Introduction to Cyber Security Training

Jul 19, 2024

Introduction to Cyber Security Training

What is Cyber Security?

  • Definition: The process of using best practices to protect systems, networks, and programs from cyber attacks.
  • Purpose: To safeguard sensitive data, extend money from users, or prevent interruptions to normal business processes.
  • Critical Infrastructure: Power plants, hospitals, public transport, financial services.
  • Difference from Information Security: Cyber security protects data in cyberspace. Information security is about safeguarding data (confidentiality, integrity, availability) regardless of its form (electronic, physical, etc.).

Motives of Cyber Criminals

  1. Ease of Access: Attack less secure (unlocked) systems.
  2. Time Efficiency: Target systems that are quicker to breach.
  3. Value of Reward: Higher-value targets attract more attacks.

Basic Terminologies in Cyber Security

  • Network: Group of interconnected computers for communication and sharing data.
  • Internet: Global network system using TCP/IP protocols.
  • Internet Protocol (IP) Address: Unique address for devices on a network.
  • MAC Address: Hardware ID number for network devices, permanent and unique.
  • DNS (Domain Name System): Translates domain names to IP addresses.
  • DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices.
  • Router: Device that forwards data packets between networks.
  • Malware: Malicious software (examples: viruses, worms, bots).
  • Hash Function: Cryptographic function producing a fixed-size output from input data.

Explaining Basic Concepts

  • Network: 2 or more computers connected to share resources; can be used for cyber attacks.
  • Internet: Uses TCP/IP, supports global communication and services (WWW, email, etc.).
  • Internet Protocols: Rules (TCP/IP) for data transfer and communication on the internet.
  • IP Address: Logical identifier for network communication; unique to each device.
  • MAC Address: Hardware-specific identifier; cannot be changed.
  • DNS: Converts human-readable domain names to IP addresses for computer understanding.
  • DHCP: Manages dynamic IP assignments.
  • Router Security: Crucial to protect network integrity.

Types of Malware

  • Virus: Self-replicating, spreads by altering other programs or files. Example: Melissa Virus.
  • Worm: Self-contained, replicates without needing a host. Example: W32.Alkra.F.
  • Bots/Botnets: Used for remote control and distributed denial of service (DDoS) attacks.

Common Types of Cyber Attacks

  • Distributed Denial of Service (DDoS): Overloads a system, making it unavailable to users.
  • Man-in-the-Middle (MITM): Intercepts and potentially alters communications between two entities.
  • Password Attacks: Various methods to break passwords (dictionary, brute force, keylogging).
  • Social Engineering: Manipulates people into divulging confidential information.
  • Email Attacks: Phishing, spoofing, malicious email attachments.

Prevention & Defense Mechanisms

  • Encryption and Authentication: Strong encryption protocols and multi-factor authentication.
  • Antivirus and Anti-malware: Regularly updated to counteract threats.
  • System Patching: Keeping systems updated to prevent vulnerabilities.
  • Network Security: Proper configuration of routers and network devices.
  • Awareness and Training: User education to recognize phishing attempts and social engineering.

Demonstrations

  1. Creating a Virus Using Metasploit Framework: Steps to generate and deploy a reverse Metasploit payload.
  2. Creating Unlimited New Folder Virus: Using a .bat script to create infinite folders, illustrating simple malware.

Conclusion

  • Stay informed and vigilant with evolving cybersecurity threats.
  • Regularly update systems and software.
  • Employ strong encryption, authentication, and user awareness for sound cyber defense.

Subscribe to Simply Learn for more tutorials and training material.