1 of 17

Cyber Security for ISP

Diep Kong

2 of 17

Table of Contents

  • Cyber Security
  • Cyber Security Risks
  • ISP Challenge
  • Risk for ISP

3 of 17

CYBER Security

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

4 of 17

CYBER Security RISK

- Network Security

- Application Security 

- Information or Data Security

- Cloud Security

- Mobile Security

- Critical Infrastructure Security

- Internet of Things (IoT) Security

5 of 17

ISP Challenge

- Ransomware

- IP Blacklist/IP Reputation

- DDoS

- Botnet

6 of 17

RAMSOMWARE

  • Ransomware is malicious software (malware) that leverages data encryption to extort organizations for substantial ransoms. Once paid, ransomware attackers theoretically restore access to or unencrypt affected data using a decryption key.
  • Ransomware attacks often begin with a social engineering tactic, such as phishing emails or watering hole attacks, which trick users into downloading the malware. The attackers may then demand payment in cryptocurrency, credit card payments, or wire transfers.

7 of 17

IP Blacklist/IP Reputation

8 of 17

9 of 17

10 of 17

DDoS

DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

Motivations for carrying out a DDoS vary widely, as do the types of individuals and organizations eager to perpetrate this form of cyberattack. Some attacks are carried out by disgruntled individuals and hacktivists wanting to take down a company's servers simply to make a statement, have fun by exploiting cyber weakness, or express disapproval.

11 of 17

12 of 17

13 of 17

What was the largest DDoS attack of all time?

  • The biggest DDoS attack to date took place in September of 2017. The attack targeted Google services and reached a size of 2.54 Tbps.
  • AWS reported mitigating a massive DDoS attack in February of 2020. At its peak, this attack saw incoming traffic at a rate of 2.3 Tbps.
  • One of the largest verifiable DDoS attacks on record targeted GitHub, the attack reached 1.3 Tbps, sending packets at a rate of 126.9 million per second.
  • On October 21, 2016, Dyn, a major domain name service (DNS) provider, the DDoS attack may have actually achieved a rate of 1.5 Tbps
  • On Feb. 28, 2018, GitHub, a platform for software developers, was hit with a DDoS attack that clocked in at 1.35 Tbps and lasted for roughly 20 minutes. 
  • In February 2021, Akami announced that they had dealt with “three of the six biggest volumetric DDoS attacks” the company has ever recorded. In this case the threat attack weighed in at 800Gbps.

14 of 17

Botnet

Botnets are networks of hijacked computers and internet-connected devices that are infected by malware (i.e., malicious software). The malware runs bots on the compromised devices without the knowledge of device users. Botnets—a combination of the words “robot” and “network”—are usually controlled by a botmaster or bot herder. The bot herder essentially turns these hijacked computer devices into remote-controlled “zombie” computers. By linking compromised devices in large numbers, it becomes possible to create botnets that can be leveraged against various targets to carry out distributed denial of service (DDoS) attacks, account takeover, data theft and several other types of attacks.

15 of 17

16 of 17

17 of 17

Thank you