Professional Documents
Culture Documents
Lecture 1 - Basics of Cybersecurity-23042024
Lecture 1 - Basics of Cybersecurity-23042024
Lecture 1 - Basics of Cybersecurity-23042024
Lecture, 23.4.2024-29.5.2024
• This is a high-level course that also contains some technical cybersecurity knowledge.
• There are other courses that are much more technical. Some of these include:
• Lecture 4 (May 21): Cybersecurity in Finland: Guest Speakers & Tanesh Kumar
• Individual Assignment # 5: Deadline: 27.05.2024
• Lecture 5 (May 28): Case Studies Presentations: Tanesh Kumar & Juho Kaivosoja
Lecture 1 – Basics of Cybersecurity 26.4.2024 5
ELEC-E7470 – Cybersecurity D: Today’s Plan
• 14:20 - 14:30: Start, Tanesh
• 14:30 - 15:00: Juho's Presentation
• 15:00 - 15:15: Groups in Zoom
• 15:15 - 15:30: Break
• 15:30 - 16:15: Lecture Session
• 16:15 - 16:30: Break
• 16:30 - 17:15: Lecture Session
• 17:15 - 17:30: Break
• 17:30 - 18:00: Final Wrap-up
• What is Cybersecurity?
• Cybersecurity: Terminology
• Need/Importance of Cybersecurity
• Design Principles of Cybersecurity
• CIA TRIAD
• Cybersecurity Framework (NIST)
‘Cybersecurity’.
Let’s have a chat:
https://presemo.aalto.fi/23042024
Source: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Lecture 1 – Basics of Cybersecurity 26.4.2024 13
Source: https://csrc.nist.gov/glossary/term/cybersecurity
Cybersecurity Terminology !!
Malware!!
Hacking!!
Cyberdefense!!
Attacks!!
Cybercrime!!
Threats!!
Vulunerability!!
Firewall!! Risks
Cyberspace!! Authorization!!
Internet!!
Authentication!!
Cyberattacks!!
Source: https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-ICTSS-2020-4-PDF-E.pdf
Source: https://informationsecurity.wustl.edu/vulnerabilities-threats-and-risks-explained/ Lecture 1 – Basics of Cybersecurity 26.4.2024 17
Cybersecurity: Terminology: Authentication and Authorization
Authentication Authorization
• Mechanism to verify/identify the • Mechanism for giving permission to the
users or devices, so that only legitimate users/devices to access
legitimate entities can access the particular data, services or resources.
device/system or a network • Determines access rights based on
• Verify identity identity and role.
Cryptography
• Mechanism/process to protect and secure the digital communications in a way that
only intended person can read/access that information.
• Various techniques/codes are used in cryptography, i.e., Authentication, Encryption,
Digital Signatures, Timestamps.
Example:
• Let’s assume you and your friend form a secret code to communicate so that other can
not understand it You agree that every letter of the alphabet corresponds to a number.
• A = 1, B = 2, C = 3, and so on.
• Spaces and punctuation marks are also given corresponding numbers.
Source: https://www.ibm.com/topics/cryptography
Source: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/01-Introduction%20to%20Cryptography.pdf Lecture 1 – Basics of Cybersecurity 26.4.2024 19
Cybersecurity: Terminology: Encryption and Decryption
Encryption: Decryption:
• To protect and secure the data/information, so • Reverse process of encryption. It is used to
that only authorized entities can extract the restore data in its original form and only
needed information. authorized entities can decrypt and read the
data.
• Converts plain text (readable) into cipher text
(unreadable) using encryption algorithm or keys. • Converts cipher text (unreadable) into plain
text (readable) using decryption algorithm or
keys.
Example: Sending message through locked box
• Encryption:
• Suppose a box containing valuable items (your message). Before sending it, you put a lock on the suitcase (encryption). This lock represents
the encryption process. Only one which have the key to unlock the box.
• Decryption:
• Box received by receiver and wants to access the contents (decrypt the message). You send them the key separately, allowing them to
unlock the box (decrypt the message) and access its contents. With the key, the receiver can open the box and view the valuable items (read
the message).
Source: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/01-Introduction%20to%20Cryptography.pdf
Source: https://cloud.google.com/learn/what-is-encryption Lecture 1 – Basics of Cybersecurity 26.4.2024 20
Cyber Security: Terminology: Firewall
Firewall:
• A firewall is a crucial defense mechanism that acts as a barrier between the
devices/computer (internal network) and the internet (untrusted network)., e.g.,
Network Firewall
• It monitors and manages the Incoming and outgoing traffic based on a defined set
of rules/instructions.
• A firewall can be hardware, software, software-as-a service (SaaS), public cloud, or
private cloud (virtual).
Example:
• Imagine your computer is like a house, and the internet is the outside world.
• Firewall as a security guard placed at the entrance of the home monitors/manages incoming
who is coming inside home and who is going outside from home
Source: https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html
Source: https://www.ibm.com/docs/en/i/7.5?topic=ssw_ibm_i_75/rzaj4/rzaj4fwfirewallconcept.html
Source: https://www.f-secure.com/en/articles/firewall Lecture 1 – Basics of Cybersecurity 26.4.2024 21
Cyber Security: Terminology: Hacking
Hacking is the use of unconventional or illicit means to gain unauthorized
access to a digital device, computer system or computer network (IBM).
