0% found this document useful (0 votes)
36 views

Cybersecurity Risk

This document discusses cybersecurity awareness and provides an overview of key cybersecurity concepts. It begins by introducing the trainer and outlining the training rules, outlines, and objectives. It then defines cybersecurity and the goals of confidentiality, integrity, and availability (CIA). Various cybersecurity risks, threats, vulnerabilities, and attacks are described. The importance of cybersecurity is highlighted due to increased connectivity and digitalization. Different types of cybercriminals and their goals are listed. The document discusses risk mitigation strategies and options. It also covers topics like social engineering, security policies, endpoint security, and data breach protection strategies. Specific endpoint security techniques and countermeasures are provided.

Uploaded by

Martha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Cybersecurity Risk

This document discusses cybersecurity awareness and provides an overview of key cybersecurity concepts. It begins by introducing the trainer and outlining the training rules, outlines, and objectives. It then defines cybersecurity and the goals of confidentiality, integrity, and availability (CIA). Various cybersecurity risks, threats, vulnerabilities, and attacks are described. The importance of cybersecurity is highlighted due to increased connectivity and digitalization. Different types of cybercriminals and their goals are listed. The document discusses risk mitigation strategies and options. It also covers topics like social engineering, security policies, endpoint security, and data breach protection strategies. Specific endpoint security techniques and countermeasures are provided.

Uploaded by

Martha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

CYBERSECURITY

AWARENESS

[email protected]/
Introduce
• Full name

• Education Background

• Current Responsibility

• Working Experience
Training Rules

Silent your mobile phone

Ask Question any time

Bring good mood!

Being Passionate
Training outlines
Cybersecurity Risk

Cybersecurity Incidents

Social Engineering

IT Security Policy

Endpoint Security
Cyber Attack
Any intentional effort to steal, expose, alter, disable, or
destroy data, applications or other assets

Incident
Threat
An occurrence that actually or
Malicious attack by an individual or
imminently jeopardizes, without
organization attempting to gain access
lawful authority
to a computer network, corrupt data, or
steal confidential information

Risk
Vulnerability
Probability of exposure or loss
weakness or opportunity in an
resulting from a cyber attack or
information system that
data breach on your organization.
cybercriminals can exploit and
gain unauthorized access to a
computer system.
What Is Cybersecurity
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks,
and IoT devices data from malicious attacks.

Multiple layers of protection spread across the


computers, networks, programs, or data that one intends to
keep safe. In an organization, the people, processes, and
technology must all complement one another to create an
effective defence from cyber attacks.
Confidentiality, Integrity & Availability

Confidentiality:- are designed to prevent sensitive


information from unauthorized access attempts

Integrity:- Maintaining the consistency, accuracy


and trustworthiness of data over its entire lifecycle.

Avaliability:- information should be consistently


and readily accessible for authorized parties
How to Implement CIA

01 02 03 04
Securing Physical IT Security Educating
Network system Security Policy Employee
Why Cybersecurity so Important

Everything Connected National Security

Personal documents Business continuity

Digital footprint World borderlessness

Digital Finance Cybercrime /Attack

Huge IT infrastructure Endpoint vulnerability


Cybersecurity attack Goals
Service Disruption (DDoS)

Financial gain (Malware)

Steal Data of Competitive

Change Modify Data

Espionage

Disable and destroy


1 Hacktivist

2 State actors

3 Insider Threat
Cybercriminals
Globally Recognized
4 Cybercrime group

Business compitator
5

6 Personeel’s
Discussion Time

Cybersecurity
Risks

Given time: 10 minutes


Cybersecurity
Risks
RISK
A risk is the chance of
something happening that
will have a negative effect.
Cybersecurity Risk

Threat
Vulnerability Threat is any potential danger or
Liklihood
A vulnerability is a weakness, adverse action that could exploit This indicates the probability or
flaw, or shortcoming in a system, a vulnerability in your systems, frequency of threats occur in
infrastructure, database, data, people, or other assets and entire time pteroid or annually
software, process, or set of potentially affect those assets'
controls that can be exploited by confidentiality, integrity, or
a threat actor availability.
Risk in Cybersecurity

Finally, the risk is the


potential for loss and
damage when the
threat does occur.

Risk = Vulnerability X Threat X Likelihood


or Impact X liklihood
cont.......

