SlideShare a Scribd company logo
The Emerging Threats Of
Cyber Security
John Patrick Lita
Information Security Consultant
For ICCT College Students
• What is Cyber Security
• What is Cyber Crime
• History of Security
• Threats and Crimes
AGENDA
• Cyber security is the
body of technologies,
processes and practices
designed to protect
networks, computers,
programs and data from
attack, damage or
unauthorized access. In
a computing context,
the term security implies
cyber security.
WHAT IS CYBER SECURITY?
Source: whatis.techtarget.com/definition/cybersecurity
• Computer crime, or
cybercrime, is crime that
involves a computer and a
network. The computer
may have been used in the
commission of a crime, or it
may be the target.
WHAT IS CYBER CRIME?
https://en.wikipedia.org/wiki/Cybercrime
• Let’s talk about a little throwback about the history of
security and how it develops day by day, from physical
security to digital security
THE HISTORY
THE STONE AGE
Caveman use rocks,
braches and other natural
resources to fight predators
over time, the tools used
evolved to spears, bows
and arrows,
• Guard dogs started to appear around 30,000 BC
THE STONE AGE
SECURITY EVOLVES 3150 BC
followed by a moat around a castle in 3150 BC
the industrial revolution
SECURITY EVOLVES 1760 - 1840
Between 1760 and 1840 the rise of the security
guards,
SECURITY EVOLVES 1850S
Which were surprisingly followed by home
security systems in the 1850's!!
SECURITY EVOLVES 1853
Electro-Magnetic Alarm - 1853
The first patent on electro-magnetic alarms was
filed in 1853.
SECURITY EVOLVES 18TH/19TH CENTURY
Cryptography: 18th and 19th Century
Cryptography made its presence felt in the 18 and 1900's,
where as vaults started appearing in the 18th and 19th
century.
SECURITY EVOLVES 1990S
Write protecting on floppy disc was prevalent in the 1990s, which
brings us to where we are today. the age of tokenization and
advanced cryptography that protects data at rest and data
transmit...
The Threats and crimes
• Phishing/Spoofing
• Blackmail/Extortion
• Accessing Stored Communications
• Electronic Harassment
• Child Pornography
• Fraud
• Drug Trafficking
• Prostitution
• Criminal Copyright Infringement
CYBER CRIME INCLUDES
AVAILABILITY OF HACKING TOOLS
• Cyberspace lies at the heart of modern society; it impacts our
personal lives, our businesses and our essential services. Cyber
security embraces both the public and the private sector and
spans a broad range of issues related to national security,
whether through terrorism, crime or industrial espionage.
• E-crime, or cyber crime, whether relating to theft, hacking or
denial of service to vital systems, has become a fact of
life. The risk of industrial cyber espionage, in which one
company makes active attacks on another, through
cyberspace, to acquire high value information is also very
real.
• Cyber terrorism presents challenges for the future. We have to
be prepared for terrorists seeking to take advantage of our
increasing internet dependency to attack or disable key
systems.
• CPNI works with the Cabinet Office and lead Government
departments and agencies to drive forward the UK's cyber
security programme to counter these threats.
CYBER THREAT'S
Source: http://www.cpni.gov.uk/threats/other-threats/
PHYSICAL THREATS
RANSOMWARE
Ransomware is a type of malware that can be covertly installed on a
computer without knowledge or intention of the user that restricts access
to the infected computer system in some way, and demands that the user
pay a ransom to the malware operators to remove the restriction.
Source: https://en.wikipedia.org/wiki/Ransomware
ESPIONAGE
Espionage (colloquially,
spying) is the obtaining of
information considered
secret or confidential
without the permission of
the holder of the
information. Espionage can
be committed by an
individual or a spy ring (a
cooperating group of
spies), in the service of a
government or a company,
or operating independently.
Source: https://en.wikipedia.org/wiki/Espionage
ADVANCE PERSISTENT THREAT (APT)
An advanced persistent
threat (APT) is a network
attack in which an
unauthorized person gains
access to a network and
stays there undetected for a
long period of time. The
intention of an APT attack is
to steal data rather than to
cause damage to the
network or organization.
Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
• Cyber crime is where the
computer is use to commit
crime.
• Criminal can hide their identity
on the internet, the power of
(Anonymity)
• Cyber Crime can rub a bank
without physical appearance
• Any can be a victim as long a
you are connected on the
internet
WHY SHOULD WE CARE?
• Basic information security education
• Never rely your safety with your anti-virus, be intelligent
and be a responsible internet user
• Never connect in public Wi-Fi,
• Download in a trusted website
HOW CAN WE PROTECT?
DEMONSTRATION OF EMAIL SPAMMING
USING A WEB APPLICATION
CYBER SECURITY AWARENESS VIDEO
https://www.youtube.com/watch?v=KK_M-BeIGGQ
• whatis.techtarget.com/definition/cybersecurity
• https://en.wikipedia.org/wiki/Cybercrime
• http://www.cpni.gov.uk/threats/other-threats/
• https://en.wikipedia.org/wiki/Ransomware
• Source: https://en.wikipedia.org/wiki/Espionage
• searchsecurity.techtarget.com/definition/advanced-
persistent-threat-APT
Youtube video:
• https://www.youtube.com/watch?v=KK_M-BeIGGQ
REFERENCES:
• John Patrick J. Lita
john.patrick.lita@owasp.org
THANK YOU FOR LISTENING

