Introduction
Introduction
Introduction to cyber
1
About The Lecturer
Name:
Title: Specialty:
Email: ***@ecomschool.co.il
2
Expectations
• It is impossible to learn the entire cyber field in a year. But you can learn and understand the
basics.
• The Cyber Security field is always evolving, and new threats are constantly being discovered.
• Students are required to invest time and effort after each lesson! Otherwise, you will easily
forget what you have learned.
• Start thinking, ask questions and don’t be afraid to make mistakes - this is how you learn!
• The goal of this course is to teach you how to learn and explore
To Give you a hook and not a fish.
3
Don’t be afraid to use your brain
0 to 20 – The first one that reaches the number 20, wins!
The mission is to find a logic that will always get you a win.
4
Legal Disclaimer
Any use of what you learn in the course and what the lecturer explains /
presents during or after the lesson - is for educational purposes only.
Any use of the studied material without explicit approval is illegal and at
your own risk.
5
So…what is Cyber?
“Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data
from malicious attacks…”
6
What changed the game?
On average, organizations Processing capabilities In 2009, the first Bitcoin New players in the
pay a ransom of $233,217. In increase at a rapid rate. transaction was made. cyber arena bring new
Which allows attackers to Since then 95% of internet motives for carrying
2021, ransomware attacks
exploit mechanisms that do ransom payments have out attacks, are
against businesses will occur sponsored by
not keep up with the been made through
every 11 seconds. The global technological pace. cryptocurrencies. They countries and change
cost of ransomware recovery Passwords .. DDos. Spam.. provide anonymity and the ecosystem in the
exceed $20 billion in 2021 cyber world
convenience for payment
7
Hacker Types
8
Black hat hackers
Motivation: Money.
9
White hat hackers
Motivation: Career, paid employees.
10
“Hacktivists”
Motivation: Ideology or socially.
11
Script Kiddies
Motivation: Curiosity.
12
APT Hacking groups
Motivation: Money.
13
State-Sponsored
Hackers
Motivation: Promote a nation’s interest.
14
C2 Trojan Ransomware
16
Cyber , IT & Communication
roles
17
So many roles…
IT Information Technology:
Help-Desk, Technical Support, Sys admin,
Integrator, NOC, Cloud Specialist, etc.
D Security Operations:
SOC, Threat hunter, forensics
investigations, incident response,
Malware Analysis blue team.
O Offensive Security:
Attack systems in order to test their
resistance to attacks:
Industrial Spyware, Penetration Tester, Red
RD Research & Development:
vulnerabilities researcher,
AppSec, Security Architect
Team.
Choosing cybersecurity as a profession empowers you to
make a difference in the digital world while enjoying a
fulfilling and rewarding career journey.
18
Degree. Needed or not?
Open Debate. Feel free to ask whatever
you want.
19
Future trends in cyber
3 It can be noticed that there are more and more Black hat Hacking groups who are
known to targeting at civilians and exfiltrate personal data at scale – the digital life is
starting to get dangerous for the regular people as well.
20
Stay Updated
DigitalWhisper
digitalwhisper.co.il/
TheHackerNews
thehackernews.com/
21
The Computer
Defined as any machine that executes
predefined commands.
22
Computer component
It is very common to divide every computer part
into two categories:
• Hardware
• Software
23
Hardware
Hardware is defined as the physical
components that make up the computer
24
Hardware Types Example
Computer Level
Input-Output Devices Mother Board NIC RAM CPU GPU
Network Level
Hub Switch Router Modem CAT cable & RJ45 AP Optic Fibber
25
Software Kernel
A piece of code written in a programming language
that undergoes a certain processing (called
compilation) to be translated to the CPU.
26
Software Types Example
User Level
Office Suite Browser Whatsapp Terminal
Hacker Level
Worm Virus Ransomware Trojan
27
Recent Known Attacks
• Shirbit - Black Shadow
• SolarWinds - Sunburst
28
Software Code
{example}
29
The Software and Hardware connection
While a programmer writes code, the
hardware is usually behind the scenes.
30
Home assignment
• Send to the lecturer a short paragraph about yourself and why you
chose to learn Cybersecurity at Ecom School.
• Choose one out of these cyber attacks, read about them and
summaries them for next lesson:
1. Stuxnet (you could also watch the movie zer0days about that attack)
2. Eternalblue – The NSA hack
3. MafiaBoy – DDOS attacks
31
The End
Introduction to cyber
32