KEMBAR78
Explain why networks and data are attacked. | PPTX
Advanced Cyber Security
Yogyakarta Desember 2021
Module 1: The Danger
Module Objectives
Module Title: The Danger
Module Objective: Explain why networks and data are attacked.
Topic Title Topic Objective
War Stories Explain why networks and data are attacked.
Threat Actors Explain the motivations of the threat actors behind specific security incidents.
Threat Impact Explain the potential impact of network security attacks.
1.1 War Stories
The Danger
Hijacked People
• Hackers can set up open “rogue” wireless
hotspots posing as a genuine wireless
network.
• Rogue wireless hotspots are also known as
“evil twin” hotspots.
The Danger
Ransomed Companies
• Employees of an organization are often lured into
opening attachments that install ransomware on
the employees’ computers.
• This ransomware, when installed, begins the
process of gathering and encrypting corporate
data.
• The goal of the attackers is financial gain, because
they hold the company’s data for ransom until they
are paid.
The Danger
Targeted Nations
• Some of today’s malware is so sophisticated
and expensive to create that security experts
believe only a nation state or group of nations
could possibly have the influence and funding to
create it.
• Such malware can be targeted to attack a
nation’s vulnerable infrastructure, such as
the water system or power grid.
• One such malware was the Stuxnet worm
that infected USB drives and infiltrated
Windows operating systems. It then targeted Step
7 software that was developed by Siemens for
their Programmable Logic Controllers (PLCs).
1.2 Threat Actors
Threat Actors
Threat Actors
• Threat actors are individuals or groups of individuals who perform
cyberattacks. They include, but are not limited to:
• Amateurs
• Hacktivists
• Organized crime groups
• State-sponsored groups
• Terrorist groups
• Cyberattacks are intentional malicious acts meant to negatively
impact another individual or organization.
Threat Actors
Threat Actors (Contd.)
Amateurs
• They are also
known as script
kiddies and
have little or no
skill.
• They often use
existing tools
or instructions
found on
the internet to
launch attacks.
• Even though
they use basic
tools, the
results can still
be devastating.
Hacktivists
• These are hackers who
publicly protest against a
variety of political and
social ideas.
• They post articles and
videos, leaking sensitive
information, and
disrupting web services
with illegitimate traffic in
Distributed Denial of
Service (DDoS) attacks.
Financial Gain
• Much of the hacking
activity that consistently
threatens our security is
motivated by financial
gain.
• Cybercriminals want to
gain access to bank
accounts, personal data,
and anything else they
can leverage to generate
cash flow.
Trade Secrets and Global
Politics
• At times, nation states
hack other countries, or
interfere with their
internal politics.
• Often, they may be
interested in using
cyberspace for industrial
espionage.
• The theft of intellectual
property can give a
country a significant
advantage in
international trade.
Threat Actors
How Secure is the Internet of Things?
• The Internet of Things (IoT) helps individuals
connect things to improve their quality of life.
• Many devices on the internet are not updated
with
the latest firmware. Some older devices were not
even developed to be updated with patches.
These two situations create opportunity for threat
actors and security risks for the owners of these
devices.
1.3 Threat Impact
Threat Impact
PII, PHI, and PSI
• Personally Identifiable Information (PII) is any information
that can be used to positively identify an individual, for example, name,
social security number, birthdate, credit card numbers etc.
• Cybercriminals aim to obtain these lists of PII that can then be sold on
the dark web. Stolen PII can be used to create fake financial accounts,
such as credit cards and short-term loans.
• The medical community creates and maintains Electronic
Medical Records (EMRs) that contain Protected Health
Information (PHI), a subset of PII.
• Personal Security Information (PSI), another type of PII, includes
usernames, passwords, and other security-related information that
individuals use to access information or services on the network.
Threat Impact
Lost Competitive Advantage
• The loss of intellectual property to competitors is a serious concern.
• An additional major concern is the loss of trust that comes when a company is unable to
protect its customers’ personal data.
• The loss of competitive advantage may come from this loss of trust rather than another
company or country stealing trade secrets.
Threat Impact
Politics and National Security
• It is not just businesses that get hacked.
• State-supported hacker warriors can cause disruption and destruction of vital services and
resources within an enemy nation.
• The internet has become essential as a medium for commercial and financial activities.
Disruption of these activities can devastate a nation’s economy.
1.4 The Danger Summary
The Danger Summary
What Did I Learn in this Module?
• Threat actors can hijack banking sessions and other personal information by using “evil twin”
hotspots.
• Threat actors include, but are not limited to, amateurs, hacktivists, organized crime groups, state
sponsored, and terrorist groups.
• As the Internet of Things (IoT) expands, webcams, routers, and other devices in our homes are also
under attack.
• Personally Identifiable Information (PII) is any information that can be used to positively identify an
individual.
• The medical community creates and maintains Electronic Medical Records (EMRs) that contain
Protected Health Information (PHI), a subset of PII.
• Personal Security Information (PSI) includes usernames, passwords, and other security-related
information that individuals use to access information or services on the network.

Explain why networks and data are attacked.