Your
Countermeasures
Risk Assumption

Risk Avoidance

Risk mitigation Planning

Research & Acknowledgment

Risk Metigation Option


Risk Transference
Risk Acceptance

Risk Tolerance

Risk Sharing

Risk Assessment

Risk Metigation Option


Endpoint Security
Practice of securing endpoints or entry
points of end-user devices from being
exploited by malicious actors and
campaigns.
• Desktops • Machines,
• Laptops • IoT Devices,
• Smart watch, • Tablets
• Printer • Mobile
• Servers • Vehicles
• ATM • Households
Endpoints Contian’s

Applications Stored Data Databases

Business Security Vendor


Strategy Controls Arguments

Personal Browser
Military Data
Information Information
Cybersecurity Data Breach Protection Strategy
Proactive Active Passive
This type of security focuses on Does not inject additional traffic
Deception technology that
identifying potential weaknesses into the network. Instead, it
detects attackers as early as
in a network well before they can captures and analyses the existing
possible in the attack cycle. network traffic.
be exploited.
comprehensive security Provides a comprehensive view of
• Enact Basic Security
program that includes both actual network behaviour, allowing
Practices
prevention and for detailed analysis of traffic
• Perform Regular Network
detection/response capabilities. patterns, security threats, and
Monitoring application performance over time
• Detection
• Conduct Cybersecurity • Recovery
• Response
Awareness Training • Analysis of signature
• Deterrence
• Engage in Pentest • Behavioural characteristics
• Reduction of risk
• Tracing attack • Risk Register
• Awareness Training
Endpoint Countermeasure
Techniqie
s
Defense in Depth (DiD)

Strategy that leverages multiple layer of Cybersecurity


measures to protect holistic an organization's assets.
Awareness for Internal employee

01 Social Engineering
02 Endpoint Security
03 IT policy & Standard
04 Network Security Control
05 IT Devices & protection
06 Hackers Techniques
07 Social Media Usage
Disk encryption to prevent data exfiltration

Security method for protecting sensitive data at the hardware level by encrypting
all data on a disk drive.
Disk-level encryption safeguards data from getting into the wrong hands and is
important for organizations that are following data security compliance regulations
such as the HIPAA the GDPR

01 02 03 04 05
VeraCrypt Bitlocker DiskCryptor FileVault 2 LUKS2
Advanced antimalware and antivirus protection

Antivirus is a type of software program that helps in protecting the


computer system from viruses.

Antimalware is also a software program but it protects the computer


systems from all kinds of malware

Antivurus
Antimalware
Proactive web security (WAF, checkpoint)
A holistic approach to website protection is important because it takes a comprehensive, all-
encompassing approach to website security. It involves addressing all aspects of the website,
including website infrastructure such us.
■ Firewall Configuration
■ Authentication and Authorization system
■ Incident Detection System
■ Regular Monitoring

Proper devices Configuration


Endpoint Configuration adds solution-specific configurations to a configuration manifest and
uses one consistent action to distribute it to all endpoints. All the configuration data that
reaches the endpoint is then sensitive to changes that affect the endpoint.
Ports, Notifications, malware detector, Antivirus, Window defenders, patch
managements, Lock PowerShell etc.
Automated patch management system

Electronic Security devices (Camera, Forensic)


Endpoint End to End Encryption
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

G H I J K L M N O P Q R S T U V W X Y Z A B C D E F

O RUBK EUA
CONT...

Data Classification (RBA)


Properly Configure Local Group Policy (LGP)
Local Group Policy Editor is a Microsoft Management Console (MMC) that provides a user interface for
managing local Group Policy settings on a Windows computer.
The settings are included computer and user configurations on the local system.
Network Segmentation (VLAN)
An architectural approach that divides a network into multiple segments or subnets,
each acting as its own small network.
This allows network administrators to control the flow of network traffic between
subnets based on granular policies.
Organizations use segmentation to improve monitoring, boost performance, localize
technical issues and – most importantly – enhance security.

Strong Network security


Better Performance
Decreased Scope of Compliance
Clear Desk Policy (internal employee)
A Clear Desk Policy instructs employees to clear their desk or workstations of all
personal belongings when they leave.
This includes anything that wasn’t on the desk when they started using it, and applies
whenever they leave the desk for an extended period of time.
Data Recovery and Return back

Top Best Data Recovery Software


Disk Drill Data Recovery (Window Mac)
R-Studio (Windows, Mac, and Linux)
PhotoRec (Windows, Mac, and Linux)
Recuva (Windows)
Data Rescue (Windows & Mac)
DiskGenius (Windows)
Stellar Data Recovery (Windows & Mac)
Wondershare Recoverit (Windows &
Mac)
Set backup & Disaster
Recovery system (min 100km)
Copying of physical or virtual files or
databases to a secondary location for
preservation in case of equipment
failure.

Organization’s method of regaining


access and functionality to its IT
infrastructure after events like a
natural disaster, cyber attack, or even
business disruptions
Internal IT Security Policy
Rules and procedures that enable employees and other stakeholders to
safely use and access an organization's IT assets and resources.

