Introduction To Security Cyberspace, Cybercrime And .

3y ago
63 Views
3 Downloads
5.33 MB
48 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Braxton Mach
Transcription

Introduction to SecurityCyberspace, Cybercrime and Cybersecurity

OVERVIEW Brainstorming Definition Security Security Features Concept of Cyberspace Concept of Cybercrime Concept of Cybersecurity The way forward

Brainstorming

BrainstormingWhat is Security?Security according to two boys of 10 years old

BrainstormingWhat is Security?Security According to Junior High School ICT teacher

BrainstormingWhat is Security?

Definition Security

Definition SecurityThere is no clear cut definition

Definition SecuritySecurity is a process, not an end state.

Definition SecuritySecurity is the process of maintaining an acceptable level of perceived risk.

Definition SecurityNo organization can be considered "secure" for any time beyond the last verification of adherence to itssecurity policy.If your manager asks, "Are we secure?"you should answer, "Let me check."If he or she asks, "Will we be secure tomorrow?" you should answer, "I don't know."Such honesty will not be popular, but this mind-set will produce greater success for the organization inthe long run.

Security Features

Security has three features

Security FeaturesConfidentialityConfidentiality is roughly equivalent to privacy. Measures undertaken toensure confidentiality are designed to prevent sensitive information fromreaching the wrong people, while making sure that the right people can infact get it:ConfidentialityAssurance that information is shared only among authorized persons ororganizations.

Security FeaturesIntegrity.Assurance that the information is authentic and complete.IntegrityIn information security, data integrity means maintaining and assuring theaccuracy and consistency of data over its entire life-cycle.

Security FeaturesAvailabilityAssurance that the systems responsible for delivering, storing andprocessing information are accessible when needed, by those whoneed them.AvailabilityAvailability of information refers to ensuring that authorized parties areable to access the information when needed

Concept of Cyberspace

Concept of CyberspaceCyberspaceCyberspace is "the environment in which communicationover computer networks occurs.“And almost everybodyin one way or the otheris connected to it

Concept of CyberspaceLadies in the marketare connected to is torun their businesses

Concept of CyberspaceShepherds are connectedto locate their cattle

Concept of CyberspaceHunters are connected toit to locate their prey

Concept of CyberspaceOur friend, the farmer isconnected to it and“Facebooking” in the coconuttree

Concept of CyberspaceOur friends in the remoteareas are also connected to it

Concept of CyberspaceHuum! isn’t amazing?They are alsoconnected.

Concept of CyberspaceOn a more serious note, are connectedLaw makersGovernmentJudiciary

Concept of CyberspaceMilitaries

Concept of CyberspaceHealth SectorsBanksTransportation Sectors

Concept of Cyberspace

Concept of Cybercrime

Concept of CybercrimeCyber CrimeComputer crime, or cybercrime, is any crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target.

Concept of CybercrimeKevin MitnickTsutomu Shimomura

Concept of CybercrimeCommonwealth Bank, Australia - March 2011:Automatic teller machines (ATMs) spat outtens of thousands of free dollars in SydneyTuesday after a computer glitch turned into anightmare for the Commonwealth Bank. ITSecurity Believe that it is a the consequence ofhacking.

Concept of CybercrimeUnderground Economy

Concept of Cybercrime

Concept of CybercrimePhishing

Concept of CybercrimeHacktivism

Concept of CybercrimeCyberwar: Estonia Case

Concept of CybercrimeTuuli Aug, an editor of the daily newspaper "Eesti Paevaleht," stated thefollowing:"I felt the country was under attack by an invisible enemy. . . . It wasextremely frightening and uncontrollable because we are used to havingInternet all the time and then suddenly it wasn't around anymore, . . .You couldn't get information; you couldn't do your job. You couldn'treach the bank; you couldn't check the bus schedule anymore. It was justconfusing and frightening, but we didn't realize it was a war becausenobody had seen anything like that before“.

Concept of CybercrimeStuxnet

Concept of CybersecurityThe threat is real

Concept of Cybersecurity

Concept of CybersecurityTentative DefinitionsCyber security, also referred to as information technology security, focuses onprotecting computers, networks, programs and data from unintended or unauthorizedaccess, change or destruction.University of Maryland University CollegeThe state of being protected against the criminal or unauthorized use of electronicdata, or the measures taken to achieve this.‘some people have argued that the threat to cybersecurity has been somewhatinflated’Oxford Dictionary

Concept of CybersecurityITU-T X.1205 Definition Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, riskmanagement approaches, actions, training, best practices, assurance and technologies that can be used toprotect the cyber environment and organization and user’s assets. Organization and user’s assets includeconnected computing devices, personnel, infrastructure, applications, services, telecommunications systems,and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organizationand user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following:o Availabilityo Integrity, which may include authenticity and non-repudiationo Confidentiality

Assignment and discussion

AssignmentBased in the realities of your organization, rank the three features of securitywith respect to your information system.

The way forward ICT is a single point of failure to Businesses. IS Security is Achilles heels of ICT Your security depends on mine and mine depends on yours, Let us come together and protect our cyberspace is creating and managing a CSIRTHOW?CSIRT

hacking. Concept of Cybercrime. Concept of Cybercrime Underground Economy . Concept of Cybercrime. Concept of Cybercrime Phishing. Hacktivism Concept of Cybercrime. Cyberwar: Estonia Case Concept of Cybercrime "I felt the country was under attack by an invisible enemy. . . . It was

Related Documents:

study.2 The collection of topics for consideration within a comprehensive study on cybercrime included the problem of cybercrime, legal responses to cybercrime, crime prevention and criminal justice capabilities and other responses to cybercrime, international organizations, and technical assistance.

analogies between cyberspace and memory, and between cyberspace and urban space. Merging qualities of the given concepts reveal that the cyberspace presents contemporary formations both of memory and of place. In the light of this premise, the study argues that cyberspace potentially constitutes an

Cyberspace operations (CO) are the employment of cyberspace capabilities wherethe primary purpose is to achieve objectives in or through cyberspace. 2. Commanders must develop the capability to direct operations in the cyber domain sincestrategic mission success increasingly depends on freedom of maneuver in cyberspace (see Figure 1-1). 3. 2.

THE FUTURE OF CYBERCRIME & SECURITY Key Takeaways & Juniper Leaderboard 1.1 Cybercrime Key Takeaways 1.1.1 IoT Botnets & DDoS Emerging Security is still not being designed into much of the IoT (Internet of Things), particularly those areas that work from legacy M2M (machine to machine) networks. This leaves them open to use by cybercriminals,

These two factors make cyberspace an ideal vehicle for states and non-state actors who choose to pursue their war aims through clandestine means. In this situation effective security policy for cyberspace requires a high priority for early warning, intelligence and pre-emptive defence. The technologies that are used in cyberspace are still very .

Asia-Pacific Regional Workshop on Fighting Cybercrime Transnational organized groups and Cybercrime Dr Kim-Kwang Raymond Choo Senior Lecturer / 2009 Fulbright (DFAT Professional) Scholar University of South Australia Visiting Researcher ARC Centre of Excellence in Policing and Security, Australian National University Associate

The report contains six main chapters. After an introduction (Chapter 1), it provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and denial-of-service attacks.

An expert meeting was held to review the impact of animal nutrition on animal welfare. During the meeting, three major tasks were undertaken for both ruminant and monogastric species: 1) Identify feeding options for different livestock production systems (extensive, mixed crop-livestock, and intensive) that improve animal welfare while increas - ing profitability of the livestock producers and .