Cyber Security Foundations Part 1
Cyber Security defined: Protects computer base information and equipment Deals with confidentiality of data Protects employees information: Social security numbers Financial information Address Health information
Cyber Security defines… Network computer- connecting devices and computers Information Technology-developing, implementing and maintaining computer systems Cyber Systems-collaborating with computers and physical entities Ex. Government background checks were hacked. They blamed China because that were information was sent.
Information should be… Confidential Honest Available to employee or permitted personnel
What are we defining against? Vulnerability –weaknesses that can be exploited Threats- events that could have a negative impact on our organization Risks-likeliness or chance a lost of information or threat could occur Exploits-using vulnerabilities to attack Threat source--- the actor behind the threat. Watch YouTube video: The Office TV show Jim plays a Christmas joke on Dwight
Potential Threat Sources 1. Typical Hackers 2. State Sponsored Actors 3. Terrorist Groups 4. Organized Criminals 5. Insider Threats 6. Non-Human Threat Sources
Typical Hackers Goals: Challenge Financial Gain Revenge White Hat-the “Good Guy” I was able to do this and this… They provide heads up information regarding potential threats Black Hat- the “Bad Guy” they are stealing information from individuals and businesses using computer/Internet. They have a bad reputation Gray Hat- was previously a black hat hacker who is now doing good try to help business catch the bad guys. Activity: Ex. Watch YouTube video Hilton Hotel worldwide locks
State Sponsored Actors Goals: Financial Gain Intellectual Property Military Intelligence Advantage: well-funded organization Department of Home Security (DHS) requires that all hacking attacks be reported.
Terrorist Groups Goals: Financial Chaos Widespread Harm Political or ideological statement Is hacktivism as a legitimate form of protesting? Is it a means of getting your point across using computers?
Organized Criminals Goals: Financial Business Secrets Intellectual Property Use Cyber extortion to hold data as hostage Ex. Russian mafia
Insider Threat The Biggest Threat of all Character expose vulnerabilities as a member of organizations Types 1. Unsuspected Insider 2. Carless Insider 3. Target Insider 4. Malicious Insider-seeking financial gain
Non-Human Threat Natural Disaster---Hurricane, flood etc. Activity: Research natural disasters and their effects on computers
Risk Management What are the threat sources doing? 1. Performing Reconnaissance (military term observation of a region to locate an enemy-looking for patterns 2. Affecting Exploits 3. Executing missions---The Attack! 4. Covering Tracks 5. *We need to learn defensive hacking so we can protect our computers and mobile devices, etc.
What are Defenders doing? Preparing the defense Monitoring for an Exploit Triage and Situation Assessment After Plan-revising defense strategy to become better and faster at identifying threats
Questions to consider? What are the problems with the current defense strategy? What are the weak links? How can we close the gaps?
How do we address this problem? 1. Threat Assessments-identify events and current circumstances in different organizations 2. Vulnerability Assessments-pinpoint threats in an organization’s system 3. Impact Assessments-analyze what you can 4. Risk Assessments-Release information regarding potential outcomes 5. Ask yourself as a defensive hacker: If there is a change XYZ can occur????
What is Risk Management Conceptual term It states what organizations uses to assess, respond and monitor risk information
Risk Framework Operational Term Outlines procedures and structures that identify how organizations manage risk System characteristics Tools and Techniques Roles and Responsibilities Risk Assumption
How do we assess system characteristics Who are the system security experts? What are the computer systems used for?
Monitoring Tools and Techniques How often do you upgrade? What defense is used? Where are backups stored?
Risk strategy ask… How do we create risk framework? Who is the contact for system management? Who will monitor tools? Who decides and reports activities to take to reduce risks? What do we use to respond to risks?
How do we create Risk Framework for schools? 1. Decrease mobile devices 2. Determine supportive school resources 3. Create integrity policy (students cheating) 4. Consider computers as a distraction to learning Accepting Risks- allowing students to bring computers to school Sharing Risks-if student bring computer must sign contract..” I will not use computer to cheat Transferring Risks-Insurance Waiver if the computer is damage parents will be responsible Avoiding Risks-Eliminate when students can bring computers—close computer labs during school breaks
References Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=F1z4Va_TCsu1-AH3j7- ABQ#gws_rd=ssl&imgrc=AnFHNifwpvPFRM%3A Address&oe=&safe=active&gws_rd=ssl&um=1&ie=UTF- 8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=F1z4Va_TCsu1-AH3j7- ABQ#gws_rd=ssl&imgrc=AnFHNifwpvPFRM%3A SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAWoVChMI4pCLken7xwIVgW8- Ch2vZgBb&biw=1600&bih=907#imgrc=WqUF5bnprNFLeM%3A SearchBox&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAWoVChMI4pCLken7xwIVgW8- Ch2vZgBb&biw=1600&bih=907#imgrc=WqUF5bnprNFLeM%3A US:IE-Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIm6v-6en7xwIVCXM- Ch0a2gLu&biw=1600&bih=907#imgdii=BSHoUHmO8EBlvM%3A%3BBSHoUHmO8EBlvM%3A%3BOHBou7r_2 cAy9M%3A&imgrc=BSHoUHmO8EBlvM%3A Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMI5YrguOv7xwIVBnQ- Ch1WJAvW&biw=1600&bih=907#imgrc=8mkFKOUKVqZF7M%3A Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMI5YrguOv7xwIVBnQ- Ch1WJAvW&biw=1600&bih=907#imgrc=8mkFKOUKVqZF7M%3A US:IE-Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAWoVChMItf7fguz7xwIVwm0-Ch11- QSN&biw=1600&bih=907#imgrc=7qbT9LbXtKc-IM%3A US:IE-Address&source=lnms&tbm=isch&sa=X&ved=0CAgQ_AUoAWoVChMItf7fguz7xwIVwm0-Ch11- QSN&biw=1600&bih=907#imgrc=7qbT9LbXtKc-IM%3A US:IE-Address&source=lnms&tbm=isch&sa=X&ved=0CAkQ_AUoAmoVChMIw5_2pe37xwIVwmk- Ch0S7QlQ&biw=1600&bih=907#imgrc=fFfeojFWAAeSpM%3A