Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views38 pages

Cyber Security Basics

The document provides an overview of cybersecurity, emphasizing the importance of the CIA triad: Confidentiality, Integrity, and Availability. It outlines basic terminologies related to networks and internet protocols, as well as common types of cyber attacks, including DDoS, password attacks, email attacks, and malware. Additionally, it explains various methods used in these attacks and the functions and sources of malware.

Uploaded by

aminebelhadi2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views38 pages

Cyber Security Basics

The document provides an overview of cybersecurity, emphasizing the importance of the CIA triad: Confidentiality, Integrity, and Availability. It outlines basic terminologies related to networks and internet protocols, as well as common types of cyber attacks, including DDoS, password attacks, email attacks, and malware. Additionally, it explains various methods used in these attacks and the functions and sources of malware.

Uploaded by

aminebelhadi2003
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Cyber Security Basics

Dr Benabderrezak
Researcher in Cyber Security
Full-stack Web developer 1
Cybersecurity

Is the technology and process designed to protect networks and devices from
attacks, damage, or unauthorized access

2
CIA Triad

The security of any organization starts with three principles: Confidentiality,


Integrity, and Availability

3
Confidentiality

- Only authorized parties can access sensitive information and functions


- Example : military secrets

4
Integrity

Only authorized people and means can alter, add, or remove informations

5
Availability

- The system must be available on demand

6
Basic Terminologies
1. Network
2. Internet
3. Internet Protocols
4. IP Address
5. MAC Address
6. Domain Name Server(DNS)
7. DHCP
8. Router
9. Bots
7
Network

- A network is a connection between two or more computers that communicate

8
Internet

Internet connects a computer to any other computer anywhere in the world via
dedicated routers and servers.

9
Internet Protocols

- Data that is transferred or received cannot follow any path


- A set of rules is followed to control the flow of the Internet
- These rules are called Internet protocol

10
IP Address

- An Internet Protocol address (IP address) is assigned to all devices that connect
to a computer network and use the Internet Protocol for communication.
- An IP address looks like this : 168.192.10.3

11
MAC Address

- Every device has a unique identification number that connects to the internet.

- Traditional MAC addresses are 12-digit hexadecimal numbers.

- MAC address looks like this : D8-FC-93-C5-A5-EO

12
Domain Name Server ( DNS )

- Consider DNS as the phonebook of the internet.


- All the IP addresses and the names of the links are saved in it.
- For example, you want to go to google.com
- You type this on your web application.
- Then, this name goes to the DNS server, and the DNS server finds the IP
address of google.com.
- Then, the DNS server returns it to your computer with the IP address.

13
14
DHCP

The dynamic host configuration protocol assigns an IP address to any device that wants to
connect to the Internet

15
Router

This device routes the data that comes to it and then sends it to the destination to
ensure that it is on the appropriate path

16
Bots : are computer programs that control your computer without your knowledge. They
automatically send emails, retrieve web pages, and change computer settings.

17
Common Types of Attacks

There are mainly five types of attacks:

1. Distributed denial of service(DDoS)


2. Man in the middle
3. Email attacks
4. Password attacks
5. Malware attack

18
Distributed Denial of Service

It is an attack used to restrict a user from accessing resources by flooding the traffic that is
used to access resources

19
Distributed Denial of Service

20
Man in the middle

21
Password Attack

We use this technique to crack or find a password. There are five types of password
attacks :

1. Dictionary attack
2. Brute force
3. Keylogger
4. Shoulder surfing
5. Rainbow table

22
Password Attack - Dictionary attack :

In this method, we handle every possible password through the dictionary.

23
Password Attack - Brute force :

This trial-and-error method decodes the password or data. This attack takes the
most time.

24
Password Attack - Keylogger :

- A keylogger records all keystrokes on a keyboard.


- Most hackers use keyloggers to get passwords and account details.

25
Password Attack - Shoulder surfing :

The attackers observe the user’s keyboard by looking over the user’s shoulder.

26
Password Attack - Rainbow table :

- Rainbow tables contain precomputed hash values.


- Attackers use these tables to find a user's password

27
Email Attacks

There are three types of email attacks :

1. Phishing
2. Spoofing
3. Email attachments

28
Email Attacks - Phishing :

- For example, you receive an email like this:

29
Email Attacks - Spoofing :

The attacker pretends to be another person or organization and sends you an email
stating it is legitimate.

30
Email Attacks - Email attachments :

- You can send files through emails.


- These files may be images, documents, audio, or videos.
- Attackers send you an email, and you are encouraged to open the attached file.

31
Malware Attack

Malware : This is a malicious program or software that disrupts or damages the

computer.

32
Malware Attack

33
Virus

- Is a malicious code that replicates by copying itself to another program or document

and changes how a computer works.

- The virus requires someone to knowingly or unknowingly spread the infection without

the knowledge or permission of a user or system administrator.

- An example of a virus is the Melissa virus

34
Worms

- These are standalone programs that run independently and infect systems.
- For example, W32.Alcra.F is a worm that propagates through network share
devices

35
Functions of Malware

- Overwhelming system resources

- Creating a backdoor

- Disabling security functions

- Creating botnets

36
Sources of Malware

- Removable media

- Documents and executable files

- Internet downloads

- Network connections

- Email attachments

- Malicious advertisements

37

You might also like