SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Cybersecurity 1
Introduction to cybersecurity

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 1
What is cybersecurity?
• A very wide-ranging term with no
standard definition.
• It covers all aspects of ensuring the
protection of citizens, businesses and
critical infrastructures from threats that
arise from their use of computers and
the internet.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 2
Internet-enabled crime
• Criminals see lower risks and high
rewards from cyber crime than through
‘physical’ crime
• Stealing confidential and national
secrets by intelligence agencies and
others now involves illegally accessing
digitised information.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 3
Internet-enabled crime
• Nation states have the potential to
disrupt an enemy’s economy and
perhaps reach their strategic objectives
without risk to their armed forces
• There are fewer online barriers to antisocial behaviour on the net than in face
to face interaction.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 4
Scope of cybersecurity
• Techniques of threat and attack
analysis and mitigation
• Protection and recovery technologies,
processes and procedures for
individuals, business and government
• Policies, laws and regulation relevant to
the use of computers and the Internet
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 5
Cybersecurity is not…
• Computer security
• Security engineering
• Encryption

• Computer crime
• Computer forensics
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 6
Cybersecurity is…
• A socio-technical systems problem
• Security problems almost always stem
from a mix of technical, human and
organisational causes

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 7
Cyber attack
• A malicious attempt, using digital
technologies, to cause personal or
property loss or damage, and/or steal or
alter confidential personal or
organisational data

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 8
Insider attacks
• Attacks to an organisation carried out by
someone who is inside that organisation
• Difficult to counter using technical
methods as the insider may have valid
credentials to access the system
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 9
External attacks
• Attacks to an organisation carried out by
an external agent
• Requires either valid credentials or the
exploitation of some vulnerability to gain
access to the systems
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 10
© Infosecurity magazine 2012
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 11
Malware
• Software that has some malicious intent
and which is installed on a user’s
computer without that user’s consent

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 12
Malware
• Key loggers
– Software installed on a computer that
captures key strokes and sends these
to a remote system

– Used to try and get personal
information to gain access to sites
such as banks

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 13
Malware
• Ransomware
– Software that runs on a user’s computer
and demands that the user pays some
other organisation. If they don’t, the
information on their computer will be
destroyed.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 14
Malware transmission
• Malware can usually spread itself from
one computer to another either as a
virus or as a worm

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 15
Viruses and worms
• Virus – malware attached to a carrier
such as an email message or a word
processing document
• Worm – malware can autonomously
spread itself without a carrier, using
information about connected computers
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 16
Malicious and accidental
damage
• Cybersecurity is most concerned with
– Cyber attacks

• Cyber-accidents
–

Accidental events that can cause
loss or damage to to an individual,
business or public body

Cybersecurity 1: Introduction to cybersecurity 2013

Slide 17
• Many of the same technologies used to
protect against external attack also
protect against cyber-accidents.
• However, sometimes protecting against
cyber attacks increases the probability
of cyber-accidents.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 18
• Adding protection increases system
complexity which increases the likelihood of
introducing bugs into the system and for
humans to make mistakes.
• For example
– An attack detection system might mistakenly
detects an external attack and shut down part of
the system in response to this.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 19
Summary
• Cybersecurity all about protecting, repelling
and recovering from cyberattacks
• Need to be aware of the potential for both
insider and external cyber attacks
• Malware is malicious code that is installed on
a computer without the owner’s consent.
Cybersecurity 1: Introduction to cybersecurity 2013

Slide 20

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Insider threat
Insider threatInsider threat
Insider threat
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information security
Information securityInformation security
Information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Andere mochten auch

Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
Anthonywheeler
 

Andere mochten auch (20)

New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Cybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurityCybersecurity 5 improving cybersecurity
Cybersecurity 5 improving cybersecurity
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Maroochy water breach
Maroochy water breachMaroochy water breach
Maroochy water breach
 
Introduction to systems of systems
Introduction to systems of systemsIntroduction to systems of systems
Introduction to systems of systems
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
System safety
System safetySystem safety
System safety
 
System success and failure
System success and failureSystem success and failure
System success and failure
 
Warsaw airbus accident
Warsaw airbus accidentWarsaw airbus accident
Warsaw airbus accident
 
Reuse landscape
Reuse landscapeReuse landscape
Reuse landscape
 
Intro to requirements eng.
Intro to requirements eng.Intro to requirements eng.
Intro to requirements eng.
 

Ähnlich wie Cybersecurity 1 intro to cybersecurity

CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
Ian Sommerville
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Ähnlich wie Cybersecurity 1 intro to cybersecurity (20)

CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1CS5032 L19 cybersecurity 1
CS5032 L19 cybersecurity 1
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
1_Introduction to security.pptx
1_Introduction to security.pptx1_Introduction to security.pptx
1_Introduction to security.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 

Mehr von sommerville-videos

System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
sommerville-videos
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
sommerville-videos
 

Mehr von sommerville-videos (20)

Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to real time software systems script
Introduction to real time software systems scriptIntroduction to real time software systems script
Introduction to real time software systems script
 
System of systems classification
System of systems classificationSystem of systems classification
System of systems classification
 
Scaling agile
Scaling agileScaling agile
Scaling agile
 
Agile methods for large systems
Agile methods for large systemsAgile methods for large systems
Agile methods for large systems
 