  • 1.
    Advanced Cyber Security YogyakartaDesember 2021 Module 1: The Danger
  • 2.
    Module Objectives Module Title:The Danger Module Objective: Explain why networks and data are attacked. Topic Title Topic Objective War Stories Explain why networks and data are attacked. Threat Actors Explain the motivations of the threat actors behind specific security incidents. Threat Impact Explain the potential impact of network security attacks.
  • 3.
  • 4.
    The Danger Hijacked People •Hackers can set up open “rogue” wireless hotspots posing as a genuine wireless network. • Rogue wireless hotspots are also known as “evil twin” hotspots.
  • 5.
    The Danger Ransomed Companies •Employees of an organization are often lured into opening attachments that install ransomware on the employees’ computers. • This ransomware, when installed, begins the process of gathering and encrypting corporate data. • The goal of the attackers is financial gain, because they hold the company’s data for ransom until they are paid.
  • 6.
    The Danger Targeted Nations •Some of today’s malware is so sophisticated and expensive to create that security experts believe only a nation state or group of nations could possibly have the influence and funding to create it. • Such malware can be targeted to attack a nation’s vulnerable infrastructure, such as the water system or power grid. • One such malware was the Stuxnet worm that infected USB drives and infiltrated Windows operating systems. It then targeted Step 7 software that was developed by Siemens for their Programmable Logic Controllers (PLCs).
  • 7.
  • 8.
    Threat Actors Threat Actors •Threat actors are individuals or groups of individuals who perform cyberattacks. They include, but are not limited to: • Amateurs • Hacktivists • Organized crime groups • State-sponsored groups • Terrorist groups • Cyberattacks are intentional malicious acts meant to negatively impact another individual or organization.
  • 9.
    Threat Actors Threat Actors(Contd.) Amateurs • They are also known as script kiddies and have little or no skill. • They often use existing tools or instructions found on the internet to launch attacks. • Even though they use basic tools, the results can still be devastating. Hacktivists • These are hackers who publicly protest against a variety of political and social ideas. • They post articles and videos, leaking sensitive information, and disrupting web services with illegitimate traffic in Distributed Denial of Service (DDoS) attacks. Financial Gain • Much of the hacking activity that consistently threatens our security is motivated by financial gain. • Cybercriminals want to gain access to bank accounts, personal data, and anything else they can leverage to generate cash flow. Trade Secrets and Global Politics • At times, nation states hack other countries, or interfere with their internal politics. • Often, they may be interested in using cyberspace for industrial espionage. • The theft of intellectual property can give a country a significant advantage in international trade.
  • 10.
    Threat Actors How Secureis the Internet of Things? • The Internet of Things (IoT) helps individuals connect things to improve their quality of life. • Many devices on the internet are not updated with the latest firmware. Some older devices were not even developed to be updated with patches. These two situations create opportunity for threat actors and security risks for the owners of these devices.
  • 11.
  • 12.
    Threat Impact PII, PHI,and PSI • Personally Identifiable Information (PII) is any information that can be used to positively identify an individual, for example, name, social security number, birthdate, credit card numbers etc. • Cybercriminals aim to obtain these lists of PII that can then be sold on the dark web. Stolen PII can be used to create fake financial accounts, such as credit cards and short-term loans. • The medical community creates and maintains Electronic Medical Records (EMRs) that contain Protected Health Information (PHI), a subset of PII. • Personal Security Information (PSI), another type of PII, includes usernames, passwords, and other security-related information that individuals use to access information or services on the network.
  • 13.
    Threat Impact Lost CompetitiveAdvantage • The loss of intellectual property to competitors is a serious concern. • An additional major concern is the loss of trust that comes when a company is unable to protect its customers’ personal data. • The loss of competitive advantage may come from this loss of trust rather than another company or country stealing trade secrets.
  • 14.
    Threat Impact Politics andNational Security • It is not just businesses that get hacked. • State-supported hacker warriors can cause disruption and destruction of vital services and resources within an enemy nation. • The internet has become essential as a medium for commercial and financial activities. Disruption of these activities can devastate a nation’s economy.
  • 15.
  • 16.
    The Danger Summary WhatDid I Learn in this Module? • Threat actors can hijack banking sessions and other personal information by using “evil twin” hotspots. • Threat actors include, but are not limited to, amateurs, hacktivists, organized crime groups, state sponsored, and terrorist groups. • As the Internet of Things (IoT) expands, webcams, routers, and other devices in our homes are also under attack. • Personally Identifiable Information (PII) is any information that can be used to positively identify an individual. • The medical community creates and maintains Electronic Medical Records (EMRs) that contain Protected Health Information (PHI), a subset of PII. • Personal Security Information (PSI) includes usernames, passwords, and other security-related information that individuals use to access information or services on the network.

Editor's Notes

  • #2 CyberOps Associate v1.0 1 – The Danger 1.0 – Introduction 1.0.3 – What Will I Learn in this Module? 1.0.4 – Class Activity - Top Hacker Shows Us How It’s Done
  • #4 1 – The Danger 1.1 – War Stories 1.1.1 – Hijacked People
  • #5 1 – The Danger 1.1 – War Stories 1.1.2 – Ransomed Companies
  • #6 1 – The Danger 1.1 – War Stories 1.1.3 – Targeted Nations
  • #8 1 – The Danger 1.2 – Threat Actors 1.2.1 – Threat Actors
  • #9 1 – The Danger 1.2 – Threat Actors 1.2.1 – Threat Actors
  • #10 1 – The Danger 1.2 – Threat Actors 1.2.2 – How Secure is the Internet of Things?
  • #12 1 – The Danger 1.3 – Threat Impact 1.3.1 – PII, PHI, and PSI
  • #13 1 – The Danger 1.3 – Threat Impact 1.3.2 – Lost Competitive Advantage
  • #14 1 – The Danger 1.3 – Threat Impact 1.3.3 – Politics and National Security
  • #16 1 – The Danger 1.4 – The Danger Summary 1.4.1 – What Did I Learn in this Module? 1.4.2 – Module 1: The Danger Quiz