This presentation on Cyber Security training will help you understand what is Cyber Security, basic terminologies, how an email works, common types of attacks, functions of malware and various sources of malware. Cyber Security is the technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access. .Now, let us get started and understand Cyber Security in detail.
Below topics are explained in this Cyber Security training presentation:
1. What is Cyber Security?
2. Basic terminologies
3. How do you get internet?
4. Common types of attacks
5. Functions of malware
6. Sources of malware
Simplilearn’s Introduction to Cyber Security course is designed to give you a foundational look at today’s cybersecurity landscape and how to evaluate and manage security protocol in information processing systems. You will learn about information security concepts and technologies, the principles behind security architecture, how to mitigate vulnerabilities and threats to your systems, and how to implement risk and incident management to protect your infrastructure from cyber attack.
What are the course objectives?
In this Introduction to Cyber Security training course, you will gain a comprehensive overview of cybersecurity principles and concepts and learn the challenges of designing a security program. You will hear about evolving new threats such as social engineering attacks and learn how to mitigate their impact on organizational security. And you will be taught to develop and manage an Information Security Program, perform business impact analysis, and carry out disaster recovery testing.
What are the career benefits of this course?
The demand for cybersecurity experts has increased significantly over the last few years as companies become more dependent on the Internet and its vast facilities, and as data breaches, hacking and cyber crime reach new heights. The cyber security market is expected to grow from USD 152.71 billion in 2018 to USD 248.26 billion by 2023, at a compound annual growth rate (CAGR) of 10.2 per cent. The annual average salary of cybersecurity professionals ranges from $110,000-170,000 (Source: Glassdoor), and there are currently more than 43,000 cybersecurity positions available in the U.S. (Souce: Indeed.com)
Upon completion of this course, you will become familiar with cybersecurity methodologies and be able to:
1. Leverage an enhanced awareness of cybersecurity principles and concepts
2. Analyze appropriate types of controls to counteract various threats
3. Combat social engineering attacks such as phishing, malware, spyware, adware, ransomware, and Bluetooth attacks
4. Determine and analyze software vulnerabilities and security solutions to reduce the risk of exploitation
Learn more at https://www.simplilearn.com/introduction-to-cyber-security-course
15. What is Cyber Security?
Cyber security is the technology and process that is designed to protect networks and devices from attack,
damage, or unauthorized access
16. What is Cyber Security?
Cyber security is the technology and process that is designed to protect networks and devices from attack,
damage, or unauthorized access
Some people have confusion
in Cyber Security and
Information Security
17. What is Cyber Security?
Cyber security is the technology and process that is designed to protect networks and devices from attack,
damage, or unauthorized access
Some people have confusion
in Cyber Security and
Information Security
Cyber Security = Information Security
20. 1. Network
The network is a connection between two or more computers so
that they can communicate with each other
21. 1. Network
The network is a connection between two or more computers so
that they can communicate with each other
For example :
2 computers exchanging data
22. 1. Network
The network is a connection between two or more computers so
that they can communicate with each other
For example :
2 computers exchanging data
4 computers connected
23. 2. Internet
A means of connecting a computer to any other computer anywhere in the world via
dedicated routers and servers
When two computers are connected over the Internet, they can send
and receive all kinds of information
24. 3. Internet Protocols
All data that is being transferred or received cannot just follow any path
To control the flow of internet and connectivity, there are a set of rules that are used
We call them as :
25. 3. Internet Protocols
All data that is being transferred or received cannot just follow any path
To control the flow of internet and connectivity, there are a set of rules that are used
We call them as :
internet
protocols
26. 4. IP address
An Internet Protocol address (IP address) is a label assigned to each device connected to a
computer network that uses the Internet Protocol for communication
27. 4. IP address
An IP address looks like this
168.194.64.10
An Internet Protocol address (IP address) is a label assigned to each device connected to a
computer network that uses the Internet Protocol for communication
28. 5. MAC address
It is a unique identification number that is given to every device that
connects to the internet
Traditional MAC addresses are 12-digit hexadecimal numbers
29. 5. MAC address
MAC address looks like this :
D8-FC-93-C5-A5-E0
It is a unique identification number that is given to every device that
connects to the internet
Traditional MAC addresses are 12-digit hexadecimal numbers
30. 6. DNS(Domain Name System)
Consider DNS as phonebook of the internet
For example: You want to go to google.com
31. 6. DNS(Domain Name System)
www.google.com
Consider DNS as phonebook of the internet
32. 6. DNS(Domain Name System)
http://www.google.com goes
to DNS server
Consider DNS as phonebook of the internet
33. 6. DNS(Domain Name System)
DNS server
DNS finds the address of
google.com
DNS server finds the address of
google.com
34. 6. DNS(Domain Name System)
DNS server sends the address
back to computer and computer
connects to www.google.com
35. 7. DHCP (Dynamic Host Configuration protocol)
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
DHCP server
36. 7. DHCP (Dynamic Host Configuration protocol)
DHCP server
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
37. 7. DHCP (Dynamic Host Configuration protocol)
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
DHCP server
38. 10.0.0.1
7. DHCP (Dynamic Host Configuration protocol)
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
DHCP server
39. 10.0.0.1
10.0.0.2
7. DHCP (Dynamic Host Configuration protocol)
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
DHCP server
40. 10.0.0.1
10.0.0.2
10.0.0.3
7. DHCP (Dynamic Host Configuration protocol)
It is a management protocol that is used to assign an IP address to
any device that wants to connect to the internet
DHCP server
41. 8. Router
It is a device that routes the data that comes to it and then sends that data to the
destination and make sure it is on the appropriate path
42. 8. Router
It is a device that routes the data that comes to it and then sends that data to the
destination and make sure it is on the appropriate path
43. 8. Router
It is a device that routes the data that comes to it and then sends that data to the
destination and make sure it is on the appropriate path
44. 8. Router
It is a device that routes the data that comes to it and then sends that data to the
destination and make sure it is on the appropriate path
45. 9. Malware
It is a malicious program or software that disrupts or damages the
computer
46. 9. Malware
It is a malicious program or software that disrupts or damages the
computer
Types of malware
AdwareSpywareRansomware
47. 10. Virus
A computer virus is malicious code that replicates by copying itself to another
program or document and changes how a computer works
The virus requires someone to knowingly or unknowingly spread the infection
without the knowledge or permission of a user or system administrator
Melissa virus
For example :
48. 11. Worms
It is a standalone program that runs independently and infects the
system
For example :
W32.Alcra.F
It propagates through
network share drives
49. 12. Bots
Bots are a computer program that controls your computer without your knowledge
50. 12. Bots
They can automatically
Send Emails
Bots are a computer program that controls your computer without your knowledge
51. 12. Bots
Send Emails
Retrieve web pages
They can automatically
Bots are a computer program that controls your computer without your knowledge
52. 12. Bots
Send Emails
Retrieve web pages
Change computer settings
They can automatically
Bots are a computer program that controls your computer without your knowledge
53. 13. Hashing function and values
Let’s take an example to understand :
Facebook
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
100 users 100 passwords
54. Let’s take an example to understand :
Facebook
13. Hashing function and values
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
Hash Functionabc@123
100 passwords
55. Let’s take an example to understand :
Facebook
13. Hashing function and values
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
Hash Functionabc@123
njifvyuegfuwe
100 passwords
56. Let’s take an example to understand :
Facebook
13. Hashing function and values
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
Hash Functionabc@123
njifvyuegfuwe
100 passwords
Salt (ckxkdhdbxg)+
57. Let’s take an example to understand :
Facebook
13. Hashing function and values
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
Hash Functionabc@123
njifvyuegfuwe
100 passwords
Salt (ckxkdhdbxg)+
kndcshvdjhcv
58. Let’s take an example to understand :
Facebook
13. Hashing function and values
1. John kdncjd
2. Sam sdkcnddc
3. Will sdjkcndksnc
4. Juliet sdvfknkfb
100. Bill abc@123
Hash Functionabc@123
njifvyuegfuwe
100 passwords
Salt (ckxkdhdbxg)+
kndcshvdjhcv
Encrypted
&
Secure
60. Common types of attacks
Distributed Denial of service
Man in the middle
Password attack
E-mail attacks
61. Distributed denial of service
It is an attack used to restrict user to access the resources by flooding the traffic
that is used to access resources
Attacker
Botnet
controller
Servers
Resource
E.g. facebook.com
73. Man in the middle
New path
The Hacker steals
Card information from
the bank
74. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
75. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
76. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
Dictionary
attack
77. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
Dictionary
attack
Brute force
attack
78. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
Dictionary
attack
Brute force
attack
Key logger
79. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
Dictionary
attack
Brute force
attack
Key logger
Shoulder surfing
80. Password attack
Sometimes it’s just a guess after observing the person’s behaviour or
lifestyle and what the password might be
Common types of password
attacks
Dictionary
attack
Brute force
attack
Key logger
Shoulder surfing
Rainbow
table attack
81. Password attack – Dictionary attack
In this method, we handle every password that is possible through the dictionary
82. Password attack – Brute force
It is a trial and error method used to decode the password or data. This attack takes the most
amount of time
abc123
abcd123
abc1234
abc#123
abc123@
abc@123
83. Password attack – Key logger
As the name suggests, keylogger records all the hits on the keyboard
Most people use it to get passwords and account details
84. Password attack – Shoulder surfing
As the name suggests, the attackers observe the user’s keyboard by looking
over the user’s shoulder
85. Password attack – Rainbow table attack
There are rainbow tables that contain precomputed hash values
Attackers use this table to find the password of the user
86. Social engineering
It is a form of phycological attack that exploit human nature and behaviour. It involves convincing someone to perform an
unauthorized operation or reveal confidential information
87. Social engineering
It is a form of phycological attack that exploit human nature and behaviour. It involves convincing someone to perform an
unauthorized operation or reveal confidential information
88. Social engineering
Hello, I’m a trusted IT professional. Your
computer has some issue. Please give
me your password
It is a form of phycological attack that exploit human nature and behaviour. It involves convincing someone to perform an
unauthorized operation or reveal confidential information
89. Social engineering
Sure, my password is
abc123
It is a form of phycological attack that exploit human nature and behaviour. It involves convincing someone to perform an
unauthorized operation or reveal confidential information
Hello, I’m a trusted IT professional. Your
computer has some issue. Please give
me your password
100. Types of Email attacks
Email attachments
1
Phishing
Spoofing
101. Phishing
The attacker sends bait often in the form of an e-mail. It encourages people to share their details
102. Phishing
Lets take an example:
Brian gets an email like this :
Dear customer,
Your account is going to expire today.
