SlideShare a Scribd company logo
Introduction to Pre-Cybersecurity
THREATS&BYTES
Information Security Triad
 The three letters in "CIA triad" stand for Confidentiality, Integrity, and
Availability. The CIA triad is a common model that forms the basis for the
development of security systems. They are used for finding vulnerabilities
and methods for creating solutions.
 Confidentiality
 Integrity
 Availability
CONFIDENTIALITY
 Confidentiality involves the efforts of an organization to make sure data is
kept secret or private. To accomplish this, access to information must be
controlled to prevent the unauthorized sharing of data.
 This may involve direct attacks aimed at gaining access to systems the
attacker does not have the rights to see. It can also involve an attacker
making a direct attempt to infiltrate an application or database so they can
take data or alter it.
 These direct attacks may use techniques such as man-in-the-middle
(MITM) attacks, where an attacker positions themselves in the stream of
information to intercept data and then either steal or alter it.
INTEGRITY
 Data must not be changed in transit, and steps must be taken to ensure
data cannot be altered by unauthorized people (for example, in a breach of
confidentiality).
 Integrity involves making sure your data is trustworthy and free from
tampering. The integrity of your data is maintained only if the data is
authentic, accurate, and reliable.
 Compromising integrity is often done intentionally. An attacker may
bypass an intrusion detection system (IDS), change file configurations to
allow unauthorized access, or alter the logs kept by the system to hide the
attack. Integrity may also be violated by accident. Someone may
accidentally enter the wrong code or make another kind of careless
mistake.
Availability
 Availability means information should be consistently and readily
accessible for authorized parties. This involves properly maintaining
hardware and technical infrastructure and systems that hold and display
the information.
 his means that systems, networks, and applications must be functioning as
they should and when they should.
 Also, individuals with access to specific information must be able to
consume it when they need to, and getting to the data should not take an
inordinate amount of time.
 To ensure availability, organizations can use redundant networks, servers,
and applications. These can be programmed to become available when the
primary system has been disrupted or broken.
FIVE STAGE OF ETHICAL HACKING
 The aim of ethical hacking is to mimic the actions of hackers and identify both
existing and potential vulnerabilities that may arise in the future. To
accomplish this, an ethical hacker undertakes multiple stages of assessment to
gain as much in-depth knowledge of the system as possible.
 While the phases discussed in the webinar are from the perspective of a
hacker, King explains that these are the same phases used by a white hat
hacker to test an organization’s network. To put it simply, an attacker uses this
approach to breach the network, while the ethical hacker uses it to protect it.
 The following Phases of hacking are as follows:
 1. Reconnaissance
 2. Scanning
 3. Gaining Access
 4. Maintaining Access
 5. Clearing tracks
Reconnaissance
 The first phase of ethical hacking is called Reconnaissance. This phase
hacker gathers information about a target before launching an attack.
 It is during this phase that the hacker finds valuable information such as
old passwords, names of important employees.
 There are two types of reconnaissance methods that has been used by
hackers are as follows:
 Active: Directly interacting with the target to gather information about the
target.
 Passive: Trying to collect the information about the target without directly
accessing the target. To this purpose, hacker can use social media, public
websites etc.
Scanning
 hackers are probably seeking any information that can help them perpetrate attack such as
computer names, IP addresses, and user accounts. In fact, hacker identifies a quick way to
gain access to the network and look for information.
 This phase includes usage of tools like dialers, port scanners, network mappers, sweepers,
and vulnerability scanners to scan data.
 Basically, at this stage, four types of scans are used:
 Pre-attack: Hacker scans the network for specific information based on the information
gathered during reconnaissance.
 Port scanning/sniffing: This method includes the use of dialers, port scanners, and other
data-gathering equipment.
 Vulnerability Scanning: Scanning the target for weaknesses/vulnerabilities.
 Information extraction: In this step, hacker collects information about ports, live machines
and OS details, topology of network, routers, firewalls, and servers.
Gaining Access
 Once ethical hackers expose vulnerabilities through the process’s first and
second hacking phases, they now attempt to exploit them for administrative
access. The third phase involves attempting to send a malicious payload to the
application through the network, an adjacent sub network, or physically using
a connected computer.
 An attacker can gain access various attack such as:
 Phishing attacks
 Brute force attack
 Spoofing attack
 Man in the middle attack
 Dos attack
 Session hijacking
 Buffer overflow attacks
Maintaining Access
 Hacker may just hack the system to show it was vulnerable or he can be so
mischievous that he wants to maintain or persist the connection in the
background without the knowledge of the user.
 This can be done using Trojans, Rootkits or other malicious files. The aim is
to maintain the access to the target until he finishes the tasks he planned
to accomplish in that target.
 A white-hat hacker continuously exploits the system for further
vulnerabilities and escalates privileges to understand how much control
attackers can gain once they pass security clearance.
Covering Tracks
 Once a hacker has obtained access, they leave no trace to prevent detection by the security
team.
 They execute this by deleting cache and cookies, interfering with log files, and closing all
open ports.
 This incorporates some of the steps an ethical hacker uses to cover and eliminate their
footprint.
 Deleting/corrupting all logs
 Changing the values of logs or registries
 Removing all of the folders established by the ethical hacker
 Uninstalling all the applications
Introduction to Cyber Attacks
 Brute force attack
 Phishing
 Phishing 2
 DOS
 DDOS
 Man in the Middle attacks
 SQL Injection
 Password attack
 Insider Threats
Introduction to Malware
 Malware
 Virus
 Worm
 Antivirus
 Rootkits
 Ransom ware
 Trojan Horse
 Dropper
 Drive-by-Attacks
Introduction to Cyber defense
 Antivirus
 Firewall
 Honeypot
 IDS/IPS
 Monitoring system and network
 SOC
 MFA
 Malware Scanner
 Store data to Cloud platform
References
 https://www.techtarget.com/whatis/definition/Confidentiality-integrity-
and-availability-CIA
 https://www.fortinet.com/resources/cyberglossary/cia-triad
 https://intellipaat.com/blog/the-cia-triad/
 https://www.invensislearning.com/blog/phases-of-ethical-hacking/
 https://www.greycampus.com/opencampus/ethical-hacking/phases-of-
hacking
 https://www.ramsac.com/it-resources/cybersecurity/an-introduction-to-
cyber-attacks/

