SlideShare a Scribd company logo
1 of 27
Download to read offline
The Emerging Threats Of
Cyber Security
John Patrick Lita
Information Security Consultant
For ICCT College Students
• What is Cyber Security
• What is Cyber Crime
• History of Security
• Threats and Crimes
AGENDA
• Cyber security is the
body of technologies,
processes and practices
designed to protect
networks, computers,
programs and data from
attack, damage or
unauthorized access. In
a computing context,
the term security implies
cyber security.
WHAT IS CYBER SECURITY?
Source: whatis.techtarget.com/definition/cybersecurity
• Computer crime, or
cybercrime, is crime that
involves a computer and a
network. The computer
may have been used in the
commission of a crime, or it
may be the target.
WHAT IS CYBER CRIME?
https://en.wikipedia.org/wiki/Cybercrime
• Let’s talk about a little throwback about the history of
security and how it develops day by day, from physical
security to digital security
THE HISTORY
THE STONE AGE
Caveman use rocks,
braches and other natural
resources to fight predators
over time, the tools used
evolved to spears, bows
and arrows,
• Guard dogs started to appear around 30,000 BC
THE STONE AGE
SECURITY EVOLVES 3150 BC
followed by a moat around a castle in 3150 BC
the industrial revolution
SECURITY EVOLVES 1760 - 1840
Between 1760 and 1840 the rise of the security
guards,
SECURITY EVOLVES 1850S
Which were surprisingly followed by home
security systems in the 1850's!!
SECURITY EVOLVES 1853
Electro-Magnetic Alarm - 1853
The first patent on electro-magnetic alarms was
filed in 1853.
SECURITY EVOLVES 18TH/19TH CENTURY
Cryptography: 18th and 19th Century
Cryptography made its presence felt in the 18 and 1900's,
where as vaults started appearing in the 18th and 19th
century.
SECURITY EVOLVES 1990S
Write protecting on floppy disc was prevalent in the 1990s, which
brings us to where we are today. the age of tokenization and
advanced cryptography that protects data at rest and data
transmit...
The Threats and crimes
• Phishing/Spoofing
• Blackmail/Extortion
• Accessing Stored Communications
• Electronic Harassment
• Child Pornography
• Fraud
• Drug Trafficking
• Prostitution
• Criminal Copyright Infringement
CYBER CRIME INCLUDES
AVAILABILITY OF HACKING TOOLS
• Cyberspace lies at the heart of modern society; it impacts our
personal lives, our businesses and our essential services. Cyber
security embraces both the public and the private sector and
spans a broad range of issues related to national security,
whether through terrorism, crime or industrial espionage.
• E-crime, or cyber crime, whether relating to theft, hacking or
denial of service to vital systems, has become a fact of
life. The risk of industrial cyber espionage, in which one
company makes active attacks on another, through
cyberspace, to acquire high value information is also very
real.
• Cyber terrorism presents challenges for the future. We have to
be prepared for terrorists seeking to take advantage of our
increasing internet dependency to attack or disable key
systems.
• CPNI works with the Cabinet Office and lead Government
departments and agencies to drive forward the UK's cyber
security programme to counter these threats.
CYBER THREAT'S
Source: http://www.cpni.gov.uk/threats/other-threats/
PHYSICAL THREATS
RANSOMWARE
Ransomware is a type of malware that can be covertly installed on a
computer without knowledge or intention of the user that restricts access
to the infected computer system in some way, and demands that the user
pay a ransom to the malware operators to remove the restriction.
Source: https://en.wikipedia.org/wiki/Ransomware
ESPIONAGE
Espionage (colloquially,
spying) is the obtaining of
information considered
secret or confidential
without the permission of
the holder of the
information. Espionage can
be committed by an
individual or a spy ring (a
cooperating group of
spies), in the service of a
government or a company,
or operating independently.
Source: https://en.wikipedia.org/wiki/Espionage
ADVANCE PERSISTENT THREAT (APT)
An advanced persistent
threat (APT) is a network
attack in which an
unauthorized person gains
access to a network and
stays there undetected for a
long period of time. The
intention of an APT attack is
to steal data rather than to
cause damage to the
network or organization.
Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
• Cyber crime is where the
computer is use to commit
crime.
• Criminal can hide their identity
on the internet, the power of
(Anonymity)
• Cyber Crime can rub a bank
without physical appearance
• Any can be a victim as long a
you are connected on the
internet
WHY SHOULD WE CARE?
• Basic information security education
• Never rely your safety with your anti-virus, be intelligent
and be a responsible internet user
• Never connect in public Wi-Fi,
• Download in a trusted website
HOW CAN WE PROTECT?
DEMONSTRATION OF EMAIL SPAMMING
USING A WEB APPLICATION
CYBER SECURITY AWARENESS VIDEO
https://www.youtube.com/watch?v=KK_M-BeIGGQ
• whatis.techtarget.com/definition/cybersecurity
• https://en.wikipedia.org/wiki/Cybercrime
• http://www.cpni.gov.uk/threats/other-threats/
• https://en.wikipedia.org/wiki/Ransomware
• Source: https://en.wikipedia.org/wiki/Espionage
• searchsecurity.techtarget.com/definition/advanced-
persistent-threat-APT
Youtube video:
• https://www.youtube.com/watch?v=KK_M-BeIGGQ
REFERENCES:
• John Patrick J. Lita
john.patrick.lita@owasp.org
THANK YOU FOR LISTENING

