Chapter 1 Into To Cyb
Chapter 1 Into To Cyb
Email : [email protected]
Introduction to Cybersecurity Office Location: Building 2, 4th Floor, Room B413
Coordinator of the Cybersecurity Track:
PRESENTED BY:
1 2
Outline Introduction
Cybersecurity Overview
Network Security
Authentication Process Information System
?
Traditional Firewall vs Next Generation Firewall
Symmetric Cryptography
Asymmetric Cryptography
Digital Signature / PKI
Credential Authority – SSL/TLS? (Application of the Crypto)
3 4
3 4
2/8/2025
Introduction
Motivation
Cybercrime is Rising
CyberSecurity While
Readiness Declines.*
* 2014 U.S. State of Cybercrime Survey co-sponsored by PwC, CSO magazine, the CERT® Division of
the Software Engineering Institute at Carnegie Mellon University, and the United States Secret
Service.
5 6
Introduction Introduction
What is an information system?
Information
"Information is an asset that, like other important
business assets, is valuable to an organization and,
therefore, must be properly protected."
Information system:
Printed or written on paper Organization of activities consisting of
to acquire, store, transform, disseminate, exploit, manage, ....
Electronically stored Information
One of the technical ways to operate an information system is to use a
Sent by mail or electronically Computer system
communicated in conversations...
7 8
2/8/2025
9 10
Introduction
People !! What does Cybersecurity mean:
National Security Telecommunication and Information Systems Security Committe (NSTISSC)
définie la Security des réseaux comme suit:
12
11 12
2/8/2025
Introduction Introduction
Why Cyber security? What is the impact of cybercrime on business:
1- Internet connection 24/7
2- Increase in cybercrime 1- Decreased productivity
3- Impact on businesses and individuals 2- Loss of turnover
4- Legislation and responsibilities 3- Release of unauthorized sensitive data
5- Proliferation of threats 4- Threat of trade secrets of formulas
6- The sophistication of threats 5- Compromise of reputation and trust
6- Loss of communication
7- Loss of time
13 14
13 14
Introduction Introduction
Challenges of cybersecurity
15 16
15 16
2/8/2025
17 18
Data integrity: Assures that information and programs are Confidentiality: Guard against unauthorized access to sensitive
information.
changed only in a specified and authorized manner.
Integrity: Safeguard system information and processes from both
System integrity: Assures that a system performs its intentional and accidental alterations.
intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the Availability: Guarantee that systems and data remain accessible to
system. authorized users when needed.
19 20
2/8/2025
Security
Security
Availability
S
Integrity
Risk •Once logged in, follow this path: Challenges > Network > FTP-
Confidentiality authentication.
Traceability
•Let’s find the password.
Vulnerability
Security
21 22
21 22