SlideShare a Scribd company logo
1 of 44
Computer Security
By Abdo and Roberts
Professional English Communication
November 2016 | DIN16SP
OAMK
Or Insecurity?
So you think you are
secure?
Think again!
If you think like an attacker
you can defend better...
You asking what is this
colors?
Who is a hacker?
It’s not what you think it is!
Hackers are the good ones!
Crackers are the bad ones
But they keep calling bad
guys “hacker” in general
because of media
And then there are colored
hats!
What are their motivations?
“White hat” hacker
Operate with permission to improve security
“Grey hat” hacker
May violate ethical standards or laws, but without “bad”
intentions
“Black hat” hacker
Operate with “bad” intentions, for example, personal financial
gain
HacktivistsHacktivists
State sponsored hackers
Cyber warfare
Spy hackers
Security by obscurity...
How about NO?
BUT
Hackers are always one
step ahead of you...
Get the mindset
Tools?
Kali linux (kali.org)
Areas?
1. Computer forensics
2. Cryptography
3. Reverse engineering and vulnerability analysis
4. Social engineering
5. Penetration testing
6. Malware analysis
7. Security management
Penetration testing
1. Information gathering (OSINT)
2. Enumeration
3. Exploit
4. Report
Certifications?
1.OSCP (offensive-security.com)
2.CEH
3.Security+
4.GIAC
5.CISSP
And ...
How to be secure?
1. password password password!
2. Updated antivirus
3. Updated softwares
4. Firewall
5. There is no patch for human stupidity! :) lol
Brain food
1. defcon.org
2. social-engineer.org
3. The first book: Penetration testing By Georgia
Weidman ISBN: 978-1-59327-564-8
4. Vulnhub.com and other wargames and CTF
5. My twitter @n3tg33k :D
6. google.com
“TRY HARDER”-- offensive security
Th4nk y0u

More Related Content

What's hot

osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source IntelligenceOsama Ellahi
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionChandrapal Badshah
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA (European Emergency Number Association)
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataChema Alonso
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 

What's hot (8)

osint - open source Intelligence
osint - open source Intelligenceosint - open source Intelligence
osint - open source Intelligence
 
OSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet versionOSINT mindset to protect your organization - Null monthly meet version
OSINT mindset to protect your organization - Null monthly meet version
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
Osint primer
Osint primerOsint primer
Osint primer
 
From OSINT to Phishing presentation
From OSINT to Phishing presentationFrom OSINT to Phishing presentation
From OSINT to Phishing presentation
 
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big DataCazando Cibercriminales con: OSINT + Cloud Computing + Big Data
Cazando Cibercriminales con: OSINT + Cloud Computing + Big Data
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 

Viewers also liked

الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا
 الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا
الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميدياFady Ramzy
 
Participatory [Citizen] Science
Participatory [Citizen] ScienceParticipatory [Citizen] Science
Participatory [Citizen] ScienceMuki Haklay
 
RiskM-8-standard and certification
RiskM-8-standard and certificationRiskM-8-standard and certification
RiskM-8-standard and certificationtellstptrisakti
 
C4S1 Tipe Tipe Industri dan Peluang
C4S1   Tipe Tipe Industri dan PeluangC4S1   Tipe Tipe Industri dan Peluang
C4S1 Tipe Tipe Industri dan Peluangtellstptrisakti
 
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giải
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giảiSức bền vật liệu - Bài tập sức bền vật liệu có lời giải
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giảiCửa Hàng Vật Tư
 
Entrepreneurship in hospitality and tourism
Entrepreneurship in hospitality and tourismEntrepreneurship in hospitality and tourism
Entrepreneurship in hospitality and tourismtellstptrisakti
 
Historical prespective of the mice industri
Historical prespective of the mice industriHistorical prespective of the mice industri
Historical prespective of the mice industritellstptrisakti
 
Taking Advantage of Emerging Tech in 2017
Taking Advantage of Emerging Tech in 2017Taking Advantage of Emerging Tech in 2017
Taking Advantage of Emerging Tech in 2017ALATechSource
 