User stories
User storiesUser stories
User stories
 
Agile and plan based development processes
Agile and plan based development processesAgile and plan based development processes
Agile and plan based development processes
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Introducing Software Engineering
Introducing Software EngineeringIntroducing Software Engineering
Introducing Software Engineering
 
Why se script
Why se scriptWhy se script
Why se script
 
Ariane 5 launcher failure
Ariane 5 launcher failure Ariane 5 launcher failure
Ariane 5 launcher failure
 
Airbus Flight Control System
Airbus Flight Control SystemAirbus Flight Control System
Airbus Flight Control System
 
Stakeholders, viewpoints and concerns
Stakeholders, viewpoints and concernsStakeholders, viewpoints and concerns
Stakeholders, viewpoints and concerns
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Requirements engineering challenges
Requirements engineering challengesRequirements engineering challenges
Requirements engineering challenges
 
Emergent properties
Emergent propertiesEmergent properties
Emergent properties
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Availability and reliability
Availability and reliabilityAvailability and reliability
Availability and reliability
 
Critical systems engineering
Critical systems engineeringCritical systems engineering
Critical systems engineering
 
System security
System securitySystem security
System security
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cybersecurity 1 intro to cybersecurity

  • 1. Cybersecurity 1 Introduction to cybersecurity Cybersecurity 1: Introduction to cybersecurity 2013 Slide 1
  • 2. What is cybersecurity? • A very wide-ranging term with no standard definition. • It covers all aspects of ensuring the protection of citizens, businesses and critical infrastructures from threats that arise from their use of computers and the internet. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 2
  • 3. Internet-enabled crime • Criminals see lower risks and high rewards from cyber crime than through ‘physical’ crime • Stealing confidential and national secrets by intelligence agencies and others now involves illegally accessing digitised information. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 3
  • 4. Internet-enabled crime • Nation states have the potential to disrupt an enemy’s economy and perhaps reach their strategic objectives without risk to their armed forces • There are fewer online barriers to antisocial behaviour on the net than in face to face interaction. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 4
  • 5. Scope of cybersecurity • Techniques of threat and attack analysis and mitigation • Protection and recovery technologies, processes and procedures for individuals, business and government • Policies, laws and regulation relevant to the use of computers and the Internet Cybersecurity 1: Introduction to cybersecurity 2013 Slide 5
  • 6. Cybersecurity is not… • Computer security • Security engineering • Encryption • Computer crime • Computer forensics Cybersecurity 1: Introduction to cybersecurity 2013 Slide 6
  • 7. Cybersecurity is… • A socio-technical systems problem • Security problems almost always stem from a mix of technical, human and organisational causes Cybersecurity 1: Introduction to cybersecurity 2013 Slide 7
  • 8. Cyber attack • A malicious attempt, using digital technologies, to cause personal or property loss or damage, and/or steal or alter confidential personal or organisational data Cybersecurity 1: Introduction to cybersecurity 2013 Slide 8
  • 9. Insider attacks • Attacks to an organisation carried out by someone who is inside that organisation • Difficult to counter using technical methods as the insider may have valid credentials to access the system Cybersecurity 1: Introduction to cybersecurity 2013 Slide 9
  • 10. External attacks • Attacks to an organisation carried out by an external agent • Requires either valid credentials or the exploitation of some vulnerability to gain access to the systems Cybersecurity 1: Introduction to cybersecurity 2013 Slide 10
  • 11. © Infosecurity magazine 2012 Cybersecurity 1: Introduction to cybersecurity 2013 Slide 11
  • 12. Malware • Software that has some malicious intent and which is installed on a user’s computer without that user’s consent Cybersecurity 1: Introduction to cybersecurity 2013 Slide 12
  • 13. Malware • Key loggers – Software installed on a computer that captures key strokes and sends these to a remote system – Used to try and get personal information to gain access to sites such as banks Cybersecurity 1: Introduction to cybersecurity 2013 Slide 13
  • 14. Malware • Ransomware – Software that runs on a user’s computer and demands that the user pays some other organisation. If they don’t, the information on their computer will be destroyed. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 14
  • 15. Malware transmission • Malware can usually spread itself from one computer to another either as a virus or as a worm Cybersecurity 1: Introduction to cybersecurity 2013 Slide 15
  • 16. Viruses and worms • Virus – malware attached to a carrier such as an email message or a word processing document • Worm – malware can autonomously spread itself without a carrier, using information about connected computers Cybersecurity 1: Introduction to cybersecurity 2013 Slide 16
  • 17. Malicious and accidental damage • Cybersecurity is most concerned with – Cyber attacks • Cyber-accidents – Accidental events that can cause loss or damage to to an individual, business or public body Cybersecurity 1: Introduction to cybersecurity 2013 Slide 17
  • 18. • Many of the same technologies used to protect against external attack also protect against cyber-accidents. • However, sometimes protecting against cyber attacks increases the probability of cyber-accidents. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 18
  • 19. • Adding protection increases system complexity which increases the likelihood of introducing bugs into the system and for humans to make mistakes. • For example – An attack detection system might mistakenly detects an external attack and shut down part of the system in response to this. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 19
  • 20. Summary • Cybersecurity all about protecting, repelling and recovering from cyberattacks • Need to be aware of the potential for both insider and external cyber attacks • Malware is malicious code that is installed on a computer without the owner’s consent. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 20