LO1 - Know about aspects of cyber security

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Unethical use of Computers and Networks
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Topic 5: Basic Security.
Hurdles in implementation of cyber security in India.
Web Page Design and Development I Standards Standard A Safety and Ethics – 3 Identify potential abuse and unethical uses of computers and networks.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Safe’n’Sec IT security solutions for enterprises of any size.
Cybersecurity Test Review Introduction to Digital Technology.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
BIS 220 MASTER Leading through innovation/bis220masterdotcom.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Edexcel GCSE Cyber security threats Computer Science 1CP1
Scams & Schemes Common Sense Media.
Antisocial use of ICT and Computer Fraud
IT Security  .
Administrative Practices Outcome 1
Information Security.
Unit 32 – Networked Systems Security
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
© EIT, Author Gay Robertson, 2017
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Five Unethical Uses of Computers
Risk of the Internet At Home
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Security of Data  
Faculty of Science IT Department By Raz Dara MA.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
LO1 - Know about aspects of cyber security
Lesson 2- Protecting Yourself Online
Security in mobile technologies
LO1 - Know about aspects of cyber security
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Marcial Quinones-Cardona
LO1 - Know about aspects of cyber security
Presentation transcript:

LO1 - Know about aspects of cyber security Level 2 Technical IT Unit 2: Essentials of Cyber Security

Types of Cyber Security Incidents and their targets Lesson 2

Objectives Be able to explain the different types of cyber security incidents Be able to identify the different targets of cyber security attacks

Types of incidents A Cyber Security incident can be defined as: “Any malicious act or suspicious event that: Compromises, or was an attempt to comprise, the perimeter surrounding a network (both physical or electronic) of Critical Cyber Assets. It can also disrupt, or attempt to disrupt, the operations of Critical Cyber Asset. This can be mainly through the process of hacking Gaining unauthorised access to a computer network or system We touched on this during your last lesson, but there are 4 types of cyber security incidents you need to be aware of: Data Destruction Data Manipulation Data Modification Data Theft

Data Destruction This is the process of permanently erasing data within an organisation or of an individual. This can occur with the use of malicious software (malware) that has been created to gain access to the infrastructure of an entire IT system. In some cases companies and organisations may use back-ups to be able to restore data if this happens. However, more and more advances are meaning that data destruction type attacks may even attack and wipe out this safety net.

Data Manipulation Data manipulation is the practice of altering digital documents and other information that could mean disaster for organisations, companies, health care provider, national security agencies and individuals. These alterations could change the truth about certain information Hackers can infiltrate the network and find their way into databases or application to change the information contained. This is instead of stealing it and holding it for a ransom. Examples: Attackers might target certain organisations in order to receive monetary gain and profit or to ruin the reputation of rival organisations Think about the implications manipulating data might have in some of the above areas mentioned?

Data modification This can be seen as similar to manipulation. However, Data Modification is not really for personal gain or profit. Data modification can sometimes be seen as a way to blackmail or cause disruption or harm to an organisation or individual How might this affect organisations and people?

What are the targets of a Cyber Security Attack? These could be: Individuals Organisations Equipment Data/Information

Task In your books, write a list of why the following might be targets for cyber security attacks. Individuals Organisations Equipment Data/Information You may want to think about the data and information for the individuals or organisations. You may want to also think about yourself in terms of data and information about you and why people might focus their attack on you.

Individuals/People Stolen identity using personal data Health records Altering to give false impressions Using record to obtain benefits illegally Name/Address Interception of mail to gather further information Ordering goods to your address and intercepting or using another address Bank Details Creation of mortgages or accounts to gain loans etc. without your knowledge Withdraw funds Close accounts Gain these through fake websites (eg. Internet shopping) Can be done using spam, phishing and malware attacks (We will cover this in another lesson, but maybe research this for next week)

Organisations To gain access to financial and personal information (eg. Employees, Customers, members etc.) This can lead to fines or court cases due to failure to protect information Potential to steal intellectual property/research. Ownership can be uncertain which could lead to arguments over ownership, leading to court cases. Potential to see development plans which could result in competitors adjusting plans to take advantage. Attacks on these private, public or governmental organisation could be: Internal hacking External hacking Theft of data Theft of equipment Misuse of data (editing, adding deleting records) Blackmail

Equipment With technology being around us evermore, these different types of equipment could be targeted. Mobile Phones Tablets Cameras/Webcams Smart Appliances (Thermostats, Fridges, Alexa/Google Home) With this the devices could be connected to other networks etc.

Homework Read some news articles about Cyber Security. BBC News Guardian The Times Etc. Bring an article to the next lesson for a discussion on different real life incidents.