SlideShare a Scribd company logo
Speaker: Dr Eng Hasan Shamroukh
Cybersecurity

It is the protection of computer
systems and networks from
information disclosure, theft of
or damage to their hardware,
software, or electronic data, as
well as from the disruption or
misdirection of the services they
provide
Cybersecurity Significance

1- Due to the continuously expanding reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things".

2- Cybersecurity is also one of the significant challenges in the contemporary
world, due to its complexity, both in terms of political usage and technology.
Assets

It is any resource owned or controlled by a business or an economic entity

Assets Types:

Data Assets

Financial Assets
Data Types
According to data importance
From lower security level to higher
security level
Security Triad / Security Elements
Encryption

It is converting the original representation of the information (plaintext), into an
alternative form known as (cipher text).

Wireless Application

EEA: EPS Encryption Algorithm

Types

Symmetric: one key used in Encryption & Decryption

Asymmetric: a key used in Encryption and another in Decryption
Symmetric Key Encryption
Asymmetric Encryption Example
Diffie–Hellman key exchange
It is a method of securely exchanging
cryptographic keys over a public channel
and was one of the first public-key protocols
as conceived by Ralph Merkle and named
after Whitfield Diffie and Martin Hellman.
It establishes a shared secret between two
parties that can be used for secret
communication for exchanging data over a
public network. An analogy illustrates the
concept of public key exchange by using
colors instead of very large numbers:
Integrity
It is Checking that data is not altered or
modified during Tx.
MAC = HMAC Authentic
MAC = HMAC Not Authentic
Wireless Application
TKIP (Temporary Key Integrity Protocol)
EIA: EPS Integrity Algorithm
Authentication

Username and password Verification

Protocols

PAP: Password Authentication Protocol

CHAP: Challenge Handshaking Authentication Protocol

EAP: Extensible Authentication Protocol

PEAP: Protected Extensible Authentication Protocol

FEAP: Fast Extensible Authentication Protocol

LEAP: Lightweight Extensible Authentication Protocol
Authentication Factor Types

1-Knowledge factors: Something the user knows

(e.g., a password, partial password, pass phrase, personal identification number (PIN), challenge
response (the user must answer a question or pattern), security question).

2-Ownership factors: Something the user has

(e.g., wrist band, ID card, security token, implanted device, cell phone with built-in hardware token,
software token, or cell phone holding a software token).

3- Inherence factors: Something the user is or does

(e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient),
signature, face, voice, unique bio-electric signals, or other biometric identifier).
Authentication Types
According to factors used:

1- Single Factor Authentication

2- Multi Factor Authentication
According to use
DoD (Defense of Depth)
Onion Model: The best DoD Representation
Data is the center and the most important security level
It is a concept used in Information security in which
multiple layers of security controls (defense) are placed
throughout an information technology (IT) system
DoD Controls
Physical control
Anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like.
Technical controls

hardware or software whose purpose is to protect systems and resources.

Examples: disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical
controls in that they prevent access to the contents of a system, but not the physical systems themselves.
Administrative controls

Organization's policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to
security and that regulations are met. They include things such as hiring practices, data handling procedures, and security
requirements.
Information security culture

1-Pre-evaluation: To identify the awareness of information security within
employees and to analyze the current security policies.

2-Strategic planning: To come up with a better awareness program, clear targets
need to be set. Assembling a team of skilled professionals is helpful to achieve it.

3-Operative planning: A good security culture can be established based on
internal communication, management-buy-in, security awareness and a training
program.

4-Implementation: Four stages should be used to implement the information
security culture. They are:

A-Commitment of the management

B-Communication with organizational members

C-Courses for all organizational members

D-Commitment of the employees

5-Post-evaluation: To assess the success of the planning and implementation,
and to identify unresolved areas of concern.
Incident response planning

1-Preparation: Preparing stakeholders on the procedures for handling computer
security incidents or compromises

2-Detection and analysis: Identifying and investigating suspicious activity to confirm a
security incident, prioritizing the response based on impact and coordinating
notification of the incident

3-Containment, eradication and recovery: Isolating affected systems to prevent
escalation and limit impact, pinpointing the genesis of the incident, removing
malware, affected systems and bad actors from the environment and restoring
systems and data when a threat no longer remains

4-Post incident activity: Post mortem analysis of the incident, its root cause and the
organization's response with the intent of improving the incident response plan and
future response efforts
Digital Certificate

Called also public key certificate / identity certificate

It is an electronic document used to prove the ownership of a public key

The certificate includes:

1- Key Information

2- Subject: Information about the identity of its owner

3- Issuer: Digital signature of an entity that has verified the certificate's contents
Public key infrastructure (PKI)
It is a set of roles, policies, hardware, software and
procedures needed to create, manage, distribute, use,
store and revoke digital certificates and manage public-
key encryption.
CA: Certificate Authority
RA: Registration Authority
VA: Validation Authority
Digital Signature

It is a mathematical scheme for verifying the authenticity
of digital messages or documents.

