SlideShare uma empresa Scribd logo
1 de 15
Introduction to Pre-Cybersecurity
THREATS&BYTES
Information Security Triad
 The three letters in "CIA triad" stand for Confidentiality, Integrity, and
Availability. The CIA triad is a common model that forms the basis for the
development of security systems. They are used for finding vulnerabilities
and methods for creating solutions.
 Confidentiality
 Integrity
 Availability
CONFIDENTIALITY
 Confidentiality involves the efforts of an organization to make sure data is
kept secret or private. To accomplish this, access to information must be
controlled to prevent the unauthorized sharing of data.
 This may involve direct attacks aimed at gaining access to systems the
attacker does not have the rights to see. It can also involve an attacker
making a direct attempt to infiltrate an application or database so they can
take data or alter it.
 These direct attacks may use techniques such as man-in-the-middle
(MITM) attacks, where an attacker positions themselves in the stream of
information to intercept data and then either steal or alter it.
INTEGRITY
 Data must not be changed in transit, and steps must be taken to ensure
data cannot be altered by unauthorized people (for example, in a breach of
confidentiality).
 Integrity involves making sure your data is trustworthy and free from
tampering. The integrity of your data is maintained only if the data is
authentic, accurate, and reliable.
 Compromising integrity is often done intentionally. An attacker may
bypass an intrusion detection system (IDS), change file configurations to
allow unauthorized access, or alter the logs kept by the system to hide the
attack. Integrity may also be violated by accident. Someone may
accidentally enter the wrong code or make another kind of careless
mistake.
Availability
 Availability means information should be consistently and readily
accessible for authorized parties. This involves properly maintaining
hardware and technical infrastructure and systems that hold and display
the information.
 his means that systems, networks, and applications must be functioning as
they should and when they should.
 Also, individuals with access to specific information must be able to
consume it when they need to, and getting to the data should not take an
inordinate amount of time.
 To ensure availability, organizations can use redundant networks, servers,
and applications. These can be programmed to become available when the
primary system has been disrupted or broken.
FIVE STAGE OF ETHICAL HACKING
 The aim of ethical hacking is to mimic the actions of hackers and identify both
existing and potential vulnerabilities that may arise in the future. To
accomplish this, an ethical hacker undertakes multiple stages of assessment to
gain as much in-depth knowledge of the system as possible.
 While the phases discussed in the webinar are from the perspective of a
hacker, King explains that these are the same phases used by a white hat
hacker to test an organization’s network. To put it simply, an attacker uses this
approach to breach the network, while the ethical hacker uses it to protect it.
 The following Phases of hacking are as follows:
 1. Reconnaissance
 2. Scanning
 3. Gaining Access
 4. Maintaining Access
 5. Clearing tracks
Reconnaissance
 The first phase of ethical hacking is called Reconnaissance. This phase
hacker gathers information about a target before launching an attack.
 It is during this phase that the hacker finds valuable information such as
old passwords, names of important employees.
 There are two types of reconnaissance methods that has been used by
hackers are as follows:
 Active: Directly interacting with the target to gather information about the
target.
 Passive: Trying to collect the information about the target without directly
accessing the target. To this purpose, hacker can use social media, public
websites etc.
Scanning
 hackers are probably seeking any information that can help them perpetrate attack such as
computer names, IP addresses, and user accounts. In fact, hacker identifies a quick way to
gain access to the network and look for information.
 This phase includes usage of tools like dialers, port scanners, network mappers, sweepers,
and vulnerability scanners to scan data.
 Basically, at this stage, four types of scans are used:
 Pre-attack: Hacker scans the network for specific information based on the information
gathered during reconnaissance.
 Port scanning/sniffing: This method includes the use of dialers, port scanners, and other
data-gathering equipment.
 Vulnerability Scanning: Scanning the target for weaknesses/vulnerabilities.
 Information extraction: In this step, hacker collects information about ports, live machines
and OS details, topology of network, routers, firewalls, and servers.
Gaining Access
 Once ethical hackers expose vulnerabilities through the process’s first and
second hacking phases, they now attempt to exploit them for administrative
access. The third phase involves attempting to send a malicious payload to the
application through the network, an adjacent sub network, or physically using
a connected computer.
 An attacker can gain access various attack such as:
 Phishing attacks
 Brute force attack
 Spoofing attack
 Man in the middle attack
 Dos attack
 Session hijacking
 Buffer overflow attacks
Maintaining Access
 Hacker may just hack the system to show it was vulnerable or he can be so
mischievous that he wants to maintain or persist the connection in the
background without the knowledge of the user.
 This can be done using Trojans, Rootkits or other malicious files. The aim is
to maintain the access to the target until he finishes the tasks he planned
to accomplish in that target.
 A white-hat hacker continuously exploits the system for further
vulnerabilities and escalates privileges to understand how much control
attackers can gain once they pass security clearance.
Covering Tracks
 Once a hacker has obtained access, they leave no trace to prevent detection by the security
team.
 They execute this by deleting cache and cookies, interfering with log files, and closing all
open ports.
 This incorporates some of the steps an ethical hacker uses to cover and eliminate their
footprint.
 Deleting/corrupting all logs
 Changing the values of logs or registries
 Removing all of the folders established by the ethical hacker
 Uninstalling all the applications
Introduction to Cyber Attacks
 Brute force attack
 Phishing
 Phishing 2
 DOS
 DDOS
 Man in the Middle attacks
 SQL Injection
 Password attack
 Insider Threats
Introduction to Malware
 Malware
 Virus
 Worm
 Antivirus
 Rootkits
 Ransom ware
 Trojan Horse
 Dropper
 Drive-by-Attacks
Introduction to Cyber defense
 Antivirus
 Firewall
 Honeypot
 IDS/IPS
 Monitoring system and network
 SOC
 MFA
 Malware Scanner
 Store data to Cloud platform
References
 https://www.techtarget.com/whatis/definition/Confidentiality-integrity-
and-availability-CIA
 https://www.fortinet.com/resources/cyberglossary/cia-triad
 https://intellipaat.com/blog/the-cia-triad/
 https://www.invensislearning.com/blog/phases-of-ethical-hacking/
 https://www.greycampus.com/opencampus/ethical-hacking/phases-of-
hacking
 https://www.ramsac.com/it-resources/cybersecurity/an-introduction-to-
cyber-attacks/

