Presentation is loading. Please wait.

Presentation is loading. Please wait.

LO1 - Know about aspects of cyber security

Similar presentations


Presentation on theme: "LO1 - Know about aspects of cyber security"— Presentation transcript:

1 LO1 - Know about aspects of cyber security
Level 2 Technical IT Unit 2: Essentials of Cyber Security

2 Types of Cyber Security Incidents and their targets
Lesson 2

3 Objectives Be able to explain the different types of cyber security incidents Be able to identify the different targets of cyber security attacks

4 Types of incidents A Cyber Security incident can be defined as:
“Any malicious act or suspicious event that: Compromises, or was an attempt to comprise, the perimeter surrounding a network (both physical or electronic) of Critical Cyber Assets. It can also disrupt, or attempt to disrupt, the operations of Critical Cyber Asset. This can be mainly through the process of hacking Gaining unauthorised access to a computer network or system We touched on this during your last lesson, but there are 4 types of cyber security incidents you need to be aware of: Data Destruction Data Manipulation Data Modification Data Theft

5 Data Destruction This is the process of permanently erasing data within an organisation or of an individual. This can occur with the use of malicious software (malware) that has been created to gain access to the infrastructure of an entire IT system. In some cases companies and organisations may use back-ups to be able to restore data if this happens. However, more and more advances are meaning that data destruction type attacks may even attack and wipe out this safety net.

6 Data Manipulation Data manipulation is the practice of altering digital documents and other information that could mean disaster for organisations, companies, health care provider, national security agencies and individuals. These alterations could change the truth about certain information Hackers can infiltrate the network and find their way into databases or application to change the information contained. This is instead of stealing it and holding it for a ransom. Examples: Attackers might target certain organisations in order to receive monetary gain and profit or to ruin the reputation of rival organisations Think about the implications manipulating data might have in some of the above areas mentioned?

7 Data modification This can be seen as similar to manipulation.
However, Data Modification is not really for personal gain or profit. Data modification can sometimes be seen as a way to blackmail or cause disruption or harm to an organisation or individual How might this affect organisations and people?

8 What are the targets of a Cyber Security Attack?
These could be: Individuals Organisations Equipment Data/Information

9 Task In your books, write a list of why the following might be targets for cyber security attacks. Individuals Organisations Equipment Data/Information You may want to think about the data and information for the individuals or organisations. You may want to also think about yourself in terms of data and information about you and why people might focus their attack on you.

10 Individuals/People Stolen identity using personal data
Health records Altering to give false impressions Using record to obtain benefits illegally Name/Address Interception of mail to gather further information Ordering goods to your address and intercepting or using another address Bank Details Creation of mortgages or accounts to gain loans etc. without your knowledge Withdraw funds Close accounts Gain these through fake websites (eg. Internet shopping) Can be done using spam, phishing and malware attacks (We will cover this in another lesson, but maybe research this for next week)

11 Organisations To gain access to financial and personal information (eg. Employees, Customers, members etc.) This can lead to fines or court cases due to failure to protect information Potential to steal intellectual property/research. Ownership can be uncertain which could lead to arguments over ownership, leading to court cases. Potential to see development plans which could result in competitors adjusting plans to take advantage. Attacks on these private, public or governmental organisation could be: Internal hacking External hacking Theft of data Theft of equipment Misuse of data (editing, adding deleting records) Blackmail

12 Equipment With technology being around us evermore, these different types of equipment could be targeted. Mobile Phones Tablets Cameras/Webcams Smart Appliances (Thermostats, Fridges, Alexa/Google Home) With this the devices could be connected to other networks etc.

13 Homework Read some news articles about Cyber Security. BBC News
Guardian The Times Etc. Bring an article to the next lesson for a discussion on different real life incidents.


Download ppt "LO1 - Know about aspects of cyber security"

Similar presentations


Ads by Google