Introduction to Cybersecurity and Ethical Hacking.pptx

raamtheinternet 0 views 18 slides Oct 08, 2025
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

Sbsn s


Slide Content

INTRODUCTION TO CYBERSECURITY & ETHICAL HACKING 01/15

H ello , everyone, I am Nishant Mehta, with 7+ years of experience in Cyber Security. Currently I am working as a Deputy Manager with Protiviti Global Solutions. I was previously employed with EY and Atos. My expertise lies in identification of vulnerabilities, implementing security frameworks, measures and ensuring compliance to strengthen overall resilience against cyber attacks. I have completed by graduation in Computer Engineering from Pune university and PG from IIM Nagpur in Cybersecurity Management . I am reachable on – 02/15 ABOUT ME +91-9527612793 [email protected] https://www.linkedin.com/in/nishant-mehta-032808129/

What is Cybersecurity? Cybersecurity – Key Concepts and Threat Landscape CIA Triad CIA Triad - Case Studies Types of Hackers Cyber Ethics Cybersecurity measures and best practices Defence In Depth Approach Cyber Legal Consideration Overview of CTF Competitions Introduction to Kali Linux and Terminal Basics Career Roles in Cybersecurity Summary Q&A 03/15 AGENDA

04/15 What Is Cybersecurity? Cybersecurity refers to the practice of protecting systems, networks, programs, and data from digital attacks. These attacks are typically aimed at: Gaining unauthorized access to data, Destroying or altering sensitive information, Interrupting normal business processes. Cybersecurity encompasses a wide array of strategies, tools, and techniques designed to safeguard digital assets from internal and external threats.

05/15 Cybersecurity - Key Concepts & Threat Landscape Key Concepts Common Cyber Threats Authentication – The process of verifying the identity of a user, device, or other entity Authorization – The process of giving someone the ability to access a resource Vulnerability – The weaknesses in systems, software, or processes that can be exploited by attackers. Threat – Any potential danger that can negatively impact systems, data, or operations Risk – The potential for loss or damage to an organization's assets, data, and reputation due to malicious activities M alware – A malicious program designed to harm or exploit computer systems, networks, or data Phishing – Cyber attacker tricks user and attempts to steal sensitive data by pretending as a trustworthy entities. DDOS – The attacker floods a server with internet traffic to prevent users from accessing services Ransomware – A malicious software encrypts a victim's files or blocks access to their computer and the attacker then demands a ransom payment, usually in cryptocurrency, in exchange for a decryption key Data Breaches – Unauthorized user accesses to steals data.

06/15 Confidentiality - T he process of keeping an organization or individual’s data private and ensuring only authorized people can access it. Example: Encrypting sensitive emails, Role based access control (RBAC) Integrity – The data integrity means ensuring data remains accurate, complete, and trustworthy, and hasn't been altered or deleted without authorization. Example: Hashing data, Regular data backups and restoration Availability – The systems and the data must be accessible when needed, whether during normal operations or in the face of a cyber attack, power outage, or natural disaster. Example: DDOS, Software bug, Network outage CIA Triad The CIA Triad is a foundational model in cybersecurity representing three key principles: Confidentiality, Integrity, and Availability

06/15 CIA Triad Case Studies 1. Case Study on the CIA Triad: Secure Healthcare System Implementation Overview: This case study examines the implementation of a secure electronic health record (EHR) system for a regional hospital network, MedSecure , to illustrate how the CIA Triad principles are applied in a real-world scenario. Scenario: MedSecure , a network of five hospitals serving 500,000 patients, aimed to transition from paper-based records to a cloud-based EHR system. The system needed to store sensitive patient data, including medical histories, prescriptions, and billing information, while complying with regulations like HIPAA (Health Insurance Portability and Accountability Act). A security breach or system failure could lead to compromised patient privacy, altered medical records, or disrupted healthcare services. 2. Case Study on the CIA Triad: Secure Online Banking System Implementation Overview: This case study explores how TrustBank , a mid-sized financial institution with 1.2 million customers, applied the CIA Triad to implement a secure online banking platform to protect customer data, transactions, and services. Scenario: TrustBank sought to upgrade its legacy online banking system to a modern platform supporting mobile and web access. The system needed to handle sensitive data, including account balances, transaction histories, and personal identification details, while complying with regulations like PCI DSS (Payment Card Industry Data Security Standard) and GDPR (General Data Protection Regulation). A security failure could result in financial losses, identity theft, or disrupted banking services.

07/15 White Hat Hackers – Employ their skills to enhance system security, often working for organizations or as consultants. White hat hackers also knows as Ethical hackers. Conducts penetration testing, vulnerability assessments, and security audits to identify weaknesses before malicious actors can exploit them. Helps organizations to improve security and protect systems from attacks. Black Hat Hacker – Use their skills for illegal and harmful activities, such as stealing data, causing damage, or disrupting systems. Exploit vulnerabilities, spread malware, and engage in other malicious cyber activities. Motivation is financial gain, revenge, or causing chaos. Grey Hat Hacker – Operate in the middle, sometimes breaching systems without permission but without malicious intent, often to highlight weaknesses. May exploit vulnerabilities without permission but often alert the affected organization to the issue. May seek recognition, compensation, or simply enjoy the challenge of finding vulnerabilities. Types Of Hackers

08/15 Cyber Ethics Privacy Ensures that personal data and information are kept secure and protected from unauthorized access or misuse. Individuals' privacy rights must be respected in the digital world 01 Security Protecting systems, networks, and data from cyberattacks, unauthorized access, and vulnerabilities. Cybersecurity measures must be implemented to safeguard the digital environment. 04 Integrity Promoting honesty and accuracy in digital communications, transactions, and content. Avoid the creation or spread of false information and ensure data is not altered without authorization. 02 Access Ensuring equal access to digital resources and technology for everyone, regardless of socioeconomic status, geographic location, or other barriers. The digital divide should be minimized to promote inclusivity. 05 Accountability Individuals and organizations should be held accountable for their actions in the digital space. Take responsibility for digital content, behavior, and the consequences of online actions. 03 Digital Responsibility Encouraging ethical behavior in the use of technology, including respecting others' intellectual property rights, avoiding cyberbullying, and ensuring the responsible use of online platforms and tools. 06 “Cyber ethics refers to the moral principles guiding the responsible use of technology and data.”

09/15 Cybersecurity Measures – Multifactor Authentication (MFA) Regular software updates Data Backup Implement firewall for network traffic filtration Install anti malware and anti virus solutions Cyber Security Measures & Best Practices Cybersecurity Best Practices – Strong Passwords Avoid clicking links from suspicious sources User Awareness Safe browsing habits Secure endpoint devices

09/15 Defense In Depth Approach Defence In Depth Defense in depth ( DiD ) is a cybersecurity approach that utilizes multiple layers of security controls to protect an organization's assets. It's a layered security strategy, meaning that if one security measure fails, others are in place to mitigate the risk. This approach is designed to slow down or prevent attacks by making it more difficult for malicious actors to penetrate the system. Example: Implement MFA, Network Segmentation, Encryption, Privilege Access Management, etc.

09/15 Cybersecurity legal considerations involve a complex interplay of laws, regulations, and ethical principles designed to protect data and systems from cyber threats. Legally, cybersecurity is governed by laws like the IT Act in India, GDPR in Europe, and various national regulations addressing cybercrime, data protection, and digital forensics. Key Legal Considerations – Data Protection Laws – These laws govern the collection, processing, storage, and transfer of personal data. Organizations must comply with these laws to protect sensitive information and avoid penalties for non-compliance. Examples: the GDPR in Europe and DPDP in India. Cybersecurity Regulations – Laws and legal standards that govern how organizations protect their digital assets, data, and networks from cyber threats and data breaches. Examples: HI{PPA, IT Act 2000, PCI DSS. Contractual Obligations – Cybersecurity is often addressed in contracts between organizations and their partners, vendors, and clients. These contracts may include data protection agreements, service-level agreements, and security clauses that define responsibilities and liabilities related to cybersecurity. Cyber Legal Considerations

10/15 Overview of Capture The Flag (CTF) Competition Capture the Flag (CTF) competition is an exercise in which participants, either individually or as part of a team, are challenged to find and exploit vulnerabilities in a system to capture a "flag" or piece of information. These events simulate real-world attack and defense scenarios, promoting hands-on learning and collaboration. Platforms like TryHackMe and OverTheWire host many such challenges tailored to different skill levels. Follow – https://tryhackme.com/resources/blog/free_path

11/15 Introduction to Kali Linux and Terminal Basics Kali Linux is a Debian-derived Linux distribution that is maintained by Offensive Security. Kali Linux is a specially designed OS for network analysts, Penetration testers, or in simple words, it is for those who work under the umbrella of cybersecurity and analysis. Kali Linux has pre-installed tools for various security tasks, including information gathering, vulnerability analysis, password attacks, and wireless attacks. Refer: https://www.kali.org/docs/ https://static.packt-cdn.com/downloads/KaliLinux2AssuringSecuritybyPenetrationTesting_thirdEdition_ColorImages.pdf Basic Kali Linux commands ls – List directory contents metasploit – Exploitation framework cd – Change directory aircrack -ng – Wireless network security tools pwd – Print working directory hydra – Brute-force attack tool mkdir – Create a new directory john – Password cracking tool rm – Remove files or directories netcat – Networking utility cp – Copy files or directories sqlmap – SQL injection tool mv – Move or rename files or directories nmap – Network scanning and enumeration grep – Search text within files

12/15 Career Roles In Cybersecurity Comptia Security + EC Council Certified Ethical Hacker EC Council Lead Penetration Tester

12/15 Summary Cybersecurity Overview: Protecting systems, networks, and data from digital attacks aimed at unauthorized access, data alteration, or service disruption. CIA Triad: Foundational principles of Confidentiality, Integrity, and Availability ensure secure data handling and system reliability. Threat Landscape: Common threats include malware, phishing, DDoS, ransomware, and data breaches, addressed through authentication, authorization, and vulnerability management. Types of Hackers: White Hat (ethical), Black Hat (malicious), and Grey Hat (mixed motives) hackers impact system security differently. Cyber Ethics: Emphasizes privacy, integrity, security, accountability, access, and digital responsibility in technology use. Legal Considerations: Compliance with data protection laws (e.g., GDPR, DPDP), cybersecurity regulations (e.g., IT Act, HIPAA), and contractual obligations is critical. CTF Competitions: Hands-on exercises like Capture The Flag enhance skills in identifying and exploiting vulnerabilities. Kali Linux: Specialized OS with tools like nmap , metasploit , and aircrack -ng for penetration testing and security analysis. Career Roles: Opportunities include roles certified by CompTIA Security+, EC Council Certified Ethical Hacker, and Lead Penetration Tester.

Any 13/15 Questions ?

THANK 14/15 YOU!