Include business sensitive information, should only be accessed when absolutely necessary
External stakeholders
groups outside an organisation, shareholders for example
Internal stakeholders
groups within an organisation, like owners and employees
An organisation typically stores information about:
employee salaries
employee perks
client lists
trade secrets
sales numbers
customer information
news about restructuring
All important data should regularly be backed up to a secure location
Some impacts of failing to maintain privacy
Financial
Reputational
Financial impact
Payment compensation
Security improvement costs
Lost customers
Lost revenue
Emails and contact lists can also be targeted during an attack
Reputation
Loss of data in an attack can lead customers to lose trust and confidence in the company
Restoring lost or corrupted data leads to a time delay, disrupting usual business
Cyber security
The practice of defending computers, servers, mobile devices, systems, networks and data from malicious attacks
Targets of technical threats
everyone.
Types of technical threats
Botnets
DDoS
Hacking
Malware
Social engineering
Insecure APIs
Open networks
Man-in-the-middle attacks
API
The interface that allows two or more software applications to communicate
Remote API
can interact through a communications network with the resources
Not all remote APIs are web APIs, but all web APIs are remote
APIs can become insecure over time
Ad hoc networks
a network created without the use of a wireless router or access point, meaning the devices communicate directly
Problems with ad hoc networks
slow data transmission
minimal security
Man-in-the-middle attacks (MITM)
A hacker places themselves in the middle of a communication between devices/users
Hacker
someone who uses computers to gain unauthorised access to data
Dark net
networks that are not indexed by search engines, only accessed by those with authorisation
DDoS - Distributeddenial-of-service
Vulnerability testing (A.K.A penetration testing)
used to identify vulnerabilities before a cyber attack
Physical threats
internal
external
Internal threats
Location of systems
Layout of systems
System robustness
Circumstances of use
User characteristics
Mitigate
to take steps to reduce the likelihood of something happening, or reduce the impact if it does happen
Humidity
Amount of water vapour in the air
Firmware
code added at manufacturing to a hardware device's non-volatile memory. the software that allows the hardware to run
External threats
Earthquake
Tsunami / flood
Lightning strikes
Other natural disasters
Human threats
Human error
Malicious employees
Disguised criminals
Targeted attack
Human error can include
Accidental file deletion
Saving files and folders to a different location
Sending emails with data to the incorrect recipients
Accidental changes in documents
Malicious employees can also be referred to as Turncloaks
Botnets
networks infected with malicious software, controlled remotely by hackers without the owner's knowledge, used to perform malicious activity against victims.
Zombie computer
a computer connected to the internet that has been compromised by a hacker, virus or trojan horse
DDoS
A malicious attempt to disrupt the normal traffic of a targeted server by overwhelming it with a flood of internet traffic.
Hacking
The act of gaining unauthorised access to computer systems, networks or devices
Malware
Short for 'malicious software' , referring to any malicious program or code that is harmful to systems