Cybersecurity Risk
Cybersecurity Risk
AWARENESS
[email protected]/
Introduce
• Full name
• Education Background
• Current Responsibility
• Working Experience
Training Rules
Being Passionate
Training outlines
Cybersecurity Risk
Cybersecurity Incidents
Social Engineering
IT Security Policy
Endpoint Security
Cyber Attack
Any intentional effort to steal, expose, alter, disable, or
destroy data, applications or other assets
Incident
Threat
An occurrence that actually or
Malicious attack by an individual or
imminently jeopardizes, without
organization attempting to gain access
lawful authority
to a computer network, corrupt data, or
steal confidential information
Risk
Vulnerability
Probability of exposure or loss
weakness or opportunity in an
resulting from a cyber attack or
information system that
data breach on your organization.
cybercriminals can exploit and
gain unauthorized access to a
computer system.
What Is Cybersecurity
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks,
and IoT devices data from malicious attacks.
01 02 03 04
Securing Physical IT Security Educating
Network system Security Policy Employee
Why Cybersecurity so Important
Espionage
2 State actors
3 Insider Threat
Cybercriminals
Globally Recognized
4 Cybercrime group
Business compitator
5
6 Personeel’s
Discussion Time
Cybersecurity
Risks
Threat
Vulnerability Threat is any potential danger or
Liklihood
A vulnerability is a weakness, adverse action that could exploit This indicates the probability or
flaw, or shortcoming in a system, a vulnerability in your systems, frequency of threats occur in
infrastructure, database, data, people, or other assets and entire time pteroid or annually
software, process, or set of potentially affect those assets'
controls that can be exploited by confidentiality, integrity, or
a threat actor availability.
Risk in Cybersecurity
Your
Countermeasures
Risk Assumption
Risk Avoidance
Risk Tolerance
Risk Sharing
Risk Assessment
Personal Browser
Military Data
Information Information
Cybersecurity Data Breach Protection Strategy
Proactive Active Passive
This type of security focuses on Does not inject additional traffic
Deception technology that
identifying potential weaknesses into the network. Instead, it
detects attackers as early as
in a network well before they can captures and analyses the existing
possible in the attack cycle. network traffic.
be exploited.
comprehensive security Provides a comprehensive view of
• Enact Basic Security
program that includes both actual network behaviour, allowing
Practices
prevention and for detailed analysis of traffic
• Perform Regular Network
detection/response capabilities. patterns, security threats, and
Monitoring application performance over time
• Detection
• Conduct Cybersecurity • Recovery
• Response
Awareness Training • Analysis of signature
• Deterrence
• Engage in Pentest • Behavioural characteristics
• Reduction of risk
• Tracing attack • Risk Register
• Awareness Training
Endpoint Countermeasure
Techniqie
s
Defense in Depth (DiD)
01 Social Engineering
02 Endpoint Security
03 IT policy & Standard
04 Network Security Control
05 IT Devices & protection
06 Hackers Techniques
07 Social Media Usage
Disk encryption to prevent data exfiltration
Security method for protecting sensitive data at the hardware level by encrypting
all data on a disk drive.
Disk-level encryption safeguards data from getting into the wrong hands and is
important for organizations that are following data security compliance regulations
such as the HIPAA the GDPR
01 02 03 04 05
VeraCrypt Bitlocker DiskCryptor FileVault 2 LUKS2
Advanced antimalware and antivirus protection
Antivurus
Antimalware
Proactive web security (WAF, checkpoint)
A holistic approach to website protection is important because it takes a comprehensive, all-
encompassing approach to website security. It involves addressing all aspects of the website,
including website infrastructure such us.
■ Firewall Configuration
■ Authentication and Authorization system
■ Incident Detection System
■ Regular Monitoring
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
O RUBK EUA
CONT...
Example
1 Active Working Hours
Acceptable Use Policy
2 Privilege to Access Resources Security Awareness and Training Policy
BCP is a document that explains the BCP is the process of creating a system in
actions you should take before, during your business that helps prevent,
and after unexpected events and minimise and recover from threats in
situations. • Natural disasters (floods, storms)
It is designed to help you: • Fire
• Identify, prevent or reduce risks
• power outages
• Prepare for risks that are out of your
• IT outages
control
• Supply chain failures
• Respond and recover if an incident or
• Staff shortages
crisis occurs.
• Pandemics.
Assurance of IT services
The insurance industry can play an essential role in working with governments to improve the
resilience of critical infrastructure against natural disasters.
First, its underwriting expertise offers detailed risk assessment of the critical assets, helping
governments “price” the risk exposure of their critical infrastructure.
Second, Pooling risks and providing financial compensation, insurance helps restore the
destroyed assets in the wake of a disaster.
Third, the insurance industry, as an investor, can play an important role in the long-term
financing of the critical infrastructure.
International Standard
Organization
Social Engineering And
Its Techniques
• Social engineering is the art of convincing
people to reveal confidential information.
• Social engineering is all about the
psychology of persuasion.
Program
(Organizational)
Security Policy
System Specific
Policy
Program (Organizational)
Security Policy
Program policies are strategic, high-level
blueprints that guide an organization’s
information security program.
A security policy must answer three questions.
w Who can access
Which resources
In what manner?
Eg. Protecting IT assets from External Attack.
Issue-specific policies are developed to focus on
areas of current relevance and concern (and
sometimes controversy) to an organization
Password management
Facilitates the
confidentiality, integrity, Reduces the risk of
and availability of data security incidents