpt.pptx
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Cybersecurity.pptx
Cyber security # Lec 1
Cybersecurity Training
Cyber Security and Data Privacy in Information Systems.pptx
Computer Security Presentation
File000119
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Protecting Your Business From Cybercrime
20101012 isa larry_clinton
Unit 1.pptx
securing_information_systems_._lec6.pptx
Cyber Security
Vulenerability Management.pptx
Information & cyber security, Winter training ,bsnl. online
Information cyber security
Solvay secure application layer v2015 seba
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Lec 1- Intro to cyber security and recommendations
InfoSec_Awareness_Training_chat_gpt.pptx
chapter1 Introduction to Software Security.pptx
Cybersecurity.pptx
Ad

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
master seminar digital applications in india
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Complications of Minimal Access Surgery at WLH
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
RMMM.pdf make it easy to upload and study
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
master seminar digital applications in india
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
human mycosis Human fungal infections are called human mycosis..pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Basic Mud Logging Guide for educational purpose
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
Complications of Minimal Access Surgery at WLH
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
RMMM.pdf make it easy to upload and study
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Cell Types and Its function , kingdom of life
Microbial disease of the cardiovascular and lymphatic systems
PPH.pptx obstetrics and gynecology in nursing
Abdominal Access Techniques with Prof. Dr. R K Mishra
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Ad

Information Security Basics.pptx

  • 1. INFORMATION SECURITY BASICS IS165 – Networking Fundamentals
  • 4. CYBER SECURITY THREAT OR RISK 1. Human Nature 2. Malware 3. Phishing Attacks and Social Engineering 4. Formjacking 5. Inadequate Patch Management 6. Outdated Hardware and Software 7. Man-in-the-Middle Attacks
  • 5. HUMAN NATURE • Capital One recently had more than 100 million customer accounts compromised in a data breach. But, not by a random hacker or even an employee. • Capital One uses Amazon Web Services (AWS) for their cloud hosting and a former AWS employee exploited a misconfigured firewall to gain access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 bank account numbers, plus an undisclosed number of people’s names, addresses, credit scores, credit limits, balances, and other information. • Capital One expects to face $100-150 million in costs, including customer notifications, credit monitoring, tech costs, and legal support due. • Not to mention any potential company stock value losses.
  • 6. MALWARE • Center for Internet Security
  • 7. PHISHING ATTACKS AND SOCIAL ENGINEERING • Phishing is a fraudulent attempt to elicit sensitive information from a victim in order to perform some type of action. • Phishing comes in many forms: • General phishing • Spear phishing • CEO fraud • Smishing • Vishing • Clone phishing • Domain spoofing • URL phishing • Watering hole phishing • Evil twin phishing
  • 9. FORMJACKING • British Airways formjacking attack resulted in more than 380,000 credit cards being stolen at an estimated loss of $17 million, plus £183 million fine levied by the EU for the lack of GDPR compliance. • Attackers injected malicious JavaScript code onto Ticketmaster’s website after compromising the chatbot used for customer support on Ticketmaster websites. The attackers altered the JS code to capture payment card data from customers and send it to their servers. The malicious code may have been on the Ticketmaster website for almost a year.
  • 11. INADEQUATE PATCH MANAGEMENT • EternalBlue is an exploit allegedly developed by NSA. • It exploits Microsoft vulnerabilities and led to worldwide attacks that included the Petya and WannaCry ransomware. • Microsoft released patches for EternalBlue, but many organizations didn’t apply the patch and remained vulnerable or they were using old systems past their end-of-life period. • The National Healthcare System (NHS) in the UK had thousands of appointments and surgeries cancelled, which cost NHS more than £100 million. • Two years after the WannaCry attacks, EternalBlue continues to impact systems around the world.
  • 12. OUTDATED SYSTEMS • Data breaches and other security incidents result from outdated or unpatched technologies. • Equifax’s 2017 data breach that exploited a patchable vulnerability that wasn’t patched is an example.
  • 13. MAN-IN-THE-MIDDLE ATTACKS • A notable example of a MitM attack occurred when a group of agents from Russia’s GRU tried to hack into the office of the Organization for the Prohibition of Chemical Weapons. • They used a Wi-Fi spoofing device to try to get the results of an investigation. • The attack failed, but evidences that no one — not even governments — are exempt from being MitM attack targets.
  • 14. THREATS • A Threat is a negative event that can lead to an undesired outcome, such as damage to, or loss of, an asset. • Threats become dangerous because of a vulnerability in a system. • Threat is used interchangeably with both Attack and Threat Actor, and is often substituted for a Danger.
  • 15. THREAT ACTORS • Threat Actors are the person, actor, entity, or organization that is initiating a given scenario, such as a hack attempt. • Threat Actors include: • Hacktivists • Cybercriminals • Disgruntled insiders • Nation States • Careless employees • Nature
  • 16. VULNERABILITIES • Vulnerabilities are weaknesses in a system that make threats possible. • A Vulnerability is a weakness exploited by a Threat Actor to do Harm. • Examples of Vulnerabilities include: • Lack of proper building access control • Cross-site Scripting (XSS) • SQL Injection • Cleartext transmission of sensitive data • Failure to check authorization to sensitive resources • Failure to encrypt sensitive data at rest
  • 17. RISK • A Risk is the chance that something bad may happen including the Harm if it does happen. • The result of combining Probability and Impact: risk = probability x impact
  • 18. SUMMARY • A Threat is a negative scenario you want to avoid • A Threat Actor is the agent that makes a Threat happen • A Vulnerability is a weakness that can be exploited in order to attack you • A Risk is a negative scenario you want to avoid, combined with its probability and its impact • The difference between a Threat and a Risk is a Threat is a negative event by itself, where a Risk is the negative event combined with its probability and its impact.