Mitigating a Cyber Attack
The New Era of Cyber Security
University of Piraeus
8/12/2014
Γιάννης Κυπραίος CISSP, CISM, ISO-27005 CIRM
Υποδιεύθυνση Ασφάλειας Πληροφοριακών Συστημάτων
Διεύθυνση Διακυβέρνησης Πληροφορικής Ομίλου ΕΤΕ
Agenda
• Cyber Attack Definition
• Cyber Attack Targets
• Cyber Criminals Profile
• Crime-as-a-Service
• Type of Cyber Attacks
• Critical Controls for effective Cyber Defense
• Cyber Attack Detection
• Reaction to a Cyber Attack
Cyber Attack Definition
Wikipedia
Cyber-attack is any type of offensive maneuver employed by individuals or
whole organizations that targets computer information systems,
infrastructures, computer networks, and/or personal computer devices by
various means of malicious acts usually originating from an anonymous
source that either steals, alters, or destroys a specified target by hacking into
a susceptible system.
Yale Law School
A Cyber-attack consists of any action taken to undermine the functions of a computer
network for a political or national security purpose.
Yale: The Law of Cyber Attack
Cyber Attack Definition
Cyber Attack Definition
Cyber Attack Targets
• Control Systems
• Energy
• Finance
• Telecommunication
• Transportation
• Water
Cyber Attack Targets
• Stealing Information
• Wiping Data, Blocking Infrastructure
• Stealing money
• Damaging Company Reputation
• Financial Losses
Cyber Criminal Profiles
• The Hacktivist
• Nation States
• Cyber Criminals
• Insiders
Motives
Europol: Internet Organized Crime Threat Assessment 2014
Motives
Europol: Internet Organized Crime Threat Assessment 2014
Crime-as-a-Service
• Underground forums
• Criminal Services
– Infrastructure-as-a-Service
– DDoS-as-a-Service
– Data-as-a-Service
– Pay-per-install Services
– Hacking-as-a-Service
– Malware-as-a-Service
– Translation Services
– Money Laundering-as-a-Service
Critical Controls for Effective Cyber Defense
Critical Security Controls - Version 5
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Authorized and Unauthorized Software
3. Secure Configurations for Hardware and Software on
Mobile Devices, Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and Remediation
5. Malware Defenses
6. Application Software Security
https://www.sans.org/critical-security-controls/
Critical Controls for Effective Cyber Defense
Critical Security Controls - Version 5
7. Wireless Access Control
8. Data Recovery Capability
9. Security Skills Assessment and Appropriate Training to Fill Gaps
10.Secure Configurations for Network Devices such as Firewalls,
Routers, and Switches
11.Limitation and Control of Network Ports, Protocols, and
Services
12.Controlled Use of Administrative Privileges
13.Boundary Defense
https://www.sans.org/critical-security-controls/
Critical Controls for Effective Cyber Defense
Critical Security Controls - Version 5
14.Maintenance, Monitoring and Analysis of Audit
Logs
15.Controlled Access Based on the Need to Know
16.Account Monitoring and Control
17.Data Protection
18.Incident Response and Management
19.Secure Network Engineering
20.Penetration Tests and Red Team Exercises
https://www.sans.org/critical-security-controls/
Cyber Attack Detection
There is no ”if”; only “when”!
• “I am convinced that there are only two types of
companies:
those that have been hacked and those that will be.
And even they are converging into one category:
companies that have been hacked and will be hacked
again.”
R.S. Mueller III, Director of FBI
• “There are two types of law firms: those that know
they’ve been hacked and those that do not;”
Attorney V. Polley
Cyber Attack Detection (Logs)
• Network Firewalls
• AntiVirus
• Data Base Firewalls
• Web Application Firewalls
• Intrusion Prevention Systems
• Security Logs
Security
Information &
Event
Management
Cyber Attack Detection (Behavior)
• Slow Internet
• Slow LAN
• Inaccessible Web Sites
• Computer Behavior Changes
• Unknown Services
• Unknown Connections
DoS / DDoS
Malware
Reaction to a Cyber Attack
Be Prepared
• Response Team
• Reporting
• Initial Response
• Investigation
• Recovery and follow-up
• Public Relations
• Law Enforcement
Mitigating a Cyber Attack
The New Era of Cyber Security
University of Piraeus
8/12/2014
Ioannis Kypraios CISSP, CISM, ISO-27005 CIRM
ikipr@nbg.gr

More Related Content

PPT
Cyber security 22-07-29=013
PPTX
Cyber-Espionage: Understanding the Advanced Threat Landscape
PPTX
Cyber attack
PPTX
Cyber Security: Threats and Needed Actions
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
PDF
Cyber security
Cyber security 22-07-29=013
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber attack
Cyber Security: Threats and Needed Actions
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Cyber security

What's hot (20)