To keep your account activated, please click on the link
https://activate.com and proceed with the verification
process
Thanks
ABC bank
The attacker sends bait often in the form of an e-mail. It encourages people to share their details
103. Phishing
Dear customer,
Your account is going to expire today.
To keep your account activated, please click on the link
https://activate.com and proceed with the verification
process
Thanks
ABC bank
How Brian found out that it was
spam?
104. Phishing
Dear customer,
Your account is going to expire today.
To keep your account activated, please click on the link
https://activate.com and proceed with the verification
process
Thanks
ABC bank
How Brian found out that it was
spam?
Simple.
He did not have ABC bank account
105. Phishing
Dear customer,
Your account is going to expire today.
To keep your account activated, please click on the link
https://activate.com and proceed with the verification
process
Thanks
ABC bank
How Brian found out that it was
spam?
Simple.
He did not have ABC bank account
What if someone has an
account in ABC bank?
106. Phishing
Dear customer,
Your account is going to expire today.
To keep your account activated, please click on the link
https://activate.com and proceed with the verification
process
Thanks
ABC bank
How Brian found out that it was
spam?
Simple.
He did not have ABC bank account
What if someone has a
account in ABC bank?
Banks do not send an e-
mail like this. If this
happens, contact your
bank immediately
107. Spoofing
Attacker pretends to be some other person or organization and sends
you an email stating that it is a legitimate email.
Example: You get a mail from
your manager
Hi Bill,
I got the information that your computer system has been
compromised.
Please share the password of your computer in this email.
Thanks
Watson
Manager
ABC company
108. Spoofing
Attacker pretends to be some other person or organization and sends
you an email stating that it is a legitimate email.
Hi Bill,
I got the information that your computer system has been
compromised.
Please share the password of your computer in this email.
Thanks
Watson
Manager
ABC company
After seeing the email from your
manager, you may share the
email.
109. Spoofing
Attacker pretends to be some other person or organization and sends
you an email stating that it is a legitimate email.
Hi Bill,
I got the information that your computer system has been
compromised.
Please share the password of your computer in this email.
Thanks
Watson
Manager
ABC company
After seeing the email from your
manager, you may share the
email.
After seeing email like this,
always talk to the person from
whom you got the email
110. Email attachments
You can send files through emails. These files may be images,
documents, audio, or videos
111. Email attachments
Dear customer,
Thank you for shopping with us. Your order will get delivered
within 4 working days.
If you have any queries related to your order, please contact
the number below.
Please find the invoice of your order in the attachments.
invoice.-pdf.exe
Attackers send you an email such that
you are encouraged to open the
attached file
You can send files through emails. These files may be images,
documents, audio, or videos
112. Email attachments
Dear customer,
Thank you for shopping with us. Your order will get delivered
within 4 working days.
If you have any queries related to your order, please contact
the number below.
Please find the invoice of your order in the attachments.
invoice.-pdf.exe
Attackers send you an email such that
you are encouraged to open the
attached file
You can send files through emails. These files may be images,
documents, audio, or videos
115. Overwhelming system resources
Malware, especially like worms can overwhelm the system or network by spreading themselves
They use so much of network that nothing is left to do legitimate work
116. Overwhelming system resources
Malware, especially like worms can overwhelm the system or network by spreading themselves
Some malwares create so many folders that no memory is left and slow the computer down
121. Disabling security functions
These malware can disable the antivirus as well as security updates
These malware tend to last longer because there is no security to
stop it
They tend to keep the system vulnerable to other malware
132. Sources of malware
Removable media
Documents and
executable files
Email attachments
Network connections
Internet downloads
133. Sources of malware
Removable media
Documents and
executable files
Email attachments
Network connections
Internet downloads
Malicious
advertisements
134. Sources of malware
Removable media
Documents and
executable files
Email attachments
Network connections
Internet downloads
Malicious
advertisements
Pop-ups