0% found this document useful (0 votes)
2 views

Lecture-4-1

The document is a lecture on cybersecurity by Dr. Shafiq Hussain, covering essential terms and concepts such as cloud computing, IP addresses, rootkits, and social engineering. It also discusses security practices like penetration testing, multi-factor authentication, and ethical hacking. The lecture emphasizes the importance of understanding these terms for effective cybersecurity management.

Uploaded by

Shahzaib Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lecture-4-1

The document is a lecture on cybersecurity by Dr. Shafiq Hussain, covering essential terms and concepts such as cloud computing, IP addresses, rootkits, and social engineering. It also discusses security practices like penetration testing, multi-factor authentication, and ethical hacking. The lecture emphasizes the importance of understanding these terms for effective cybersecurity management.

Uploaded by

Shahzaib Ahmad
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Cyber Security

Lecture # 4

Dr. Shafiq Hussain


Associate Professor

1
Objectives
Introduction to Cybersecurity

2
Important Terms in Cyber Security(Cont..)

Cloud:
• Cloud computing is providing on-demand services
over the internet.

• If you want to run a business and you need to keep


user data and you decide to do it on a hard drive, you
will need a lot of storage space and a tech staff for it.

Dr Shafiq 3
Important Terms in Cyber Security(Cont..)

Cloud:
• Cloud service providers like Microsoft Azure, AWS,
and Google Cloud, which offer on-demand services
and are both cost-effective and low-risk in terms of
security, make this procedure simple.

Dr Shafiq 4
Important Terms in Cyber Security(Cont..)

IP Address:
• The world IP stands for Internet Protocol.

• An IP address is a series of numbers allocated to


computers routers servers, and pretty much anything
connected to the Internet, including websites.

Dr Shafiq 5
Important Terms in Cyber Security(Cont..)

IP Address:
• It functions very similarly to a standard address,
allowing users to find any system or device on the
global network by specifying its location

Dr Shafiq 6
Important Terms in Cyber Security(Cont..)

Rootkit:
• A rootkit is a collection of programs or software tools
that allow hackers to remotely access and control a
computer or network.

• Although rootkits do not directly damage users, they


have been used for other purposes that are legal, such
as remote end-user support.

Dr Shafiq 7
Important Terms in Cyber Security(Cont..)

Rootkit:
• However, the majority of rootkits either leverage the
system for additional network security attacks or
open a backdoor on the targeted systems for the
introduction of malware, viruses, and ransomware.

• Typically, a rootkit is installed without the victim's


knowledge via a stolen password or by taking
advantage of system flaws.

Dr Shafiq 8
Important Terms in Cyber Security(Cont..)

Rootkit:
• In order to avoid being picked up by endpoint
antivirus software, rootkits are typically employed in
conjunction with other malware.

Dr Shafiq 9
Important Terms in Cyber Security(Cont..)

BYOD (Bring Your Own Device) :


• Bring Your Own Device (BYOD) is a company
policy that permits, encourages, or mandates
employees to access enterprise systems and data
using their own personal devices, such as laptops,
tablets, and smartphones, for work-related activities.

Dr Shafiq 10
Important Terms in Cyber Security(Cont..)

Pen-testing :
• An approach to security evaluation where manual
exploitations and automated techniques are used by
attack and security professionals.

• Only environments with a solid security


infrastructure should employ this advanced kind of
security evaluation with a mature security
infrastructure.

Dr Shafiq 11
Important Terms in Cyber Security(Cont..)

Pen-testing :
• Penetration tests can disrupt operations and harm
systems because they employ the same equipment,
procedures, and methodology as malicious hackers

Dr Shafiq 12
Important Terms in Cyber Security(Cont..)

Social Engineering :
• Instead of breaking in or utilizing technical hacking
techniques, social engineering is a growingly popular
way to access restricted resources.

• This strategy relies on user manipulation and human


psychology.

Dr Shafiq 13
Important Terms in Cyber Security(Cont..)

Social Engineering :
• An employee might get an email from a social
engineer purporting to be from the IT department in
order to deceive him into disclosing private
information rather than trying to uncover a software
weakness in a company system.