PPTX
Cyber security
PPTX
Should i study cyber security
PPTX
The Importance of Cybersecurity in 2017
PPTX
Cyber Security
PPTX
Introduction to Cybersecurity
PPT
Cyber security & Importance of Cyber Security
PPTX
презентация1
DOCX
Hot Cyber Security Technologies
PPTX
Pranavi verma-cyber-security-ppt
PPTX
Cybersecurity
PDF
Cyber security and demonstration of security tools
PDF
Cyber Security Vulnerabilities
PDF
Cyber Security
PPTX
Cyber security
PPTX
Cyber Security Research Project Topics
PDF
Cyber Security - awareness, vulnerabilities and solutions
PPTX
Latest Top 10 Types of Cyber Security Threats
PPTX
Cyber security # Lec 1
PDF
Cybersecurity concepts & Defense best practises
Cyber security
Should i study cyber security
The Importance of Cybersecurity in 2017
Cyber Security
Introduction to Cybersecurity
Cyber security & Importance of Cyber Security
презентация1
Hot Cyber Security Technologies
Pranavi verma-cyber-security-ppt
Cybersecurity
Cyber security and demonstration of security tools
Cyber Security Vulnerabilities
Cyber Security
Cyber security
Cyber Security Research Project Topics
Cyber Security - awareness, vulnerabilities and solutions
Latest Top 10 Types of Cyber Security Threats
Cyber security # Lec 1
Cybersecurity concepts & Defense best practises
Ad

Viewers also liked (10)

PDF
Enhancing Cybersecurity Readiness Through International Cooperation
PPTX
Cyber Attack Survival: Are You Ready?
PDF
Is Cyber-offence the New Cyber-defence?
PPTX
Cyber attack
PDF
Cyber Defense in 2016
PPTX
Cyber attacks and IT security management in 2025
PPTX
Corporate-Espionage
PDF
Cyber Defense: three fundamental steps
PDF
cyber security and impact on national security (3)
PDF
Anatomy of a cyber attack
Enhancing Cybersecurity Readiness Through International Cooperation
Cyber Attack Survival: Are You Ready?
Is Cyber-offence the New Cyber-defence?
Cyber attack
Cyber Defense in 2016
Cyber attacks and IT security management in 2025
Corporate-Espionage
Cyber Defense: three fundamental steps
cyber security and impact on national security (3)
Anatomy of a cyber attack
Ad

Similar to 4. Mitigating a Cyber Attack (20)

PDF
Tecnologie a supporto dei controlli di sicurezza fondamentali
PDF
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
PDF
Introduction to QRadar
PPTX
Cyber security for business
PPT
CCNA Security 02- fundamentals of network security
PPTX
Introduction to cyber security.pptx
PDF
8 Top Cybersecurity Tools.pdf
PPT
Information Technology Security Basics
PPTX
8 Top Cybersecurity Tools.pptx
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Topic – cyber security, Introduction,future scope
PDF
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
PDF
InfosecTrain Cybersecurity Analyst Interview Questions
PDF
Cyber Security Analyst Interview Questions: Download our white paper
PDF
Cybersecurity Analyst Interview Questions for 2024.pdf
PDF
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
PPTX
Zero Trust: Redefining Security in the Digital Age
PDF
Cybersecurity Analyst Interview Questions By InfosecTrain
PDF
Cyber Security Interview Analyst Questions.pdf
Tecnologie a supporto dei controlli di sicurezza fondamentali
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Introduction to QRadar
Cyber security for business
CCNA Security 02- fundamentals of network security
Introduction to cyber security.pptx
8 Top Cybersecurity Tools.pdf
Information Technology Security Basics
8 Top Cybersecurity Tools.pptx
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Topic – cyber security, Introduction,future scope
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬: 𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐎𝐮𝐫 𝗪𝗵𝗶𝘁𝗲 𝗣𝗮𝗽𝗲𝗿!
InfosecTrain Cybersecurity Analyst Interview Questions
Cyber Security Analyst Interview Questions: Download our white paper
Cybersecurity Analyst Interview Questions for 2024.pdf
Top Cybersecurity Analyst Interview Questions: Download InfosecTrain’s White ...
Zero Trust: Redefining Security in the Digital Age
Cybersecurity Analyst Interview Questions By InfosecTrain
Cyber Security Interview Analyst Questions.pdf

More from isc2-hellenic (20)

PDF
Cyber Security Expect the Unexpected
PDF
European Cyber Security Challenge - Greel National Cyber Security Team
PDF
The evolving threats and the challenges of the modern CISO
PDF
Operation Grand Mars
PDF
Pci standards, from participation to implementation and review
PDF
Flowchart - Building next gen malware behavioural analysis environment
PPTX
Building next gen malware behavioural analysis environment
PDF
GDPR Cyber Insurance 11/1/2017
PDF
GDPR 11/1/2017
PDF
General assembly 2016 02 24 1.0
PDF
2016 02-14 - tlp-white ce2016 presentation
PDF
Panoptis 2016
PDF
2016 02-14-nis directive-overview isc2 chapter
PDF
Event 16 12-15 kostas papadatos
PDF
Event 16 12-15 panel1
PDF
Event 16 12-15 panel2
PDF
Event 16 12-15 global information security workforce study 1.0
PDF
5. Experience from recent national & international cyber exercises
PDF
3. APTs Presentation
PDF
2. Chapter introduction & update
Cyber Security Expect the Unexpected
European Cyber Security Challenge - Greel National Cyber Security Team
The evolving threats and the challenges of the modern CISO
Operation Grand Mars
Pci standards, from participation to implementation and review
Flowchart - Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
GDPR Cyber Insurance 11/1/2017
GDPR 11/1/2017
General assembly 2016 02 24 1.0
2016 02-14 - tlp-white ce2016 presentation
Panoptis 2016
2016 02-14-nis directive-overview isc2 chapter
Event 16 12-15 kostas papadatos
Event 16 12-15 panel1
Event 16 12-15 panel2
Event 16 12-15 global information security workforce study 1.0
5. Experience from recent national & international cyber exercises
3. APTs Presentation
2. Chapter introduction & update

