SlideShare a Scribd company logo
Dr. Mostafa Elgamala
RHCE-MCSA-CCNA-CCAI-CSCU-PMP-ITIL-IBDL
Security importance
 Algerian ministry of defense subjected to 3500 attempt daily.
 Hacking on UAV in south Korea.
 Hacking on Boshahr Nuclear reactor in Iran.
 Electric failure in USA due to cyber attack.
 Thieving of subscriber data of ashley madison, AT&T, T
mobile US.
 Thieving of 55000 username/password from Twitter.
 Nasa hacking.
Hacking scope
1- Planted medical devices hacking
2- Automobiles hacking
3- Computer hacking
4- Network devices hacking
5- UAV hacking
6- Industrial devices hacking
…….Any software based device is vulnerable.
Cyber attack (online attack)- Why
 On line criminals for money ( i.e bank accounts)
 On line criminals for opinions and protest
(anonymous)
 Governments against its citizens
 For fun
Results
 Financial loss (AT&T)
 Identity theft
 Loss of trust
 Data loss/theft (ashley madiso , T mobile)
 Misuse of computer resources.
Levels f security
 User security
 Application security
 System security
 Network security
 Physical security
System security
 Virus
 Worms(network)
 Backdoor
 Trojans (79% of malware)
 Key logger
 Logic bomb
 Spy ware
 Password cracking (brute force, dictionary attack,
shoulder surfing, social engineering)
 Zombie (bot)
Statistics (Sophos & F5)
 250000 virus every day (315000 Kaspersky)
 30,000 hacked site every day
 99 % from people fail to implement the basic security
procedures
 25% of malware is caught by antivirus
 50% of malware designed to bypass security defenses
 82% of security problems from internal
Famous viruses
 1986 – Brain – Baset & Amgad Farouk
 1987 – chirstmas tree worm-slowing
 1988 – morris worm – 10% of internet PC 6000-100M$
 1998 – Chernobyl – erase MBR
 2000 – I love you worm –file editing-10% of internet
PC-(5-10 B$)
 2008 – Conficker worm –slowing and steal data-15
million windows servers
 2010 – Stuxnet – scada systems – Boshaar - Iran
Guidelines for windows
 Strong password
 Lock the system when not in use
 Apply software patches
 Use windows firewall
 Hide files/folders
 Disable unnecessary services
 Use NTFS
 Implement malware protection
Identity theft
 Personal information
 Names
 Addresses
 Birth date
 Telephone number
 Passport number
 Social security number
 Credit card number
How attacker steal identity?
 Physical methods:
 Stealing (computer, mobile, wallets)
 Social engineering (people trust)
 Skimming: steal credit no. by special storage.
 Internet methods
Phishing : pretend to be financial institution site
or email.
Key loggers: may be by Trojans
Hacking: compromise user O.S , user sniffers, etc.
Social Engineering
 Art of convincing people to reveal confidential
information from people
 Human based method:
 Laying
 Eavesdropping
 Shoulder surfing
 Dumpster diving
 Computer based method
 Chain letter: free money or gift
 Hoax letter: warning from viruses
 Pop-up window: ask for information
 Fake website: to know your info.
Measures
 Complex password
 Disable auto login
 Not post sensitive/personal information
 Be careful clicking links in messages (fake sites)
Social networking security
 Cyber bullying: spreading rumors, threating,
harassments.
 Be careful about what is posted on internet
 Ignore the bully
 Document all conversations
 Contact local authorities
Mobile devices security
 Mobile malware: conversations listener, wipe-out
info. ,monitor your actions.
 Application vulnerabilities
 Lost or stolen devices
Measure procedures
 Patching mobile platforms and applications
 Use power-on authentication
 Backup
 Use mobile phone anti-virus
 Encrypt your data
 Secure Bluetooth
Avoid mobile device theft
 Avoid lending mobile phone
 Do not talk while walking/driving
 Do not leave mobile in a car
 Turn off ringer
 Record IMEI (*#06#)
 Use anti-theft s/w to remotely wipe the data &
make the device unusable
 Cancel SIM
Network security types
 Network sniffers
 Denial of service (DOS)
 DNS poisoning (DNS spoofing)
 Wireless security
 Man-in-the-middle attack
 Sql injection
Encryption
 Plain text
 Cipher text
 Encryption key
 Encryption types (symmetric / asymmetric / hash
function)
 Encryption standard (DES / AES)
Security awareness is the first
step for your security
Thanks

More Related Content

What's hot

Information security management
Information security managementInformation security management
Information security management
UMaine
 

What's hot (20)

Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
System security
System securitySystem security
System security
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
cyber security
cyber securitycyber security
cyber security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Information security management
Information security managementInformation security management
Information security management
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 

Similar to Introduction to security

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
ADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesADM 316 Workshop 5 Slides
ADM 316 Workshop 5 Slides
Russ Ray
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
Ajay Singh
 

Similar to Introduction to security (20)

Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
ADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesADM 316 Workshop 5 Slides
ADM 316 Workshop 5 Slides
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Web security
Web securityWeb security
Web security
 

More from Mostafa Elgamala

More from Mostafa Elgamala (20)

Faculty of Engineering - Tanta University- Programmong world
Faculty of Engineering - Tanta University- Programmong worldFaculty of Engineering - Tanta University- Programmong world
Faculty of Engineering - Tanta University- Programmong world
 
Faculty of Engineering - Tanta University - Mobile technology
Faculty of Engineering - Tanta University - Mobile technologyFaculty of Engineering - Tanta University - Mobile technology
Faculty of Engineering - Tanta University - Mobile technology
 
