Getting Started With Cyber Security
Getting Started With Cyber Security
TABLE OF CONTENTS
1. INTRODUCTION TO CYBERSECURITY 3
What is Cybersecurity?
Need for Cybersecurity
2. CIA TRIAD 5
Con dentiality
Integrity
Availability
3. INTRODUCTION TO CRYPTOGRAPHY 7
4. ETHICAL HACKING 10
Types of Ethical Hackers
Types of Hacking
TABLE OF CONTENTS
6. CYBERSECURITY FRAMEWORKS 13
Types of Cybersecurity Framework
Components of Cybersecurity Framework
Cybersecurity Framework’s Functions
7. CYBERSECURITY TOOLS 15
8. CYBER THREATS 16
Chapter 1
INTRODUCTION TO
CYBERSECURITY
Cybercrime is a global problem that’s been dominating the news cycle. It
poses a threat to individual security and an even bigger threat to large
international companies, banks, and governments. Today’s organized
cybercrimes out shadow lone hackers of the past, now large organized crime
rings function like start-ups and often employ highly-trained developers who
are constantly innovating online attacks. With so much data to exploit out
there, Cybersecurity has become essential.
Cyberattacks can be extremely expensive for businesses to endure. In addition to financial damage
1 suffered by the business, a data breach can also inflict untold reputational damage.
Cyberattacks these days are becoming progressively destructive. Cybercriminals are using more
2 sophisticated ways to initiate cyber attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal data they
3 hold.
cybersecurity benefits
Chapter 2
CIA TRIAD
Confidentiality, Integrity, and Availability,
also known as the CIA Triad, is a model
designed to guide companies and
organizations to form their security policies.
It is also known as the AIC triad to avoid
confusion with Central Intelligence Agency
(CIA). The components of the triad are
considered to be the most important and
fundamental components of security.
2.1 Confidentiality
Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means
trying to keep the identity of authorized parties involved in sharing and holding data private and
anonymous. Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-
middle (MITM) attacks, and disclosing sensitive data. Standard measures to establish confidentiality
include:
Confidentiality Measures
Data Biometric
Encryption Verification
Two-Factor Security
Authentication Tokens
2.2 Integrity
Integrity refers to protecting information from being modified by unauthorized parties. It is a
requirement that information and programs are changed only in a specified and authorized manner.
Challenges that could endanger integrity include turning a machine into a “zombie computer”,
embedding malware into web pages, etc. Standard measures to guarantee integrity include:
integrity Measures
Cryptographic Uninterrupted
Checksums Power Supplies
2.3 Availability
Availability is making sure that authorized parties are able to access the information when needed.
Data only has value if the right people can access it at the right time. Information unavailability can
occur due to security incidents such as DDoS attacks, hardware failures, programming errors,
human errors. Standard measures to guarantee availability include:
Availability Measures
Implementing Data
Firewalls Redundancy
Chapter 3
INTRODUCTION TO
CRYPTOGRAPHY
Cryptography is the practice and study of techniques for securing communication and data in the
presence of adversaries.
Based on the type of keys and encryption algorithms, cryptography is classified under various categories.
Cryptography is broadly classified into two categories: Symmetric key Cryptography and Asymmetric
key Cryptography (popularly known as public-key cryptography).
TRANSPOSITION CIPHERS
1 In Cryptography, a Transposition Cipher is a method of encryption by which the positions held by units
of plaintext (which are commonly characters or groups of characters) are shifted according to a regular
system so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is
changed (the plaintext is reordered). Mathematically, a bijective function is used on the characters’
positions to encrypt and an inverse function to decrypt.
SUBSTITUTION CIPHER
2 Method of encryption by which units of plaintext are replaced with ciphertext, according to a fixed
system; the “units” may be single letters (the most common), pairs of letters, triplets of letters, mixtures
of the above, and so forth.
STREAM CIPHER
3 Symmetric or secret-key encryption algorithm that encrypts a single bit at a time. With a Stream Cipher,
the same plaintext bit or byte will encrypt to a different bit or byte every time it is encrypted.
BLOCK CIPHER
4
An encryption method that
applies a deterministic
algorithm along with a
symmetric key to encrypt a
block of text, rather than
encrypting one bit at a time
as in stream ciphers.
RSA ALGORITHM
RSA stands for Rivest,
Shamir, and Adelman,
inventors of this
technique. Both public
and private key are
interchangeable.
Variable Key Size (512,
1024, or 2048 bits)
Chapter 4
ETHICAL HACKING
Hacking is the process of finding vulnerabilities in a system and using these found vulnerabilities to gain
unauthorized access into the system to perform malicious activities ranging from deleting system files
to stealing sensitive information. Hacking is illegal and can lead to extreme consequences if you are
caught in the act. People have been sentenced to years of imprisonment because of
hacking. Nonetheless, hacking can be legal if done with permission. Computer experts are often hired
by companies to hack into their systems to find vulnerabilities and weak endpoints so that they can be
fixed. This is done as a precautionary measure against legitimate hackers who have malicious intent.
