01-Induction cybersecurity and ethical hacking.pdf
1.
INDEX
• Introduction toCyber Security & Ethical Hacking
• CIA Triad
• CVE & CVSS
• Types of Security Testing
• Introduction to Network & Network Topology
• Categories of Computer Networks
• LAN, MAN, WAN
• Computer Network Architecture
• Peer-to-Peer Architecture
• Client-to-Server Architecture
• Career & Placement
2.
What is CyberSecurity?
• Cyber Security is the art of protecting networks,
devices, and data from unauthorized access or
criminal use and the practice of ensuring
confidentiality, integrity, and availability of
information.
• Cyber Security refers to a set of techniques used to
protect the integrity of networks, programs and data
from attack, damage or unauthorized access.
Introduction
to
Cyber Security
& Ethical
Hacking
3.
Cont…
• The useof cyber security can help prevent cyber attacks, data breaches, and identity theft
and can aid in risk management.
• So, when talking about Cyber Security, one might wonder,
“What are we trying to protect ourselves against?”
• Well, there are three main aspects we are trying to control, name:
• Un-Authorised Access
• Un-Aauthorised Deletion
• Un-Authorised Modification
4.
Core Fundamental Conceptsof Security
• In Cyber Security, the factors to consider are endless. The three core fundamental concepts
of security: Vulnerabilities, Threats and Risk.
5.
What is EthicalHacking?
• Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or
network. An ethical hacker finds the weak points or loopholes in a computer, web
application or network and reports them to the organization.
• Carrying out an ethical hack involves duplicating strategies and actions of malicious
attackers.
• This practice helps to identify security vulnerabilities which can then be resolved before a
malicious attacker has the opportunity to exploit them.
6.
Phases of EthicalHacking
• Reconnaissance, also known as the preparatory phase, is where the
hacker gathers information about a target before launching an attack
• In Scanning phase, the hacker identifies a quick way to gain access to the
network and look for information.
• The Hacker gains access to the system, applications, and network, and
escalates their user privileges to control the systems connected to it.
• Here, the Hacker secures access to the organization’s Rootkits and Trojans
and uses it to launch additional attacks on the network.
• Once the Hacker gains access, they cover their tracks to escape the
security personnel. They do this by clearing the cache and cookies,
tampering the log files, and closing all the open ports. This step is
important because it clears the system information making hacking a great
deal harder to track.
7.
What is CIATriad?
• The three letters in "CIA triad" stand for
• Confidentiality,
• Integrity, and
• Availability.
• The CIA triad is a common design model that forms
the basis for the development of security systems.
• The components of the triad are considered to be the
most important and fundamental components of
security
CIA Triad
8.
CIA Triad
• Confidentiality
•Confidentiality is the protection of personal information.
Confidentiality means keeping a client’s information between you
and the client, and not telling others including co-workers, friends,
family, etc.
• Integrity
• Integrity, in the context of computer systems, refers to methods of
ensuring that data is real, accurate and safeguarded from
unauthorized user modification.
• Availability
• Availability, in the context of a computer system, refers to the ability
of a user to access information or resources in a specified location
and in the correct format.
9.
What is CVE?
• CVE stands for Common Vulnerability and Exposure.
• CVE is a standardized, unique identifier assigned to
security vulnerabilities or exposures in software and
hardware products.
• The CVE system facilitates accurate tracking and
management of security issues across diverse
platforms, vendors, and technologies, empowering
users, vendors, and regulatory authorities to
efficiently identify, catalog, prioritize, and remediate
potential cybersecurity threats.
Common
Vulnerability
Exposure (CVE)
10.
What is aVulnerability?
• A vulnerability is a specific weakness or flaw within a software, hardware, or network
system that can be exploited by an attacker to compromise its security.
• Vulnerability can further be classified as:
• Human Error
• Design Flaws
• Configuration Issues
• Third-party Components
• Unpatched Software
• Zero-day Vulnerabilities
11.
What is CVSS?
