The Awareness of Cybersecurity: Cybersecurity Lecturer: Jumana Khwaileh
The Awareness of Cybersecurity: Cybersecurity Lecturer: Jumana Khwaileh
Cybersecurity Lecturer:
Jumana Khwaileh
Topics:
Identity, Digital Identity, Credentials
Threats today
Taking control of your computer • RAT, After RAT & Protect Ourselves
Pen drives • Leak of Information, Infected Pen drives, USB Killer Pen drive, BitLocker
Topics:
Revealing Information
•Authorized Entity, Key Management
Encryption •Key Exchange. Public key
ip address
Mobility
•Storage & performance
Cloud •synchronization
•Firewall
Cyber security tools •Network Intrusion Detection system/ Host Intrusion Detection System (NIDS,HIDS)
•Proxy * Modem VS Router
1. Length: Use passwords that are at least 12-16 characters long. Longer passwords are
generally more secure.
2. Complexity: Include a mix of uppercase and lowercase letters, numbers, and special
characters (e.g., !@#$%^&*).
3. Avoid Common Words: Avoid using dictionary words, common phrases, or easily
guessable information.
4. Avoid Personal Information: Do not use easily obtainable information such as your
name, birthdate, or common passwords like "password" or "123456."
5. Unique Passwords: Use a unique password for each account to prevent a single breach
from compromising multiple accounts.
6. Use Passphrases: Consider using a passphrase, which is a series of random words strung
together, as they can be easier to remember and harder to crack.
How to Create a Good Password:
1. Malware
2. Ransomware
3. Data Breaches
4. Insider Threats
• Then, the attacker moves to gain the victim’s trust and provide stimuli for subsequent
actions that break security practices, such as revealing sensitive information or
granting access to critical resources.
Social Engineering life cycle
Social engineering attack techniques
• Social engineering attacks come in many different forms and can be
performed anywhere where human interaction is involved.
• The following are the five most common forms of digital social engineering
assaults.
– Baiting
– Scareware
– Pretexting
– Phishing
– And others.
Social engineering
• Social engineering is dangerous because it relies on human psychology and
deception to bypass traditional security measures. Here are several reasons
why it poses a significant threat:
1. Exploits Human Trust
• And others.
Tips
Social engineers manipulate human feelings, such as curiosity or fear, to
carry out schemes and draw victims into their traps.
Being alert can help you protect yourself against most social engineering
attacks taking place in the digital realm.
Summary
• Phishing attacks often use email, instant messaging, or social media platforms
to deceive users into clicking on malicious links or downloading attachments
that contain malware.
Emails that appear to be from a trusted contact but are actually from an
attacker who has compromised the contact's account.
Mail Fraud
• Mail fraud, on the other hand, is a form of fraud that involves using the postal
service to deceive victims. While less common than phishing in the digital age,
mail fraud schemes can still be sophisticated and damaging. Mail fraud can
take various forms, such as:
– Sweepstakes or lottery scams that require victims to pay fees to claim a prize that doesn't
exist.
– Investment scams that promise high returns but result in financial loss for victims.
• Both phishing and mail fraud aim to deceive individuals into providing sensitive
information or sending money under false pretenses.
• Both forms of fraud often use similar tactics, such as impersonating legitimate
entities and creating a sense of urgency or excitement to manipulate victims.
Impact and Prevention:
• Phishing and mail fraud can have serious consequences, including financial
loss, identity theft, and damage to reputation. To prevent falling victim to
these scams, individuals and organizations should:
– Verify the legitimacy of requests for sensitive information before providing any
personal details.
– Be cautious of emails or mailings that create a sense of urgency or offer unsolicited
rewards.
– Use strong, unique passwords for online accounts and enable two-factor
authentication when available.
– Educate themselves and others about the dangers of phishing and mail fraud and
how to recognize and report suspicious activity.
Summary
• In conclusion, phishing and mail fraud are persistent threats that target
individuals and organizations worldwide. While phishing primarily occurs
through electronic communication channels, mail fraud exploits the postal
service to deceive victims. Despite their differences, both forms of fraud
rely on deception and manipulation to trick individuals into providing
sensitive information or sending money.
Summary
• However, like any digital payment method, NFC payments are not without their
cybersecurity risks. This discussion explores the implications of NFC payments on
cybersecurity, highlighting both the benefits and challenges of this technology.
NFC Payments
• This technology is commonly used for contactless payments, enabling users to simply
tap their devices on a compatible terminal to complete a transaction.
Benefits of NFC Payments:
• NFC payments offer several benefits, including convenience, speed, and security.
Users can quickly and easily make payments without the need for cash or physical
cards, reducing the risk of theft or loss. NFC transactions are also encrypted, making
them more secure than traditional magnetic stripe cards.
Cybersecurity Challenges:
• Despite the security features of NFC payments, there are still cybersecurity challenges
to consider. One of the main risks is data interception, where attackers attempt to
intercept and steal sensitive information during the transaction process. This risk can
be mitigated through the use of encryption and secure authentication methods.
Security Best Practices:
• To enhance the security of NFC payments, users should follow best practices such as:
Keeping their devices updated with the latest security patches and updates.
