The Absolute Beginners Guide To Cyber Security Hand Book
The Absolute Beginners Guide To Cyber Security Hand Book
BEGINNERS
HAND BOOK
GUIDE TO
CYBER SECURITY
Part 1
www.labcyber.com
CIA TRIAD
Confidentiality: Ensuring that data is private and accessed only by those with permission to do so.
Can be achieved with the use of passwords,biometrics and encryption
Integrity: Ensuring that data has not been altered in any way. Can be achieved through the use of
checksums and access control.
Availability: Ensuring that data is always available for access and use. Can be achieved through the
use of backups, maintenance & disaster recovery plans
CYBER TERMINOLOGIES
Cat fishing: The process of creating a fake online profile in order to trick people into believing they are
someone else for financial gain.
Data Mining: The activity of analyzing and/or searching through data in order to find items of relevance,
significance or value
Threat: This generally refers to anything that has the potential to cause our data, systems and networks
harm.
Exploit: A clearly defined way to breach the security of
a system.
Logic Bomb: A malicious code that is only triggered when a set of conditions are met.
Obfuscation: A term used to describe the tactic of making code unclear so that humans or programs like
an antivirus cannot understand it.
Spoof: The act of falsifying the identity of the source of a communication or interaction
A protocol is a set of rules that determines how computers or networks communicate with
each other.
TCP/IP
TCP (Transmission Control Protocol): Divides a message or file into smaller packets that are transmitted
over the internet and then reassembled at the destination point.
IP (Internet Protocol): Responsible for the address of each packet so they are sent to the right
destination
TYPES OF HACKERS
Derogatory term Use black hat The bad guys The good guys Activists who
used to describe techniques who are highly who defend data hack for a social
unskilled hackers skilled and hack and networks or political cause
for personal and from black hats
financial gain and malware
Passive Recon: Silent reconnaissance where the target isn’t aware of it. Information gathered here
include email addresses, phone numbers, social media accounts etc.
Active Recon: More aggressive reconnaissance where the target is actively engaged to discover
vulnerabilities. Information gathered here include passwords, IP addresses, open ports, conversation with
employees.
Exploitation means taking advantage of a vulnerability to gain access.
Privilege Escalation refers to increasing the control over the exploited target.
Establishing persistence means ensuring continuous access even after the breach/attack has been
discovered by the victim.
ATTACKS
BRUTE FORCE ATTACKS
PHISHING
This is the forgery of an email header to make it look like the message originated from someone else
other than the actual source.
BOTNETS
This is an attack where the targeted server is flooded with useless requests in an attempt to overwhelm
and shut it down. Can be combated by blocking the IP address of the source of the attack.
A more sophisticated form of a DOS attack. Can be prevented with bandwidth overprovision.
A crafty attack where the hacker is able to intercept and alter or steal data sent between two or more
workstations. Examples of this attack include email hijacking, session hijacking and wifi eavesdropping.
The attacker executes malicious SQL commands to try and corrupt a database. This type of attack can
provide the attacker with unauthorized access to sensitive information like passwords and usernames.
The attacker executes malicious scripts of code into a website or web application
MALWARE FAMILY
Destroy/corrupt data, can self Can spread and self replicate Disguised to look like a legiti-
replicate but cannot spread themselves mate app, cannot self replicate
themselves across a network.
SPYWARE/
ROOTKITS ADWARE KEYLOGGERS
Very hard to detect and Spies on the online activities of Can record keyboard key
remove. Designed to provide the victim strokes
remote access
Displays ads on your computer
Ransomware: An attack where the victim’s files are encrypted and need to pay a ransom (usually in the
form of Bitcoin) before they can regain access.
DEFENCES
ANTI-VIRUS
This is software used to protect a computer from
malware. They are able to detect malware through
their signatures.
Encryption uses a key known as a cipher to make the data secretive. Another key is then needed to
decrypt the key and make it accessible again.
Symmetric Asymmetric
Uses a single key e,g DES & AES Uses two different keys for encrypting
and decrypting e.g RSA
FIREWALLS
A firewall is a security device that monitors incoming and outgoing network traffic. They can prevent
users from sending certain data outside of their network and can also prevent access to certain websites.
Firewalls work by
2 FACTOR AUTHENTICATION
A user provides 2 authentication factors to verify who they are.
Production Honeypot: Are usually placed inside of a production network with other real servers to
act as a decoy. The main objective is to keep the hackers distracted while the real production servers
are patched up.
A Demilitarized Zone (DMZ) is a physical or logical subnetwork that separates a local area network from
other untrusted networks
WIRELESS SECURITY
This is the prevention of unauthorized access to
computers using wireless networks
PASSWORD MANAGEMENT
A strong password has 4 main requirements
BYOD Policy: A policy that describes how employees are able to use their own personal device to access
company data in a safe and secure manner.
Incident Response Plan: A set of policies and procedures that are used to identify, contain and eliminate
cyber attacks.
Disaster Recovery Plan: A plan that focuses on the restoration of critical systems after a disaster.
The Security vs Ease of Access paradox states that the easier it is to access data the less secure it is and
the more difficult it is to access it, the more secure it is.
ACTIONABLE TIPS FOR
PERSONAL
CYBER SECURITY
USE A STRONG PASSWORD
One of the easiest things you can do right now. Make sure your password is at least 8 characters in
length and has a combination of letters, numbers and a special character.
PASSWORD VARIETY
Even if you have got the strongest password in the world, it's not a good idea to just one password for
all your accounts. Try to come up with 2 or even 3 variations of your main password and use those as
well for some accounts. An alternative here would be to use password managers like Dashlane or
LastPass.
USE AN ANTIVIRUS
As we discussed in the Protocols class, HTTPS is the secure version of HTTP and should be used on sites
where important information like credit card details are provided. Whenever you are on such a site, make
sure that you can see the secure padlock sign in the address bar that shows HTTPS
If you have an internet router at home, take 10 minutes now to change the default password now if you
haven't.
If you have got important files like scanned copies of very important documents, you are better off
storing them on a detachable flash drive that you can always plug into your computer and use when you
have to.
www.labcyber.com