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Internet of Everything -Basic concepts details
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Module 1 Introduction to Web Programming .pptx
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Internet of Everything -Basic concepts details
Build Your First AI Agent with UiPath.pptx
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
The influence of sentiment analysis in enhancing early warning system model f...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Basics of Cloud Computing - Cloud Ecosystem
future_of_ai_comprehensive_20250822032121.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
NewMind AI Weekly Chronicles – August ’25 Week IV
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Co-training pseudo-labeling for text classification with support vector machi...
Rapid Prototyping: A lecture on prototyping techniques for interface design
giants, standing on the shoulders of - by Daniel Stenberg
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...

4. Mitigating a Cyber Attack

  • 1. Mitigating a Cyber Attack The New Era of Cyber Security University of Piraeus 8/12/2014 Γιάννης Κυπραίος CISSP, CISM, ISO-27005 CIRM Υποδιεύθυνση Ασφάλειας Πληροφοριακών Συστημάτων Διεύθυνση Διακυβέρνησης Πληροφορικής Ομίλου ΕΤΕ
  • 2. Agenda • Cyber Attack Definition • Cyber Attack Targets • Cyber Criminals Profile • Crime-as-a-Service • Type of Cyber Attacks • Critical Controls for effective Cyber Defense • Cyber Attack Detection • Reaction to a Cyber Attack
  • 3. Cyber Attack Definition Wikipedia Cyber-attack is any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system. Yale Law School A Cyber-attack consists of any action taken to undermine the functions of a computer network for a political or national security purpose. Yale: The Law of Cyber Attack
  • 6. Cyber Attack Targets • Control Systems • Energy • Finance • Telecommunication • Transportation • Water
  • 7. Cyber Attack Targets • Stealing Information • Wiping Data, Blocking Infrastructure • Stealing money • Damaging Company Reputation • Financial Losses
  • 8. Cyber Criminal Profiles • The Hacktivist • Nation States • Cyber Criminals • Insiders
  • 9. Motives Europol: Internet Organized Crime Threat Assessment 2014
  • 10. Motives Europol: Internet Organized Crime Threat Assessment 2014
  • 11. Crime-as-a-Service • Underground forums • Criminal Services – Infrastructure-as-a-Service – DDoS-as-a-Service – Data-as-a-Service – Pay-per-install Services – Hacking-as-a-Service – Malware-as-a-Service – Translation Services – Money Laundering-as-a-Service
  • 12. Critical Controls for Effective Cyber Defense Critical Security Controls - Version 5 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Malware Defenses 6. Application Software Security https://www.sans.org/critical-security-controls/
  • 13. Critical Controls for Effective Cyber Defense Critical Security Controls - Version 5 7. Wireless Access Control 8. Data Recovery Capability 9. Security Skills Assessment and Appropriate Training to Fill Gaps 10.Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11.Limitation and Control of Network Ports, Protocols, and Services 12.Controlled Use of Administrative Privileges 13.Boundary Defense https://www.sans.org/critical-security-controls/
  • 14. Critical Controls for Effective Cyber Defense Critical Security Controls - Version 5 14.Maintenance, Monitoring and Analysis of Audit Logs 15.Controlled Access Based on the Need to Know 16.Account Monitoring and Control 17.Data Protection 18.Incident Response and Management 19.Secure Network Engineering 20.Penetration Tests and Red Team Exercises https://www.sans.org/critical-security-controls/
  • 15. Cyber Attack Detection There is no ”if”; only “when”! • “I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” R.S. Mueller III, Director of FBI • “There are two types of law firms: those that know they’ve been hacked and those that do not;” Attorney V. Polley
  • 16. Cyber Attack Detection (Logs) • Network Firewalls • AntiVirus • Data Base Firewalls • Web Application Firewalls • Intrusion Prevention Systems • Security Logs Security Information & Event Management
  • 17. Cyber Attack Detection (Behavior) • Slow Internet • Slow LAN • Inaccessible Web Sites • Computer Behavior Changes • Unknown Services • Unknown Connections DoS / DDoS Malware
  • 18. Reaction to a Cyber Attack Be Prepared • Response Team • Reporting • Initial Response • Investigation • Recovery and follow-up • Public Relations • Law Enforcement
  • 19. Mitigating a Cyber Attack The New Era of Cyber Security University of Piraeus 8/12/2014 Ioannis Kypraios CISSP, CISM, ISO-27005 CIRM [email protected]