Cybersecurity Essentials-Chania-C1-correct

Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

Cybersecurity Essentials

Common Terms for Common People


What this presentation is about (and NOT)
• Oriented to non- • Not for System Admins
of medium/large scale
professionals of IT Networks
• Intends to inform us • Not to train us for the
for common threats Cyber Crime
Investigation Unit
• …in order to advise • …or to transform us to
students, parents, Black Hat Hackers
colleagues • We will not cover
relative issues of digital
• We will only talk about dangers such us Cyber
digital attack issues Bullying, Fake News,
Sexting, etc
Overview of the presentation
• Some Numbers
• “Hackers”: Who and Why?
• Cyber Security milestones
• Common Cyber Attack concepts and techniques
• Let’s share a story
• Some more Terms
• Additional Resources
• Quiz Game
Cybersecurity Essentials

Some Numbers
Κ.Κουμάκης - Ημέρα Ασφαλούς Διαδικτύου 2019
Cybersecurity Essentials

Hacking and Hackers


Cyber Security = Hacking?
Who it might be?
The Hacking Game: It is in our Human Nature

Hackers: Users:
• Financial Gain • Are in harry
• Proof of Capability • Make Mistakes
• Fame • wrong judgment
• Curiosity • Show good faith
• “Not going to happen to me” attitude • “Not going to happen to me” attitude
Source:
BlackHat USA 2016 BenchMarks
Cybersecurity Essentials
Cyber Security Milestones
Personal data
Cybersecurity Essentials
Most Common Threats and Attack Techniques
Stalkerware: A special kind of Spyware
Ransomware Threats grow through time
BRUTE FORCE ATTACK

WHAT IT DOES
Brute Force Attacks refer to a trial and error
method utilized to find the username and
password mixes in order to gain access to an
account

• Dictionaries are being used


• Automated software can perform millions of trials in minutes
• Potentially can hack every existing account, but…
• …demands a very long time for strong passwords
• “old – school”, but still popular method
Cybersecurity Essentials
Are you a little confused?
TECHNIQUES, METHODS AND CATEGORIES OVERLAPING

Are you a little confused?

• Malware categories are not quite clear


• Some infections adopts characteristics from many categories
• Combination of methods/techniques on many attacks
Spam

Pretexting

Fake phone
calls
Phishing


SOCIAL ENGEENIRING

Spam

Adware
Pharming


VIRUSES

MALWARE RANSOMWARE

KEYLOGGERS

SPYWARE
… Can get to our
PC through
Warm (Copies It’s Pharming/Phishi
… shelf to many
ng techniques
Files/ Machines

Uses Anti-
Analysis Uses Installers
Techniques not / DownLoaders
to get to spread
exterminated WannaCry
RansomWare

(2017)

Not really a
Could be an Uses Trojan Virus, but
attach on SPAM Horses to hide often
mails mentioned as
0ne
TECHNIQUES, METHODS AND CATEGORIES OVERLAPING

Are you a little confused?

• Malware categories are not quite clear


• Some infections adopts characteristics from many categories
• Combination of methods/techniques on many attacks
MALWARE CATEGORIES AND THEIR DISTRIBUTION
LET’S SHARE AND PLAY

• Recall on a Cyber-Attack story that has happened to you or a close person.

• Share your story with us!

• We shall try to recognize (or assume) characteristics in order to categorize it


botnet.global.sonicwall.com/view
GENERAL SECURITY ADVICES
• I keep my device’s Operating System updated
• I use current and updated Cyber - Defense software
• I do not use public devices for very important tasks
(eshoping, ebanking, etc)
• I choose different, unpredictable passwords, do not share
them, and change them occasionally
• I choose “two factor” verification, if optional

...I think twice before I click!


SOME MORE TERMS….
…that every Cyber-Security presentation should contain

• Cryptography
• Virtual Private Networks (VPN)
• Deep Web – Dark Web
• Internet of Things (IoT)
• General Data Protection Regulation (GDPR)
• Firewall
• Vulnerabilities
• ….
ADITIONAL RESOURCES
Free Course on edX
www.edx.org/course/cyber-security-basics-a-hands-on-approach
• Free of charge
• Understanding Videos
• Studying Material/Tests/Exams
• Starts from Essential Level of knowledge
ADITIONAL RESOURCES

• Free courses on Coursera, edX, etc


• Training at opensecuritytraining.info
• Educational Articles from Varonis.com
• Educational Articles from other Security Companies
Cybersecurity Essentials
Common Terms for Common People

Thank You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy