Chapter 1 Introduction To Information Security
Chapter 1 Introduction To Information Security
Chapter 1 Introduction To Information Security
Introduction
-Er.Shankar Bhattarai, M.Sc. Engg.
My Introduction
• Shankar Bhattarai
• M.Sc. Engineering in Technology and Innovation Management
(Pulchowk Campus, IoE, Tribhuvan University)
• B.E Computer Engineering (Kantipur Engineering College, Tribhuvan
University)
Email: [email protected]
Current: IT Officer (SHRUTI Office), Lecturer (CITE)
Past: System Admin (GIZ Nepal),Project Coordinator (Bits Innovation)
Interest : Computer Network & Security
Basics of Information System
• Data: raw facts
Alphanumeric, image, audio, and video
• Information: collection of facts organized in such a way that they have
additional value beyond the value of the facts themselves.
• An Information System is a set of interrelated components that
collect or retrieve, process, store and distribute information to
support decision making and control in an organization.
What is Security?
• “The quality or state of being secure i.e. to be free from danger”
• To be protected from attackers
• A successful organization should have multiple layers of security in
place:
• Physical security
• Personal security
• Operations security
• Communications security
• Network security
Information Security
Information security means protecting information and information
systems from unauthorized access, use, disclosure, disruption,
modification, or destruction.
7. Periodic Review
• Few controls are permanently effective. Just when the security specialist finds a way to
secure assets against certain kinds of attacks, the opposition doubles its efforts in an
attempt to defeat the security mechanisms. Thus, judging the effectiveness of a control is
an ongoing task. (Sidebar 1-8 reports on periodic reviews of computer security.)
Computer Attack
• A computer/cyber attack is any type of offensive action that targets
computer information systems, infrastructures, computer networks or
personal computer devices, using various methods to steal, alter or destroy
data or information systems.
• Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
• Man-in-the-middle (MitM) attack
• Phishing and spear phishing attacks
• Password attack/Brute force
• SQL injection attack
• Cross-site scripting (XSS) attack
• Eavesdropping attack
• Malware attack
Biggest Cyber Attacks in the History
Yahoo ! , 2016
• The company said the attack compromised the real names, email
addresses, dates of birth and telephone numbers of 500 million users.
Marriott - Starwood Hotels, 2018
• On November 30, 2018, Marriott International, one of the largest
hotel chains in the world, suffered a major data breach involving its
reservations database. Marriot initially estimated that as many as 500
million of its customers might have been affected by the cyber-
incident, but then went on to amend its estimate to 383 million.
Biggest Cyber Attacks in the History
eBay
• As one of the world’s largest online marketplaces, most famous for its
auction-style sales, eBay probably needs little in the way of introduction.
In 2014, the company disclosed that it had been the victim of an attack in
which as many as 145 million of its active users were affected.
Target
• In 2013, Target, one of the largest retailers in the United States, suffered
a major data breach that affected more than 41 million customer
payment card accounts as well as the contact information of over 60
million customers.
Biggest Cyber Attacks in the History
• Evernote: 50 million records compromised in 2013
• Living Social: 50 million records compromised in 2013
• Sony Online Entertainment: 24.6 million records compromised in
2011
• Sony PlayStation Network: 77 million records compromised in 2010
Biggest Cyber Attacks in the History
• In Nepal,
Vianet,April 2020
There was a breach of customer data from a well-known ISP of Nepal,
Vianet; more than 1.7 Lakh users data was leaked on the internet.
Foodmandu, March 2020
The hackers have leaked the database consist of more than 50,000 User
names, personal detail, latitude, longitude, current address, emails, and
phone number
Biggest Cyber Attacks in the History
ATM Hacked, 2019
September 2nd, 2019, five Chinese citizens found hacking the Nepalese
ATM server around Kathmandu Valley. The Hacker succeed to hack the
ATM Machine after injecting the malware in the ATM machine. In the
following cybercrime, Chinese hackers robbed Rs 17.6 lakh in total.
Security breaches leads to
• Reputation loss
• Financial loss
• Intellectual property loss
• Breaches leading to legal actions
• Loss of customer confidence
• Business interruption costs
• Loss of goodwill
Social Engineering
• Social Engineering – is the art of manipulating people so that they
give up their confidential information like bank account details,
password etc.
• These criminals can trick you into giving your private and confidential
information or they will gain your trust to get access to your computer
to install a malicious software- that will give them control of your
computer.
Computer Crime
• Cybercrime, also called computer crime, the use of a computer as an instrument to
further illegal ends, such as committing fraud, stealing intellectual property,
stealing identities, or violating privacy, spreading private image or videos over
internet etc.
• computer crime is an act performed by a knowledgeable computer user, sometimes
referred to as a hacker that illegally browses or steals a company's or individual's
private information. In some cases, this person or group of individuals may be
malicious and destroy or otherwise corrupt the computer or data files.
• From 2018 to 2019, 180 cases of cybercrime were recorded, 125 from the
Kathmandu and 55 from outside the valley.
• There were 132 cases reported during 2017, and according to Nepal Police, they
reported just 53 cases of cybercrime in 2016.
Computer security risk
• A computer security risk is anything on your computer that may
damage or steal your data or allow someone else to access your
computer, without your knowledge or consent. There are a lot of
different things that can create a computer risk like malware (Viruses),
spyware, ransomware, trojan horse, worms etc.
• Misconfiguration of computer products as well as unsafe computing
habits also pose risks.
Threats on Information Security
• Threat can be anything that can take advantage of a vulnerability to
breach security and negatively alter, erase, harm object or objects of
interest.
• Vulnerable: The state of being exposed to the possibility of being
attacked or harmed
END !!