Search Header Logo
CYBERATTACKS AND CYBERSECURITY

CYBERATTACKS AND CYBERSECURITY

Assessment

Presentation

Other

University

Hard

Created by

Roberto Santana

Used 5+ times

FREE Resource

20 Slides • 6 Questions

1

CYBERATTACKS AND CYBERSECURITY

keeponlearning

Slide image

2

Inget-inget duyu..

yuk jawab..

3

Multiple Choice

The term_________ describes the standards or codes of behavior expected of an individual by a group to which the individual belongs.

1

morals

2

ethics

3

virtues

4

integrity

4

Multiple Choice

____________ is/are one’s personal beliefs about what is right and wrong.

1

virtues and vices

2

ethics

3

morals

4

code of ethics

5

Multiple Choice

Laws provide a complete guide to ethical behavior. True or False?

1

true

2

false

6

Open Ended

The moral corruption of people in power has been given the name ...........

7

Multiple Choice

According to the Ethics Resource Center, which of the following is the most commonly observed form of employee misconduct?

1

Lying to employees

2

Abusive behavior

3

Inappropriate social networking

4

Misuse of company time

8

Multiple Choice

A statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.

1

Integrity statement

2

code of ethics

3

mission statement

4

vision statement

9

A zero-day exploit

  • is a cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability. 

  • It takes advantage of security flaws that enable unauthorized users to gain access to a computer system or to download sensitive user data 

10

complex trade-offs when making decisions regarding IT security 

  • How much effort and money should be spent to safeguard against computer crime? (In other words, how safe is safe enough?

  • What should be done if recommended computer security safeguards make conducting business more difficult for customers and employees, resulting in lost sales and increased costs? 

  • If a firm is a victim of a cybercrime, should it pursue prosecution of the criminals at all costs, maintain a low profile to avoid the negative publicity, inform affected customers, or take some other action?

11

WELL..THIS IS TOO BAD

While one would hope that the discoverer of a zero-day vulnerability would immediately inform the original software manufacturer so that a fix can be created for the problem, unfortunately this is often not the case. In some cases, this knowledge is sold on the black market to hackers, cyberterrorists, governments, or large organizations that may then use it to launch their own cyberattacks. Information about one zero-day vulnerability in Apple’s iOS was reportedly sold for $500,000.

12

Slide image

13

a recent survey of more than 10,000 IT professionals around the world revealed the following: 

  • 58 percent of global companies have an overall security strategy

  • 54 percent have a chief information security officer (CISO) in charge of security

  • 53 percent have employee security awareness and training programs

14

a recent survey of more than 10,000 IT professionals around the world revealed the following: 

  • 52 percent have security standards for third parties

  • 49 percent conduct threat assessments

  • 48 percent actively monitor and analyze security intelligence 

15

What caused a dramatic increase in the number, variety, and severity of security incidents are...

  • Increasing computing complexity,  

  • expanding and changing systems,

  • an increase in the prevalence of bring your own device (BYOD) policies,

  • a growing reliance on software with known vulnerabilities,

  • and the increasing sophistication of those who would do harm

16

Increasing Complexity Increases Vulnerability

  • Computing environments have become enormously complex. Cloud computing, networks, computers, mobile devices, virtualization, operating systems, applications, websites, switches, routers, and gateways are interconnected and driven by hundreds of millions of

    lines of code.

  • The number of possible entry points to a network expands continually as more devices are added, increasing the possibility of security breaches.

17

Expanding and Changing Systems Introduce New Risks

  • Business has moved from an era of stand-alone computers, in which critical data were stored on an isolated mainframe computer in a locked room, to an era in which personal computers and mobile devices connect to networks with millions of other computers, all capable of sharing information.

  • it is increasingly difficult for IT organizations to keep up with the pace of technological change, successfully perform an ongoing assessment of new security risks, and implement approaches for dealing with them

18

Increasing Prevalence of BYOD Policies

  • Bring your own device (BYOD) is a business policy that permits, and in some cases

    encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet. 

  • However, this practice raises many potential security issues as it is highly likely that such devices are also used for nonwork activity (browsing websites, shopping, visiting social networks, blogging, etc.) that exposes them to malware much more frequently than a device used strictly for business purposes 

19

Increasing Prevalence of BYOD Policies

  • many users do not password protect their laptops, tablets, and smartphones or set the timeout to automatically lock the device after a few minutes of not being used. All these create an environment ripe for potential security problems. 

  • It is worth noting that employees also have concerns with BYOD policies, primarily related to privacy

  • Most people place a high priority on keeping any prying eyes, including those of their employer, from looking at the personal photos, text messages, and email stored on their personal mobile devices

20

Growing Reliance on Commercial Software with Known Vulnerabilities

  • In computing, an exploit is an attack on an information system that takes advantage of a particular system vulnerability. 

  • Often this attack is due to poor system design or implementation. 

  • Once the vulnerability is discovered, software developers create and issue a “fix,” or patch, to eliminate the problem 

  • Any delay in installing a patch exposes the user to a potential security breach

21

Increasing Sophistication of Those Who Would Do Harm

  • Previously, the stereotype of a computer troublemaker was that of an introverted “geek” working on his or her own and motivated by the desire to gain some degree of notoriety 

  • While such individuals still exist, it is not this stereotyped individual who is the biggest threat to IT security 

  • Today’s computer menace is much better organized and may be part of an organized group (for example, Anonymous, Chaos Computer Club, Lizard Squad, TeslaTeam, and hacker teams sponsored by national governments) that has an agenda and targets specific organizations and websites.

22

Slide image

23

Types of Exploits

There are numerous types of computer attacks, with new varieties being invented all the time. 

24

explain...

  • Ransomware

  • viruses

  • worms

  • trojan horse

  • blended threat

  • spam

  • DDoS attacks

25

explain...

  • Advanced Persistent Threat 

  • Phishing

  • Smishing  

  • Vishing

  • Cyberespionage 

  • Cyberterrorism 

26

Assignment Just 4 U

Explain how an organization respond to cyberattack. Turn in your written explanation on Google Classroom

CYBERATTACKS AND CYBERSECURITY

keeponlearning

Slide image

Show answer

Auto Play

Slide 1 / 26

SLIDE