More Related Content

PPTX
EVS GE6351-unit 3
PPTX
Understanding dom based xss
PPTX
Understanding sql Injection
PDF
Understanding CSRF
PDF
IOT Security - ICCT College of Engineering
PPTX
Web appsec and it’s 10 best SDLC practices
PDF
PPTX
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
EVS GE6351-unit 3
Understanding dom based xss
Understanding sql Injection
Understanding CSRF
IOT Security - ICCT College of Engineering
Web appsec and it’s 10 best SDLC practices
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]

Viewers also liked (16)

PPT
CS201- Introduction to Programming- Lecture 04
PDF
Bab10 pengelolaan server_jaringan
PDF
Graf presentasi
PPTX
~たり、~たりします
PDF
Bab9 wan
PPT
CS201- Introduction to Programming- Lecture 18
PDF
Projet Nous Citoyens : Régime universel de retraite
PPTX
Uniformes oficial
PPTX
The Three Little Aviator Pigs By Brad Hatcher
PPTX
Web 2ggg
PPTX
Benefits of formative eAssessment and reusable questions
PPTX
Age of exploration
DOCX
Didactic sequence 1 santo tomas preschool
PDF
Tugas Metode Numerik Pendidikan Matematika UMT
PPT
Konfigurasi server debian
PPTX
CS201- Introduction to Programming- Lecture 04
Bab10 pengelolaan server_jaringan
Graf presentasi
~たり、~たりします
Bab9 wan
CS201- Introduction to Programming- Lecture 18
Projet Nous Citoyens : Régime universel de retraite
Uniformes oficial
The Three Little Aviator Pigs By Brad Hatcher
Web 2ggg
Benefits of formative eAssessment and reusable questions
Age of exploration
Didactic sequence 1 santo tomas preschool
Tugas Metode Numerik Pendidikan Matematika UMT
Konfigurasi server debian
Ad

Similar to Cyber Security - ICCT Colleges (20)

PPTX
Module 1_ Introduction to Cyber Security.pptx
PPTX
Introduction to computer forensic in IT World
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Presentation1_CYBERCRIME.pptx
PPTX
Cyber Crime
PPT
CYBER CRIME AND SECURITY
PPTX
Cyber security mis
PPTX
Cyber security.pptx
PPTX
Cyber crime and Information Security.pptx
PPTX
Cyber security
PPTX
cyber crime types and presentations.pptx
PPT
Cyber Crime & Security
PPTX
CYBERSPACE & CRIMINAL BEHAVIOR
PPTX
Cyber crime perspective, definition types, various forms of cyber crime
PPTX
cyber security
PPTX
What is Cyber & information security.pptx
PPTX
introduction of Cyber securit
PPTX
Cyber security
PPTX
Cyber Security
DOCX
127027205 selected-case-studies-on-cyber-crime
Module 1_ Introduction to Cyber Security.pptx
Introduction to computer forensic in IT World
Cyber security.pptxelectronic systems, networks, and data from malicious
Presentation1_CYBERCRIME.pptx
Cyber Crime
CYBER CRIME AND SECURITY
Cyber security mis
Cyber security.pptx
Cyber crime and Information Security.pptx
Cyber security
cyber crime types and presentations.pptx
Cyber Crime & Security
CYBERSPACE & CRIMINAL BEHAVIOR
Cyber crime perspective, definition types, various forms of cyber crime
cyber security
What is Cyber & information security.pptx
introduction of Cyber securit
Cyber security
Cyber Security
127027205 selected-case-studies-on-cyber-crime
Ad

Cyber Security - ICCT Colleges

  • 1. The Emerging Threats Of Cyber Security John Patrick Lita Information Security Consultant For ICCT College Students
  • 2. • What is Cyber Security • What is Cyber Crime • History of Security • Threats and Crimes AGENDA
  • 3. • Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. WHAT IS CYBER SECURITY? Source: whatis.techtarget.com/definition/cybersecurity
  • 4. • Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. WHAT IS CYBER CRIME? https://en.wikipedia.org/wiki/Cybercrime
  • 5. • Let’s talk about a little throwback about the history of security and how it develops day by day, from physical security to digital security THE HISTORY
  • 6. THE STONE AGE Caveman use rocks, braches and other natural resources to fight predators over time, the tools used evolved to spears, bows and arrows,
  • 7. • Guard dogs started to appear around 30,000 BC THE STONE AGE
  • 8. SECURITY EVOLVES 3150 BC followed by a moat around a castle in 3150 BC the industrial revolution
  • 9. SECURITY EVOLVES 1760 - 1840 Between 1760 and 1840 the rise of the security guards,
  • 10. SECURITY EVOLVES 1850S Which were surprisingly followed by home security systems in the 1850's!!
  • 11. SECURITY EVOLVES 1853 Electro-Magnetic Alarm - 1853 The first patent on electro-magnetic alarms was filed in 1853.
  • 12. SECURITY EVOLVES 18TH/19TH CENTURY Cryptography: 18th and 19th Century Cryptography made its presence felt in the 18 and 1900's, where as vaults started appearing in the 18th and 19th century.
  • 13. SECURITY EVOLVES 1990S Write protecting on floppy disc was prevalent in the 1990s, which brings us to where we are today. the age of tokenization and advanced cryptography that protects data at rest and data transmit...
  • 14. The Threats and crimes
  • 15. • Phishing/Spoofing • Blackmail/Extortion • Accessing Stored Communications • Electronic Harassment • Child Pornography • Fraud • Drug Trafficking • Prostitution • Criminal Copyright Infringement CYBER CRIME INCLUDES
  • 17. • Cyberspace lies at the heart of modern society; it impacts our personal lives, our businesses and our essential services. Cyber security embraces both the public and the private sector and spans a broad range of issues related to national security, whether through terrorism, crime or industrial espionage. • E-crime, or cyber crime, whether relating to theft, hacking or denial of service to vital systems, has become a fact of life. The risk of industrial cyber espionage, in which one company makes active attacks on another, through cyberspace, to acquire high value information is also very real. • Cyber terrorism presents challenges for the future. We have to be prepared for terrorists seeking to take advantage of our increasing internet dependency to attack or disable key systems. • CPNI works with the Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter these threats. CYBER THREAT'S Source: http://www.cpni.gov.uk/threats/other-threats/
  • 19. RANSOMWARE Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Source: https://en.wikipedia.org/wiki/Ransomware
  • 20. ESPIONAGE Espionage (colloquially, spying) is the obtaining of information considered secret or confidential without the permission of the holder of the information. Espionage can be committed by an individual or a spy ring (a cooperating group of spies), in the service of a government or a company, or operating independently. Source: https://en.wikipedia.org/wiki/Espionage
  • 21. ADVANCE PERSISTENT THREAT (APT) An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
  • 22. • Cyber crime is where the computer is use to commit crime. • Criminal can hide their identity on the internet, the power of (Anonymity) • Cyber Crime can rub a bank without physical appearance • Any can be a victim as long a you are connected on the internet WHY SHOULD WE CARE?
  • 23. • Basic information security education • Never rely your safety with your anti-virus, be intelligent and be a responsible internet user • Never connect in public Wi-Fi, • Download in a trusted website HOW CAN WE PROTECT?
  • 24. DEMONSTRATION OF EMAIL SPAMMING USING A WEB APPLICATION
  • 25. CYBER SECURITY AWARENESS VIDEO https://www.youtube.com/watch?v=KK_M-BeIGGQ
  • 26. • whatis.techtarget.com/definition/cybersecurity • https://en.wikipedia.org/wiki/Cybercrime • http://www.cpni.gov.uk/threats/other-threats/ • https://en.wikipedia.org/wiki/Ransomware • Source: https://en.wikipedia.org/wiki/Espionage • searchsecurity.techtarget.com/definition/advanced- persistent-threat-APT Youtube video: • https://www.youtube.com/watch?v=KK_M-BeIGGQ REFERENCES:
  • 27. • John Patrick J. Lita john.patrick.lita@owasp.org THANK YOU FOR LISTENING