A valid digital signature, where the prerequisites are
satisfied, gives a recipient very strong reason to believe
that the message was created by a known sender
(authenticity), and that the message was not altered in
transit (integrity)

Digital Signature Schemes
Hackers
Persons skilled in information technology who
uses their technical knowledge to achieve a goal
or overcome an obstacle, within a computerized
system by non-standard means.
Penetration Testing

It is an authorized simulated cyberattack on a computer system, performed to evaluate the security of
the system

Tools

BackBox

Nmap

Metasploit Project

Nessus
Penetration Testing Phases

1-Reconnaissance: The act of gathering important information on a target system. This information can
be used to better attack the target.

For example, open source search engines can be used to find data that can be used in a social
engineering attack.

2-Scanning: Uses technical tools to further the attacker's knowledge of the system.

For example, Nmap can be used to scan for open ports.

3-Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can
use a payload to exploit the targeted system.

For example, Metasploit can be used to automate attacks on known vulnerabilities.

4-Maintaining access: Maintaining access requires taking the steps involved in being able to be
persistently within the target environment in order to gather as much data as possible.

5-Covering tracks: The attacker must clear any trace of compromising the victim system, any type of
data gathered, log events, in order to remain anonymous.
SOC (Security Operation Center)

is a facility where enterprise information
systems (web sites, applications, databases,
data centers and servers, networks,
desktops and other endpoints) are
monitored, assessed, and defended.
SOC other names

Security Defense Center (SDC)

Security Analytics Center (SAC)

Network Security Operations Center (NSOC)

Security Intelligence Center

Cyber Security Center

Threat Defense Center,

Security Intelligence and Operations Center (SIOC)

Infrastructure Protection Center (IPC)
SOC Types

SNOC, Security Network Operations Center

ASOC, Advanced Security Operations Center

GSOC, Global Security Operations Center

vSOC, Virtual Security Operations Center

CSOC, Cloud Security Operations Center

SSOC, Smart Security Operations Center
Contact me

00962796061387 call / whatsapp / imo / telegram

Email: hasannaim@yahoo.com

https://www.facebook.com/DrEngHasanShamroukh

https://www.linkedin.com/in/eccie

https://www.slideshare.net/enghasanshamroukh

https://www.youtube.com/user/enghasanccie

More Related Content

What's hot

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Edureka!
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

Similar to Cybersecurity

Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptshanthishyam
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Security and management
Security and managementSecurity and management
Security and managementArtiSolanki5
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
I MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptxI MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptxArumugam90
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 

Similar to Cybersecurity (20)

Unit v
Unit vUnit v
Unit v
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Is4560
Is4560Is4560
Is4560
 
Cryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.pptCryptography and Network Security_Chapter 1.ppt
Cryptography and Network Security_Chapter 1.ppt
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Security and management
Security and managementSecurity and management
Security and management
 
Mis 1
Mis 1Mis 1
Mis 1
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
I MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptxI MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from Eng Hasan Shamroukh CISCO Exams Author (13)

Fiber optics
Fiber opticsFiber optics
Fiber optics
 
Public Artificial Intelligence الذكاء الاصطناعي الحكومي
Public Artificial Intelligence الذكاء الاصطناعي الحكومي Public Artificial Intelligence الذكاء الاصطناعي الحكومي
Public Artificial Intelligence الذكاء الاصطناعي الحكومي
 
Big data البيانات الضخمة
Big data البيانات الضخمةBig data البيانات الضخمة
Big data البيانات الضخمة
 
5G
5G 5G
5G
 
Network Security
Network SecurityNetwork Security
Network Security
 
Big Data
Big DataBig Data
Big Data
 
Mobile security
Mobile securityMobile security
Mobile security
 
Iot security
Iot securityIot security
Iot security
 
Vsat
VsatVsat
Vsat
 
Wireless
WirelessWireless
Wireless
 
Vo ip
Vo ipVo ip
Vo ip
 
الاستثمار الأمثل للهواتف الذكية
الاستثمار الأمثل للهواتف الذكيةالاستثمار الأمثل للهواتف الذكية
الاستثمار الأمثل للهواتف الذكية
 
Telecom seminar
Telecom seminarTelecom seminar
Telecom seminar
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