• DoS and DDoS attacks can have a significant impact on applications and
software.
• DoS and DDoS attacks can have a significant impact on applications and
software.
• Antivirus programs can detect and remove malware that may be used to
launch dos and DDoS attacks.
• Additionally, antivirus software can help prevent the spread of malware
that could be used to create botnets for DDoS attacks.
RAT, AFTER RAT & PROTECT OURSELVES
RAT
• RATs are a type of malware that provides attackers with unauthorized
access to a victim's computer.
• They can be used to perform a wide range of malicious activities,
including:
1. Monitoring user activity, such as keystrokes, screen captures, and
webcam feeds.
2. Stealing sensitive information, such as passwords, credit card
numbers, and personal data.
3. Installing additional malware or backdoors to maintain access to the
compromised system.
After RAT
After a RAT has been installed on a victim's computer, attackers can use the
compromised system to launch further attacks.
• Infected pen drives can contain malware that is designed to steal sensitive
information from a computer when the pen drive is inserted.
• These pen drives can contain malware that is designed to infect any
computer it is inserted into.
• USB killer pen drives are typically used as a form of sabotage or vandalism,
rather than for stealing information.
BitLocker
• BitLocker is a full-disk encryption feature included with Windows that can
help protect against the leak of information and such threats from
infected or USB killer pen drives.
• By encrypting the data stored on the drive, BitLocker ensures that even if
the drive is compromised, the encrypted data remains secure and cannot
be accessed by unauthorized parties.
Revealing Information
Revealing information
5. Educating employees and users about the importance of cybersecurity and privacy.
Authorized Entity, Key
Management
Authorized Entity Management
• Managing authorized entities involves defining and enforcing access
controls to ensure that only authorized users and devices have access to
sensitive data and systems.
• Effective key management ensures that keys are protected from unauthorized
access and that they are rotated regularly to minimize the risk of compromise.
Challenges in Key Management
• Key management presents several challenges, including:
– Ensuring that keys are generated securely and are sufficiently random.
• This discussion will explore the concept of key exchange in public key cryptography,
its importance in ensuring secure communication, and the challenges involved in
implementing secure key exchange protocols.
Public Key Cryptography
• In public key cryptography, each user has a pair of keys: a public key and a
private key.
• The public key is used for encryption, while the private key is used for
decryption.
• The public key can be freely distributed, allowing anyone to encrypt
messages that can only be decrypted by the corresponding private key
holder.
Key Exchange Protocols
• One of the most widely used key exchange protocols is the Diffie-Hellman
key exchange, which allows two parties to establish a shared secret key
over an insecure channel without any prior communication.
Challenges in Key Exchange
– Key distribution, ensuring that public keys are authentic and not tampered
with.
• Public Wi-Fi provides convenient access to the internet in public spaces but can
also pose security risks.
• Deep fake technology, on the other hand, allows for the creation of highly realistic
but fake videos and images, raising concerns about misinformation and privacy.
Public Wi-Fi networks
• Public Wi-Fi networks, such as those found in cafes, airports, and hotels, offer
convenient internet access for users on the go.
• However, these networks are often unsecured, making them vulnerable to various
cyber threats, including:
– Man-in-the-middle attacks, where an attacker intercepts communication between a user and the
internet.
– Eavesdropping, where an attacker monitors a user's internet activity.
– Malware distribution, where an attacker uses the public Wi-Fi network to distribute malicious
software.
Deep Fake Technology
• Deep fake technology uses artificial intelligence to create highly realistic
but fake videos and images.
• While this technology has legitimate uses, such as in the film industry, it
also raises concerns about misinformation and privacy.
• Use a virtual private network (VPN) when connecting to public Wi-Fi networks to
encrypt internet traffic.
• Wi-Fi technology has evolved significantly since its inception in the late
1990s. Initially, Wi-Fi networks were slow and had limited range.
– Convenience: Wi-Fi allows for wireless connectivity, eliminating the need for
cumbersome cables.
– Mobility: Wi-Fi enables users to stay connected while on the move, whether
in a coffee shop, airport, or hotel.
– Convenience: Hotspots provide wireless internet access, eliminating the need for cables
or wired connections.
– Mobility: Hotspots allow users to stay connected while traveling or away from home,
providing access to important information and services.
– Cost-effective: Hotspots can be a cost-effective alternative to cellular data plans,
especially for users who only need occasional internet access.
Using Hotspots Securely
• To use hotspots securely, users can take the following steps:
– Use a virtual private network (VPN) to encrypt internet traffic and protect against
eavesdropping.
– Avoid accessing sensitive information, such as banking or personal data, over public
hotspots.
– Enable firewall and antivirus software on devices to protect against malware and other
threats.
– Keep devices and software up to date with the latest security patches and updates.
Wireless access point (WAP)
Wireless access point (WAP)
• Wireless Access Points (WAPs) are devices that enable wireless devices to
connect to a wired network using Wi-Fi technology.
• Wireless Access Points serve as the bridge between wired and wireless
networks, allowing devices such as laptops, smartphones, and tablets to
connect to the network without the need for physical cables.