More Related Content

What's hot

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Introduction a la securité informatique Volume1
Introduction a la securité informatique Volume1Introduction a la securité informatique Volume1
Introduction a la securité informatique Volume1Sylvain Maret
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaNSConclave
 
Operational Security
Operational SecurityOperational Security
Operational SecuritySplunk
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 

What's hot (20)

Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Introduction a la securité informatique Volume1
Introduction a la securité informatique Volume1Introduction a la securité informatique Volume1
Introduction a la securité informatique Volume1
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
What is botnet?
What is botnet?What is botnet?
What is botnet?
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Ppt
PptPpt
Ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 

Viewers also liked

Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xssPotato
 
Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql InjectionPotato
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRFPotato
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesPotato
 
CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04Bilal Ahmed
 
Bab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanBab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanAgung Sakepris
 
~たり、~たりします
~たり、~たりします~たり、~たりします
~たり、~たりしますAlexanderSensei
 
CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18Bilal Ahmed
 
Projet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteProjet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteKévin Veyssière
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherBrad Hatcher
 
Benefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsBenefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsdewiparry
 
Age of exploration
Age of explorationAge of exploration
Age of explorationNeutron428
 
Didactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoolDidactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoollausansot
 

Viewers also liked (20)

Understanding dom based xss
Understanding dom based xssUnderstanding dom based xss
Understanding dom based xss
 
Understanding sql Injection
Understanding sql InjectionUnderstanding sql Injection
Understanding sql Injection
 
Understanding CSRF
Understanding CSRFUnderstanding CSRF
Understanding CSRF
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
 
Fibonacci
FibonacciFibonacci
Fibonacci
 
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
QCL-14-v3_[Pareto Diagram]_[SIIB]_[Sandeep Majumder]
 
CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04CS201- Introduction to Programming- Lecture 04
CS201- Introduction to Programming- Lecture 04
 
Bab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringanBab10 pengelolaan server_jaringan
Bab10 pengelolaan server_jaringan
 
Graf presentasi
Graf presentasiGraf presentasi
Graf presentasi
 
~たり、~たりします
~たり、~たりします~たり、~たりします
~たり、~たりします
 
Bab9 wan
Bab9 wanBab9 wan
Bab9 wan
 
CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18CS201- Introduction to Programming- Lecture 18
CS201- Introduction to Programming- Lecture 18
 
Projet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraiteProjet Nous Citoyens : Régime universel de retraite
Projet Nous Citoyens : Régime universel de retraite
 
Uniformes oficial
Uniformes oficialUniformes oficial
Uniformes oficial
 
The Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad HatcherThe Three Little Aviator Pigs By Brad Hatcher
The Three Little Aviator Pigs By Brad Hatcher
 
Web 2ggg
Web 2gggWeb 2ggg
Web 2ggg
 
Benefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questionsBenefits of formative eAssessment and reusable questions
Benefits of formative eAssessment and reusable questions
 
Age of exploration
Age of explorationAge of exploration
Age of exploration
 
Didactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschoolDidactic sequence 1 santo tomas preschool
Didactic sequence 1 santo tomas preschool
 

Similar to Emerging Cyber Security Threats

Similar to Emerging Cyber Security Threats (20)

Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber security Cyber security
Cyber security
 