Cybersecurity

  • 1.
  • 2. Speaker: Dr Eng Hasan Shamroukh
  • 3.
  • 4. Cybersecurity  It is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
  • 5. Cybersecurity Significance  1- Due to the continuously expanding reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things".  2- Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology.
  • 6. Assets  It is any resource owned or controlled by a business or an economic entity  Assets Types:  Data Assets  Financial Assets
  • 7. Data Types According to data importance From lower security level to higher security level
  • 8. Security Triad / Security Elements
  • 9. Encryption  It is converting the original representation of the information (plaintext), into an alternative form known as (cipher text).  Wireless Application  EEA: EPS Encryption Algorithm  Types  Symmetric: one key used in Encryption & Decryption  Asymmetric: a key used in Encryption and another in Decryption
  • 11. Asymmetric Encryption Example Diffie–Hellman key exchange It is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. It establishes a shared secret between two parties that can be used for secret communication for exchanging data over a public network. An analogy illustrates the concept of public key exchange by using colors instead of very large numbers:
  • 12. Integrity It is Checking that data is not altered or modified during Tx. MAC = HMAC Authentic MAC = HMAC Not Authentic Wireless Application TKIP (Temporary Key Integrity Protocol) EIA: EPS Integrity Algorithm
  • 13. Authentication  Username and password Verification  Protocols  PAP: Password Authentication Protocol  CHAP: Challenge Handshaking Authentication Protocol  EAP: Extensible Authentication Protocol  PEAP: Protected Extensible Authentication Protocol  FEAP: Fast Extensible Authentication Protocol  LEAP: Lightweight Extensible Authentication Protocol
  • 14. Authentication Factor Types  1-Knowledge factors: Something the user knows  (e.g., a password, partial password, pass phrase, personal identification number (PIN), challenge response (the user must answer a question or pattern), security question).  2-Ownership factors: Something the user has  (e.g., wrist band, ID card, security token, implanted device, cell phone with built-in hardware token, software token, or cell phone holding a software token).  3- Inherence factors: Something the user is or does  (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).
  • 15. Authentication Types According to factors used:  1- Single Factor Authentication  2- Multi Factor Authentication According to use
  • 16. DoD (Defense of Depth) Onion Model: The best DoD Representation Data is the center and the most important security level It is a concept used in Information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system
  • 17. DoD Controls Physical control Anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like. Technical controls  hardware or software whose purpose is to protect systems and resources.  Examples: disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical controls in that they prevent access to the contents of a system, but not the physical systems themselves. Administrative controls  Organization's policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to security and that regulations are met. They include things such as hiring practices, data handling procedures, and security requirements.
  • 18. Information security culture  1-Pre-evaluation: To identify the awareness of information security within employees and to analyze the current security policies.  2-Strategic planning: To come up with a better awareness program, clear targets need to be set. Assembling a team of skilled professionals is helpful to achieve it.  3-Operative planning: A good security culture can be established based on internal communication, management-buy-in, security awareness and a training program.
  • 19.  4-Implementation: Four stages should be used to implement the information security culture. They are:  A-Commitment of the management  B-Communication with organizational members  C-Courses for all organizational members  D-Commitment of the employees  5-Post-evaluation: To assess the success of the planning and implementation, and to identify unresolved areas of concern.
  • 20. Incident response planning  1-Preparation: Preparing stakeholders on the procedures for handling computer security incidents or compromises  2-Detection and analysis: Identifying and investigating suspicious activity to confirm a security incident, prioritizing the response based on impact and coordinating notification of the incident  3-Containment, eradication and recovery: Isolating affected systems to prevent escalation and limit impact, pinpointing the genesis of the incident, removing malware, affected systems and bad actors from the environment and restoring systems and data when a threat no longer remains  4-Post incident activity: Post mortem analysis of the incident, its root cause and the organization's response with the intent of improving the incident response plan and future response efforts
  • 21. Digital Certificate  Called also public key certificate / identity certificate  It is an electronic document used to prove the ownership of a public key  The certificate includes:  1- Key Information  2- Subject: Information about the identity of its owner  3- Issuer: Digital signature of an entity that has verified the certificate's contents
  • 22. Public key infrastructure (PKI) It is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public- key encryption. CA: Certificate Authority RA: Registration Authority VA: Validation Authority
  • 23. Digital Signature  It is a mathematical scheme for verifying the authenticity of digital messages or documents.  A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authenticity), and that the message was not altered in transit (integrity)  Digital Signature Schemes
  • 24. Hackers Persons skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
  • 25. Penetration Testing  It is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system  Tools  BackBox  Nmap  Metasploit Project  Nessus
  • 26. Penetration Testing Phases  1-Reconnaissance: The act of gathering important information on a target system. This information can be used to better attack the target.  For example, open source search engines can be used to find data that can be used in a social engineering attack.  2-Scanning: Uses technical tools to further the attacker's knowledge of the system.  For example, Nmap can be used to scan for open ports.
  • 27.  3-Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can use a payload to exploit the targeted system.  For example, Metasploit can be used to automate attacks on known vulnerabilities.  4-Maintaining access: Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible.  5-Covering tracks: The attacker must clear any trace of compromising the victim system, any type of data gathered, log events, in order to remain anonymous.
  • 28. SOC (Security Operation Center)  is a facility where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.
  • 29. SOC other names  Security Defense Center (SDC)  Security Analytics Center (SAC)  Network Security Operations Center (NSOC)  Security Intelligence Center  Cyber Security Center  Threat Defense Center,  Security Intelligence and Operations Center (SIOC)  Infrastructure Protection Center (IPC)
  • 30. SOC Types  SNOC, Security Network Operations Center  ASOC, Advanced Security Operations Center  GSOC, Global Security Operations Center  vSOC, Virtual Security Operations Center  CSOC, Cloud Security Operations Center  SSOC, Smart Security Operations Center
  • 31. Contact me  00962796061387 call / whatsapp / imo / telegram  Email: hasannaim@yahoo.com  https://www.facebook.com/DrEngHasanShamroukh  https://www.linkedin.com/in/eccie  https://www.slideshare.net/enghasanshamroukh  https://www.youtube.com/user/enghasanccie