2) Cyber Security -BR-Introduction
Cyber Security Overview
Cyber security refers to the protection of online information through various services.
As internet usage increases, so do the associated security threats.
Understanding Cyber Security
Meaning and Implementation
Cyber security combines elements of information technology, internet safety, and virtual reality.
The key aspects include:
Understanding the need for security.
Knowing how to implement effective security measures.
Identifying ongoing problems in the cybersecurity field.
Definition of Cyber Security
Cyber security standards help organizations implement safe security practices to reduce successful cyber attacks.
Key components include:
Communication Security: Protecting communication media, technology, and content.
Network Security: Safeguarding networking components and connections.
Information Security: Protecting information and its essential elements, including systems and hardware.
Need for Cyber Security
Essential for safeguarding data against threats like data theft and misuse.
Important for protecting systems against viruses and other harmful attacks.
Types of Cyber Crime
The terminology for cyber crime has evolved:
Originally referred to as "computer crime" or "computer-related crime."
Modern terms include "cybercrime" and "net crime."
Common types of cyber crime:
Illegal access
Illegal interception
System interference
Data interference
Misuse of devices
Fraud
Major Security Problems
Common security issues in cyber security include:
Viruses
Hackers
Malware
Trojan horses
Password cracking
History of Cyber Crime
Significant milestones include:
1820: First recorded cyber crime.
1978: First spam email sent over the Arpanet.
1982: First virus installed on an Apple Computer.
1995: Kevin Mitnick arrested for multiple computer crimes; later became a security consultant.
2002: Gary McKinnon accused of the largest military computer hack.
Cyber Intelligence Concepts
Cyber intelligence involves acquiring and analyzing information to track cyber capabilities and intentions.
It enhances decision-making with the following key findings:
Identification and tracking of cyber activities.
Threat Data and Intelligence
Raw Threat Data
Comprises indicators of compromise that help identify potential threats.
Often misunderstood as "intelligence" without context.
True Threat Intelligence
Involves analyzing threat data in relation to other information applicable to an organization.
Enables identification of adversaries and informed action to protect the organization.