SlideShare uma empresa Scribd logo
1 de 27
Wanna be h4ck3r
snapshot of security concept
By
Eslam Mamdouh El Husseiny
‫؟‬ ‫أكون‬ ‫من‬
@EslamElHusseiny
www.eslamizmy.org
Wanna be h4ck3r
● Agenda
– Security policy
– Attackers
– Type of attacks
– So am I a looser ?
– Live demo
– ‫؟‬ ‫بعدين‬ ‫و‬ ‫طب‬
– ‫كده‬ ‫كفاية‬ ‫خلص‬
Security policy
● Document describing the way computer
equipment may/may not be used
● Security policy aspects:
– Physical security
– Network security
– Authentication
– Authorization
Physical Security
● Ensure that nobody can access computer
hardware
– Locks on doors
– Access codes
– Signing-in of staff
– Physical protection of cabling
Physical Security
● Physical environment
– Uninterruptible Power Supply (UPS)
– Fire suppression system
– Air Conditioning (heat, moisture)
● Physical breakdown of computer hardware
– Spare components
– Backups (consider off-site storage)
Network Security
● Ensure that no unauthorized user can
access the system
– over the network
– Internet
– other WAN
– LAN
● Needs to be done for every networked
system
Authentication
● User name/Password
● Public key cryptography
● Smart cards
● Biometrics
Authorization
● Determining what you may do
● Usually dependent on group membership
Attackers
● Hackers
– A hacker is someone who wants to satisfy
his curiosity
● Means no harm
● May cause harm accidentally
Attackers
● Crackers
– A cracker is someone who wants to gain
something
● Access to your system to use resources
● Access to data (e.g. credit card numbers)
● Publicity
● Revenge
Attackers
● Script Kiddies
– A Script Kiddie is someone who uses
hackers tools without understanding what
they do
Types of Attack (1)
● Scanning
– Which services are enabled
– Which software and version is used
● Sniffing
– Monitoring data (e.g. passwords) in transit
● Break-in
– Gain access to a computer, preferably as
superuser
Types of Attack (1)
● Brute Force
– Try every possible combination until one
works
● Man-in-the-Middle
– Act as the server to a client
– Act as a client to the server
Types of Attack (1)
● Denial of Service (DoS)
– Prevent legitimate users from working
– Usually done by crashing or overloading
the system or network
● Distributed Denial of Service (DDoS)
– DoS attack from many different sources
simultaneously
Types of Attack (2)
MW ViSTA
Types of Attack (2)
●
Maleware
●
Worm
●
Virus
●
Spyware
●
Trojan
●
Adware
Types of Attack (2)
● Virus
– Malicious program that attaches itself to
other programs
● Worm
– Self-replicating malicious program
● Trojan Horse
– Apparently useful program with a malicious
component
What You Have to Lose
● Loss of resources
– Disk space
– Bandwidth
– CPU time
● Loss or alteration of data
● Loss or impairment of service
● Loss of reputation, goodwill, trust
What You Have to Lose
● Disclosure of personal, proprietary or
confidential
● information
● Financial loss
● Stolen credit card numbers
● Legal, criminal action against you
Live Demo
And so !
‫نظامك‬ ‫إعرف‬
Quiz !
Questions ?
References
➢ Mainly IBM Slides
thanks
Eslam Mamdouh
Future Owner Of RedHat
eslam.husseiny@gmail.com

Mais conteúdo relacionado

Semelhante a Wanna be h4ck3r snapshot of security concept

operating system Security presentation vol 2
operating system Security presentation vol 2operating system Security presentation vol 2
operating system Security presentation vol 2qacaybagirovv
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfsatonaka3
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptxRushikeshChikane2
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpagenakomuri
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.pptmiki304759
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14jemtallon
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksSam Bowne
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platformsBen Tullis
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksSam Bowne
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraAnant Corporation
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer SystemManesh T
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Information security introduction
Information security introductionInformation security introduction
Information security introductionG Prachi
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentalsManesh T
 

Semelhante a Wanna be h4ck3r snapshot of security concept (20)

operating system Security presentation vol 2
operating system Security presentation vol 2operating system Security presentation vol 2
operating system Security presentation vol 2
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Basic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpageBasic security concepts_chapter_1_6perpage
Basic security concepts_chapter_1_6perpage
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Real life hacking101
Real life hacking101Real life hacking101
Real life hacking101
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platforms
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Network sec 1
Network sec 1Network sec 1
Network sec 1
 
Information security introduction
Information security introductionInformation security introduction
Information security introduction
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Wanna be h4ck3r snapshot of security concept

  • 1. Wanna be h4ck3r snapshot of security concept By Eslam Mamdouh El Husseiny
  • 3. Wanna be h4ck3r ● Agenda – Security policy – Attackers – Type of attacks – So am I a looser ? – Live demo – ‫؟‬ ‫بعدين‬ ‫و‬ ‫طب‬ – ‫كده‬ ‫كفاية‬ ‫خلص‬
  • 4. Security policy ● Document describing the way computer equipment may/may not be used ● Security policy aspects: – Physical security – Network security – Authentication – Authorization
  • 5. Physical Security ● Ensure that nobody can access computer hardware – Locks on doors – Access codes – Signing-in of staff – Physical protection of cabling
  • 6. Physical Security ● Physical environment – Uninterruptible Power Supply (UPS) – Fire suppression system – Air Conditioning (heat, moisture) ● Physical breakdown of computer hardware – Spare components – Backups (consider off-site storage)
  • 7. Network Security ● Ensure that no unauthorized user can access the system – over the network – Internet – other WAN – LAN ● Needs to be done for every networked system
  • 8. Authentication ● User name/Password ● Public key cryptography ● Smart cards ● Biometrics
  • 9. Authorization ● Determining what you may do ● Usually dependent on group membership
  • 10. Attackers ● Hackers – A hacker is someone who wants to satisfy his curiosity ● Means no harm ● May cause harm accidentally
  • 11. Attackers ● Crackers – A cracker is someone who wants to gain something ● Access to your system to use resources ● Access to data (e.g. credit card numbers) ● Publicity ● Revenge
  • 12. Attackers ● Script Kiddies – A Script Kiddie is someone who uses hackers tools without understanding what they do
  • 13. Types of Attack (1) ● Scanning – Which services are enabled – Which software and version is used ● Sniffing – Monitoring data (e.g. passwords) in transit ● Break-in – Gain access to a computer, preferably as superuser
  • 14. Types of Attack (1) ● Brute Force – Try every possible combination until one works ● Man-in-the-Middle – Act as the server to a client – Act as a client to the server
  • 15. Types of Attack (1) ● Denial of Service (DoS) – Prevent legitimate users from working – Usually done by crashing or overloading the system or network ● Distributed Denial of Service (DDoS) – DoS attack from many different sources simultaneously
  • 16. Types of Attack (2) MW ViSTA
  • 17. Types of Attack (2) ● Maleware ● Worm ● Virus ● Spyware ● Trojan ● Adware
  • 18. Types of Attack (2) ● Virus – Malicious program that attaches itself to other programs ● Worm – Self-replicating malicious program ● Trojan Horse – Apparently useful program with a malicious component
  • 19. What You Have to Lose ● Loss of resources – Disk space – Bandwidth – CPU time ● Loss or alteration of data ● Loss or impairment of service ● Loss of reputation, goodwill, trust
  • 20. What You Have to Lose ● Disclosure of personal, proprietary or confidential ● information ● Financial loss ● Stolen credit card numbers ● Legal, criminal action against you
  • 27. thanks Eslam Mamdouh Future Owner Of RedHat eslam.husseiny@gmail.com