Enhanced Presentation1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

The aim of cybersecurity is the protection of data, from unauthorized access, misuse,

or loss.

Cybersecurity aims to protect data.


THREE CORE PRINCIPLES THAT GUIDE DATA
PROTECTION
CIA

1:Confidentiality ; Ensures that information is accessible only to those authorized to view it.

2: Integrity; prevents unauthorized alterations, ensuring - information


remains unchanged during storage or transmission.

3: Availability; prevent disruptions in access, ensures that data and systems are accessible to authorized
users whenever needed.
To ensure Confidentiality,

1: Access Control
 Implement role-based access.
 Use multi-factor authentication (MFA).

2:Encryption, both in transit and at rest.

3:Strong Password Policies


To ensure Integrity

1: Hashing and Checksums(SHA-256)

2:Digital Signatures, verify authenticity


Ensuring Availability

1: Redundancy and Backup Systems.


2:Disaster Recovery Planning
Hacking

-Refer to the practice of gaining unauthorized access to computers, networks, or data.

Ethical hacking -is the practice of using hacking techniques lawfully and responsibly to
improve security. Penetration testers.
Types of Hackers

1: Black-Hat Hackers
•Hack without permission and often for malicious purposes (e.g., financial gain, data theft, or
damaging systems.

2:White-Hat Hackers (Ethical Hackers)


•Obtain authorization to test systems and networks for vulnerabilities.
•Use the same techniques as black-hat hackers but with the intent to improve security.
•Report vulnerabilities to the organization and may help fix them.
Types of Hackers

3:Gray-Hat Hackers
•Operate between black and white-hat hacking. They might exploit systems without permission.
•Sometimes, they report vulnerabilities to organizations, but they may demand a fee for the
information.
Ethical Hacking Process:

1:Reconnaissance,
 Gather information about the target system, such as
IP addresses and network details, to understand its
structure.

2: Scanning,
 identify potential vulnerabilities that could be
exploited.
Ethical Hacking Process:

3:Gaining Access,
 Attempt to exploit identified vulnerabilities to gain access to the system.

4: Maintaining Access,
 Hackers use to keep their connection to a compromised system after gaining initial access. This step
helps them further explore the system and gather more information about potential vulnerabilities.
Ethical Hacking Process:

5: Covering Tracks and Reporting

 compile a report detailing the vulnerabilities found, methods used, and


recommendations for securing the system.
Common tools used in various phases of the ethical hacking process:

1. Reconnaissance
 Nmap, network scanning tool used to discover hosts and services on a network

 Maltego, data mining tool for gathering information about targets, such as domain names and IP
addresses

 Google Dorking, advanced Google search operators to find sensitive data publicly available on
the web.

 WHOIS Lookup,
o To gather information about domain registration and ownership.
 Shodan,
o search engine for discovering devices connected to the internet, providing insights into
vulnerable systems.
Scanning

 Social Engineering Toolkit (SET)


o toolkit specifically designed for creating social engineering attacks like phishing and spear-phishing.

 Wireshark
o network protocol analyzer that captures and analyzes network packets

 Tcpdump
o command-line network packet analyzer that captures and displays packets transmitted over a
network
Scanning

 Nmap
Used for port scanning to find open ports and running services

 Gobuster
•A tool for directory and file brute-forcing, useful for finding hidden directories on web servers.

 Nikto
web server scanner that identifies vulnerabilities like outdated software, misconfigurations, and
default files
Scanning

 Social Engineering Toolkit (SET)


o toolkit specifically designed for creating social engineering attacks like phishing and spear-
phishing.

 OWASP ZAP
o web security scanning,

 Acunetix
o web security scanning
Gaining Access

1:Metasploit Framework
o tools for exploiting vulnerabilities and gaining access to systems

2:BurpSuite: used for exploiting web application vulnerabilities.

3:Aircrack-ng:for assessing Wi-Fi network security, often used for cracking WEP and WPA/WPA2
encryption.

4:SQLMap: An open-source tool for detecting and exploiting SQL injection vulnerabilities in web
applications.

5: BeEF (Browser Exploitation Framework)


•A tool for exploiting web browsers to assess browser-based vulnerabilities.
Maintaining Access

Metasploit (again): Can be used to create persistent backdoors on compromised systems.


Covering Tracks and Reporting

Metasploit (again): Can help document findings and vulnerabilities during the testing process.

Wireshark: A network protocol analyzer that can help identify potential tracking or logging
mechanisms.
common web vulnerabilities

1: SQL Injection
o Attackers can inject malicious SQL queries to access, modify, or delete data in a database

2: Cross-Site Scripting (XSS)


o Allows attackers to inject malicious scripts into web pages viewed by other users,
potentially stealing information or impersonating users.

3:Cross-Site Request Forgery (CSRF)


o Tricks authenticated users into submitting unauthorized requests, often performing
actions without their consent.
common web vulnerabilities

4: Broken Access Control


o Weak access control policies allow unauthorized users to access restricted resources or
actions.

5:Directory Traversal

o Attackers manipulate URLs to access files and directories outside the intended folder,
often accessing sensitive files.
common web vulnerabilities

6:Server-Side Request Forgery (SSRF)


o Attackers force the server to make unintended requests to internal or external resources,
potentially leading to data leakage

7:Clickjacking
o Hidden elements overlaid on legitimate buttons trick users into clicking, potentially
compromising accounts or data.

8:Command Injection
o Input is injected into commands executed by the server, allowing attackers to execute arbitrary
commands.
common web vulnerabilities

9:Weak Password Policies


o Insufficient password complexity or lack of password restrictions can lead to easy brute-
force attacks.

10: HTTP
o Using HTTP instead of HTTPS

11:Unrestricted File Uploads


o Poorly validated file uploads allow attackers to upload malicious files, potentially leading to
code execution.
common web vulnerabilities

12: Outdated Server Software


o Outdated servers like Apache, Nginx, or IIS may have unpatched vulnerabilities that attackers can
exploit, leading to unauthorized access, remote code execution, or denial-of-service attacks.

o Protocol and Cipher Weaknesses: Older server versions may use outdated protocols or weak
encryption ciphers, increasing susceptibility to cryptographic attacks.

13:Outdated Operating Systems (OS),


o Older OS versions, Windows 7 or outdated Linux distributions

You might also like