8 8 23 To 1 Introduction To Cyber Security
8 8 23 To 1 Introduction To Cyber Security
Ethical Hacking
About me
– Endless opportunities
– Security
– Keeping private things “private”
– Stopping any sort of frauds or crimes
From any business
perspective
Need for cyber security
– Maintaining Customer and Employee
Trust
– Securing financial position of the
organisation
– Preserve the Organization's Ability to
Function
– Staying Strong Amidst Competition
– Reducing Risk
Reality of
Hacking in
movies and
shows
Benefits
of
hacking
Types
of
Hackers
Types of Hackers:
– Black Hat Hackers: These hackers mainly involve in bad
and illegal practices. It can be stealing money from bank to
data leak of big organizations[Fig 1]
– White Hat Hackers: These hackers work legally to protect
the client's businesses from cyber-attacks.[Fig 3]
– Grey Hat Hackers: These hackers are neither bad nor
good. They work what they think right thing to do.[Fig 2]
– And some others…
Fig. 1 Fig. 2 Fig. 3
Few most
recent data
breaches of
2023
Data breach on April 6,2023
Data breach on April 10,2023
Data
breach on
April
3,2023
Why we need security ??
► we need it -- personal data, sensitive info from being leaked
► Confidentiality makes sure that only authorized personnel are given access or permission to
modify data
► Integrity helps maintain the trustworthiness of data by having it in the correct state and
immune to any improper modifications
► Availability means that the authorized users should be able to access data whenever required
Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation
Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (often abbreviated as
"CIA" or "CIAAN") are the five core security properties that are used to ensure the security and
reliability of information systems. Together, they form the foundation of information security and
are the key elements that must be protected in order to ensure the safe and secure handling of
sensitive information.
1. Confidentiality is important to protect sensitive information from being disclosed to unauthorized parties.
This includes protecting data at rest, in transit, and in use. Common techniques used to maintain
confidentiality include encryption, access controls, and data masking.
2. Integrity is important to ensure that information has not been tampered with or modified in an
unauthorized way. This includes protecting data from unauthorized modification, deletion or addition.
Common techniques used to maintain integrity include digital signatures, message authentication codes,
and data hashing.
3. Availability is important to ensure that information and systems are accessible to authorized users when
they need them. This includes protecting against denial of service attacks and ensuring that systems are
highly available and can withstand failures. Common techniques used to maintain availability include load
balancing, redundancy, and disaster recovery planning.
4 Authenticity is important to ensure that information and communication
spoofing and other types of identity fraud. Common techniques used to establish
identification.
timestamps.
3 aaa cyber security
Elements of Cyber security
National Institute of Standards and Technology
Common Terminologies :
► eg. in college / uni ---> you are doing some work on your laptop
you got a call you went out for 5 mins...meanwhile a friend of you or anyone else
access your laptop and gains some personal information
► Ethical Hacking : permitted to do that ...ethical hacking -- companys hires you as
ethical hacker
► give you a permission to hack their systems, websites, networks ,database to find
out the loopflaws
► proper documentation is there before this betweeen the EH and the company ..
---> security testing
► hackers are not the bad guys --- crackers are the one
► Who are Hackers::::: a hacker is a person who use a device or particular stuff
other then the purpose for which it is meant for.
► They are the ones who are challenging the limits of everything , using the stuff
beyond their use.
► plagiarism checker tools : while you are doing any kind of research ...submit
research work --> they will is it 100% authenticate
► it should be copied from any website on internet
► BHH -- black hat hackers --- exceptionally talented individuals --> exploit the systems for financial gains --->
never report the bug -- just exploit
► WHH -- white hat hackers --- talented inidividuals -- use their knowledge to protect the data and fight agains
BHH-- > never exploit a bug --- direct report it
► GHH -- -combination of both BHH + WHH ==> GHH -- sometimes they are offensive (BHH) and sometimes
defensive(WHH)
► Script Kiddies -- new bie in the cyber world-- they have the names of the tools used -- dont have the
necessary skills
► Hacktivists -- hackers activist --- fight for a cause ---> anonymous, shadow breakers etc
► 3 very important terminologies
==============================
► Vulnerability : it means any kind of weakness , flaw, loophole in the system design,
architecture which compromise the security of entire applications
► Payload : the shell or the code used to exploit the websites is called payload ( weapon
used for hacking )
-like- A payload is a piece of code that executes when hackers exploit a vulnerability. In other
words, it's an exploit module. It's usually composed of a few commands that will run on the
targeted operating system (e.g., key-loggers) to steal data and other malicious acts.
VULNERABILITY RISK THREAT
► Phases of hacking :
► 3. Gaining Access
► 4. Maintaining Access
► Information Gathering :
► =======================
► acccess the info from internet ---> platforms like fb , insta , website
► Practical