0% found this document useful (0 votes)
4 views13 pages

Introduction To Cybersecurity Lab - Fall24

The document provides an introduction to cybersecurity, defining it as the protection of digital information from online threats. It outlines common cyber attacks such as ransomware, botnet attacks, social engineering, cryptocurrency hijacking, and phishing. Additionally, it introduces key concepts like the CIA Triad and lists various lab experiments and grading criteria for a cybersecurity course.

Uploaded by

Nayla Greige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views13 pages

Introduction To Cybersecurity Lab - Fall24

The document provides an introduction to cybersecurity, defining it as the protection of digital information from online threats. It outlines common cyber attacks such as ransomware, botnet attacks, social engineering, cryptocurrency hijacking, and phishing. Additionally, it introduces key concepts like the CIA Triad and lists various lab experiments and grading criteria for a cybersecurity course.

Uploaded by

Nayla Greige
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Introduction to

Cybersecurity lab
By Nayla Greige
What is Cybersecurity ?
•Definition:
Cybersecurity is the practice of protecting your digital information
from threats and attacks while you’re using the internet.
•Importance:
With more people going online, the number of security threats
that can cause harm is also growing.
COMMON CYBER ATTACKS
Ransomware
• Ransomware is harmful software that locks your files or makes them
unreadable. The hacker demands money to unlock them.

• Example: Your photos and documents are suddenly locked. You


receive a message asking for $500 in cryptocurrency to get a code to
unlock them.
Botnet Attacks
• A botnet is a group of infected computers controlled by a hacker.
These computers can be used to perform harmful actions.

• Example: Your computer is used to send out thousands of junk emails,


causing trouble for others.
Social Engineering
• Social engineering tricks people into giving away personal
information. It relies on manipulating people rather than using
technical methods.

• Example: You get a call from someone pretending to be from your


bank, asking for your account number and password.
Cryptocurrency Hijacking
• Cryptocurrency hijacking is when hackers secretly use your computer
to mine cryptocurrencies without your knowledge.

• Example: Your computer runs slowly and your power bill is higher.
Later, you discover malware was using your computer to mine
cryptocurrency.
Phishing
• Phishing is a scam where hackers trick you into giving them your
personal information by pretending to be someone you trust.

• Example: You receive an email that looks like it’s from your email
provider, asking you to click a link to 'verify your account.'
KEY CONCEPTS OF CYBER SECURITY
The CIA Triad
•Confidentiality: Ensures that only authorized individuals can access
specific information, keeping it secret from unauthorized users.

•Integrity: Ensures that the data remains accurate and unaltered during
storage or transmission, preventing unauthorized changes.

•Availability: Ensures that information and systems are accessible to


authorized users when needed, without interruptions.
IN THIS LAB ….
TOPICS YOU WILL LEARN :

•Experiment 1: Linux Security Basics

•Experiment 2: Environment Variable and Set-UID

• Experiment 3: Encryption

•Experiment 4:Bash vulnerability

•Experiment 5: Generate shell code

•Experiment 6: Buffer Overflow

•Experiment 7: Sniffing & Spoofing

•Experiment 8: ARP cache poisoning

•Experiment 9: TCP attack


GRADING :
• ATTENDANCE & CLASS PARTICIPATION: 10%
• REPORTS : 45%
• PROJECT: 30%
• QUIZZES : 15%

You might also like