• Phishing assaults are built on a foundation of social


engineering.

Dr Shafiq 14
Important Terms in Cyber Security(Cont..)

Clickjacking :
• While someone is tricked into clicking on one object
on a web page when they want to click on another,
this practice is known as clickjacking.

• In this manner, the attacker is able to use the victim's


click against them.

Dr Shafiq 15
Important Terms in Cyber Security(Cont..)

Clickjacking :
• Clickjacking can be used to enable the victim's
webcam, install malware, or access one of their
online accounts.

Dr Shafiq 16
Important Terms in Cyber Security(Cont..)

Deepfake:
• A piece of audio or video that has been altered and
changed to make it seem authentic or credible.

• The most perilous aspect of the prevalence of


deepfakes is that they can easily convince individuals
into believing a particular tale or idea, which may
lead to user behavior that has a greater impact on
society at large, such as in the political or financial
spheres.
Dr Shafiq 17
Important Terms in Cyber Security(Cont..)

Multi-Factor Authentication:
• Multi-factor authentication (MFA), also referred to as
two-factor authentication, makes it more difficult for
hackers to access your account by requiring you to
provide at least two different credentials.

• MFA requires a second factor to confirm your identity


in addition to your username and password, such as a
one-time security code, a fingerprint scan, or a face
recognition scan.
Dr Shafiq 18
Important Terms in Cyber Security(Cont..)

User Authentication:
• A technique to prevent unauthorized users from
accessing sensitive data is user authentication.

• For instance, User A can only see data that is relevant


and cannot view User B's sensitive information.

Dr Shafiq 19
Important Terms in Cyber Security(Cont..)

Antivirus:
• The newest virus detection technology is integrated
into anti-virus systems to shield users against viruses,
spyware, trojans, and worms that can damage
computer hardware through email or web browsing.

Dr Shafiq 20
Important Terms in Cyber Security(Cont..)

Ethical Hacking:
• With the owner's permission, breaches the network to
obtain sensitive information—completely legal.
Typically, this technique is used to check for
infrastructure weaknesses.

Dr Shafiq 21
Important Terms in Cyber Security(Cont..)

Cyber Attack :
• Any attempt to breach a logical environment's
security boundary.

• An attack may concentrate on intelligence gathering,


disrupting company operations, exploiting
weaknesses, keeping track of targets, stopping work,
obtaining value, harming logical or physical assets, or
leveraging system resources to enable assaults against
other targets.
Dr Shafiq 22
Important Terms in Cyber Security(Cont..)

Network:
• Two or more computers connected together to share
resources (such printers and CDs), exchange files, or
enable electronic communications make up a
network.

• A network's connections to its computers can be made


by cables, phone lines, radio waves, satellites, or
infrared laser beams.

Dr Shafiq 23
Important Terms in Cyber Security(Cont..)

Internet of Things:
• The phrase "Internet of Things" (IoT) refers to
commonplace items that are connected to the internet
and are capable of autonomously collecting and
transferring data without requiring human input.

Dr Shafiq 24
Important Terms in Cyber Security(Cont..)

Internet of Things:
• Any physical thing that can be given an IP address
and can transport data is considered to be a part of the
Internet of Things, which also includes traditional
computers, vehicles, CCTV cameras, household
appliances, and even people.

Dr Shafiq 25
Important Terms in Cyber Security(Cont..)

Penetration Test:
• A penetration test, commonly referred to as a pen test,
simulates a cyberattack on your computer system to
look for weaknesses that could be exploited.

Dr Shafiq 26
Important Terms in Cyber Security(Cont..)

Penetration Test:
• Pen testing involves attempting to get into any
number of application systems (such as
frontend/backend servers, APIs, etc.) in order to find
security holes like unsanitized inputs that are
vulnerable to code injection attacks.

Dr Shafiq 27
Questions
Any Question Please?

You can contact me at: [email protected]

Your Query will be answered within one working day.

28
Further Readings

29
Thanks

30

You might also like