0% found this document useful (0 votes)
36 views22 pages

Cybersecurity Essentials

The document provides an overview of cybersecurity, including its definition, career paths, types of cyber attacks, and the roles of various cybersecurity professionals. It highlights the importance of protecting systems and data from threats like phishing and ransomware, and discusses the motivations behind hacking. Additionally, it introduces basic cybersecurity tools and commands related to ethical hacking practices.

Uploaded by

keanaalihaidar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views22 pages

Cybersecurity Essentials

The document provides an overview of cybersecurity, including its definition, career paths, types of cyber attacks, and the roles of various cybersecurity professionals. It highlights the importance of protecting systems and data from threats like phishing and ransomware, and discusses the motivations behind hacking. Additionally, it introduces basic cybersecurity tools and commands related to ethical hacking practices.

Uploaded by

keanaalihaidar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Cyber

Security
Essentials
protecting computers, networks,
and data from hackers, viruses,
and other cyber threats.

Speaker: CYBERSECURITY EXPERT


1

Table of Content

1 What is Cybersecurity? 4 Kali Linux demo

2 Cybersecurity Career Paths 5 Basic Cybersecurity tools

3 Types of Cyber attack 6 Ethical Hacking demo

NEXT
2

What is Cybersecurity
Cybersecurity is the practice of protecting
systems, networks, and data from cyber
attacks. These attacks are aimed at
accessing, changing, or destroying
sensitive information, extorting money, or
disrupting normal business processes.
10 Important facts about Cybersecurity

01 02 03 04 05

The annual
A cyberattack 95% of 90% of cyber
30,000 average cost of
occurs every cybersecurity attack starts
websites are cybercrime is
39 seconds breaches are with phishing
hacked daily projected to
caused by emails
exceed $23
human error
trillion by 2027

10 09 08 07 06

Phishing attacks Ransomware


The IoT is The average The average cost
increased by attacks affected
projected to have hacker can of a data breach is
4,151% since the 59% of
75 bllion breach a system $4.35m
public debut of organizations, with
vulnerable in less than 35
ChatGPT in late 83% of victims
devices by 2025 minutes
2022 paying the ransom
Cybersecurity Analyst
Monitor systems for suspicious activities and respond to security
alerts, investigates and security breaches. SIEM platforms (e.g.,
Splunk, IBM QRadar), antivirus software, EDR tools.

Security Engineer
Designs, implements, and maintains security infrastructure,
including firewalls, intrusion detection systems. SIEM platforms
(e.g., Splunk, IBM QRadar), antivirus software, EDR tools.

Penetration Tester
Penetration tester Simulates cyberattacks to
identify weaknesses.

Incident Responder
Responds to security incidents, investigates breaches, and
implements recovery procedures.Forensic tools (e.g., EnCase,

Key Roles in
FTK), threat detection platforms, SOAR tools (e.g., Palo Alto
Cortex XSOAR)
CISO
Cybersecurity Lead the organization's overall cybersecurity strategy and
oversee incident response, compliance, and risk management
activities. GRC tools (e.g., RSA Archer, ServiceNow)

GRC Analyst
Ensure the organization complies with regulatory
requirements (e.g., GDPR, H).
Who is a
Hacker?
6

Hacker 2

A hacker is someone who uses their technical skills to break into


computer systems, networks, or devices without permission. They
often take advantage of weaknesses in software or hardware to
bypass security for different reasons, such as stealing information or
causing damage.
WHAT DO HACKERS WANT?
Hackers are often motivated by money. They may steal
credit card information, conduct fraud, or deploy
ransomware to demand payment from victims. Other
common reasons hackers target systems include

Money 01 03 Political or social motives


Hackers aim to steal money through Hacktivists hack for political
banking fraud, credit card theft, or reasons, targeting organizations,
extorting businesses or individuals governments, or businesses to
with ransomware demands. promote social causes or protest
perceived injustices.

Data Theft 02 04 Access to systems


Some hackers want
They may steal sensitive unauthorized access to
personal or corporate data to systems to control critical
sell it on the black market or infrastructure
use it for identity theft,
espionage, or further
cybercrimes.
WHO ELSE WANTS ACCESS YOUR DATA BESIDES HACKERS

03 04
01 03
Websites Internet
Social
Advertizers you visit Service
media Platforms Providers (ISP)

These platforms gather Websites use cookies to Your ISP tracks your
Advertisers monitor and
information about your track your activities in online activity and, in
track your online activities
gender, geolocation, order to provide a more some countries, they can
such as shopping habits
phone number and personalized experience. sell this data to
and personal preferences
political and religious But this leaves a data trail advertisers for a profit. In
and send targeted ads
ideologies based on your that is linked to your certain circumstances,
your way.
search histories and online identity that can ISPs may be legally
online identity. This often end up in the hands required to share your
information is then sold to of advertisers information with
advertisers for a profit. government surveillance
agencies or authorities.
Black Hat Hacker White Hat Hacker

TYPES OF
HACKERS
Grey Hat Hacker
Black-Hat Hacker

These hackers break into systems for personal gain,


such as stealing sensitive data, spreading malware, or
demanding ransom. They attempt to exploit
vulnerability for personal or financial gain. They are
interested in everything, from credit cards to
organizational data
White-Hat Hacker

These are ethical hackers who test systems in order to


improve their security. They test systems, websites,
and networks to find weaknesses before criminals can
exploit them. They often work for companies,
governments, or as security consultants to help
prevent cyberattacks.
Grey-Hat Hacker

These are individuals who work both offensively and


defensively at various times. We cannot predict their
behavior. Sometimes they use their skills for the
common good while some other times they may use
them for their personal gains.
OPEN SOURCE
INTELLIGENCE (OSINT)
Live threat map
OSINT Framework
Open Source
Built with
Intelligence
Whois Tools
Maltego
Google dork
TYPES OF
CYBER
ATTACKs
Social engineering is a
method of getting
information from
SOCIAL individuals without their
ENGINEERING knowledge. It relies on
manipulating people
into revealing sensitive
or confidential details
6

7 Phishing
Phishing is a type of cyberattack where
attackers impersonate a trusted source,
such as a bank, company, or friend, to trick
individuals into revealing sensitive
information or taking actions that benefit
the attacker. They may create fake
websites resembling familiar ones like G1B,
Faceb00k, or Wi-Fi networks
Basic Kali
Linux Commands
whoami Shows the current logged-in user
Command s

ifconfig shows the IP Address of Kali


pwd Displays the present working directory
cd Changes the current directory
date Displays the date
clear clears the terminal
history shows the history
cp copy
mv move
ping checks if an Ip address is up
touch creates new file
nano Edits a file
cat /dev/urandom Displays gibberish
Basic
Cybersecurity
Tools
Basic Cybersecurity Tools

Burp Suite NIKTO NMAP Kali Linux Pentest tools SET


8

Thank You

NEXT

You might also like