• Virtual Private Networks (VPNs) are essential tools for ensuring online
privacy and security.
• IPv4 addresses are the most common type of IP address and are used to
identify devices on the internet.
Types of IP Addresses
– Connectivity: Mobility has connected people around the world, enabling new forms of
collaboration and communication.
Cloud
- Storage & performance
Cloud computing
• Cloud computing has revolutionized the way we store and access data,
offering scalable storage solutions and high-performance computing
resources.
• Cloud storage allows users to store data remotely, freeing them from the
limitations of physical storage devices.
Benefits of Cloud Storage
– Accessibility: Cloud storage enables users to access their data from anywhere
with an internet connection, making it ideal for remote work and collaboration.
– Choose the right storage type for their needs, considering factors such as
performance, cost, and scalability.
– Backup: Cloud synchronization provides a secure backup of files and data, protecting
against loss due to hardware failure, theft, or other disasters.
– Synchronization: Cloud synchronization ensures that files and data are kept up to date
across all devices, eliminating the need for manual updates or transfers.
How Cloud Synchronization Works
Cloud synchronization works by storing files and data in the cloud and
using synchronization software to keep them updated across multiple
devices.
This process ensures that all devices have the latest version of the file.
How Cloud Synchronization Works
Best Practices for Cloud Synchronization:
To use cloud synchronization effectively, users can follow these best practices:
Use encryption: Encrypt files before syncing them to the cloud to protect against
unauthorized access.
Enable versioning: Use versioning features provided by cloud storage providers to keep track
of changes and recover previous versions if needed.
Monitor storage usage: Regularly monitor storage usage and delete unnecessary files to free
up space and avoid additional costs.
Use strong passwords: Use strong, unique passwords for cloud storage accounts to prevent
unauthorized access.
CYBER SECURITY
TOOLS
Firewall
Network Intrusion Detection system/ Host
Intrusion Detection System (NIDS, HIDS)
Proxy
Modem VS Router
FIREWALLS
Firewalls
• Firewalls are a critical component of network security, acting as a barrier
between a trusted internal network and untrusted external networks,
such as the Internet.
• They monitor and control incoming and outgoing network traffic based on
predetermined security rules, helping to protect against unauthorized
access, malware, and other cyber threats.
Role of Firewalls in Network Security
• Firewalls play a crucial role in network security by:
– Filtering network traffic: Firewalls examine incoming and outgoing traffic and
block or allow it based on predefined rules.
– Detecting and blocking threats: Firewalls can detect and block malware,
viruses, and other cyber threats before they reach the network.
Types of Firewalls
– Alerting security teams: NIDS and HIDS generate alerts when suspicious activity is
detected, allowing security teams to investigate and respond to potential threats.
– Providing visibility: NIDS and HIDS provide visibility into network and device activity,
helping organizations identify and mitigate security vulnerabilities.
Key Features of NIDS and HIDS
• NIDS and HIDS offer several key features, including:
– Signature-based detection: NIDS and HIDS use predefined signatures to identify known
threats and patterns of malicious activity.
– Anomaly-based detection: NIDS and HIDS analyze network and device activity for
deviations from normal behavior, which may indicate a security breach.
– Real-time monitoring: NIDS and HIDS provide real-time monitoring and alerting,
allowing for immediate response to potential threats.
– Centralized management: NIDS and HIDS can be centrally managed, allowing for easier
deployment and management across large networks.
Best Practices for Implementing and Managing NIDS and HIDS
– Privacy: Proxies can mask the IP address of client devices, providing anonymity and
protecting personal information.
– Access control: Proxies can enforce access policies, allowing or blocking access to
specific websites or content based on predefined rules.
How Proxies Work
When a client device sends a request to access a website, it first connects to the
proxy server.
The proxy then forwards the request to the internet on behalf of the client, using
its own IP address.
The website responds to the proxy server, which then forwards the response to
the client.
This process allows the client to access the website without revealing its own IP
address.
Benefits of Proxies
• Proxies offer several benefits, including:
– Improved security: Proxies can filter traffic, blocking malicious content and protecting
against attacks.
– Enhanced privacy: Proxies can mask the IP address of client devices, providing
anonymity and protecting personal information.
– Access to restricted content: Proxies can bypass geo-restrictions and access content that
may be blocked in certain regions.
Drawbacks of Proxies
However, proxies also have drawbacks, including:
– Slow performance: Proxies can introduce latency, slowing down internet connection
speeds.
– Potential for abuse: Proxies can be used to bypass security measures and engage in
malicious activities, such as hacking or spamming.
• It uses routing tables to determine the best path for data packets to reach
their destination.
Router: A router manages the traffic between devices within a network and
directs data packets to their destination.
Roles in a Network Setup
Roles in a Network Setup:
• In a typical home or office network setup, the modem connects to the ISP's
network, while the router connects to the modem and manages the local
network.
• Devices within the network, such as computers, smartphones, and smart
home devices, connect to the router either wired or wirelessly to access
the internet.
Cyber security myth
Cybersecurity