1 / 119

Cyber Security Training For Beginners | Cyber Security Tutorial | #LearningMarathon2021​ |Simplilearn

This presentation on Cyber Security training for beginners will help you understand the concept of cybersecurity from scratch. Here, we will look at various networking concepts, cyberattacks, understand the need for cybersecurity. <br><br>Post Graduate Program in Cyber Security:<br>This Post Graduate Program in Cyber Security is designed to equip you with the skills required to become an expert in the rapidly growing field of Cyber Security. This cyber security course aims to help you stay abreast all the latest trends in cyber security as well. This Post Graduate Program in Cyber Security will help you learn comprehensive approaches to protecting your infrastructure and securing your data, including risk analysis and mitigation, cloud-based security, and compliance. You will receive foundational to advanced security skills through industry-leading certification courses that are part of the program.<br><br>Key Features:<br>u2705 Simplilearn Post Graduate Certificate<br>u2705 Masterclasses from MIT Faculty<br>u2705 Featuring Modules from MIT SCC and EC-Council<br>u2705 150 hours of Applied Learning<br>u2705 Get noticed by the top hiring companies<br>u2705 EC-Council learning kit<br>u2705 Industry case studies in cyber security<br>u2705 MIT SCC Professional Learning Community<br>u2705 Capstone project in 3 domains<br>u2705 25 hands-on projects<br><br>Learn more at https://www.simplilearn.com/pgp-cyber-security-certification-training-course?utm_campaign=CyberSecurity&utm_medium=Description&utm_source=Slideshare

Simplilearn
Télécharger la présentation

Cyber Security Training For Beginners | Cyber Security Tutorial | #LearningMarathon2021​ |Simplilearn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Rise of Cybercrimes Different Types of Cyberattacks What Is Cyber Security? Basic Network Terminologies Cyber Security Goals Tackling Cybercrime Today’s Agenda

  2. Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Origin of the attack • May 2017 • 12

  3. Click here to watch the video

  4. Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • How did the attack happen? Within a day more than 230,000 computers were infected across 150 countries • Attack started from an exposed vulnerable SMB port

  5. Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Victims of the attack • Users that used the unsupported version of Microsoft Windows and also those users who hadn’t installed the new Microsoft security update of April 2017 • Computers running the Microsoft OS

  6. Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Description of the attack • WannaCry cryptoworm encrypted the data and locked the users out of the target systems In return, the users were asked for a ransom of $300 - $600 which has to be paid via bitcoin

  7. Did you know about the deadly WannaCry ransomware attack? It was one of the most severe worldwide cyberattacks, caused by the WannaCry cryptoworm The Rise of Cybercrimes • Impact of the attack • Both private and government organizations were hit, computers in hospitals were corrupted, Nissan and Renault had to put their business on hold as their computers were infected • 200,000 to 300,000 computers were infected

  8. In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes Hacker

  9. In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes The user’s first and last name, and email IDs were stolen Hacker

  10. In February 2019, Dunkin’ Donuts announced that the users of their rewards program were targeted by a credential stuffing attack. In such an attack, users’ credentials are stolen The Rise of Cybercrimes Let’s now look into the different types of such cyberattacks The user’s first and last name, and email IDs were stolen Hacker

  11. Different Types of Cyberattacks The different types of cyberattacks are : Denial of Service Attack Malware Attack SQL Injection Attack Social Engineering Attack Man in the Middle Attack Password Attack

  12. Malware Attack Malware refers to malicious software, viruses, ransomware, and worms. Trojan virus is also a form of malware that disguises itself as a legitimate software

  13. It gets into a system when the user clicks on suspicious links or downloads attachments or uses an infected pen drive. It then obtains all the information from the client’s system Malware Attack User opens links or uses a corrupted pen drive User User’s system gets corrupted

  14. It gets into a system when the user clicks on suspicious links or downloads attachments or uses an infected pen drive. It then obtains all the information from the client’s system Malware Attack User opens links or uses a corrupted pen drive User User’s system gets corrupted

  15. Social Engineering Attack It is the art of manipulating people so that they end up giving their confidential information. It is broken down into 3 categories

  16. Social Engineering Attack It is the art of manipulating people so that they end up giving their confidential information. It is broken down into 3 categories Phishing Attack Spear Phishing Attack Whaling Phishing Attack

  17. Phishing attack is a practice wherein the hacker usually sends fraudulent emails, which appear to be coming from a trusted source. It is done to install malware or to steal sensitive data like credit card information, and log in credentials Social Engineering Attack User opens the mail with the attachment and unknowingly downloads the virus User’s system gets affected Phishing Attack

  18. Social Engineering Attack Spear Phishing is a variation of Phishing. Here, the attacker targets a specific individual or a group of people Spear Phishing Attack Hacker identifies a victim Now, hacker steals data from the victim’s computer Hacker then sends a targeted legitimized looking email Unaware of this, the victim opens the email which has malware

  19. Social Engineering Attack Whaling Phishing attack is a type of attack that specifically targets wealthy, powerful and prominent individuals Whaling Phishing Attack

  20. Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Attacker

  21. Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Got the IP address! Attacker

  22. Man in the Middle Attack This attack is also known as eavesdropping attack. The attacker hijacks a session between the client and the server Client-server communication Client Server Attacker

  23. A Denial-of-Service attacks’ motive is to flood systems and networks with traffic to exhaust its resources and bandwidth. By doing so, it is unable to cater to legitimate service requests Denial of Service Attack

  24. When attackers use multiple systems to launch this attack, it is known as Distributed Denial of Service (DDOS) attack Denial of Service Attack

  25. In a database driven website, the hacker manipulates a standard SQL query. Malicious code is inserted into a SQL server to obtain information SQL Injection Attack Malicious code inserted into a SQL server

  26. In a database driven website, the hacker manipulates a standard SQL query. Malicious code is inserted into a SQL server to obtain information SQL Injection Attack Hacker now has access to the database

  27. The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack

  28. The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack Brute force attack – every possible combination A, a, Aa, AAAA, aaaa, B, b….

  29. The easiest way to hack a system is by cracking a user's password. This is done in various ways Password Attack Brute force attack – every possible combination A, a, Aa, AAAA, aaaa, B, b…. Dictionary attack – common passwords 1234, ABCD,……

  30. In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack

  31. In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack Sender Receiver Attacker

  32. In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 5989 Sender Receiver Attacker

  33. In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 2989 5989 Sender Receiver 2989 Message is modified Attacker

  34. In an active attack the intruder attempts to disrupt the network’s normalcy, modifies data and tries to alter the system resources Active Attack 2989 2989 5989 Sender Receiver Message is modified Attacker

  35. In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack Sender Receiver Attacker

  36. In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack 5989 5989 Sender Receiver Message is read by the attacker Attacker

  37. In passive attack, the intruder intercepts data traveling through the network. Here, the intruder eavesdrops but does not modify the message Passive Attack 5989 But have you ever wondered why these attacks happen? 5989 Sender Receiver Message is read by the attacker Attacker

  38. Reasons for Cyberattacks Cyberterrorism Such an attack is carried out by terrorist groups against nations to fulfill their agendas. Networks and computers are attacked

  39. Reasons for Cyberattacks Cyberwarfare Here, nations hack into other nations’ network to cause damage. By doing so, critical data is stolen, and infrastructure can also be hampered

  40. Reasons for Cyberattacks Cyber espionage Here, technology is used to gain information without consent from its owners. This can be done for monetary, social, or political gain

  41. Reasons for Cyberattacks Personal differences Cyber attacks are also made due to certain intellectual challenges. This type of a hacker hacks for his own personal or social reasons

  42. Reasons for Cyberattacks To prevent such attacks, cyber security is implemented Personal differences Cyber attacks are also made due to certain intellectual challenges. This type of a hacker hacks for his own personal or social reasons

  43. Cyber Security refers to the practice of protecting networks, programs, computer systems, and their components from unauthorized digital access and attacks What Is Cyber Security?

  44. Cyber Security refers to the practice of protecting networks, programs, computer systems, and their components from unauthorized digital access and attacks What Is Cyber Security? Cyberattack Cyber Security

  45. Information Security Cyber Security What Is Cyber Security? Cyber Security and Information Security are different from one another • Processes and tools deployed to protect sensitive information • Set of techniques used to protect the integrity of networks

  46. The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data

  47. The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data

  48. The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data

  49. The Cost of Not Being Cybersecure Reply Rate Click-Through Rate Customer trust hampered Compromising confidential data Financial crisis Information can be hacked which in turn can be used to spoil a company’s image Customers will discontinue business with an organization if their information is leaked A company can spend a lot of money and time in restoring the lost data Let us now have a look at the basic network terminologies, which is used in implementing cyber security

More Related