Mais conteúdo relacionado

Semelhante a Introduction to Pre-Cybersecurity.pptx

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking pptNitesh Dubey
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGNathan Mathis
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfMithunJV
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guideMatt Ford
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecCMR WORLD TECH
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Mohammad Affan
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 

Semelhante a Introduction to Pre-Cybersecurity.pptx (20)

Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKINGA REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Vulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdfVulnerability Prevention Using Ethical Hacking.pdf
Vulnerability Prevention Using Ethical Hacking.pdf
 
Hacking.pptx
Hacking.pptxHacking.pptx
Hacking.pptx
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Computer security
Computer securityComputer security
Computer security
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
System Security
System SecuritySystem Security
System Security
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 

Último

定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfJamalYaseenJameelOde
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...vinbld123
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfTheKnowledgeReview2
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一diploma 1
 

Último (20)

定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdf
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...tools in IDTelated to first year vtu students is useful where they can refer ...
tools in IDTelated to first year vtu students is useful where they can refer ...
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdfMost Inspirational Leaders Empowering the Educational Sector, 2024.pdf
Most Inspirational Leaders Empowering the Educational Sector, 2024.pdf
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
 

Introduction to Pre-Cybersecurity.pptx

  • 2. Information Security Triad  The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.  Confidentiality  Integrity  Availability
  • 3. CONFIDENTIALITY  Confidentiality involves the efforts of an organization to make sure data is kept secret or private. To accomplish this, access to information must be controlled to prevent the unauthorized sharing of data.  This may involve direct attacks aimed at gaining access to systems the attacker does not have the rights to see. It can also involve an attacker making a direct attempt to infiltrate an application or database so they can take data or alter it.  These direct attacks may use techniques such as man-in-the-middle (MITM) attacks, where an attacker positions themselves in the stream of information to intercept data and then either steal or alter it.
  • 4. INTEGRITY  Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).  Integrity involves making sure your data is trustworthy and free from tampering. The integrity of your data is maintained only if the data is authentic, accurate, and reliable.  Compromising integrity is often done intentionally. An attacker may bypass an intrusion detection system (IDS), change file configurations to allow unauthorized access, or alter the logs kept by the system to hide the attack. Integrity may also be violated by accident. Someone may accidentally enter the wrong code or make another kind of careless mistake.
  • 5. Availability  Availability means information should be consistently and readily accessible for authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.  his means that systems, networks, and applications must be functioning as they should and when they should.  Also, individuals with access to specific information must be able to consume it when they need to, and getting to the data should not take an inordinate amount of time.  To ensure availability, organizations can use redundant networks, servers, and applications. These can be programmed to become available when the primary system has been disrupted or broken.
