Sei sulla pagina 1di 27

Lovely Grace S.

Presto
Computer Programmer II
What is Internet?
The INTERNET is a global system of
interconnected computer networks that use
the standard Internet protocol suite (TCP/IP)
to link several billion devices worldwide.
It is a NETWORK OF NETWORKS that consists
of millions of private, public, academic,
business, and government networks of local to
global scope
Overview of Cyber Security Principles
lgsp@2015
The internet of Things

Overview of Cyber Security Principles


lgsp@2015
Current uses of Internet
E-MAIL

Finances World Wide Web


(WWW)

News On-Line Chat


Rooms

Internet telephone
Multi-User
&
Dummies
Video telephone
Streamed
Broadcast
Overview of Cyber Security Principles
lgsp@2015
Impact of Internet technologies
Search
Search technologies are
used to navigate the
Internet, it is used by every
individual to navigate
through the plethora of
pages, images, video clips,
and audio recordings found
on the World Wide Web

Overview of Cyber Security Principles


lgsp@2015
Impact of Internet technologies
Learning
Digital technologies has
been widely known and
accepted to support
learning and teaching in
schools.
It is also use as tool for
learning in the
achievement of knowledge
through the use of data
needed for research
purposes.
Overview of Cyber Security Principles
lgsp@2015
Impact of Internet technologies
Business
Advertising

Overview of Cyber Security Principles


lgsp@2015
Is the Creation of Internet
Beneficial to Humanity?
1. Internets Social effect
Physical interaction versus
Internet Debate online communication
Is there any benefits to the
extroverts?
2. Research
Internet vs. Library
3. Online Gaming
Internet addiction
4. Security while using the Internet

Overview of Cyber Security Principles


lgsp@2015
Cyber Crime
What really is Cyber Crime?
IT IS A CRIMINAL ACTIVITY
COMMITTED ON THE INTERNET.
THIS IS A BROAD TERM THAT
DESCRIBE EVERYTHING FROM
ELECTRONIC CRACKING TO DENIAL
OF SERVICE ATTACKS THAT CAUSE
ELECTRONIC COMMERCE SITES TO
LOSE MONEY.

Overview of Cyber Security Principles


lgsp@2015
Distribution of Targets

Overview of Cyber Security Principles


lgsp@2015
Attack Techniques
Spear Phishing
It is an attack where
there is an attach virus
or malware to the
received email that
appear to come from a
trusted source.

Overview of Cyber Security Principles


lgsp@2015
Attack Techniques
Distributed denial of service (DDoS)
This attack is an attempt to make
a machine or network resource
unavailable to its intended users.
In DDoS attack, the attacker use
many computer or ZOMBIE PC
to temporarily or indefinitely
interrupt or suspend services of a
host/target connected to the
Internet.
The attackers target a wide variety
of important resources, from
banks to news websites, and
present a major challenge to
making sure people can publish
and access important information.
Overview of Cyber Security Principles
lgsp@2015
Attack Techniques

Other Techniques
Malware
SQLi
Traffic road sign
hacking

Overview of Cyber Security Principles


lgsp@2015
Is there a need of security
while using the internet?

Overview of Cyber Security Principles


lgsp@2015
What is Cyber Security?

CYBER SECURITY is the body of


technologies, processes and practices
designed to protect networks, computers,
programs and data from attack, change or
destruction, damage, unauthorized access
and vulnerabilities and attacks delivered via
the Internet by cyber criminals.

Overview of Cyber Security Principles


lgsp@2015
Cyber security standards

Digital security techniques developed to


prevent or mitigate Cyber security attacks.
It has been created because sensitive
information is now frequently stored on
computers that are attached to the Internet.

Overview of Cyber Security Principles


lgsp@2015
Cyber Security Basic Principles

CIA Triad

Overview of Cyber Security Principles


lgsp@2015
CIA Triad

Confidentiality
It refers to limiting information access and
disclosure to authorized users -- "the right people
-- and preventing access by or disclosure to
unauthorized ones -- "the wrong people.
Confidential information /data should not be
accessible to unauthorized users.

Overview of Cyber Security Principles


lgsp@2015
Confidentiality

Overview of Cyber Security Principles


lgsp@2015
CIA Triad

Integrity
Data integrity means maintaining and assuring the
accuracy and consistency of data over its entire life-
cycle.
Data may only be modified through an authorized
mechanism.

Overview of Cyber Security Principles


lgsp@2015
Integrity

Overview of Cyber Security Principles


lgsp@2015
CIA Triad

Availability
For any information system to serve its purpose,
the information must be AVAILABLE when it is
needed.
Ensuring availability also involves preventing Ddos
attack, such as a flood of incoming messages to
the target system essentially forcing it to shut
down.

Overview of Cyber Security Principles


lgsp@2015
Availability

Overview of Cyber Security Principles


lgsp@2015
What should we need to do in
order to be secured???
1. Learn to protect ones personal or organizations
sensitive data
2. Acquire knowledge in preventing possible risks
in cyber security
both regarding strategic or policy issues and
organizational design.
3. Formulate/Implement organizations regulatory
and policy initiatives
Security breach notifications and
Mandatory Cyber security standards
Overview of Cyber Security Principles
lgsp@2015
References
1. Mr. M. Pathrikar. Cyber Security In Modern World . Second Year Of Computer Engineering. Imperial
College Of Engineering And Research,, Wagholi, Nagar Road. ,Pune-421207.
2. Principles of Information Security, 3rd Edition
3. European Doctorate in Law and Economics; Economic analysis of cyber security policy
4. J. Bughin, et al,The impact of Internet technologies: Search, ;July 2011
5. www.saylor.org/hist104 Sub-subunit 7.1.1, Research: Internet vs. Library
6. G.GuangHao Su and J. Lee, Is the Creation of Internet Beneficial to Humanity?, Nov., 2010

Overview of Cyber Security Principles


lgsp@2015
Thoughts of the Day!

Security is a
combination of
People, Processes,
and Technologies

Overview of Cyber Security Principles


lgsp@2015
Thank you for listening!

Overview of Cyber Security Principles


lgsp@2015

Potrebbero piacerti anche