2) Cyber Security -BR-Introduction

Cyber Security Overview

  • Cyber security refers to the protection of online information through various services.

  • As internet usage increases, so do the associated security threats.

Understanding Cyber Security

Meaning and Implementation

  • Cyber security combines elements of information technology, internet safety, and virtual reality.

  • The key aspects include:

    • Understanding the need for security.

    • Knowing how to implement effective security measures.

    • Identifying ongoing problems in the cybersecurity field.

Definition of Cyber Security

  • Cyber security standards help organizations implement safe security practices to reduce successful cyber attacks.

  • Key components include:

    • Communication Security: Protecting communication media, technology, and content.

    • Network Security: Safeguarding networking components and connections.

    • Information Security: Protecting information and its essential elements, including systems and hardware.

Need for Cyber Security

  • Essential for safeguarding data against threats like data theft and misuse.

  • Important for protecting systems against viruses and other harmful attacks.

Types of Cyber Crime

  • The terminology for cyber crime has evolved:

    • Originally referred to as "computer crime" or "computer-related crime."

    • Modern terms include "cybercrime" and "net crime."

  • Common types of cyber crime:

    • Illegal access

    • Illegal interception

    • System interference

    • Data interference

    • Misuse of devices

    • Fraud

Major Security Problems

  • Common security issues in cyber security include:

    • Viruses

    • Hackers

    • Malware

    • Trojan horses

    • Password cracking

History of Cyber Crime

  • Significant milestones include:

    • 1820: First recorded cyber crime.

    • 1978: First spam email sent over the Arpanet.

    • 1982: First virus installed on an Apple Computer.

    • 1995: Kevin Mitnick arrested for multiple computer crimes; later became a security consultant.

    • 2002: Gary McKinnon accused of the largest military computer hack.

Cyber Intelligence Concepts

  • Cyber intelligence involves acquiring and analyzing information to track cyber capabilities and intentions.

  • It enhances decision-making with the following key findings:

    • Identification and tracking of cyber activities.

Threat Data and Intelligence

Raw Threat Data

  • Comprises indicators of compromise that help identify potential threats.

    • Often misunderstood as "intelligence" without context.

True Threat Intelligence

  • Involves analyzing threat data in relation to other information applicable to an organization.

  • Enables identification of adversaries and informed action to protect the organization.