The document discusses a cybersecurity certification course that covers topics like why cybersecurity is needed, common cyber threats, the CIA triad of confidentiality, integrity and availability, and how to protect against unauthorized access, deletion and modification. It also discusses vulnerability, threats and risk assessments, and tools that can help with cybersecurity monitoring, threat intelligence and patching issues.
2. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Why we need Cyber Security?
What is Cyber Security?
The CIA Triad
Vulnerability, Threat and Risk
Cognitive Cyber Security
Agenda
5. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cyber Threats
Phishing
Malware
Password Attacks
Maladvertising
Man In the Middle
Drive-By Downloads
Rogue SoftwareDDoS
6. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
History of Cyber Attacks
Cyber-threats are not only increasing by the year, but they are becoming harder to recognise and also evolving
with time so they can easily by pass normal anti-viruses
7. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Cyber Security
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from
cyberattacks.
9. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
The CIA Triad
Confidentiality Integrity Availability
10. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Attacks on CIA
o Cracking Encrypted Data
o Man In The Middle
attacks on plain text
o Data leakage/
Unauthorised copying of
sensitive data
o Installing
Spyware/Malware on a
server
o Web Penetration for
malware insertion
o Maliciously accessing
servers and forging
records
o Unauthorised Database
scans
o Remotely controlling
zombie systems
o DOS/DDoS attacks
o Ransomware attacks –
Forced encryption of Key
data
oDeliberately disrupting a
server rooms power
supply
o Flooding a server with
too many requests
Confidentiality Integrity Availability
11. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Steps to Fix a Crime
Analyse and Evaluate
Treat
Identify
12. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Vulnerability, Threat & Risk
o Vulnerability refers to the
weakness of an asset that
can be exploited by one or
more attacker
o In context of cyber world,
vulnerability refers to a
bug/ defect in hardware
or software which
remains to be fixed and is
prone to be exploited to
cause a damage to one of
the elements within CIA
triad
o Risk refers to the
potential for loss or
damage when a threat
exploits a vulnerability
o Risk = Threat x
Vulnerability
o Risk management is key
to cybersecurity
o A threat is any event that
has the potential to bring
harm to an organisation
or individual
o Natural Threats,
Intentional Threats,
Unintentional threats
o Threat assessment
techniques are used for
understanding threats.
THREAT
Vulnerability Threat Risk
14. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training
Activity Response System
People Processes
Activity Response System