More Related Content

Similar to Introduction to Pre-Cybersecurity.pptx

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Nathan Mathis
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
MithunJV
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
Yogesh Chauhan
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
Matt Ford
 
Computer security
Computer securityComputer security
Computer security
sruthiKrishnaG
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
Erfan Mallick
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
CMR WORLD TECH
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
System Security
System SecuritySystem Security
System Security
Reddhi Basu
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
Mohammad Affan
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
chakrekevin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
Hacking
HackingHacking
Hacking
blues_mfi
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
ManassahIjudigal
 

Similar to Introduction to Pre-Cybersecurity.pptx (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Computer security
Computer securityComputer security
Computer security
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
System Security
System SecuritySystem Security
System Security
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 

Recently uploaded

IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
Base Camp
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
Thomas GIRARD BDes
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
Alliance Jobs
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
Bruce Bennett
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
2zjra9bn
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
NWEXAM
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
MuhammadWaqasBaloch1
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
FauzanHarits1
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
kakomaeric00
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
SocMediaFin - Joyce Sullivan
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
ashiquepa3
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
Aditya Raghav
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
Bruce Bennett
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
GabrielleSinaga
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
SnapJob
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
2zjra9bn
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
dsnow9802
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
KateRobinson68
 

Recently uploaded (20)

IT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a RoadmapIT Career Hacks Navigate the Tech Jungle with a Roadmap
IT Career Hacks Navigate the Tech Jungle with a Roadmap
 
0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf0624.speakingengagementsandteaching-01.pdf
0624.speakingengagementsandteaching-01.pdf
 
5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf5 Common Mistakes to Avoid During the Job Application Process.pdf
5 Common Mistakes to Avoid During the Job Application Process.pdf
 
Resumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying OnlineResumes, Cover Letters, and Applying Online
Resumes, Cover Letters, and Applying Online
 
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
官方认证美国旧金山州立大学毕业证学位证书案例原版一模一样
 
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
How to Prepare for Fortinet FCP_FAC_AD-6.5 Certification?
 
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
Status of Women in Pakistan.pptxStatus of Women in Pakistan.pptx
 
Introducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptxIntroducing Gopay Mobile App For Environment.pptx
Introducing Gopay Mobile App For Environment.pptx
 
Leadership Ambassador club Adventist module
Leadership Ambassador club Adventist moduleLeadership Ambassador club Adventist module
Leadership Ambassador club Adventist module
 
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdfSwitching Careers Slides - JoyceMSullivan SocMediaFin -  2024Jun11.pdf
Switching Careers Slides - JoyceMSullivan SocMediaFin - 2024Jun11.pdf
 
Lbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdfLbs last rank 2023 9988kr47h4744j445.pdf
Lbs last rank 2023 9988kr47h4744j445.pdf
 
thyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatialthyroid case presentation.pptx Kamala's Lakshaman palatial
thyroid case presentation.pptx Kamala's Lakshaman palatial
 
A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024A Guide to a Winning Interview June 2024
A Guide to a Winning Interview June 2024
 
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
Gabrielle M. A. Sinaga Portfolio, Film Student (2024)
 
Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024Job Finding Apps Everything You Need to Know in 2024
Job Finding Apps Everything You Need to Know in 2024
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
在线制作加拿大萨省大学毕业证文凭证书实拍图原版一模一样
 
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
Tape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdfTape Measure Training & Practice Assessments.pdf
Tape Measure Training & Practice Assessments.pdf
 