• The Common Vulnerability Scoring System (CVSS) is a
free and open industry standard for assessing the
severity of computer system security vulnerabilities.
• CVSS attempts to assign severity scores to
vulnerabilities, allowing responders to prioritize
responses and resources according to threat.
Common
Vulnerability
Scoring
System(CVSS)
12.
CVSS Framework
• Scoresare calculated based on a formula that
depends on several metrics that approximate ease
and impact of an exploit.
• Scores range from 0 to 10, with 10 being the most
severe. While many utilize only the CVSS Base score
for determining severity, temporal and
environmental scores also exist, to factor in
availability of mitigations and how widespread
vulnerable systems are within an organization,
respectively
13.
Security Testing
• Securitytesting checks whether software is
vulnerable to cyber attacks, and tests the impact of
malicious or unexpected inputs on its operations.
• Security testing provides evidence that systems and
information are safe and reliable, and that they do
not accept unauthorized inputs.
Security Testing
14.
Main Goals ofSecurity Testing
• Identify assets
• Things that need to be protected, such as software applications and computing infrastructure.
• Identify threats and vulnerabilities
• Activities that can cause damage to an asset, or weaknesses in one or more assets that can be exploited
by attackers.
• Identify risk
• Security testing aims to evaluate the risk that specific threats or vulnerabilities will cause a negative
impact to the business. Risk is evaluated by identifying the severity of a threat or vulnerability, and the
likelihood and impact of exploitation.
• Perform remediation
• It provides actionable guidance for remediating vulnerabilities discovered, and can verify that
vulnerabilities were successfully fixed.
Security Testing Approaches
•Black Box Testing
• In black box testing, the security tester evaluates a system’s security from the outside without knowing the
internal processes generating responses.
• White Box Testing
• In white box testing, the tester designs test cases and tests based on the software’s source code.
• Gray Box Testing
• Gray box testing is a hybrid of white box and black box testing – black box testing involves a test object with
an unknown internal structure; white box testing requires the application’s internal structure to be fully
known.
17.
What is anetwork?
• A network is two or more computers (or other
electronic devices) that are connected together,
usually by cables or Wirelessly.
• Using a network allows you to share:
• hardware, such as a printer
• software, allowing multiple users to run the same
programs on different computers
• data, so that other people can access shared work
and you can access your data from any computer
on the network
Introduction to
Networks & Network
Topology
18.
Network Topology
• Topologydefines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
Types of Network Topology
• Physical Topology
• Logical Topology
Both these types can be further classified.
19.
Types of PhysicalTopology
• Bus Topology
• A single communication line or cable is shared among all
devices in this type of topology. If a failure is encountered in
the communication line, all devices connected to it are
affected and eventually stop functioning.
• Mesh topology
• One host gets connected to several other hosts, thus having a
point-to-point connection. Mesh topology is utilized in large
buildings with a wireless network for internet access.
20.
Types of PhysicalTopology
• Star topology
• A central device, known as a hub device, is involved in a star topology.
This includes Ethernet, which is family-based and uses cables to send
and receive data in a local network area.
• Ring topology
• This topology involves connecting one host device to two other
devices, which creates a ring or circular network layout. A failure of
one host in ring topology leads to the collapse of the whole structure.
21.
Types of LogicalTopology
• Broadcast topology
• This topology allows a host to send data to all other hosts
available in that network. No order or restrictions are observed
among the hosts regarding sharing data.
• Token-passing topology
• This topology only allows the sharing of data to hosts through the
access of an electronic token.
• If one host has no data to share, the electronic token is passed to
the next host in the sequence.
22.
What is aComputer network?
• A computer network is a set of computers sharing
resources located on or provided by network nodes.
• Computers use common communication
protocols over digital interconnections to
communicate with each other.
• These interconnections are made up
of telecommunication network technologies based
on physically wired, optical, and wireless radio-
frequency methods that may be arranged in a variety
of network topologies.
Computer Networks
23.
Types of ComputerNetworks
• LAN (Local Area Network)
• A Local Area Network (LAN) is a group of connected devices
that are in a limited area such as a school, office, building, or
home. It is a network mostly used for sharing hardware
resources such as printers, files, scanners, etc
• There are two types of LAN:
• Wired LAN– In this type of LAN, wired cables such as twisted
pair or coaxial cables are used for the connection and
transmission of data.
• Wireless LAN– In this type of LAN, devices are connected by
wireless cables such as radio, and light waves.
24.
Understanding Computer network
Architecture
•Computer Network Architecture is defined as the
physical and logical design of the software, hardware,
protocols, and media of the transmission of data.
• Simply we can say that how computers are organized
and how tasks are allocated to the computer
• The Architecture is further classified into two
Categories
Computer Network
Architecture
25.
Types of ComputerNetwork Architecture
• Peer-To-Peer network
• Peer-To-Peer network is a network in which all
the computers are linked together with equal
privilege and responsibilities for processing the
data.
• Peer-To-Peer network is useful for small
environments, usually up to 10 computers.
• Peer-To-Peer network has no dedicated server.
• Special permissions are assigned to each
computer for sharing the resources, but this
can lead to a problem if the computer with the
resource is down.
26.
Types of ComputerNetwork Architecture
• Client/Server Network
• Client/Server network is a network model
designed for the end users called clients, to access
the resources such as songs, video, etc. from a
central computer known as Server.
• The central controller is known as a server while
all other computers in the network are
called clients.
• A server performs all the major operations such as
security and network management.
• A server is responsible for managing all the
resources such as files, directories, printer, etc.
• All the clients communicate with each other
through a server
27.
Career Opportunities
• Asthe threat of cyberattacks grows, so does the
demand for cybersecurity experts.
• Cyber security is a growing industry that is still in
need of skilled professionals
Market Size and Growth
• Cyber security is a method of protecting systems,
networks, and programs from digital attacks.
• The cyber security market size was valued at USD
153.65 billion in 2022 and is projected to grow from
USD 172.32 billion in 2023 to USD 424.97 billion in
2030, exhibiting a 13.8% CAGR during the forecast.
Career &
Placement
28.
Emerging Cyber Security
•Diving Factors
• Increase in Remote and Hybrid work
• Rising adoption of Application Security
• Shift to Cloud-based delivery Models
• Focus on Consumer Security
• Challenges
• Ransomware Evolution, Wipers and Destructive Malware
• Cloud Third-Party Threats & Mobile Malware
• Global Attacks on Business
• Blockchain Revolution & AI Expansion
• IoT Threats
• Keeping Abreast of Technological Advancements
29.
Industrial Opportunities
Cyber Securityalready has spread out in all the
Major industries that include
• Banking & Finance Industries
• Healthcare Industry
• Entertainment Industry
• Business and Retail Industries
With this growing pace, there comes a lot of
opportunities for various kinds of jobs that include:
• Cyber Security Expert
• Mobile/Web Application Security Engineer
• Penetration Tester/Vulnerability Assessor
• Malware Analyst
• Cloud Security Engineer
• Network Security Manager/Consultant
• Ethical Hacker, and many more…
30.
Placement and IncomeOpportunities
• Cybersecurity analyst - Average annual salary: ₹5,10,203
• Security tester - Average annual salary: ₹7,24,297
• Network security engineer - Average annual salary: ₹6,13,536
• Chief information security officer (CISO) - Average annual salary: ₹19L
• Ethical hacker - Average annual salary: ₹5,14,639
In-Demand Cyber Security Skills:
• Cloud security
• Programming (especially scripting) languages
• Encryption
• Risk assessment
• Intrusion detection
• Problem-solving
• Analytical thinking
CONFIDENTIAL: The informationin this document belongs to Boston Institute of Analytics LLC. Any unauthorized sharing of this
material is prohibited and subject to legal action under breach of IP and confidentiality clauses.
THANK YOU !!!