0% found this document useful (0 votes)
57 views21 pages

Intro To Cyber 1

Cybersecurity is the process of protecting networks, servers, and other infrastructure from cyber attacks. It aims to protect the confidentiality, integrity, and availability of information. Standard cybersecurity measures include data encryption, multi-factor authentication, file permissions, backups, firewalls, and more. Cyber attacks come in various forms like phishing, viruses, and denial of service attacks. The cyber kill chain model traces the stages of a cyber attack from reconnaissance to actions on the target. It can help security teams identify vulnerabilities and stop attacks at different stages.

Uploaded by

Michael Wagxy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views21 pages

Intro To Cyber 1

Cybersecurity is the process of protecting networks, servers, and other infrastructure from cyber attacks. It aims to protect the confidentiality, integrity, and availability of information. Standard cybersecurity measures include data encryption, multi-factor authentication, file permissions, backups, firewalls, and more. Cyber attacks come in various forms like phishing, viruses, and denial of service attacks. The cyber kill chain model traces the stages of a cyber attack from reconnaissance to actions on the target. It can help security teams identify vulnerabilities and stop attacks at different stages.

Uploaded by

Michael Wagxy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

INTRODUCTION

TO
CYBERSECURITY

#CyberFam
@2023
Intro to Cybersecurity

• What is Cybersecurity?
Cybersecurity is a process used to protect and defend network,
server etc from cyber attack.

• What is Information Security?


Information security is the process used to protect and defend
both physical and digital infrastructure.
Intro to Cybersecurity

• When talking about cybersecurity, one might wonder “What are


we trying to protect ourselves against?”

• These 3 main aspects we are trying to protect are: “CIA Triad”


• Confidentiality

• Integrity

• Availability
Intro to Cybersecurity
• Confidentiality - refers to protecting information from unauthorized access.
• Integrity - means data are trustworthy, complete, and have not been
accidentally altered or modified by an unauthorized user.

• Availability - means data are accessible when you need them.

Why do we need cybersecurity?


Cyber attacks can be extremely expensive for businesses to endure.
Intro to Cybersecurity

Standard measures to establish confidentiality include:


• Data encryption – MD5, SHA1 ...
• MultiFactor Authentication (MFA) / Two-factor Authentication
• Something You Know - Password, Pin ...
• Something You Have – Security token, Smart card ...
• Something You Are – Fingerprint, Retina scan, Face scan, Voice Recognition
Intro to Cybersecurity

Standard measures to guarantee integrity include:


•Cryptographic checksums
•Using file permissions
•Uninterrupted power supplies
Intro to Cybersecurity

Standard measures to guarantee availability include:


• Backing up data to external drives
• Implementing firewalls
• Having backup power supplies
• Data redundancy
Intro to Cybersecurity
• Types of cyber attacks?
A cyber-attack is an exploitation of computer systems and networks. It uses
malicious code to manipulate computer code, logic or data and lead to
cybercrimes, such as information and identity theft.

Cyber-attacks can be classified into the following categories:


• Web-based attacks

• System-based attacks
Intro to Cybersecurity
• Web-based attacks • System-based attacks
These are the attacks which occur on a These are the attacks which are intended to
website or web applications. compromise a computer or a computer
network.
Some of the important system-based attacks
Some of the important web-based attacks are
are as follows:
as follows:
• Phishing • Virus
• Brute force • Worm
• Denial of Service • Trojan horse
• Dictionary attacks • Backdoors
• Injection attacks • Botnet
• Man in the middle attack
Intro to Cybersecurity

• Because of the above reasons, cybersecurity has


become an important part of the business and the focus
now is on developing appropriate response plans that
minimize the damage in the event of a cyber attack.

• But,an organization or an individual can develop a


proper response plan only when he has a good grip on
cybersecurity fundamentals.
CYBER KILL CHAIN

•The cyber kill chain is essentially a


cybersecurity model created by Lockheed
Martin that traces the stages of a cyber-
attack, identifies vulnerabilities, and
helps security teams to stop the attacks at
every stage of the chain.
RECONNAISSANCE
• The attacker collects information about the target and the
strategies for the attack. This incorporates collecting e-mail
addresses and gathering other data. Automated scanners are
utilized by intruders to discover focuses of defenselessness
within the system. This incorporates filtering firewalls,
intrusion prevention systems, etc to urge a point of passage
for the attack.

• Tools: OSINT, Social platforms, Job Portals


RECONNAISSANCE
• Types of Reconnaissance?
Active Reconnaissance
• Hackers interact directly with the computer system and attempt to obtain
information through techniques like automated scanning or manual testing
and tools like ping and netcat

Passive Reconnaissance
Hackers interact without directly interacting with systems, using tools such as
Wireshark and Shodan and methods such as OS fingerprinting to gain
information. 
WEAPONIZATION
• Attackers develop malware by leveraging security
vulnerabilities. Attackers engineer malware based on
their needs and the intention of the attack. This
process also involves attackers trying to reduce the
chances of getting detected by the security solutions
that the organization has in place.

• Tools: Msfvenom, TheFatRat, Metasploit ...


DELIVERY
•The attacker delivers the weaponized malware
via a phishing email or some other medium. The
most common delivery vectors for weaponized
payloads include websites, removable disks, and
emails. This is the most important stage where
the attack can be stopped by the security teams.

•Tools: Netcat, Python and Apache Server


EXPLOITATION
•The malicious code is conveyed into the
organization’s system. The perimeter is
breached here. And the attackers get the
opportunity to misuse the organization’s
systems by introducing tools, running scripts,
and altering security certificates.

•Tools: Metasploit, Sqlmap ...


INSTALLATION
•A backdoor or remote access trojan is
introduced by the malware that gives access to
the intruder Typically another imperative
organize way the attack can be ceased utilizing
systems is by implementation of ; HIDS (Host-
based Intrusion Detection System)

•Types of IDS & IPS


COMMAND AND CONTROL
•The attacker gains control over the
organization’s systems and network.
Attackers gain access to privileged
accounts and attempt brute force
attacks, search for credentials, and
change permissions to take over the
control.
ACTIONS ON OBJECTIVE

•The attacker finally extracts the data


from the system. The objective
involves gathering, encrypting, and
extracting confidential information
from the organization’s environment.
Thank you

Questions!!
#CyberFam
@2023

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy