2. Cybersecurity: Protecting
Your Digital Footprint
Cybersecurity is the practice of protecting computers, networks, and data
from bad actors like hackers, viruses, and other online threats. It involves
using tools, techniques, and rules to keep information safe from being stolen,
damaged, or accessed without permission.
In simple terms, cybersecurity is like a security system for your digital life,
making sure your personal information, devices, and online activities are safe
from harm. National Cyber Security Policy and initiatives by the Pakistan
Telecommunication Authority (PTA) and the Pakistan Computer Emergency
Response Team (PakCERT) to improve the country's cybersecurity posture.
3. The Evolving Threat Landscape
Sophistication
• Hackers are using advanced tools and clever
techniques to carry out attacks. For example,
they might use artificial intelligence (AI) to
find weaknesses in systems or create malware
that can change itself to avoid being detected
by security software.
• These attacks are harder to spot, making it
easier for hackers to break into systems or
steal data.
Targeting
• Instead of attacking randomly, hackers are now
focusing on specific individuals, companies, or
industries. They carefully research their targets
to find the best way to attack.
• For example, they might send fake emails
(called phishing) that look like they come from
a trusted source, tricking people into giving
away personal information or clicking on
harmful links.
4. Techniques that use cybersecurity :
1. Encryption
•Definition: Encryption is the process of converting data into a coded format that can only be read by someone who has the decryption key.
•Types:
• Symmetric Encryption: Uses the same key for both encryption and decryption (e.g., AES).
• Asymmetric Encryption: Uses a pair of keys (public and private) for encryption and decryption (e.g., RSA).
•Use Cases: Protecting sensitive data at rest (e.g., databases) and in transit (e.g., data sent over the internet).
2. Access Control
•Definition: Access control mechanisms determine who can access specific data and what actions they can perform.
•Types:
• Role-Based Access Control (RBAC): Access is granted based on the user's role within the organization.
• Attribute-Based Access Control (ABAC): Access is granted based on attributes (e.g., user characteristics, resource types).
• Mandatory Access Control (MAC): Access is based on fixed policies set by the system administrator.
•Use Cases: Ensuring that only authorized personnel can access sensitive information.
3. Data Masking
•Definition: Data masking involves obfuscating specific data within a database to protect it from unauthorized access while maintaining its usability
for testing or analysis.
•Techniques:
• Static Data Masking: Data is masked in a non-production environment.
• Dynamic Data Masking: Data is masked in real-time as it is accessed.
•Use Cases: Protecting personally identifiable information (PII) in development and testing environments.
4. Firewalls
•Definition: Firewalls are network security devices that monitor and control incoming and outgoing network traffic based on predetermined
security rules.
•Types:
• Network Firewalls: Protect entire networks by filtering traffic at the network perimeter.
• Host-Based Firewalls: Protect individual devices by filtering traffic to and from that device.
•Use Cases: Preventing unauthorized access to networks and systems.
5. Advanced techniques in cybersecurity
1. Artificial Intelligence and Machine Learning
•Threat Detection: AI and machine learning algorithms are being used to analyze vast amounts of data to
identify patterns and detect anomalies that may indicate cyber threats.
•Automated Response: AI can help automate responses to certain types of cyber incidents, reducing the time it
takes to mitigate threats.
2. Zero Trust Architecture
•This security model assumes that threats could be both outside and inside the network. It requires strict
identity verification for every person and device trying to access resources on a private network.
3. Extended Detection and Response (XDR)
•XDR integrates multiple security products into a cohesive security operations system, providing a more
comprehensive view of threats across endpoints, networks, and servers.
4. Cloud Security
•As more organizations move to cloud environments, advanced cloud security solutions are being developed to
protect data and applications hosted in the cloud, including encryption, identity management, and access
controls.
5. Blockchain Technology
•Blockchain is being explored for its potential to enhance security in various applications, including secure
transactions, identity verification, and data integrity.
6. Threat Intelligence Sharing
•Organizations are increasingly participating in threat intelligence sharing platforms to collaborate on identifying
6. Real life attack
One notable real-life example of a cybersecurity incident is the Colonial Pipeline ransomware attack in May
2021. This attack led to the shutdown of a major fuel pipeline in the United States, causing widespread fuel
shortages. The attackers gained access to the company's systems and demanded a ransom, which Colonial
Pipeline ultimately paid to restore operations. Here are some key points about this incident:
Overview of the Colonial Pipeline Attack
•Date of Incident: May 2021
•Type of Attack: Ransomware
•Impact:
• Shutdown of a major fuel pipeline
• Fuel shortages across the Eastern United States
• Disruption of supply chains and increased fuel prices
Attack Details
•Method of Attack:
• Attackers exploited a vulnerability in the company's network
• Gained access through a compromised password for a VPN account
•Ransom Demand:
• The attackers demanded a ransom payment in cryptocurrency
• Colonial Pipeline paid approximately $4.4 million to regain access to their systems
7. Real time attack:
TESLA:
Tesla In May 2023, two former employees stole and leaked Tesla’s confidential data to a German news outlet,
Handelsblatt. An investigation showed that malicious actors breached the company’s IT security and data
protection policies to unlawfully obtain and disclose 23,000 internal documents from Tesla, amounting to nearly
100 gigabytes of confidential information. As a result, the personal information of 75,735 current and former Tesla
employees was leaked and the company was at risk of facing a $3,3 billion fine for insufficient data protection.
