Professional Documents
Culture Documents
Analytics
Week 1 – Introduction to cybersecurity for enterprise data
analytics, & standards
Acknowledgements:
The contents are compiled from
Prasad, R., & Rohokale, V. (2020). Cyber Security: The Lifeline of Information and Communication Technology.
Springer.
THOMAS, T. P. V., Vijayaraghavan, A. P., & Emmanuel, S. (2020). MACHINE LEARNING APPROACHES IN CYBER
SECURITY ANALYTICS. SPRINGER VERLAG, SINGAPOR.
Ghavami, P. (2019). Big Data Analytics Methods: Analytics Techniques in Data Mining, Deep Learning and
Natural Language Processing. Walter de Gruyter GmbH & Co KG.
Introduction to MN623
Welcome Note
Parties of Cybersecurity
(2) Access
• Use of web apps to communicate with system’s command and control
server.
(3) Escalation
• continuously observe the network operations, map them
• and monitor the system with the help of networking and hacking tools
• and then try to scale the infection.
(4) Exfiltration
• attackers acquire the access to admin’s machine or account.
(6) Assault
• It happens when the hackers alter the functionality of the
victim’s hardware
• or disable the hardware totally.
(7) Obfuscation
• This step makes the victim more confused about the attack
• by hiding the compromised tracks
1. Backdoors
8. Adware
2. Denial-of-service Attack
9. Ransomware
3. Eavesdropping
10. Spyware
4. Spoofing
11. Scareware
5. Tampering
12. Phishing
6. Repudiation Attack
13. Password Attacks
7. Social Engineering
Penetration Testing
• Metasploit, Kali Linux