Emerging Cyber Security Threats

  • 1. The Emerging Threats Of Cyber Security John Patrick Lita Information Security Consultant For ICCT College Students
  • 2. • What is Cyber Security • What is Cyber Crime • History of Security • Threats and Crimes AGENDA
  • 3. • Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security. WHAT IS CYBER SECURITY? Source: whatis.techtarget.com/definition/cybersecurity
  • 4. • Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. WHAT IS CYBER CRIME? https://en.wikipedia.org/wiki/Cybercrime
  • 5. • Let’s talk about a little throwback about the history of security and how it develops day by day, from physical security to digital security THE HISTORY
  • 6. THE STONE AGE Caveman use rocks, braches and other natural resources to fight predators over time, the tools used evolved to spears, bows and arrows,
  • 7. • Guard dogs started to appear around 30,000 BC THE STONE AGE
  • 8. SECURITY EVOLVES 3150 BC followed by a moat around a castle in 3150 BC the industrial revolution
  • 9. SECURITY EVOLVES 1760 - 1840 Between 1760 and 1840 the rise of the security guards,
  • 10. SECURITY EVOLVES 1850S Which were surprisingly followed by home security systems in the 1850's!!
  • 11. SECURITY EVOLVES 1853 Electro-Magnetic Alarm - 1853 The first patent on electro-magnetic alarms was filed in 1853.
  • 12. SECURITY EVOLVES 18TH/19TH CENTURY Cryptography: 18th and 19th Century Cryptography made its presence felt in the 18 and 1900's, where as vaults started appearing in the 18th and 19th century.
  • 13. SECURITY EVOLVES 1990S Write protecting on floppy disc was prevalent in the 1990s, which brings us to where we are today. the age of tokenization and advanced cryptography that protects data at rest and data transmit...
  • 14. The Threats and crimes
  • 15. • Phishing/Spoofing • Blackmail/Extortion • Accessing Stored Communications • Electronic Harassment • Child Pornography • Fraud • Drug Trafficking • Prostitution • Criminal Copyright Infringement CYBER CRIME INCLUDES
  • 17. • Cyberspace lies at the heart of modern society; it impacts our personal lives, our businesses and our essential services. Cyber security embraces both the public and the private sector and spans a broad range of issues related to national security, whether through terrorism, crime or industrial espionage. • E-crime, or cyber crime, whether relating to theft, hacking or denial of service to vital systems, has become a fact of life. The risk of industrial cyber espionage, in which one company makes active attacks on another, through cyberspace, to acquire high value information is also very real. • Cyber terrorism presents challenges for the future. We have to be prepared for terrorists seeking to take advantage of our increasing internet dependency to attack or disable key systems. • CPNI works with the Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter these threats. CYBER THREAT'S Source: http://www.cpni.gov.uk/threats/other-threats/
  • 19. RANSOMWARE Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Source: https://en.wikipedia.org/wiki/Ransomware
  • 20. ESPIONAGE Espionage (colloquially, spying) is the obtaining of information considered secret or confidential without the permission of the holder of the information. Espionage can be committed by an individual or a spy ring (a cooperating group of spies), in the service of a government or a company, or operating independently. Source: https://en.wikipedia.org/wiki/Espionage
  • 21. ADVANCE PERSISTENT THREAT (APT) An advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. Source: searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
  • 22. • Cyber crime is where the computer is use to commit crime. • Criminal can hide their identity on the internet, the power of (Anonymity) • Cyber Crime can rub a bank without physical appearance • Any can be a victim as long a you are connected on the internet WHY SHOULD WE CARE?
  • 23. • Basic information security education • Never rely your safety with your anti-virus, be intelligent and be a responsible internet user • Never connect in public Wi-Fi, • Download in a trusted website HOW CAN WE PROTECT?
  • 24. DEMONSTRATION OF EMAIL SPAMMING USING A WEB APPLICATION
  • 25. CYBER SECURITY AWARENESS VIDEO https://www.youtube.com/watch?v=KK_M-BeIGGQ
  • 26. • whatis.techtarget.com/definition/cybersecurity • https://en.wikipedia.org/wiki/Cybercrime • http://www.cpni.gov.uk/threats/other-threats/ • https://en.wikipedia.org/wiki/Ransomware • Source: https://en.wikipedia.org/wiki/Espionage • searchsecurity.techtarget.com/definition/advanced- persistent-threat-APT Youtube video: • https://www.youtube.com/watch?v=KK_M-BeIGGQ REFERENCES:
  • 27. • John Patrick J. Lita john.patrick.lita@owasp.org THANK YOU FOR LISTENING