Lecture-4-1
Lecture-4-1
Lecture # 4
1
Objectives
Introduction to Cybersecurity
2
Important Terms in Cyber Security(Cont..)
Cloud:
• Cloud computing is providing on-demand services
over the internet.
Dr Shafiq 3
Important Terms in Cyber Security(Cont..)
Cloud:
• Cloud service providers like Microsoft Azure, AWS,
and Google Cloud, which offer on-demand services
and are both cost-effective and low-risk in terms of
security, make this procedure simple.
Dr Shafiq 4
Important Terms in Cyber Security(Cont..)
IP Address:
• The world IP stands for Internet Protocol.
Dr Shafiq 5
Important Terms in Cyber Security(Cont..)
IP Address:
• It functions very similarly to a standard address,
allowing users to find any system or device on the
global network by specifying its location
Dr Shafiq 6
Important Terms in Cyber Security(Cont..)
Rootkit:
• A rootkit is a collection of programs or software tools
that allow hackers to remotely access and control a
computer or network.
Dr Shafiq 7
Important Terms in Cyber Security(Cont..)
Rootkit:
• However, the majority of rootkits either leverage the
system for additional network security attacks or
open a backdoor on the targeted systems for the
introduction of malware, viruses, and ransomware.
Dr Shafiq 8
Important Terms in Cyber Security(Cont..)
Rootkit:
• In order to avoid being picked up by endpoint
antivirus software, rootkits are typically employed in
conjunction with other malware.
Dr Shafiq 9
Important Terms in Cyber Security(Cont..)
Dr Shafiq 10
Important Terms in Cyber Security(Cont..)
Pen-testing :
• An approach to security evaluation where manual
exploitations and automated techniques are used by
attack and security professionals.
Dr Shafiq 11
Important Terms in Cyber Security(Cont..)
Pen-testing :
• Penetration tests can disrupt operations and harm
systems because they employ the same equipment,
procedures, and methodology as malicious hackers
Dr Shafiq 12
Important Terms in Cyber Security(Cont..)
Social Engineering :
• Instead of breaking in or utilizing technical hacking
techniques, social engineering is a growingly popular
way to access restricted resources.
Dr Shafiq 13
Important Terms in Cyber Security(Cont..)
Social Engineering :
• An employee might get an email from a social
engineer purporting to be from the IT department in
order to deceive him into disclosing private
information rather than trying to uncover a software
weakness in a company system.
Dr Shafiq 14
Important Terms in Cyber Security(Cont..)
Clickjacking :
• While someone is tricked into clicking on one object
on a web page when they want to click on another,
this practice is known as clickjacking.
Dr Shafiq 15
Important Terms in Cyber Security(Cont..)
Clickjacking :
• Clickjacking can be used to enable the victim's
webcam, install malware, or access one of their
online accounts.
Dr Shafiq 16
Important Terms in Cyber Security(Cont..)
Deepfake:
• A piece of audio or video that has been altered and
changed to make it seem authentic or credible.
Multi-Factor Authentication:
• Multi-factor authentication (MFA), also referred to as
two-factor authentication, makes it more difficult for
hackers to access your account by requiring you to
provide at least two different credentials.
User Authentication:
• A technique to prevent unauthorized users from
accessing sensitive data is user authentication.
Dr Shafiq 19
Important Terms in Cyber Security(Cont..)
Antivirus:
• The newest virus detection technology is integrated
into anti-virus systems to shield users against viruses,
spyware, trojans, and worms that can damage
computer hardware through email or web browsing.
Dr Shafiq 20
Important Terms in Cyber Security(Cont..)
Ethical Hacking:
• With the owner's permission, breaches the network to
obtain sensitive information—completely legal.
Typically, this technique is used to check for
infrastructure weaknesses.
Dr Shafiq 21
Important Terms in Cyber Security(Cont..)
Cyber Attack :
• Any attempt to breach a logical environment's
security boundary.
Network:
• Two or more computers connected together to share
resources (such printers and CDs), exchange files, or
enable electronic communications make up a
network.
Dr Shafiq 23
Important Terms in Cyber Security(Cont..)
Internet of Things:
• The phrase "Internet of Things" (IoT) refers to
commonplace items that are connected to the internet
and are capable of autonomously collecting and
transferring data without requiring human input.
Dr Shafiq 24
Important Terms in Cyber Security(Cont..)
Internet of Things:
• Any physical thing that can be given an IP address
and can transport data is considered to be a part of the
Internet of Things, which also includes traditional
computers, vehicles, CCTV cameras, household
appliances, and even people.
Dr Shafiq 25
Important Terms in Cyber Security(Cont..)
Penetration Test:
• A penetration test, commonly referred to as a pen test,
simulates a cyberattack on your computer system to
look for weaknesses that could be exploited.
Dr Shafiq 26
Important Terms in Cyber Security(Cont..)
Penetration Test:
• Pen testing involves attempting to get into any
number of application systems (such as
frontend/backend servers, APIs, etc.) in order to find
security holes like unsanitized inputs that are
vulnerable to code injection attacks.
Dr Shafiq 27
Questions
Any Question Please?
28
Further Readings
29
Thanks
30