Cyber security fundamentals & ethical hacking

ervaijnathgoler 17 views 33 slides Mar 02, 2025
Slide 1
Slide 1 of 33
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33

About This Presentation

Cybersecurity fundamentals and ethical hacking are intertwined disciplines focused on protecting digital assets. Here's a breakdown:
Cybersecurity Fundamentals:
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are often aimed at acce...


Slide Content

How to Secure Your Future Exploring Cybersecurity Fundamentals, Career Paths, and Ethical Hacking Demos Dr. Varun M Deshpande

Background

Why is Cyber Security Important? Protect your digital resources Protect from Hackers Protect your Business Protect Customer Data Secure from Vulnerabilities Secure your Digital Identity Protect against Data Theft Regulatory Compliance requirements Protect Customers Trust

CIA Triad Confidentiality – Prevent intentional or unintentional or unauthorized disclosure of contents. (Protect against Data Theft) Integrity – Guarantees that message delivered has not been altered intentionally or unintentionally from the original data received. (Ensure correctness of the messages exchanged) Availability – Assurance that the system would be stable, resilient and accessible always. (Protect against Denial of Service) CONFIDENTIALITY AVAILABILITY INTEGRITY AAA Security Framework : Authentication Authorization Accounting

Common Terminologies MALWARE – Malicious Software MALWARE has 2 components Propagation Mechanism - The way in which malware spread Payload – Malicious action performed by malware Viruses Worms Trojan Horses Propagation Human Action Self Spreading Tricking users as a legitimate SW Payload Any payload Any payload Any payload Example The Concept virus Stuxnet worm Free Software+ Spy ware

Anatomy of a Cyber Attack

Security Design Principles Defense in Depth Error & Exception handling Fail Safe Treat all inputs as unsafe Principle of Least Privilege

Challenges

Cyber Security threats to Watch out for

OWASP Top 10 security Risks

Advancements

Career

Cybersecurity Career Path https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool https://www.cyberseek.org/pathway.html

Cybersecurity Certification Path https://www.isc2.org/certifications/cc https://www.comptia.org/certifications/security https://pauljerimy.com/security-certification-roadmap/

Career Path Work on Research Projects Develop Online Profile Internships Associate Full Time Job Develop Yourself with Experience & Certification/ Higher Study Choose area to Expertise and spend extra effort Excel as Professional & Share Knowledge Attend Workshops Work under Professors Experiment with Technology Present in Conferences Share knowledge with peers Catalog Projects in Github etc. File for Patents when applicable Reach out & build Network Work for a startup company Don’t hesitate to learn new tech Understand the needs of Market Get as much industry exposure as possible Learn how to work in Corporate Environment Take up ownership of certain tasks Build Trust and Professional Relationships Put extra effort in first few years of your career Decide if you want to pursue higher studies and in which subject Explore opportunities to prove your capabilities Select a domain in which you would want to be Subject Matter Expert Explore, learn and gain experience in the subject Make yourself ready for higher responsibilities Don’t forget your career path and the journey that you took Stay connected with your teachers and all who helped you along the way Take time to refresh your knowledge and stay updated with latest changes

Conclusion

Cyber Security Defense Starts With You! Use complex password and don’t share with anyone Enable multi factor authentication wherever available Be mindful of Phishing Attacks – If its too good to be true, it usually isn’t! Be mindful of the systems that you use and ensure session is closed Always apply security patches to your system Don’t open / forward any messages that seem suspicious or tempting offers Follow security design principles in what ever activity you do Take ownership of your career and prepare to excel!

Thank You https://www.linkedin.com/in/dr-varun-m-deshpande-33826512/

References https://www3.weforum.org/docs/WEF_The_Global_Risks_Report_2022.pdf https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ https://www.hindustantimes.com/india-news/report-breach-within-six-hours-govt-frames-cybersecurity-norms-101651171521206.html https://www.wilmerhale.com/en/insights/blogs/WilmerHale-Privacy-and-Cybersecurity-Law/20220330-sri-lanka-becomes-the-first-south-asian-country-to-pass-comprehensive-privacy-legislation https://economictimes.indiatimes.com/tech/technology/fresh-legislation-may-replace-data-protection-bill/articleshow/89624369.cms https://informationisbeautiful.net/visualizations/ransomware-attacks/ https://www.sentinelone.com/cybersecurity-101/zero-trust-architecture/ https://2cloud.eu/ddos https://www.leapit.co.uk/why-is-cyber-security-important/ https://www.onelogin.com/learn/ddos-attack https://www.cloudflare.com/learning/access-management/phishing-attack/ https://www.wallarm.com/what/what-is-a-supply-chain-attack https://www.belfercenter.org/publication/AttackingAI https://www.toolbox.com/it-security/identity-access-management/articles/what-is-privileged-access-management/ https://www.toolbox.com/it-security/vulnerability-management/articles/what-is-vulnerability-management/ https://www.pamten.com/blog/security-frameworks/ https://www.fortinet.com/blog/business-and-technology/fortiweb-release-6-0--ai-based-machine-learning-for-advanced-thr.html https://www.uvu.edu/spam/phishing.html

How to Protect our digital assets from Threats? Adopt a Proactive Approach Find and fix the Vulnerabilities before hackers exploit it Incorporate Security Design Principles Set Proper Security Configurations Disable ports which are not required, disable ICMP response Error pages/messages should be generic Encrypt data which is sensitive. Even if its lost, it will not be useful to attackers Adopt Secure Development Lifecycle Train the team, and provide them enough resources to implement secure practices Monitor your systems for any anomalies Setup Google Alerts against GHDB exploits Spikes in usage need to be monitored – DDOS protection services Security breaches are inevitable – Move Quickly to resolve the issues Have a robust Security Incident Response Team Have a Business Continuity Plan CONFIDENTIALITY AVAILABILITY INTEGRITY