Strengthening Cyber Security in Digital Era
It is crucial to promote and strengthen security amidst evolving technology to combat complex security threats. Cyber attackers follow an intrusion kill chain, aiming for data exfiltration and persistence. Minimize risks by practicing cyber security principles and best practices, focusing on areas like authentication, authorization, and asset protection in IT systems.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Digital Security Architecture Fundamental As technology continues to evolve, it is more important now than ever to promote and strengthen security for individuals, businesses and governments to mitigate and prevent complex security threats. As a result of our new digital reality, the nature of crime, and the ways in which businesses, law enforcement and emergency response agencies work, are also evolving. We need to step-up to learn and practise cyber security guiding principle and best practices into our daily work as IT Professional. wengtattchan wengtatt_chan@live.com +6 019-3559710
What is the first thing comes into your mind on Cyber Security ?
Anatomy of an Cyber Attack : Intrusion Kill Chain Laptop, Mobile or Smart Device IT Security (NGFW, WAF, etc) Middleware (API gateway, Public Internet Database Web Public or Home EAI, etc) Public Internet Application Server Comm and and Contro l (C2) server to establish a Command and Control (C2) channel. Internal LAN Document Action s on Object ives which typically is data exfiltration, which involves collecting, encrypting and extracting info. Private Network Office Laptop or PC Recon naissa nce selection of target. Weap onizati on an exploit into a deliverable payload. Then, client application is used as weaponized deliverable. Delive ry Transmission of the weapon to targeted environment using vectors like email attachments, websites and USB- removable media or even with voice call. Social Engineering Exploit ation After the weapon is delivered to victim host, exploitation triggers intruder s code. Install ation Installation of a remote access trojan or backdoor on the victim system allows adversary to maintain persistence inside the environment. Research, Identification and Coupling a remote access trojan with Typically, compromised hosts must beacon outbound to an Internet controller Intruder takes action to achieve their planned goal
What can we do to minimize the risk of Cyber Attack ?
Areas of Concern on Cyber Security : 7ARP Authentication Authorization Availability Asset Protection Administration Audit Assurance Risk Management Public Safety
Areas of Concern on Cyber Security : 7ARP Authentication : the substantiation of the identity of a person or entity related to the enterprise or system. Authorization : the definition and enforcement of permitted capabilities for a person or entity whose identity has been established. Availability : The ability of the enteprise to function without service interruption or depletion despite abnormal or malicious events. Asset Protection : The protection of information assets from loss or unintended disclosures, and resources from unauthorized and unintended use. Administration : The ability to add and change security policies; add or change how policies are implemented in the enterprise, and add or change the persons or entities related to the systems. Audit : the ability to provide forensic data attesting that the systems have been used in accordance with stated security policies. Assurance : The ability to test and prove that the enterprise has the security attributes required to uphold the stated security policies. Risk Management : The enterprise s attitude and tolerance for risk. Public Safety : The prevention and protection of the public from dangers affecting safety due to cyber criminal act on connected physical assets
and and Contro l (C2) Recon naissa nce Weap onizati on s on Object ives Delive ry Exploit ation Install ation February 2022 : Kojima Industries was hit by ransomware attack Many of the roughly 400 tier one suppliers (including Kojima Industries) that Toyota deals with directly are connected to the automaker's just-in-time production control system, which allowed the cyberattack incident at Kojima to spill over to Toyota. The automaker halted production of 14 plants (up to 28 manufacturing lines) to prevent longer-term damage, and prioritized inspection and recovery of the system. Kojima activated manual process to assure resiliency of their operation while isolating and investigating the cyberattack incident. Kojima is a business partner of the Toyota Motor Corporation that manufactures interior and exterior automotive components. For Toyota, Kojima is a domestic supplier of plastic parts and electronic components.
Digital Security Architecture Fundamental As technology continues to evolve, it is more important now than ever to promote and strengthen security for individuals, businesses and governments to mitigate and prevent complex security threats. As a result of our new digital reality, the nature of crime, and the ways in which businesses, law enforcement and emergency response agencies work, are also evolving. We need to step-up to learn and practise cyber security guiding principle and best practices into our daily work as IT Professional. wengtattchan wengtatt_chan@live.com +6 019-3559710