Introduction to Pre-Cybersecurity.pptx

  • 2. Information Security Triad  The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.  Confidentiality  Integrity  Availability
  • 3. CONFIDENTIALITY  Confidentiality involves the efforts of an organization to make sure data is kept secret or private. To accomplish this, access to information must be controlled to prevent the unauthorized sharing of data.  This may involve direct attacks aimed at gaining access to systems the attacker does not have the rights to see. It can also involve an attacker making a direct attempt to infiltrate an application or database so they can take data or alter it.  These direct attacks may use techniques such as man-in-the-middle (MITM) attacks, where an attacker positions themselves in the stream of information to intercept data and then either steal or alter it.
  • 4. INTEGRITY  Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).  Integrity involves making sure your data is trustworthy and free from tampering. The integrity of your data is maintained only if the data is authentic, accurate, and reliable.  Compromising integrity is often done intentionally. An attacker may bypass an intrusion detection system (IDS), change file configurations to allow unauthorized access, or alter the logs kept by the system to hide the attack. Integrity may also be violated by accident. Someone may accidentally enter the wrong code or make another kind of careless mistake.
  • 5. Availability  Availability means information should be consistently and readily accessible for authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.  his means that systems, networks, and applications must be functioning as they should and when they should.  Also, individuals with access to specific information must be able to consume it when they need to, and getting to the data should not take an inordinate amount of time.  To ensure availability, organizations can use redundant networks, servers, and applications. These can be programmed to become available when the primary system has been disrupted or broken.
  • 6. FIVE STAGE OF ETHICAL HACKING  The aim of ethical hacking is to mimic the actions of hackers and identify both existing and potential vulnerabilities that may arise in the future. To accomplish this, an ethical hacker undertakes multiple stages of assessment to gain as much in-depth knowledge of the system as possible.  While the phases discussed in the webinar are from the perspective of a hacker, King explains that these are the same phases used by a white hat hacker to test an organization’s network. To put it simply, an attacker uses this approach to breach the network, while the ethical hacker uses it to protect it.  The following Phases of hacking are as follows:  1. Reconnaissance  2. Scanning  3. Gaining Access  4. Maintaining Access  5. Clearing tracks
  • 7. Reconnaissance  The first phase of ethical hacking is called Reconnaissance. This phase hacker gathers information about a target before launching an attack.  It is during this phase that the hacker finds valuable information such as old passwords, names of important employees.  There are two types of reconnaissance methods that has been used by hackers are as follows:  Active: Directly interacting with the target to gather information about the target.  Passive: Trying to collect the information about the target without directly accessing the target. To this purpose, hacker can use social media, public websites etc.
  • 8. Scanning  hackers are probably seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts. In fact, hacker identifies a quick way to gain access to the network and look for information.  This phase includes usage of tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data.  Basically, at this stage, four types of scans are used:  Pre-attack: Hacker scans the network for specific information based on the information gathered during reconnaissance.  Port scanning/sniffing: This method includes the use of dialers, port scanners, and other data-gathering equipment.  Vulnerability Scanning: Scanning the target for weaknesses/vulnerabilities.  Information extraction: In this step, hacker collects information about ports, live machines and OS details, topology of network, routers, firewalls, and servers.
  • 9. Gaining Access  Once ethical hackers expose vulnerabilities through the process’s first and second hacking phases, they now attempt to exploit them for administrative access. The third phase involves attempting to send a malicious payload to the application through the network, an adjacent sub network, or physically using a connected computer.  An attacker can gain access various attack such as:  Phishing attacks  Brute force attack  Spoofing attack  Man in the middle attack  Dos attack  Session hijacking  Buffer overflow attacks
  • 10. Maintaining Access  Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user.  This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.  A white-hat hacker continuously exploits the system for further vulnerabilities and escalates privileges to understand how much control attackers can gain once they pass security clearance.
  • 11. Covering Tracks  Once a hacker has obtained access, they leave no trace to prevent detection by the security team.  They execute this by deleting cache and cookies, interfering with log files, and closing all open ports.  This incorporates some of the steps an ethical hacker uses to cover and eliminate their footprint.  Deleting/corrupting all logs  Changing the values of logs or registries  Removing all of the folders established by the ethical hacker  Uninstalling all the applications
  • 12. Introduction to Cyber Attacks  Brute force attack  Phishing  Phishing 2  DOS  DDOS  Man in the Middle attacks  SQL Injection  Password attack  Insider Threats
  • 13. Introduction to Malware  Malware  Virus  Worm  Antivirus  Rootkits  Ransom ware  Trojan Horse  Dropper  Drive-by-Attacks
  • 14. Introduction to Cyber defense  Antivirus  Firewall  Honeypot  IDS/IPS  Monitoring system and network  SOC  MFA  Malware Scanner  Store data to Cloud platform
  • 15. References  https://www.techtarget.com/whatis/definition/Confidentiality-integrity- and-availability-CIA  https://www.fortinet.com/resources/cyberglossary/cia-triad  https://intellipaat.com/blog/the-cia-triad/  https://www.invensislearning.com/blog/phases-of-ethical-hacking/  https://www.greycampus.com/opencampus/ethical-hacking/phases-of- hacking  https://www.ramsac.com/it-resources/cybersecurity/an-introduction-to- cyber-attacks/