Example
1 Active Working Hours
Acceptable Use Policy
2 Privilege to Access Resources Security Awareness and Training Policy

3 Role Based Responsibility Sharing Change Management Policy


Incident Response Policy
4 Communication Line/chain Remote Access Policy
5 Punishment Rule for misuse Vendor Management Policy

6 Legal Relation With Stockholders Password Creation & Management Policy


Network Security Policy
7 Organization Roadmap Access Authorization, Modification
8 National Contribution Data Retention Policy
Business continuity Plan (BCP)

BCP is a document that explains the BCP is the process of creating a system in
actions you should take before, during your business that helps prevent,
and after unexpected events and minimise and recover from threats in
situations. • Natural disasters (floods, storms)
It is designed to help you: • Fire
• Identify, prevent or reduce risks
• power outages
• Prepare for risks that are out of your
• IT outages
control
• Supply chain failures
• Respond and recover if an incident or
• Staff shortages
crisis occurs.
• Pandemics.
Assurance of IT services
The insurance industry can play an essential role in working with governments to improve the
resilience of critical infrastructure against natural disasters.
First, its underwriting expertise offers detailed risk assessment of the critical assets, helping
governments “price” the risk exposure of their critical infrastructure.
Second, Pooling risks and providing financial compensation, insurance helps restore the
destroyed assets in the wake of a disaster.
Third, the insurance industry, as an investor, can play an important role in the long-term
financing of the critical infrastructure.

Penetration Test Periodically


Application pen tests Embedded Cloud
Network pen tests (IoT) .
Web apps.
Personnel tests

Hardware pen tests Mobile devices. Mobile


Governmental Support
• National cybersecurity agency—the overall responsibility of defining and driving the
cybersecurity agenda of the entire country.
• This involves developing a cohesive national cybersecurity strategy with a portfolio
of initiatives, among them protecting the critical infrastructure of the country,
mobilizing the response to cyber incidents, defining cybersecurity standards,
improving the cyber awareness of citizens, and developing the cybersecurity
capabilities of professionals.
• Prioritized critical sectors and assets. A country typically determines whether a
sector is critical based on how significant a role it plays in ensuring the health of the
economy, well-being of the society, and national security of the country.
IT AUDIT (RISK ASSESSMENT)
Information Network Security
Administration

National Information Security


Technology

International Standard
Organization
Social Engineering And
Its Techniques
• Social engineering is the art of convincing
people to reveal confidential information.
• Social engineering is all about the
psychology of persuasion.

Personnel Target Company Target Governmental Org.


They lure users into a Tactic of manipulating, Politicians can use words
trap that steals their influencing, or deceiving to change people’s
perceptions & the reality
personal information a victim ito gain control
of a situation.
Social Engineering
Factors make Company vulnerable
to Attack
COUNTERMEASURES
01
07
02
08
03
09
04 10
05 11
06 12
13
What do know about
Policy, Procedures and Guideline
IT Security Policy
• Security policy is the statement of responsible
decision makers about the protection mechanism of a
company crucial physical and information assets.
• A security policy is an official statement of the rules
by which people who access a company’s information
technology system must abide.
• Security policy applies to all senior management,
employees, stockholders, consultants, and service
providers who use company assets.
• All employees so that everyone adheres to policies
and fulfils their defined role.
Participants when new
Policy Drafted
The audience section of your ISP specifically denotes who
must abide by the rules and procedures listed in the ISP.
IT Standard Compliances
Standards are mandatory courses of action or rules that give formal policies support
and direction. Your business and department must adhere to all applicable IT
compliance standards.
HIPAA (Health Insurance Portability PCI DSS (Payment Card Industry
and Accountability Act) Data Security Standard)

FISMA (Federal NIST (National Institute of ISO/IEC 27001


Information Security Standards and Technology) ISO (International Organization for
Management Act) Standardization) and IEC
(International Electrotechnical
Commission)
Types of IT Security Policies
Security policies can vary in scope, applicability, and complexity, according to the
needs of different organizations. While there’s no universal model for security policies,
the National Institutes of Standards and Technology (NIST) spells out three distinct types.

Program
(Organizational)
Security Policy

Issue Specific Policy

System Specific
Policy
Program (Organizational)
Security Policy
Program policies are strategic, high-level
blueprints that guide an organization’s
information security program.
A security policy must answer three questions.
w Who can access
Which resources
In what manner?
Eg. Protecting IT assets from External Attack.
Issue-specific policies are developed to focus on
areas of current relevance and concern (and
sometimes controversy) to an organization

Password management

Disposal of information or data

Backup and data recovery

Modify Access privilege


System Specific Policy
The body of rules and practices used to protect a particular information system. System-
specific policy is limited to the system or systems affected and may change with
changes in the system, its functionality, or its vulnerabilities.

• Cisco firewall configuration /configuration rule

• File sharing in ERP system

• Policies for intrusion detection and prevention


Importance of an IT Security Policy

Facilitates the
confidentiality, integrity, Reduces the risk of
and availability of data security incidents

Provides clear statement


Helps to address of security policy to third
regulatory compliance parties
requirements
National level cybersecurity incident report path from end user /client to organizational level and up to national
cybersecurity defense team.
Resources
Cyber essentials
(www.cyberaware.gov.uk/cyberessentials)
Cybersecurity Critical
mass
Digital Ethiopia
Roadmap
“ Building IT security awareness and training ” nist SP 800-
50
“Information Security, Cybersecurity and privacy
protection”
ISO/IEC 27005:2022
“Risk Management Guidelines ” ISO 31000:2018
CONTACT US
0949937068
0921546698

1000, Addis Ababa,


Ethiopia

Addis ababa, Ethiopia

You might also like