Proactive Cyber Defence

Download Report

Transcript Proactive Cyber Defence

Cyber Complot And Operation
Technology
With the background of increasing dependence on
technology and web-based communications, the internet usage
spreading all over the world, many people, firm and bank have
started to use internet in order to make easy their business such
as paying their bill with credit cards on the internet.
http://www.youtube.com/watch?v=-plRCjTIvSg
Cyber Attack Boomed
http://www.youtube.com/watch?v=SWe1aCvxt1M
http://www.youtube.com/watch?v=Hq24-aP_46U
Don’t share your private
information on unsafe web server
Cyber attack can be defined as
accessing other people’s e-mail, message
and information unlawfully.
People who attack web sites and access personal
computer are called hacker. Hackers want to profit from
their innate hacking capabilities.
http://www.youtube.com/watch?v=0nqjb56ZxNQ
Hacker can be divided into three groups
as White Hat, Grey Hat and Black Hat.
http://www.youtube.com/watch?v=VDBUkWrzwTM
With the increasing number of cyber
attack, cyber crime became the top priority
issue for government and people.
Cyber Attack And Defence
Cyber Attack Types
Malware
Rootkits
Spam
Spayware
Trojans
Viruses
Phishing
Malware
Malware, short for malicious software, is software
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
It can appear in the form of code, scripts, active
content, and other software.
Malware includes computer viruses,ransomware,worms,
trojan horses,rootkits, keyloggers,dialers,spyware and adware
Viruses
A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) into other computer programs,
data files, or the boot sector of the hard drive
Trojan horses
When a malicious program is disguised
as something normal or desirable, users may
willfully install it without realizing it. This is the
technique of the Trojan horse or trojan.
Spam
One of the largest ever cyber attacks is
slowing global internet services and the disruption
could get worse after an organization blocking
"spam" content became a target.
Phishing
Phishing is the act of attempting to acquire
information such as usernames, passwords, and
credit card details.
Phishing is typically carried out by email
spoofing or instant messaging and it often directs
users to enter details at a fake website whose look
and feel are almost identical to the legitimate one.
Defence
Proactive Cyber Defence
 Active Cyber Defence

Proactive Cyber Defence or active cyber
defence (ACD) means acting in anticipation to
oppose an attack against computers
and networks.
Proactive Cyber Defence

Proactive cyber defense means acting in
anticipation to oppose an attack
against computers and networks.

It represents the dynamic between purely
offensive and defensive action; interdicting and
disrupting an attack or a threat’s preparation
to attack, either preemptively or in self-defence.
Active Cyber Defence
Active cyber defense (ACD), a term that
describes a range of proactive actions that engage
the adversary before and during a cyber incident

Some software can be used for defending systems

Antivirus or AV software is computer
software used to prevent, detect and remove
malicious computer viruses.
Protections;
Rootkit detection
Real-time protection
Heuristics

Firewall
a firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets
An illustration of where a firewall would be
located in a network.
Cyber Technology in Turkey
http://www.youtube.com/watch?v=kictJz35kkg
Turkey has some concerns about
cyber-attacks which include acts of
cyber war, terrorism, crime, protest,
vandalism, and more.
Cyber Security Agency struggles with threats
coming from software such as some viruses like
Trojan and malicious viruses.
Cyber attack strategies are provided by
cyber security agencies in digital enviroment.
These strategies are pot system, a trap set to
detect, deflect, or in some manner counteract
attempts at unauthorized use of information
systems.
The hacktivist group Anonymous has taken down the
Turkish President’s website and attack Turkısh Cyber
Army(AYYILDIZ TİM).
Ayyıldız Team makes counter attack to anonymous.
TÜBİTAK support training programs with cooperation of Cyber Security Agency.DDOS defensive
tool to eliminate cyber attacts.
Prepared by
Saray KURT
 Enes YILMAZ
 Erdi ŞEKERCİLER
 Harun KARABAL
