Cyber Security - Lecture 1 - Threats and Attacks
Cyber Security - Lecture 1 - Threats and Attacks
Cyber Security - Lecture 1 - Threats and Attacks
AND ATTACKS
Lecture # 01
Instructor: Mr. Sharjeel Ahmed
Slide Elements
• What is Threat in Cyber-Security?
• Types of Cyber-Security Threats
• Cyber Threat Actors
• Practices to Protect from Cyber Threats
CYBER SECURITY THREATS
What is Cyber-security?
• Cyber-security is the art of protecting networks, devices, and data
from unauthorized access or criminal use and the practice of ensuring
confidentiality, integrity, and availability of information.
• More than 71% of targeted attacks involve the use of spear phishing.
4. Man in the Middle Attack
• Man in the Middle (MitM) attack occurs when cyber criminals place
themselves between a two-party communication. Once the attacker
interprets the communication, they may filter and steal sensitive data
and return different responses to the user.
• A man-in-the-middle attack like this is generally not possible if the
initial request from the customer uses HTTPS.
• According to Netcraft (Internet services company), 95% of HTTPS
servers are vulnerable to MitM.
5. Denial of Service Attack
• Denial of Service attacks aims at flooding systems, networks, or
servers with massive traffic, thereby making the system unable to
fulfill legitimate requests. Attacks can also use several infected
devices to launch an attack on the target system. This is known as a
Distributed Denial of Service (DDoS) attack.
• SQL injection accounts for nearly 65.1% of all web application attacks.
7. Zero-day Exploit
• A zero-day attack occurs when software or hardware vulnerability is
announced, and the cybercriminals exploit the vulnerability before a
patch or solution is implemented.
• Backup Data: Backing up data regularly helps reduce the risk of data
breaches. Back up your website, applications, databases, emails,
attachments, files, and more on an ongoing and consistent basis.