Professional Documents
Culture Documents
IMPORTANT ?
RECORDING: https://www.youtube.com/watch?v=OB78iqf2zzo
SECURITY APPROACHES
DEFENSIVE SECURITY
Use a reactive approach to security that focuses on prevention, detection, and response to attacks
OFFENSIVE SECURITY
Deploy a proactive approach to security through the use of Ethical Hacking
OFFENSIVE DEFENSIVE
SECURITY SECURITY
WHY CYBER SECURITY IS SO IMPORTANT?
PRACTICAL EXAMPLES
(Social Engg & Email Spoofing)
PRACTICAL EXAMPLES PRACTICAL EXAMPLES
www.cve.mitre.org/cve
www.nvd.nist.gov
www.phishtank.com
SECURITY THREATS, ATTACKS & MITIGATION
Reconnaissance attacks (Collect info about victim device/network before the real attack) ✓ Harden the applications
Access attacks (Gain password/access by exploiting the vulnerabilities in Access Services ✓ Update security patches regularly
DoS attacks (Consume all resources of an important server/device & make it unavailable for valid use) ✓ Install & keep Antivirus updated on all hosts
✓ Disable unneeded services
2. Social Engineering (Phishing, Spam,..) ✓ Use strong authentications to avoid risk of packet sniffers
Attacker bluffs the victim to visits a link & gain confidential info (Author: Waqas Karim CCIE)
✓ Deploy Strong IDS/IPS
✓ Implement strong password rules
3. Malware / Virus
Attacker sends the victim a malicious program/code that replicates itself & spreads further ✓ Deploy network and application firewalls
✓ User awareness
4. Data Loss ✓ Physical Access Control
Confidential info from emails, printed form, hard disks is copied or deleted
✓ Apply Access Control List
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES