1.19k likes | 1.21k Vues
This presentation on Cyber Security training for beginners will help you understand the concept of cybersecurity from scratch. Here, we will look at various networking concepts, cyberattacks, understand the need for cybersecurity. <br><br>Post Graduate Program in Cyber Security:<br>This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.<br><br>Key Features:<br>u2705 Simplilearn Post Graduate Certificate<br>u2705 Masterclasses from MIT Faculty<br>u2705 Featuring Modules from MIT SCC and EC-Council<br>u2705 150 hours of Applied Learning<br>u2705 Get noticed by the top hiring companies<br>u2705 EC-Council learning kit<br>u2705 Industry case studies in cyber security<br>u2705 MIT SCC Professional Learning Community<br>u2705 Capstone project in 3 domains<br>u2705 25 hands-on projects<br><br>Learn more at https://www.simplilearn.com/pgp-cyber-security-certification-training-course?utm_campaign=CyberSecurity&utm_medium=Description&utm_source=Slideshare
E N D
The Rise of Cybercrimes Different Types of Cyberattacks What Is Cyber Security? Basic Network Terminologies Cyber Security Goals Tackling Cybercrime Today’s Agenda
Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Origin of the attack • May 2017 • 12
Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • How did the attack happen? Within a day more than 230,000 computers were infected across 150 countries • Attack started from an exposed vulnerable SMB port
Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Victims of the attack • Users that used the unsupported version of Microsoft Windows and also those users who hadn’t installed the new Microsoft security update of April 2017 • Computers running the Microsoft OS
Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Description of the attack • WannaCry cryptoworm encrypted the data and locked the users out of the target systems In return, the users were asked for a ransom of $300 - $600 which has to be paid via bitcoin
Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Impact of the attack • Both private and government organizations were hit, computers in hospitals were corrupted, Nissan and Renault had to put their business on hold as their computers were infected • 200,000 to 300,000 computers were infected
In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes Hacker
In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes The user’s first and last name, and email IDs were stolen Hacker
In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes Let’s now look into the different types of such cyberattacks The user’s first and last name, and email IDs were stolen Hacker
Different Types of Cyberattacks The different types of cyberattacks are : Denial of Service Attack Malware Attack SQL Injection Attack Social Engineering Attack Man in the Middle Attack Password Attack
Malware Attack Malware refers to malicious software, viruses, ransomware, and worms. Trojan virus is also a form of malware that disguises itself as a legitimate software
It gets into a system when the user clicks on suspicious links or downloads attachments or uses an infected pen drive. It then obtains all the information from the client’s system Malware Attack User opens links or uses a corrupted pen drive User User’s system gets corrupted
It gets into a system when the user clicks on suspicious links or downloads attachments or uses an infected pen drive. It then obtains all the information from the client’s system Malware Attack User opens links or uses a corrupted pen drive User User’s system gets corrupted
Social Engineering Attack It is the art of manipulating people so that they end up giving their confidential information. It is broken down into 3 categories
Social Engineering Attack It is the art of manipulating people so that they end up giving their confidential information. It is broken down into 3 categories Phishing Attack Spear Phishing Attack Whaling Phishing Attack
Phishing attack is a practice wherein the hacker usually sends fraudulent emails, which appear to be coming from a trusted source. It is done to install malware or to steal sensitive data like credit card information, and log in credentials Social Engineering Attack User opens the mail with the attachment and unknowingly downloads the virus User’s system gets affected Phishing Attack
Social Engineering Attack Spear Phishing is a variation of Phishing. Here, the attacker targets a specific individual or a group of people Spear Phishing Attack Hacker identifies a victim Now, hacker steals data from the victim’s computer Hacker then sends a targeted legitimized looking email Unaware of this, the victim opens the email which has malware
Social Engineering Attack Whaling Phishing attack is a type of attack that specifically targets wealthy, powerful and prominent individuals Whaling Phishing Attack
Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Attacker
Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Got the IP address! Attacker
Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Attacker
A Denial-of-Service attacks’ motive is to flood systems and networks with traffic to exhaust its resources and bandwidth. By doing so, it is unable to cater to legitimate service requests Denial of Service Attack
When attackers use multiple systems to launch this attack, it is known as Distributed Denial of Service (DDOS) attack Denial of Service Attack
In a database driven website, the hacker manipulates a standard SQL query. Malicious code is inserted into a SQL server to obtain information SQL Injection Attack Malicious code inserted into a SQL server
In a database driven website, the hacker manipulates a standard SQL query. Malicious code is inserted into a SQL server to obtain information SQL Injection Attack Hacker now has access to the database
The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack
The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack Brute force attack – every possible combination A, a, Aa, AAAA, aaaa, B, b….
The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack Brute force attack – every possible combination A, a, Aa, AAAA, aaaa, B, b…. Dictionary attack – common passwords 1234, ABCD,……
In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack
In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack Sender Receiver Attacker
In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 5989 Sender Receiver Attacker
In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 2989 5989 Sender Receiver 2989 Message is modified Attacker
In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 2989 2989 5989 Sender Receiver Message is modified Attacker
In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack Sender Receiver Attacker
In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack 5989 5989 Sender Receiver Message is read by the attacker Attacker
In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack 5989 But have you ever wondered why these attacks happen? 5989 Sender Receiver Message is read by the attacker Attacker
Reasons for Cyberattacks Cyberterrorism Such an attack is carried out by terrorist groups against nations to fulfill their agendas. Networks and computers are attacked
Reasons for Cyberattacks Cyberwarfare Here, nations hack into other nations’ network to cause damage. By doing so, critical data is stolen, and infrastructure can also be hampered
Reasons for Cyberattacks Cyber espionage Here, technology is used to gain information without consent from its owners. This can be done for monetary, social, or political gain
Reasons for Cyberattacks Personal differences Cyber attacks are also made due to certain intellectual challenges. This type of a hacker hacks for his own personal or social reasons
Reasons for Cyberattacks To prevent such attacks, cyber security is implemented Personal differences Cyber attacks are also made due to certain intellectual challenges. This type of a hacker hacks for his own personal or social reasons
Cyber Security refers to the practice of protecting networks, programs, computer systems, and their components from unauthorized digital access and attacks What Is Cyber Security?
Cyber Security refers to the practice of protecting networks, programs, computer systems, and their components from unauthorized digital access and attacks What Is Cyber Security? Cyberattack Cyber Security
Information Security Cyber Security What Is Cyber Security? Cyber Security and Information Security are different from one another • Processes and tools deployed to protect sensitive information • Set of techniques used to protect the integrity of networks
The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data
The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data
The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data
The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data Let us now have a look at the basic network terminologies, which is used in implementing cyber security