Cyber
Cyber
Threat Actors
• Threat actors are individuals or groups of individuals who perform
cyberattacks. They include, but are not limited to:
• Amateurs
• Hacktivists
• Organized crime groups
• State-sponsored groups
• Terrorist groups
• Cyberattacks are intentional malicious acts meant to negatively impact
another individual or organization.
How Secure is the Internet of Things?
• The Internet of Things (IoT) helps individuals connect things to improve
their quality of life.
• Many devices on the internet are not updated with the latest firmware.
Some older devices were not even developed to be updated with
patches. These two situations create opportunity for threat actors and
security risks for the owners of these devices
Ransomed Companies
Employees of an organization are often lured into opening
attachments that install ransomware on the employees’
computers. This ransomware, when installed, begins the
process of gathering and encrypting corporate data.
ifconfig
- Display network interface information.
Ifconfig
2. ip
- Show/manipulate routing, devices, policy routing,
and tunnels.
ip address show
3. route
- Display or manipulate the IP routing table.
route -n
4. ping
- Send ICMP ECHO_REQUEST to network hosts.
ping google.com
5. traceroute
- Print the route packets trace to network host.
traceroute google.com
and other of commands
Linux Users Essentials , Linux File System , Linux
Permissions
Common Threats and Attacks
1-Virus
2-Worm
3-Trojan horse
4-Ransmware
5-Spayware
user’s consent
6-Adware
7-scareware
8- Phishing
9- Rootkits (backdoor)
Security Onion
is an open-source suite of Network Security Monitoring (NSM) tools that
run
on an Ubuntu Linux distribution.
• Security Onion tools provides three core functions for the cybersecurity
analyst such as full
packet capture and data types, network-based and host-based intrusion
detection systems,
and alert analyst tools.
• Security Onion can be installed as a standalone installation or as a
sensor and server
platform.
• Some components of Security Onion are owned and maintained by
corporations, such as
Cisco and Riverbend Technologies, but are made available as open
source.
Detection Tools for Collecting Alert Data