Source: https://www.ibm.com/topics/cyber-hacking
Source: https://www.geeksforgeeks.org/types-of-hackers/ Lecture 1 – Basics of Cybersecurity 26.4.2024 22
Source: https://www.avast.com/c-hacker-types
Image Source: https://pixabay.com/vectors/hacker-computer-programming-hacking-5471975/
Cyber Security: Terminology: Cyberattacks
A Cyberattack is a malicious effort to access computer systems
without authorization with the intent to steal, expose, modify, disable
or eradicate information, (International Business Machines (IBM))
Sources: https://www.lupovis.io/what-are-cybersecurity-threat-actors/
Source: https://www.ibm.com/topics/cyber-attack Lecture 1 – Basics of Cybersecurity 26.4.2024 23
Source: https://www.sophos.com/en-us/cybersecurity-explained/threat-actors
Cyber Security: Terminology: Cyberattacks Types
Phishing
SQL
Malware Injection
MiTM
Password Attacks
Attacks
DoS Attacks
Source: https://www.ibm.com/topics/cyber-attack
Lecture 1 – Basics of Cybersecurity 26.4.2024 24
Cyber Security: Terminology: Cyberattacks Types
Source: https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html
Find out, from different sources, different definitions of cybersecurity and then
formulate your own definition for cybersecurity in the context of your
domain/field. Write a report of 1-2 pages (in PDF format) and upload the file by
May 7th, 2024.
4
• Global indicator 'Estimated Cost of 2,95
Source: https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide
Lecture 1 – Basics of Cybersecurity 26.4.2024 29
Source: https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
Need of Cybersecurity: Malware observations in Finland
Number of incidents
60 000 53 693 55 335
50 000 46 775
42 666
• Number of detected malware and 40 000
39 106
32 107 33 443
32 066
malicious traffic peaked at roughly 81 30 000
thousands incidents during the third 20 000 16 752
quarter of 2021. 10 000
0
Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3
2019 2019 2020 2020 2020 2020 2021 2021 2021 2021 2022 2022 2022 2022 2023 2023 2023
• The lowest number of 16,752 incidents
Description: Over the period from 2019 to 2023, the number of malware observations in Finland fluctuated strongly. The number of detected malware and malicious traffic peaked at roughly
was reported in the 3rd quarter of 2019. 81 thousands incidents during the third quarter of 2021. The lowest number of 16,752 incidents was reported in the 3rd quarter of 2019. Read more
Note(s): Finland; Q3 2019 to Q3 2023; Detected malware and malicious traffic
Source(s): Traficom
Source: https://www.statista.com/statistics/733010/number-of-malware-incidents-per-quarter-in-finland/
Lecture 1 – Basics of Cybersecurity 26.4.2024 30
Need of Cybersecurity: Information security violations in Finland
6 000
• In 2020, roughly 12000
Source: https://www.statista.com/statistics/1224712/number-of-reported-information-security-violations-and-threats-finland/
Lecture 1 – Basics of Cybersecurity 26.4.2024 31
Need of Cybersecurity: Personal data
breaches in Finland
600
• In 2022, 518 personal data 539
518
breaches were reported by 500 481
Source: https://www.statista.com/statistics/1204061/number-of-personal-data-breaches-reported-in-finland/
Lecture 1 – Basics of Cybersecurity 26.4.2024 32
Need of Cybersecurity
• In 2021, cybercrime cost the world $6 trillion.
• By 2025, these costs will increase to $10.5 trillion.
• Number of people using internet and digital services are significantly increasing.
• Cybercrime is an increasingly serious problem, and to address it, strong cybersecurity
is critical.
• Economic Costs
•
•
• Cybersecurity is highly important because it provides mechanism to protect all
kinds/categories of data from potential threats and risks.
• Without placing appropriate cybersecurity measures, any organization, company or
business can not deal with cyber attacks
Source: https://www.upguard.com/blog/cybersecurity-important
Source: https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/ Lecture 1 – Basics of Cybersecurity 26.4.2024 33
Need of Cybersecurity
• Personal
• Businesses
• Government Agencies
• Critical Infrastructure Providers
• Healthcare Organizations
• Financial Institutions
• Educational Institutions
• Nonprofit Organizations
• And many more…….
Source: https://www.nccoe.nist.gov/publication/1800-26/VolA/
Lecture 1 – Basics of Cybersecurity 26.4.2024 36
Source: https://www.ibm.com/topics/information-security
The CIA Triad: Banking/ATM Example
• In case of any attack (Phishing attack), cyber incident team of XYZ bank
takes the lead to limit its impact and apply potential mitigation approaches
• Team will take the necessary actions, e.g., informing the customers,
suggest to reset their passwords, notify about any unauthorized
transaction and take necessary measures for phishing emails/websites,
• The team will also coordinate with government authorities and law
enforcement agencies to get root cause of the incident and further
strengthen the security measures, i.e., block the phishing websites.
Take a use-case company (fictional) and analyze how you can enhance the
overall cybersecurity and strengthen the cyberdefense of the organization by
applying the NIST five-cybersecurity principles (Identify, Protect, Detect,
Respond, and Recover). Write a report of 2-3 pages and a slide show of three
slides that you prepare to present on the next lecture.
Hand in two files: the report as a PDF and the presentation (PDF, PPT). Each
group needs to upload both files only once by May 7th, 2024.