Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
You?
Time to hack
Practices & Ethics
CHAPTER 3:
CYBER ATTACKS &
CYBER SECURITY
Ciapha Dorley
Quang Nguyen
Alexandra Yon
Cyber Attacks . How It Works.
Who is at Risk. Cyber Security. Legal
Cyber Attacks Outline:
DEFINITION:
In the computer world, cyber attacks are defined by the obtaining of, manipulation of, and/or exploitation of something (i.e. information or data) through means of technology. It is typically malicious in intent and deliberate (Cisco).
Key Points:
Reasons Why Cyber Incidents are Prevalent
Cyber attacks are widespread due to myriads amounts of factors. Said factors include the following:
(BYOD)
(Reynolds, 2019)
Why?
Why
Factors
Number of Entry Points increases
Means New Updates, Implementations, and Security Assessments
(BYOD)
May be Less Secure than company issued / monitored Devices
Can Lead to Exploits and Zero-Day Attacks
More Resources = More Knowledge = More Dangerous
Cyber Attacks have the ability to gain access to sensitive information, rob businesses/ individuals of their identity, take down a country, and more. Thus, it is highly important to recognize the impact cyber attacks can and do have.
According to Cisco, a company is attacked everyday.
Types of black hat hackers
- Logic bomb
How do we prepare?
Cyber Security
What is Risk Assessment?
Risk assessment is the process of assessing security related risks to an organization’s
computers and networks from both internal and external threats. Such threats can prevent
an organization from meeting its key business objectives.
Confidentiality, integrity and availability, also known as the CIA, is a model designed to guide policies for information security within an organization.
What to do during an attack
Affects all Levels of Government & Many Areas of Life
Key Laws enacted to combat computer-related crime:
Key Laws To Combat Computer Related Crime
1984
Fraud and Related Activity
2003
Notice of Security Breach
2001
U.S. Patriot Act
1986
Stored Communications Act
2002
Homeland Security Act
1986 CFAA
1996
HIPAA
Discussion: Which Law do you find most influential? WHy?
What We've Discussed
- What is cybercrime, cyber attacks, and why are they important?
- Reasons why cyber attacks are becoming more prevalent
- Response to cyber attacks
- Types of Exploits
- Type of Perpetrators
- Risk assessment
- Establishing a Security Policy
- Educating Employees and Contract Workers
- Preventions
- Laws against computer attacks
2 factors may be Increased Reliance on community software and BYOD.
1 method may be Phishing.
1: Name 2 factors that contribute to Cyber Attacks.
2: Name 1 Method of Attack (Exploit).
3: What is a type of cyber Perpetrator?
4: What does CIA Stand for in Cyber Security?
5: What is The U.S. Patriot Act?
Malicious Insider
CIA stands for Confidential, Integrity, and Availability.
The U.S. Patriot Act is a law that attempts to detour terrorist attacks.
Cisco. (n.d.). What is the most common type of cyber attack. https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~how-cyber-attacks-work
Cornell Law School. (n.d.) 18 US Code s 1029 Fraud and related activity in connection with access devices. https://www.law.cornell.edu/uscode/text/18/1029
Kim, D., & Solomon, M. (2012). Fundamentals of information systems security (1st ed., pp. 87-114). Jones & Bartlett Learning International.
Reynolds, G. (2015). Ethics In Information Technology (5th ed., pp. 88-99). Cengage Learning.
Cisco. (n.d.). What is the most common type of cyber attack. https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~how-cyber-attacks-work
Kim, D., & Solomon, M. (2012). Fundamentals of information systems security (1st ed., pp. 87-114). Jones & Bartlett Learning International.
Reynolds, G. (2015). Ethics In Information Technology (5th ed., pp. 88-99). Cengage Learning.
file:///G:/Cyber%20Security%20Basics.html
“Cybersecurity Basics - Educate and Protect Yourself.” Malwarebytes, 2020, www.malwarebytes.com/cybersecurity/.