MICROSOFT:
Microsoft In September 2023, it became known that Microsoft AI researchers accidentally exposed 38 terabytes of
private data while publishing open-source training data on GitHub. The exposed data contained sensitive
corporate information from two employees’ workstations, including secrets, private keys, passwords, and over
30,000 internal Microsoft Teams messages. The researchers shared files using Azure’s SAS tokens, but they
misconfigured the system and granted access to the entire storage account rather than specific files.
8. Advanced Techniques in cybersecurity
Cybersecurity Frameworks and Standards
•Adoption of frameworks like the NIST Cybersecurity Framework and ISO/IEC 27001 helps
organizations establish robust cybersecurity practices and compliance.
8. Incident Response and Recovery
•Advanced incident response strategies, including the use of playbooks and automated tools,
are being developed to ensure quick recovery from cyber incidents.
9. Security Awareness Training
•Organizations are investing in advanced training programs to educate employees about
cybersecurity risks and best practices, recognizing that human error is often a significant
factor in breaches.
10. Regulatory Compliance
•With increasing regulations around data protection (like GDPR, CCPA), organizations are
adopting advanced compliance solutions to ensure they meet legal requirements.
9. Cybersecurity Advantages
• Enhanced Data Security: Protect sensitive data from unauthorized access, ensuring confidentiality and
integrity.
• Reduced Risk of Financial Loss: Secure financial transactions and prevent unauthorized spending, protecting
your financial assets.
• Improved Business Continuity: Ensure smooth operations in case of a cyberattack, reducing downtime and
minimizing disruption.
• Increased Customer Trust: Demonstrates a commitment to data security, building trust with customers and
partners.
• Competitive Advantage: Stay ahead of competitors by prioritizing cybersecurity, gaining trust and confidence
in your organization.
10. Cybersecurity Disadvantages
• Costly: Implementing comprehensive cybersecurity measures can be expensive, requiring significant
investments in hardware, software, and specialized personnel.
• Complexity: Maintaining and managing advanced cybersecurity systems can be challenging, requiring
ongoing updates and vigilant monitoring.
• Evolving Threats: Cybercriminals are constantly evolving their tactics, requiring organizations to adapt and
strengthen their defenses to stay ahead of the curve.
• Human Error: Despite advanced technologies, human error remains a critical risk, as employees may
inadvertently compromise security through negligence or lack of awareness.
11. Malware: Viruses, Worms,
and Trojans
Viruses
Viruses spread by attaching
themselves to files and can
corrupt or delete data.
Worms
Worms spread through
networks and can replicate
themselves without human
intervention.
Trojans
Trojans disguise themselves as legitimate software but contain
malicious code that can steal data or damage your system.
12. Social Engineering Attacks
1 Phishing
Phishing attacks trick victims into revealing sensitive information, such as passwords or credit card
details, by posing as legitimate entities.
2 Baiting
Baiting attacks entice victims to click on malicious links or open infected attachments by offering
something tempting, like free software or a discount.
3 Pretexting
Pretexting attacks involve attackers creating a believable scenario to gain trust and information from
victims, often by impersonating someone in authority.
13. Importance of Strong Password Practices
Use Unique Passwords
Create different passwords for each account to
minimize the damage if one password is compromised.
Avoid Common Passwords
Use a password manager to generate and store strong,
unique passwords for all your accounts.
14. Types of Cybersecurity
Network Security
Network security protects
networks from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction.
Endpoint Security
Endpoint security focuses
on securing individual
computers, laptops, and
mobile devices connected
to a network.
Data Security
Data security protects
sensitive data from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction.
Cloud Security
Cloud security protects
data, applications, and
infrastructure hosted in
the cloud from threats
such as malware, data
breaches, and
unauthorized access.
15. Cybersecurity encompasses a wide range of practices, technologies, and processes designed to protect networks, devices, programs,
and data from attack, damage, or unauthorized access. Here are the main types of cybersecurity, explained in detail:
1. Network Security
Network security involves protecting the integrity, confidentiality, and availability of computer networks and data. It includes both
hardware and software technologies and focuses on preventing unauthorized access, misuse, or denial of service.