  • 6. FIVE STAGE OF ETHICAL HACKING  The aim of ethical hacking is to mimic the actions of hackers and identify both existing and potential vulnerabilities that may arise in the future. To accomplish this, an ethical hacker undertakes multiple stages of assessment to gain as much in-depth knowledge of the system as possible.  While the phases discussed in the webinar are from the perspective of a hacker, King explains that these are the same phases used by a white hat hacker to test an organization’s network. To put it simply, an attacker uses this approach to breach the network, while the ethical hacker uses it to protect it.  The following Phases of hacking are as follows:  1. Reconnaissance  2. Scanning  3. Gaining Access  4. Maintaining Access  5. Clearing tracks
  • 7. Reconnaissance  The first phase of ethical hacking is called Reconnaissance. This phase hacker gathers information about a target before launching an attack.  It is during this phase that the hacker finds valuable information such as old passwords, names of important employees.  There are two types of reconnaissance methods that has been used by hackers are as follows:  Active: Directly interacting with the target to gather information about the target.  Passive: Trying to collect the information about the target without directly accessing the target. To this purpose, hacker can use social media, public websites etc.
  • 8. Scanning  hackers are probably seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts. In fact, hacker identifies a quick way to gain access to the network and look for information.  This phase includes usage of tools like dialers, port scanners, network mappers, sweepers, and vulnerability scanners to scan data.  Basically, at this stage, four types of scans are used:  Pre-attack: Hacker scans the network for specific information based on the information gathered during reconnaissance.  Port scanning/sniffing: This method includes the use of dialers, port scanners, and other data-gathering equipment.  Vulnerability Scanning: Scanning the target for weaknesses/vulnerabilities.  Information extraction: In this step, hacker collects information about ports, live machines and OS details, topology of network, routers, firewalls, and servers.
  • 9. Gaining Access  Once ethical hackers expose vulnerabilities through the process’s first and second hacking phases, they now attempt to exploit them for administrative access. The third phase involves attempting to send a malicious payload to the application through the network, an adjacent sub network, or physically using a connected computer.  An attacker can gain access various attack such as:  Phishing attacks  Brute force attack  Spoofing attack  Man in the middle attack  Dos attack  Session hijacking  Buffer overflow attacks
  • 10. Maintaining Access  Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user.  This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.  A white-hat hacker continuously exploits the system for further vulnerabilities and escalates privileges to understand how much control attackers can gain once they pass security clearance.
  • 11. Covering Tracks  Once a hacker has obtained access, they leave no trace to prevent detection by the security team.  They execute this by deleting cache and cookies, interfering with log files, and closing all open ports.  This incorporates some of the steps an ethical hacker uses to cover and eliminate their footprint.  Deleting/corrupting all logs  Changing the values of logs or registries  Removing all of the folders established by the ethical hacker  Uninstalling all the applications
  • 12. Introduction to Cyber Attacks  Brute force attack  Phishing  Phishing 2  DOS  DDOS  Man in the Middle attacks  SQL Injection  Password attack  Insider Threats
  • 13. Introduction to Malware  Malware  Virus  Worm  Antivirus  Rootkits  Ransom ware  Trojan Horse  Dropper  Drive-by-Attacks
  • 14. Introduction to Cyber defense  Antivirus  Firewall  Honeypot  IDS/IPS  Monitoring system and network  SOC  MFA  Malware Scanner  Store data to Cloud platform
  • 15. References  https://www.techtarget.com/whatis/definition/Confidentiality-integrity- and-availability-CIA  https://www.fortinet.com/resources/cyberglossary/cia-triad  https://intellipaat.com/blog/the-cia-triad/  https://www.invensislearning.com/blog/phases-of-ethical-hacking/  https://www.greycampus.com/opencampus/ethical-hacking/phases-of- hacking  https://www.ramsac.com/it-resources/cybersecurity/an-introduction-to- cyber-attacks/