0% found this document useful (0 votes)
55 views32 pages

Introduction To IT Security

This document provides an introduction to IT security. It discusses why IT security is important by explaining that individuals, societies, and businesses store sensitive data online that could be stolen and abused. It also outlines some basic methods for discovering hidden information, such as using haveibeenpwned.com to check if personal information has been compromised or who.is to lookup domain registry information. Finally, it briefly introduces the surface web, deep web and dark web, and provides an overview of the areas that will be covered in the IT security course, including ethical hacking, cryptography, firewalls, and intrusion detection.

Uploaded by

Dilshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views32 pages

Introduction To IT Security

This document provides an introduction to IT security. It discusses why IT security is important by explaining that individuals, societies, and businesses store sensitive data online that could be stolen and abused. It also outlines some basic methods for discovering hidden information, such as using haveibeenpwned.com to check if personal information has been compromised or who.is to lookup domain registry information. Finally, it briefly introduces the surface web, deep web and dark web, and provides an overview of the areas that will be covered in the IT security course, including ethical hacking, cryptography, firewalls, and intrusion detection.

Uploaded by

Dilshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Introduction to IT Security

06-10-2019
 MBA (University of Colombo)
 BSc. (Univeristy of Peradeniya)
 Visiting Lecturer
-University of Moratuwa
-CINEC
-SLIIT
 Researcher
-SDN
-SD-WAN
-Big Data Analytics
-Cyber Security
-Business Model Development
Nimesh Pollwaththage (Eng.)  Area Director, Area M4 (2018-2019),
Toastmasters International

2
Adult Leraning

3
Content

▰ Introduction
▰ Why bother with IT Security?
▰ Basic Methods to disclose hidden info
▰ Surface, Deep & Dark Web
▰ Areas We Cover (Planned)

4
Module info

▰ 2-hour lecture, 2-hour workshop


▰ Portfolio consisting of:
▰ 40% from workshops
▰ 20% from quizzes on WOLF
▰ 40% from test in assessment week

5
Create Your Own :

▰ Facebook Group
▰ WhatsApp Group
▰ YouTube Channel

6
What is IT Security ?

“IT Security: protection afforded to an automated information


system in order to attain the applicable objectives of preserving
the integrity, availability and confidentiality of information system
resources (includes hardware, software, firmware,
information/data, and telecommunications)”

7
Why IT Security ?

8
Why IT Security ? – Cont…
• Individuals store a lot of sensitive data online
-if stolen, criminals can profit from it
• Societies rely on the internet
-nefarious parties could profit by controlling it
• Business and government proprietary information is often stored
on the internet
-unauthorized access could be economically or politically
disastrous
9
Why bother with IT Security?

10
Why bother with IT Security? – cont..

11
Why bother with IT Security? – cont..

12
Why bother with IT Security? – cont..

13
Why bother with IT Security? – cont..

14
Why bother with IT Security? – cont..

15
Why bother with IT Security? – cont..

16
Why bother with IT Security? – cont..

17
Why bother with IT Security? – cont..

18
Why bother with IT Security? – cont..

19
It is near you !!!

20
They have no mercy !!!

21
Real Time Attack

22
Isn’t it Dangerous ?

23
Basic Methods to disclose hidden info

“How to check
whether your
personal
information in
other websites
have been
compromised”

https://haveibeenpwned.com/ 24
Basic Methods to disclose hidden info

“How to check domain


registry information

https://who.is/

25
Basic Methods to disclose hidden info-cont…

“To check the


architecture of a
web site

https://builtwith.com/ 26
Basic Methods to disclose hidden info-cont…

27
Surface, Deep & Dark Web

28
Tor

29
Tor : Silck Road (at your own risk !!!)

30
Areas We Cover (Planned)
Introduction to IT Security -
ITSec Concepts & Introduction to Ethical Ethical Hacking – Part 1 - Lab
Hacking
Cryptographic Systems – Part 1 Cryptographic Tools – Part 1- Lab
Cryptographic Systems – Part 2 Cryptographic Tools – Part 2 - Lab
NMAP for Scanning NMAP- Lab
Authentication Authentication Attacks- Lab
Access Control ACL – Part 1 (Simulation) - Lab
Social Engineering Social Engineering Attacks- Lab
Denial of Service DDoS Attack- Lab
Firewalls IP Tables - Lab
Intruder Detection & Intruder Prevention SNORT- Lab
Systems
Malicious Software Malware - Lab
Web Vulnerabilities – Part 1 Web Attacks – Part 1- Lab
Web Vulnerabilities – Part 2 Web Attacks – Part 2- Lab
Attacks and Tools DNS,SNMP, Session High jacking, Packet Sniffing & Port
Scanning- Lab
Security Auditing Ethical Hacking – Part 2- Lab 31
IT Security Controls Ethical Hacking – Part 3- Lab
THANKS!
Any questions?
You can find me at
[email protected]

32

You might also like