NX10 for Engineering Design 1
NX10 for Engineering Design 1NX10 for Engineering Design 1
NX10 for Engineering Design 1Nam Hoai
 
employee turnover
employee turnoveremployee turnover
employee turnoveramul
 

Viewers also liked (17)

الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا
 الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا
الحوارات الأكثر تداولا فى النصف الأول من رمضان 2016 على السوشيال ميديا
 
Tai lieu sua chua o to xe may
Tai lieu sua chua o to xe mayTai lieu sua chua o to xe may
Tai lieu sua chua o to xe may
 
Participatory [Citizen] Science
Participatory [Citizen] ScienceParticipatory [Citizen] Science
Participatory [Citizen] Science
 
Economics
EconomicsEconomics
Economics
 
RiskM-8-standard and certification
RiskM-8-standard and certificationRiskM-8-standard and certification
RiskM-8-standard and certification
 
Giao trinh tien Mastercam co ban
Giao trinh tien Mastercam co banGiao trinh tien Mastercam co ban
Giao trinh tien Mastercam co ban
 
What is PR
What is PRWhat is PR
What is PR
 
C4S1 Tipe Tipe Industri dan Peluang
C4S1   Tipe Tipe Industri dan PeluangC4S1   Tipe Tipe Industri dan Peluang
C4S1 Tipe Tipe Industri dan Peluang
 
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giải
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giảiSức bền vật liệu - Bài tập sức bền vật liệu có lời giải
Sức bền vật liệu - Bài tập sức bền vật liệu có lời giải
 
Entrepreneurship in hospitality and tourism
Entrepreneurship in hospitality and tourismEntrepreneurship in hospitality and tourism
Entrepreneurship in hospitality and tourism
 
Historical prespective of the mice industri
Historical prespective of the mice industriHistorical prespective of the mice industri
Historical prespective of the mice industri
 
1.1 definisi
1.1 definisi1.1 definisi
1.1 definisi
 
Things to do
Things to doThings to do
Things to do
 
Taking Advantage of Emerging Tech in 2017
Taking Advantage of Emerging Tech in 2017Taking Advantage of Emerging Tech in 2017
Taking Advantage of Emerging Tech in 2017
 
Tai lieu co khi
Tai lieu co khiTai lieu co khi
Tai lieu co khi
 
NX10 for Engineering Design 1
NX10 for Engineering Design 1NX10 for Engineering Design 1
NX10 for Engineering Design 1
 
employee turnover
employee turnoveremployee turnover
employee turnover
 

Similar to Computer Security pro english course

Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 
Basic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attackBasic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attackDhaval Solanki
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 

Similar to Computer Security pro english course (20)

Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hackers final
Hackers finalHackers final
Hackers final
 
Hackers final
Hackers finalHackers final
Hackers final
 
HACKING
HACKINGHACKING
HACKING
 
Hackers
HackersHackers
Hackers
 
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Basic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attackBasic Introduction about Cyber security & Cyber attack
Basic Introduction about Cyber security & Cyber attack
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
5
55
5
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 

Computer Security pro english course

Editor's Notes

  1. Introduce, and computer security what is that why we need it
  2. Better to talk about insecurity when we want to be secure. Years ago IT security sector was solely focusing on defensive
  3. Asking from audiance , who ever got hackeed, dealt with computer malwares like viruses, read news about hacked or breached data? Who knows wikileaks julian assange , edward snowden ? who heard about first official cyber war stuxnet? SO DO YOU THINK YOU ARE SECURE?
  4. Certified ethical hacker, ethics, Get Out of Jail Free card , concent of the client
  5. Old days geeks in computer security that realy think inside and outside and everywhere of box and just deleting the box and creating something new
  6. Definition - What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
  7. Definition - What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
  8. Definition - What does White Hat Hacker mean? A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them.
  9. Some organizations just ban internet or filter the access, be most secure server is offline server! But its not a server anymore
  10. Its a paradox you need to think like a black hat hacker and become them but still real black hat hackers are one step ahead of you
  11. Phone number 2 digit > facebook > snap chat > last pass breach > all phone number exept last 2 digits
  12. Social engineering showing badge from far away, being a routing make us not see the security problems anymore , being thought full not paranoid...