You are on page 1of 16

WHY CYBER SECURITY IS SO

IMPORTANT ?

Arman Hasen (CCIE)


INTRODUCTION TO CYBER SECURITY TRAINING COURSE (NETWORKWALKS ACADEMY) (arman@networkwalks.com)
WHY CYBER SECURITY
IS SO IMPORTANT ?
• This lecture was just for reference purposes to give an overall idea to students before the course starts.
• This extra lecture has already been delivered in pre-course classes & almost all students have attended it. So we will not repeat it again to save time.
• If any student has not attended this lecture before, then please watch the recording of the session here & feel free to ask any questions to instructor during live
class.

RECORDING: https://www.youtube.com/watch?v=OB78iqf2zzo
SECURITY APPROACHES

DEFENSIVE SECURITY
Use a reactive approach to security that focuses on prevention, detection, and response to attacks

OFFENSIVE SECURITY
Deploy a proactive approach to security through the use of Ethical Hacking

OFFENSIVE DEFENSIVE
SECURITY SECURITY
WHY CYBER SECURITY IS SO IMPORTANT?

SECURITY RECOMMENDATIONS (with practical examples)


PRACTICAL EXAMPLES
• Always change your default security credentials (HOMOGRAPHS BASED ATTACKS)
www.facebook.com
e.g. Admin access to network devices can lead to unauthorized access www.fаcebook.com

• Always implement strict end points security policies


e.g. Admin access to servers or other devices can lead to password crack attacks

• Always keep all unused services & ports disabled


e.g. Open ports like 445 can cause SMB based DoS attack

• Always implement strict security policies PRACTICAL EXAMPLES


intitle IP Webcam GHDB inurl
e.g. weak email security policy can lead to Social Engineering attacks /greet.html
intitle webcamxp 5 intext: live stream
GHDB intitle webcam inurl login
GHDB intitle Index of WhatsApp Images
• Always update your endpoints with security patches
e.g. Old versions can cause Hacking attacks using Metasploit

PRACTICAL EXAMPLES
(Social Engg & Email Spoofing)
PRACTICAL EXAMPLES PRACTICAL EXAMPLES

PHISHING ATTACKS DOS ATTACKS PASSWORD ATTACKS


(SPOOFING)
WHY
SOMECYBER
CYBERSECURITY
SECURITYISFACTS
SO IMPORTANT?
& FIGURES
WHY CYBER SECURITY IS SO IMPORTANT?
WHY CYBER SECURITY IS SO IMPORTANT?
SOME USEFULE SECURITY RESOURCES

www.cve.mitre.org/cve
www.nvd.nist.gov
www.phishtank.com
SECURITY THREATS, ATTACKS & MITIGATION

Network Security Threats Network Security Mitigations

1. Network Attacks ✓ Reduce the network visibility

Reconnaissance attacks (Collect info about victim device/network before the real attack) ✓ Harden the applications

Access attacks (Gain password/access by exploiting the vulnerabilities in Access Services ✓ Update security patches regularly
DoS attacks (Consume all resources of an important server/device & make it unavailable for valid use) ✓ Install & keep Antivirus updated on all hosts
✓ Disable unneeded services
2. Social Engineering (Phishing, Spam,..) ✓ Use strong authentications to avoid risk of packet sniffers
Attacker bluffs the victim to visits a link & gain confidential info (Author: Waqas Karim CCIE)
✓ Deploy Strong IDS/IPS
✓ Implement strong password rules
3. Malware / Virus
Attacker sends the victim a malicious program/code that replicates itself & spreads further ✓ Deploy network and application firewalls
✓ User awareness
4. Data Loss ✓ Physical Access Control
Confidential info from emails, printed form, hard disks is copied or deleted
✓ Apply Access Control List
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES
WHY CYBER SECURITY IS SO IMPORTANT?
PHISHING EXAMPLES

Please change your Cisco password to


keep your account active.
Thank You

You might also like