HOW TO SECURE YOUR
FUTURE
EXPLORING CYBERSECURITY
FUNDAMENTALS, CAREER PATHS, AND
ETHICAL HACKING DEMOS
DR. VARUN M DESHPANDE
BACKGROUND
Background Challenges Advancements Career Conclusions
WHY IS CYBER
SECURITY
IMPORTANT?
• Protect your digital resources
• Protect from Hackers
• Protect your Business
• Protect Customer Data
• Secure from Vulnerabilities
• Secure your Digital Identity
• Protect against Data Theft
• Regulatory Compliance
requirements
• Protect Customers Trust
CIA TRIAD
• Confidentiality – Prevent intentional or
unintentional or unauthorized disclosure
of contents. (Protect against Data Theft)
• Integrity – Guarantees that message
delivered has not been altered
intentionally or unintentionally from the
original data received. (Ensure
correctness of the messages exchanged)
• Availability – Assurance that the system
would be stable, resilient and accessible
always. (Protect against Denial of
Service)
C
O
N
F
I
D
E
N
T
I
A
L
I
T
Y
AVAILABILITY
I
N
T
E
G
R
I
T
Y
AAA Security Framework:
• Authentication
• Authorization
• Accounting
COMMON TERMINOLOGIES
• MALWARE – Malicious Software
• MALWARE has 2 components
• Propagation Mechanism - The way in which malware spread
• Payload – Malicious action performed by malware
Viruses Worms Trojan Horses
Propagation Human Action Self Spreading Tricking users as a
legitimate SW
Payload Any payload Any payload Any payload
Example The Concept virus Stuxnet worm Free Software+ Spy
ware
ANATOMY OF A CYBER ATTACK
Reconnaissance – Gain information about the system
Enumeration – Identify the weak spots for the attack
Penetration – Actively attack and compromise the system
Exfiltration – Get data out of the network
Sanitation – Cover up any traces
SECURITY DESIGN
PRINCIPLES
• Defense in Depth
• Error & Exception handling
• Fail Safe
• Treat all inputs as unsafe
• Principle of Least Privilege
CHALLENGES
Background Challenges Advancements Career Conclusions
CYBER SECURITY THREATS TO WATCH OUT FOR
Ransomware &
Malware: More
Costly than Data
Breaches
Endpoint Attacks:
Presence of Shadow
IT, IoT botnets driven
DDOS attacks
Phishing: More
Sophisticated than
Ever
Third Party & Supply
Chain Attacks: Use
of vulnerable/out
dated components
AI- and ML-Driven
Attacks: Cybercrime
Evolves with Advanced
Tools
OWASP TOP 10 SECURITY RISKS
ADVANCEMENTS
Background Challenges Advancements Career Conclusions
CAREER
Background Challenges Advancements Career Conclusions
CYBERSECURITY CAREER PATH
• https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool
• https://www.cyberseek.org/pathway.html
CYBERSECURITY CERTIFICATION PATH
• https://www.isc2.org/certifications/cc
• https://www.comptia.org/certifications/security
• https://pauljerimy.com/security-certification-roadmap/
CAREER PATH
Work on
Research
Projects
Develop Online
Profile
Internships
Associate Full
Time Job
Develop Yourself
with Experience
& Certification/
Higher Study
Choose area to
Expertise and
spend extra
effort
Excel as
Professional &
Share
Knowledge
• Attend Workshops
• Work under Professors
• Experiment with Technology
• Present in Conferences
• Share knowledge with peers
• Catalog Projects in Github etc.
• File for Patents when applicable
• Reach out & build Network
• Work for a startup company
• Don’t hesitate to learn new tech
• Understand the needs of Market
• Get as much industry exposure as
possible
• Learn how to work in
Corporate Environment
• Take up ownership of
certain tasks
• Build Trust and
Professional
Relationships
• Put extra effort in first few years of
your career
• Decide if you want to pursue
higher studies and in which subject
• Explore opportunities to prove your
capabilities
• Select a domain in which you would
want to be Subject Matter Expert
• Explore, learn and gain experience
in the subject
• Make yourself ready for higher
responsibilities
• Don’t forget your career path and the
journey that you took
• Stay connected with your teachers
and all who helped you along the
way
• Take time to refresh your knowledge
and stay updated with latest changes
CONCLUSION
Background Challenges Advancements Career Conclusions
CYBER SECURITY DEFENSE STARTS WITH YOU!
• Use complex password and don’t share with anyone
• Enable multi factor authentication wherever available
• Be mindful of Phishing Attacks – If its too good to be true, it usually isn’t!
• Be mindful of the systems that you use and ensure session is closed
• Always apply security patches to your system
• Don’t open / forward any messages that seem suspicious or tempting offers
• Follow security design principles in what ever activity you do
• Take ownership of your career and prepare to excel!
THANK YOU
HTTPS://WWW.LINKEDIN.COM/IN/DR-
VARUN-M-DESHPANDE-33826512/
REFERENCES
• https://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf
• https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
• https://www.hindustantimes.com/india-news/report-breach-within-six-hours-govt-frames-cybersecurity-norms-101651171521206.html
• https://www.wilmerhale.com/en/insights/blogs/WilmerHale-Privacy-and-Cybersecurity-Law/20220330-sri-lanka-becomes-the-first-south-asian-country-to-pass-comprehensive-
privacy-legislation
• https://economictimes.indiatimes.com/tech/technology/fresh-legislation-may-replace-data-protection-bill/articleshow/89624369.cms
• https://informationisbeautiful.net/visualizations/ransomware-attacks/
• https://www.sentinelone.com/cybersecurity-101/zero-trust-architecture/
• https://2cloud.eu/ddos
• https://www.leapit.co.uk/why-is-cyber-security-important/
• https://www.onelogin.com/learn/ddos-attack
• https://www.cloudflare.com/learning/access-management/phishing-attack/
• https://www.wallarm.com/what/what-is-a-supply-chain-attack
• https://www.belfercenter.org/publication/AttackingAI
• https://www.toolbox.com/it-security/identity-access-management/articles/what-is-privileged-access-management/
• https://www.toolbox.com/it-security/vulnerability-management/articles/what-is-vulnerability-management/
• https://www.pamten.com/blog/security-frameworks/
• https://www.fortinet.com/blog/business-and-technology/fortiweb-release-6-0--ai-based-machine-learning-for-advanced-thr.html
• https://www.uvu.edu/spam/phishing.html
HOW TO PROTECT OUR DIGITAL ASSETS FROM THREATS?
• Adopt a Proactive Approach
• Find and fix the Vulnerabilities before hackers
exploit it
• Incorporate Security Design Principles
• Set Proper Security Configurations
• Disable ports which are not required, disable
ICMP response
• Error pages/messages should be generic
• Encrypt data which is sensitive. Even if its lost,
it will not be useful to attackers
• Adopt Secure Development Lifecycle
• Train the team, and provide them enough
resources to implement secure practices
• Monitor your systems for any anomalies
• Setup Google Alerts against GHDB
exploits
• Spikes in usage need to be monitored –
DDOS protection services
• Security breaches are inevitable – Move
Quickly to resolve the issues
• Have a robust Security Incident Response
Team
• Have a Business Continuity Plan
C
O
N
F
I
D
E
N
T
I
A
L
I
T
Y
AVAILABILITY I
N
T
E
G
R
I
T
Y

Cyber security fundamentals & ethical hacking

  • 1.
    HOW TO SECUREYOUR FUTURE EXPLORING CYBERSECURITY FUNDAMENTALS, CAREER PATHS, AND ETHICAL HACKING DEMOS DR. VARUN M DESHPANDE
  • 3.
  • 4.
    WHY IS CYBER SECURITY IMPORTANT? •Protect your digital resources • Protect from Hackers • Protect your Business • Protect Customer Data • Secure from Vulnerabilities • Secure your Digital Identity • Protect against Data Theft • Regulatory Compliance requirements • Protect Customers Trust
  • 6.
    CIA TRIAD • Confidentiality– Prevent intentional or unintentional or unauthorized disclosure of contents. (Protect against Data Theft) • Integrity – Guarantees that message delivered has not been altered intentionally or unintentionally from the original data received. (Ensure correctness of the messages exchanged) • Availability – Assurance that the system would be stable, resilient and accessible always. (Protect against Denial of Service) C O N F I D E N T I A L I T Y AVAILABILITY I N T E G R I T Y AAA Security Framework: • Authentication • Authorization • Accounting
  • 7.
    COMMON TERMINOLOGIES • MALWARE– Malicious Software • MALWARE has 2 components • Propagation Mechanism - The way in which malware spread • Payload – Malicious action performed by malware Viruses Worms Trojan Horses Propagation Human Action Self Spreading Tricking users as a legitimate SW Payload Any payload Any payload Any payload Example The Concept virus Stuxnet worm Free Software+ Spy ware
  • 8.
    ANATOMY OF ACYBER ATTACK Reconnaissance – Gain information about the system Enumeration – Identify the weak spots for the attack Penetration – Actively attack and compromise the system Exfiltration – Get data out of the network Sanitation – Cover up any traces
  • 9.
    SECURITY DESIGN PRINCIPLES • Defensein Depth • Error & Exception handling • Fail Safe • Treat all inputs as unsafe • Principle of Least Privilege
  • 10.
  • 11.
    CYBER SECURITY THREATSTO WATCH OUT FOR Ransomware & Malware: More Costly than Data Breaches Endpoint Attacks: Presence of Shadow IT, IoT botnets driven DDOS attacks Phishing: More Sophisticated than Ever Third Party & Supply Chain Attacks: Use of vulnerable/out dated components AI- and ML-Driven Attacks: Cybercrime Evolves with Advanced Tools
  • 17.