•Firewalls: Act as barriers between trusted and untrusted networks, filtering incoming and outgoing traffic.
•Intrusion Detection Systems (IDS): Monitor network traffic for suspicious activity and potential threats.
•Virtual Private Networks (VPNs): Secure remote access to a network by encrypting data transmitted over the internet.
2. Application Security
Application security focuses on keeping software and devices free of threats. It involves measures taken throughout the
application's lifecycle, from development to deployment and maintenance.
•Secure Coding Practices: Implementing coding standards to prevent vulnerabilities such as SQL injection and cross-site scripting
(XSS).
•Application Firewalls: Protect applications by filtering and monitoring HTTP traffic between a web application and the internet.
•Regular Updates and Patching: Keeping software up to date to fix vulnerabilities and improve security.
3. Endpoint Security
Endpoint security protects devices such as computers, mobile devices, and servers that connect to the network. With the rise of
remote work, endpoint security has become increasingly important.
•Antivirus and Anti-malware Software: Detect and remove malicious software from devices.
•Endpoint Detection and Response (EDR): Monitors endpoint activities to detect and respond to threats in real-time.
•Mobile Device Management (MDM): Secures, monitors, and manages mobile devices used within an organization
16. Data Security
Data security involves protecting data from unauthorized access and corruption throughout its lifecycle. This includes data at rest, in transit, and in use.
•Encryption: Converting data into a coded format to prevent unauthorized access.
•Data Masking: Hiding sensitive data by replacing it with fictitious data.
•Access Controls: Implementing policies that restrict access to sensitive data based on user roles.
5. Cloud Security
Cloud security focuses on protecting data, applications, and services hosted in the cloud. As organizations increasingly adopt cloud services, securing these
environments is critical.
•Identity and Access Management (IAM): Ensures that only authorized users can access cloud resources.
•Cloud Security Posture Management (CSPM): Continuously monitors cloud environments for compliance and security risks.
•Data Loss Prevention (DLP): Protects sensitive data stored in the cloud from unauthorized access and leaks.
6. Identity and Access Management (IAM)
IAM involves managing user identities and their access to resources within an organization. It ensures that the right individuals have the appropriate access to
technology resources.
•Single Sign-On (SSO): Allows users to log in once and gain access to multiple applications without re-entering credentials.
•Multi-Factor Authentication (MFA): Requires users to provide two or more verification factors to gain access to resources.
•Role-Based Access Control (RBAC): Grants access based on the user's role within the organization.
7. Operational Security (OpSec)
Operational security involves protecting sensitive information from being accessed by unauthorized individuals. It focuses on processes and practices that
safeguard critical data.
•Risk Assessment: Identifying and evaluating risks to determine how to mitigate them.
•Incident Response Planning: Developing a plan to respond to security incidents effectively.
•Security Awareness Training: Educating employees about security policies and best practices.
8. Disaster Recovery and Business Continuity Planning
This type of cybersecurity focuses on preparing for and recovering from disruptive events, such as cyberattacks, natural disasters, or system failures.
•Disaster Recovery Plans (DRP): Outline procedures for recovering IT systems and data after a disaster.
•Business Continuity Plans (BCP): Ensure that critical business functions can continue during and after a disaster.
17. Securing Your Wireless
Network
1 Strong Password
Choose a strong password for your router and change it
regularly.
2 Encryption
Enable WPA2 or WPA3 encryption on your router to protect
your data from eavesdropping.
3 Regular Updates
Keep your router firmware up-to-date to patch security
vulnerabilities.
18. Protecting Against Data Breaches
Data Backup
Regularly back up your important data to protect it from loss or damage.
Multi-Factor Authentication
Enable multi-factor authentication (MFA) for all your accounts to add an extra layer of security.
Employee Training
Educate employees on cybersecurity best practices to prevent them from falling victim to attacks.
19. Incident Response and Recovery Planning
1 Incident Response
2 Data Recovery
3 System Restoration
4 Business Continuity
20. Employee Cybersecurity Awareness Training
1 Phishing Recognition
2 Strong Password Practices
3 Social Engineering Awareness
4 Data Security Policies
21. The Future of
Cybersecurity: Emerging
Trends
1
AI
AI is playing an increasingly
important role in
cybersecurity, both for
detecting and preventing
attacks.
2
Quantum Computing
Quantum computing holds the
potential to revolutionize
cybersecurity, both for
attackers and defenders.
22. Thank You
We appreciate you taking the time to learn about cybersecurity.
We hope this presentation provided valuable insights into
protecting your digital footprint.