Cybersecurity Essentials-Chania-C1-correct
Cybersecurity Essentials-Chania-C1-correct
Cybersecurity Essentials-Chania-C1-correct
Some Numbers
Κ.Κουμάκης - Ημέρα Ασφαλούς Διαδικτύου 2019
Cybersecurity Essentials
Hackers: Users:
• Financial Gain • Are in harry
• Proof of Capability • Make Mistakes
• Fame • wrong judgment
• Curiosity • Show good faith
• “Not going to happen to me” attitude • “Not going to happen to me” attitude
Source:
BlackHat USA 2016 BenchMarks
Cybersecurity Essentials
Cyber Security Milestones
Personal data
Cybersecurity Essentials
Most Common Threats and Attack Techniques
Stalkerware: A special kind of Spyware
Ransomware Threats grow through time
BRUTE FORCE ATTACK
WHAT IT DOES
Brute Force Attacks refer to a trial and error
method utilized to find the username and
password mixes in order to gain access to an
account
Pretexting
Fake phone
calls
Phishing
…
SOCIAL ENGEENIRING
Spam
Adware
Pharming
…
VIRUSES
MALWARE RANSOMWARE
KEYLOGGERS
SPYWARE
… Can get to our
PC through
Warm (Copies It’s Pharming/Phishi
… shelf to many
ng techniques
Files/ Machines
Uses Anti-
Analysis Uses Installers
Techniques not / DownLoaders
to get to spread
exterminated WannaCry
RansomWare
…
(2017)
…
Not really a
Could be an Uses Trojan Virus, but
attach on SPAM Horses to hide often
mails mentioned as
0ne
TECHNIQUES, METHODS AND CATEGORIES OVERLAPING
• Cryptography
• Virtual Private Networks (VPN)
• Deep Web – Dark Web
• Internet of Things (IoT)
• General Data Protection Regulation (GDPR)
• Firewall
• Vulnerabilities
• ….
ADITIONAL RESOURCES
Free Course on edX
www.edx.org/course/cyber-security-basics-a-hands-on-approach
• Free of charge
• Understanding Videos
• Studying Material/Tests/Exams
• Starts from Essential Level of knowledge
ADITIONAL RESOURCES
Thank You!