Introduction To IT Security
Introduction To IT Security
06-10-2019
MBA (University of Colombo)
BSc. (Univeristy of Peradeniya)
Visiting Lecturer
-University of Moratuwa
-CINEC
-SLIIT
Researcher
-SDN
-SD-WAN
-Big Data Analytics
-Cyber Security
-Business Model Development
Nimesh Pollwaththage (Eng.) Area Director, Area M4 (2018-2019),
Toastmasters International
2
Adult Leraning
3
Content
▰ Introduction
▰ Why bother with IT Security?
▰ Basic Methods to disclose hidden info
▰ Surface, Deep & Dark Web
▰ Areas We Cover (Planned)
4
Module info
5
Create Your Own :
▰ Facebook Group
▰ WhatsApp Group
▰ YouTube Channel
6
What is IT Security ?
7
Why IT Security ?
8
Why IT Security ? – Cont…
• Individuals store a lot of sensitive data online
-if stolen, criminals can profit from it
• Societies rely on the internet
-nefarious parties could profit by controlling it
• Business and government proprietary information is often stored
on the internet
-unauthorized access could be economically or politically
disastrous
9
Why bother with IT Security?
10
Why bother with IT Security? – cont..
11
Why bother with IT Security? – cont..
12
Why bother with IT Security? – cont..
13
Why bother with IT Security? – cont..
14
Why bother with IT Security? – cont..
15
Why bother with IT Security? – cont..
16
Why bother with IT Security? – cont..
17
Why bother with IT Security? – cont..
18
Why bother with IT Security? – cont..
19
It is near you !!!
20
They have no mercy !!!
21
Real Time Attack
22
Isn’t it Dangerous ?
23
Basic Methods to disclose hidden info
“How to check
whether your
personal
information in
other websites
have been
compromised”
https://haveibeenpwned.com/ 24
Basic Methods to disclose hidden info
https://who.is/
25
Basic Methods to disclose hidden info-cont…
https://builtwith.com/ 26
Basic Methods to disclose hidden info-cont…
27
Surface, Deep & Dark Web
28
Tor
29
Tor : Silck Road (at your own risk !!!)
30
Areas We Cover (Planned)
Introduction to IT Security -
ITSec Concepts & Introduction to Ethical Ethical Hacking – Part 1 - Lab
Hacking
Cryptographic Systems – Part 1 Cryptographic Tools – Part 1- Lab
Cryptographic Systems – Part 2 Cryptographic Tools – Part 2 - Lab
NMAP for Scanning NMAP- Lab
Authentication Authentication Attacks- Lab
Access Control ACL – Part 1 (Simulation) - Lab
Social Engineering Social Engineering Attacks- Lab
Denial of Service DDoS Attack- Lab
Firewalls IP Tables - Lab
Intruder Detection & Intruder Prevention SNORT- Lab
Systems
Malicious Software Malware - Lab
Web Vulnerabilities – Part 1 Web Attacks – Part 1- Lab
Web Vulnerabilities – Part 2 Web Attacks – Part 2- Lab
Attacks and Tools DNS,SNMP, Session High jacking, Packet Sniffing & Port
Scanning- Lab
Security Auditing Ethical Hacking – Part 2- Lab 31
IT Security Controls Ethical Hacking – Part 3- Lab
THANKS!
Any questions?
You can find me at
[email protected]
32