    OWASP TOP 10SECURITY RISKS
  • 18.
  • 24.
  • 25.
    CYBERSECURITY CAREER PATH •https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool • https://www.cyberseek.org/pathway.html
  • 26.
    CYBERSECURITY CERTIFICATION PATH •https://www.isc2.org/certifications/cc • https://www.comptia.org/certifications/security • https://pauljerimy.com/security-certification-roadmap/
  • 27.
    CAREER PATH Work on Research Projects DevelopOnline Profile Internships Associate Full Time Job Develop Yourself with Experience & Certification/ Higher Study Choose area to Expertise and spend extra effort Excel as Professional & Share Knowledge • Attend Workshops • Work under Professors • Experiment with Technology • Present in Conferences • Share knowledge with peers • Catalog Projects in Github etc. • File for Patents when applicable • Reach out & build Network • Work for a startup company • Don’t hesitate to learn new tech • Understand the needs of Market • Get as much industry exposure as possible • Learn how to work in Corporate Environment • Take up ownership of certain tasks • Build Trust and Professional Relationships • Put extra effort in first few years of your career • Decide if you want to pursue higher studies and in which subject • Explore opportunities to prove your capabilities • Select a domain in which you would want to be Subject Matter Expert • Explore, learn and gain experience in the subject • Make yourself ready for higher responsibilities • Don’t forget your career path and the journey that you took • Stay connected with your teachers and all who helped you along the way • Take time to refresh your knowledge and stay updated with latest changes
  • 28.
  • 29.
    CYBER SECURITY DEFENSESTARTS WITH YOU! • Use complex password and don’t share with anyone • Enable multi factor authentication wherever available • Be mindful of Phishing Attacks – If its too good to be true, it usually isn’t! • Be mindful of the systems that you use and ensure session is closed • Always apply security patches to your system • Don’t open / forward any messages that seem suspicious or tempting offers • Follow security design principles in what ever activity you do • Take ownership of your career and prepare to excel!
  • 31.
  • 32.
    REFERENCES • https://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf • https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ •https://www.hindustantimes.com/india-news/report-breach-within-six-hours-govt-frames-cybersecurity-norms-101651171521206.html • https://www.wilmerhale.com/en/insights/blogs/WilmerHale-Privacy-and-Cybersecurity-Law/20220330-sri-lanka-becomes-the-first-south-asian-country-to-pass-comprehensive- privacy-legislation • https://economictimes.indiatimes.com/tech/technology/fresh-legislation-may-replace-data-protection-bill/articleshow/89624369.cms • https://informationisbeautiful.net/visualizations/ransomware-attacks/ • https://www.sentinelone.com/cybersecurity-101/zero-trust-architecture/ • https://2cloud.eu/ddos • https://www.leapit.co.uk/why-is-cyber-security-important/ • https://www.onelogin.com/learn/ddos-attack • https://www.cloudflare.com/learning/access-management/phishing-attack/ • https://www.wallarm.com/what/what-is-a-supply-chain-attack • https://www.belfercenter.org/publication/AttackingAI • https://www.toolbox.com/it-security/identity-access-management/articles/what-is-privileged-access-management/ • https://www.toolbox.com/it-security/vulnerability-management/articles/what-is-vulnerability-management/ • https://www.pamten.com/blog/security-frameworks/ • https://www.fortinet.com/blog/business-and-technology/fortiweb-release-6-0--ai-based-machine-learning-for-advanced-thr.html • https://www.uvu.edu/spam/phishing.html
  • 33.
    HOW TO PROTECTOUR DIGITAL ASSETS FROM THREATS? • Adopt a Proactive Approach • Find and fix the Vulnerabilities before hackers exploit it • Incorporate Security Design Principles • Set Proper Security Configurations • Disable ports which are not required, disable ICMP response • Error pages/messages should be generic • Encrypt data which is sensitive. Even if its lost, it will not be useful to attackers • Adopt Secure Development Lifecycle • Train the team, and provide them enough resources to implement secure practices • Monitor your systems for any anomalies • Setup Google Alerts against GHDB exploits • Spikes in usage need to be monitored – DDOS protection services • Security breaches are inevitable – Move Quickly to resolve the issues • Have a robust Security Incident Response Team • Have a Business Continuity Plan C O N F I D E N T I A L I T Y AVAILABILITY I N T E G R I T Y

Editor's Notes

  • #12 DDOS Attack
  • #13 Phishing example
  • #14 How phishing works
  • #15 Supply chain attacks
  • #16 AI and ML based attack illustration
  • #17 OWASP provides tools and standards for web application security
  • #19 Identity and access management has become key
  • #20 Zero trust framework. Every company is adoption its version of zero trust. Verify everyone. Trust no one
  • #21 Vulnerability management to ensure no vulnerabilities in the system
  • #22 Using AI to solve problems at scale. Web application firewall example.
  • #23 Security frameworks