introduction to cyber-defense (richard matevosyan)
TRANSCRIPT
![Page 1: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/1.jpg)
Educational Technology Class
INTODUCTION TO CYBER DEFENSE INTODUCTION TO CYBER DEFENSE
- SIXTH GRADE -- SIXTH GRADE -
Richard MatevosyanJanuary 22, 2015
![Page 2: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/2.jpg)
LAUNCHING THE OBJECTIVESLAUNCHING THE OBJECTIVES
Cyber-threats or risks
Vulnerabilities
Safeguarding
Promoting cyber -citizenship
![Page 3: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/3.jpg)
Are we safe at cyber-school?
The school is a safer place than any other cyber-environment. However, we still
remain vulnerable for the outsiders. One of the defense tactics is knowing the
basics of virtual information assurance.
![Page 4: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/4.jpg)
Fundamentals of Information Assurance
• Confidentiality (v. privacy)• Integrity (quality, accuracy, relevance)• Availability (accessibility) • Established Public Service
Announcement (PSA)• Peer-too-peer (P2P) network within the
school or organization
![Page 5: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/5.jpg)
How Does an Attack Happen?
• By identifying the target• By gathering information• By preparing the malicious
code • By planning the attack• By attacking through the
“backdoor!”
![Page 6: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/6.jpg)
Web can be used as a weapon
Let us commemorate:• Infrastructure run by computers• Overflow dam, disrupt oil supply• Sewage plant in Australia overflowed due to black
hat hackers• Cyberterrorism (Bin Laden, Aum Shinrikyo)• Combined attack • Cause power outage and biological attack• EMS disruption and nuclear emergency
![Page 7: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/7.jpg)
MALICIOUS CODES AS THE BULLETS
SpywareMalware (Adware)
WarmsViruses
Intrude by email attachments, forwarded emails, or when we download unsolicited programs from free
cyber-space.
![Page 8: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/8.jpg)
Malicious Software (Malware)
• Are designed to damage/disrupt a system without the owner’s consent.
• Software that gets installed on your system and performs unwanted tasks.
• Pop- ups to virus deployment.
![Page 9: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/9.jpg)
Virus• Individual programs that
propagate by first infecting executable files or the system and then makes copies of itself.
• Can operate without our knowledge (when visiting a website, or opening an attachment).
• WE OPEN IT
![Page 10: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/10.jpg)
Worms
• Are designed to replicate and spread from computer to computer
• WE DON’T HAVE TO OPEN IT
![Page 11: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/11.jpg)
Trojan Horse
• Designed like benign programs, but have a hidden code that may compromise the system from remote user/computer.
![Page 12: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/12.jpg)
Spyware
Computer software (benign or malignant) that gathers information (phone numbers, DOB, email account password, address, e-signature, credit card information) about the computer user and transmits it without the user's knowledge .
![Page 13: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/13.jpg)
Adware
• Advertising supported software in which advertisements are displayed while the program is running. So annoying...
![Page 14: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/14.jpg)
Hackers & Crackers
• White hat hackers (curious), explore our vulnerabilities.
• Black hat hackers (malicious), exploit vulnerabilities for monetary profit or perpetrate a crime - an organized crime.
• Gray hat hackers (ethically righteous, just), are motivated by a sense of public good - just like the cowboys.
![Page 15: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/15.jpg)
WHAT CAN WE DO?
• Establish security culture
• Establish best security practices
• Define goals and structure of security program
• Educate personnel
• Maintain compliance with any regulations
![Page 16: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/16.jpg)
P 2 P(peer to peer)
• Acceptable use policy (AUP) is about the cyber- behavior
• Separation of duties• Hiring and termination practices need to run
background checks, orientation, exit interview, escorting procedure, as the must.
![Page 17: Introduction To Cyber-Defense (Richard Matevosyan)](https://reader031.vdocuments.us/reader031/viewer/2022022201/589a39731a28ab8c588b4e9d/html5/thumbnails/17.jpg)
SUMMARYSUMMARY
Human error is the biggest threat!
We must:• Know how to identify vulnerabilities • Know hot to report or fix vulnerabilities• Have policies and procedures • Have computer maintenance programs• Educate the staff• Stay informed of latest and greatest.