INSTITUTO POLITÉCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION
Cyber security A-15
- Dr. Ponciano Jorge Escamilla Ambrosio
pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/
Ciberseguridad Cyber security A-15 Dr. Ponciano Jorge Escamilla - - PowerPoint PPT Presentation
INSTITUTO POLITCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION Laboratorio de Ciberseguridad Cyber security A-15 Dr. Ponciano Jorge Escamilla Ambrosio pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/ CIC Cyber Cyber
INSTITUTO POLITÉCNICO NACIONAL CENTRO DE INVESTIGACION EN COMPUTACION
pescamilla@cic.ipn.mx http://www.cic.ipn.mx/~pescamilla/
CIC
2
CIC
The Internet and its network protocols were never
The Internet is now a global place for
Despite improvements, the Internet is still
3
CIC
4
CIC
social networking originated offences)
5
CIC
6
Gross domestic product (GDP)
CIC
7
CIC
8
CIC
9
The life cycle of a generic targeted
attack is directed toward a specific individual, group, business, or government body.
CIC
10
CIC
11
CIC
12
1Lawinski, J. “Companies Spend on Security Amid Mobile
and Social Threats.” Baseline , September 14, 2011.
CIC
13
CIC
14
CIC
15
CIC
Unlike a virus, a worm can replicate itself
Worms use networks to propagate and infect a
A worm can infect many devices in a network as well
Worms either exploit a vulnerability on the target
16
CIC
17
CIC
A Trojan horse is a program that seems to be
Users are tricked into executing an infected fi le,
mythology.
Trojans spread only by user interaction
18
CIC
19
CIC
20
CIC
One of the most popular types of DoS attacks
A attack Dos is a malicious attack caused by
21
CIC
22
CIC
23
CIC
The Internet of Things (IoT) can also be hacked.
at least one refrigerator, occurred between December 2013 and January 2014, and was referred to as “the fi rst home appliance ‘botnet’ and the fi rst cyberattack from the Internet of Things.” Hackers broke into more than 100,000 home appliances and used them to send over 750,000 malicious e-mails to enterprises and individuals worldwide.
24
CIC
25
CIC
26
CIC
27
CIC
28
CIC
29
CIC
30
CIC
31
CIC
32
CIC
33
CIC
fi les, databases, applications, servers, printers, or any
users with access may have with respect to those resources (i.e., read, view, write, print, copy, delete, execute, modify, or move).
34
CIC
35
CIC
Facial recognition, Signature recognition.
36
CIC
37
CIC
38
CIC
Firewalls are barriers between an internal
A firewall is designed to prevent unauthorized
Technically, a firewall is composed of hardware
39
CIC
40
CIC
41
CIC
a sensitive or classified nature through the exploitation
communications with the intent to cause damage.
42
CIC
43
CIC
44