Faculty of Engineering - Tanta University - IT market
Faculty of Engineering - Tanta University - IT marketFaculty of Engineering - Tanta University - IT market
Faculty of Engineering - Tanta University - IT market
 
تربية الاطفال
تربية الاطفالتربية الاطفال
تربية الاطفال
 
ادارة الوقت
ادارة الوقتادارة الوقت
ادارة الوقت
 
Computer Maintanance
Computer MaintananceComputer Maintanance
Computer Maintanance
 
GSM
GSMGSM
GSM
 
Risk management mod
Risk management modRisk management mod
Risk management mod
 
Quality management mod
Quality management modQuality management mod
Quality management mod
 
Procurement management
Procurement managementProcurement management
Procurement management
 
Communication management
Communication managementCommunication management
Communication management
 
Human resources
Human resourcesHuman resources
Human resources
 
Cost management
Cost managementCost management
Cost management
 
Time management
Time managementTime management
Time management
 
Scope management
Scope managementScope management
Scope management
 
Introduction project managemen
Introduction project managemenIntroduction project managemen
Introduction project managemen
 
كيف تصل الى النجاح
كيف تصل الى النجاحكيف تصل الى النجاح
كيف تصل الى النجاح
 
CCNA - Dr. Mostafa Elgamala
CCNA - Dr. Mostafa ElgamalaCCNA - Dr. Mostafa Elgamala
CCNA - Dr. Mostafa Elgamala
 
It market
It marketIt market
It market
 
Communication
CommunicationCommunication
Communication
 

Recently uploaded

Recently uploaded (20)

Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 

Introduction to security

  • 2. Security importance  Algerian ministry of defense subjected to 3500 attempt daily.  Hacking on UAV in south Korea.  Hacking on Boshahr Nuclear reactor in Iran.  Electric failure in USA due to cyber attack.  Thieving of subscriber data of ashley madison, AT&T, T mobile US.  Thieving of 55000 username/password from Twitter.  Nasa hacking.
  • 3. Hacking scope 1- Planted medical devices hacking 2- Automobiles hacking 3- Computer hacking 4- Network devices hacking 5- UAV hacking 6- Industrial devices hacking …….Any software based device is vulnerable.
  • 4. Cyber attack (online attack)- Why  On line criminals for money ( i.e bank accounts)  On line criminals for opinions and protest (anonymous)  Governments against its citizens  For fun
  • 5. Results  Financial loss (AT&T)  Identity theft  Loss of trust  Data loss/theft (ashley madiso , T mobile)  Misuse of computer resources.
  • 6. Levels f security  User security  Application security  System security  Network security  Physical security
  • 7. System security  Virus  Worms(network)  Backdoor  Trojans (79% of malware)  Key logger  Logic bomb  Spy ware  Password cracking (brute force, dictionary attack, shoulder surfing, social engineering)  Zombie (bot)
  • 8. Statistics (Sophos & F5)  250000 virus every day (315000 Kaspersky)  30,000 hacked site every day  99 % from people fail to implement the basic security procedures  25% of malware is caught by antivirus  50% of malware designed to bypass security defenses  82% of security problems from internal
  • 9. Famous viruses  1986 – Brain – Baset & Amgad Farouk  1987 – chirstmas tree worm-slowing  1988 – morris worm – 10% of internet PC 6000-100M$  1998 – Chernobyl – erase MBR  2000 – I love you worm –file editing-10% of internet PC-(5-10 B$)  2008 – Conficker worm –slowing and steal data-15 million windows servers  2010 – Stuxnet – scada systems – Boshaar - Iran
  • 10. Guidelines for windows  Strong password  Lock the system when not in use  Apply software patches  Use windows firewall  Hide files/folders  Disable unnecessary services  Use NTFS  Implement malware protection
  • 11. Identity theft  Personal information  Names  Addresses  Birth date  Telephone number  Passport number  Social security number  Credit card number
  • 12. How attacker steal identity?  Physical methods:  Stealing (computer, mobile, wallets)  Social engineering (people trust)  Skimming: steal credit no. by special storage.
  • 13.  Internet methods Phishing : pretend to be financial institution site or email. Key loggers: may be by Trojans Hacking: compromise user O.S , user sniffers, etc.
  • 14. Social Engineering  Art of convincing people to reveal confidential information from people  Human based method:  Laying  Eavesdropping  Shoulder surfing  Dumpster diving
  • 15.  Computer based method  Chain letter: free money or gift  Hoax letter: warning from viruses  Pop-up window: ask for information  Fake website: to know your info.
  • 16. Measures  Complex password  Disable auto login  Not post sensitive/personal information  Be careful clicking links in messages (fake sites)
  • 17. Social networking security  Cyber bullying: spreading rumors, threating, harassments.  Be careful about what is posted on internet  Ignore the bully  Document all conversations  Contact local authorities
  • 18. Mobile devices security  Mobile malware: conversations listener, wipe-out info. ,monitor your actions.  Application vulnerabilities  Lost or stolen devices
  • 19. Measure procedures  Patching mobile platforms and applications  Use power-on authentication  Backup  Use mobile phone anti-virus  Encrypt your data  Secure Bluetooth
  • 20. Avoid mobile device theft  Avoid lending mobile phone  Do not talk while walking/driving  Do not leave mobile in a car  Turn off ringer  Record IMEI (*#06#)  Use anti-theft s/w to remotely wipe the data & make the device unusable  Cancel SIM
  • 21. Network security types  Network sniffers  Denial of service (DOS)  DNS poisoning (DNS spoofing)  Wireless security  Man-in-the-middle attack  Sql injection
  • 22. Encryption  Plain text  Cipher text  Encryption key  Encryption types (symmetric / asymmetric / hash function)  Encryption standard (DES / AES)
  • 23. Security awareness is the first step for your security