Such people, who hack into a system with permission, without any malicious intent, are known as
Ethical Hackers and the process is known as Ethical Hacking.
SUICIDE HACKER
A Suicide Hacker is a person who works with the intent to bring down major
corporations and infrastructure. These kinds of hackers are not scared of the
consequences of their actions as they mostly work with a vengeance in their
minds. These people are also known as hacktivists.
WEBSITE HACKING
1 Hacking a website means taking unauthorized control over a web server
and its associated software such as databases and other interfaces.
NETWORK HACKING
2 Hacking a network means gathering information about a network by
using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the
intent to harm the network system and hamper its operation.
EMAIL HACKING
3
This includes gaining unauthorized access to an Email account and using
it without taking the consent of its owner for sending out spam links,
third-party threats, and other such harmful activities.
PASSWORD HACKING
4 This is the process of recovering secret passwords from data that has
been stored in or transmitted by a computer system.
COMPUTER HACKING
5 This is the process of stealing computer ID and password by applying
hacking methods and getting unauthorized access to a computer system.
Chapter 5
PHASES OF ETHICAL
HACKING
Ethical hacking has 6 distinct phases which are not strict rules, but more like a guidelines to be followed.
P RECONNAISSANCE
H
A Reconnaissance is the process of information gathering. In this phase, the hacker gathers relevant information
S regarding the target system. These include detecting services, operating systems, packet-hops to reach the
E system, IP configuration, etc. Various tools like Nmap, Hping, Google Dorks, etc are used for reconnaissance
1 purposes.
P
SCANNING H
A
In the scanning phase, the hacker begins to actively probe the target machine or network for vulnerabilities S
that can be exploited. Tools like Nessus, Nexpose, and NMAP are widely used by hackers in this process. E
2
P
H GAINING ACCESS
A
S In this phase, the vulnerability located during scanning is exploited using various methods and the hacker tries
E to enter the target system without raising any alarms. The primary tool that is used in this process is
Metasploit.
3
P
MAINTAINING ACCESS H
This is one of the most integral phases. In this phase, the hacker installs various backdoors and payloads onto A
S
the target system. Just in case you don’t know, Payload is a term used for activities performed on a system E
after gaining unauthorized access. Backdoors help the hacker gaining quicker access onto the target system
in the future. 4
P
H CLEARING TRACKS
A
S This process is an unethical activity. It has to do with the deletion of logs of all the activities that take place
E during the hacking process. Nonetheless, Ethical Hackers still have to perform this phase to demonstrate how a
Black Hat Hacker would go about his activities.
5
P
REPORTING H
A
Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report S
with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and E
the exploit processes.
6
Chapter 6
CYBERSECURITY FRAMEWORKS
The Framework is voluntary guidance, based on
existing guidelines, and practices for organizations
to better manage and reduce cybersecurity
risk. Developed through coordinated effort
amongst business and government, the intentional
Framework comprises measures, rules, and
practices to showcase the safety of imperative
foundation. The organized, adaptable, repeatable,
and effective approach of the Framework helps
house proprietors and administrators of critical
foundations to oversee cybersecurity-related
hazards. The shown image represents the
objectives of the Cybersecurity Framework.
NIST FRAMEWORK
4 A Framework for improving critical infrastructure Cybersecurity with a goal to improve organization’s
readiness for managing cybersecurity risk by leveraging standard methodologies and processes.
IDENTIFY
1 The Identify Function helps with building up a hierarchical comprehension in overseeing cybersecurity to
frameworks, individuals, resources, information, and capacities.
PROTECT
2 The Protect Function diagrams proper shields to guarantee the conveyance of basic foundation
administrations. This underpins the capacity to restrict or contain the effect of a potential Cybersecurity
occasion.
DETECT
3 The Detect Function characterizes the fitting exercises to recognize the event of a Cybersecurity occasion.
This empowers opportune revelation of Cybersecurity occasions.
RESPOND
4 The Respond Function incorporates proper activities to make a move in regards to a distinguished
Cybersecurity occurrence. It bolsters the capacity to contain the effect of a potential Cybersecurity
occurrence.
RECOVER
5 The Recover Function distinguishes proper exercises to keep up plans for versatility and to re-establish
any abilities or administrations that were impeded because of a Cybersecurity event.
Chapter 7
CYBERSECURITY AND
ETHICAL HACKING TOOLS
Threats are constantly evolving and, just like everything else, tend to follow certain trends. The best
defenses need to mirror those trends so users get the most robust protection against the newest
wave of threats. This chapter lists the Cybersecurity tools that have stood still through thick and thin
against various kinds of cyber-attacks. Since there is a multitude of tools spread out across the
various domains of Cybersecurity, here we have listed down one tool from each domain.
best tools
Chapter 8
Chapter 9
FREQUENTLY
ASKED
INTERVIEW
QUESTIONS
Cybersecurity is the only domain in IT that has not faced a
recession yet. With the increased demand, there is also
competition, and to get a job as Cybersecurity Professional,
you need to be one of the best. While having the necessary
Cybersecurity skills is half job done, cracking the interview
is another chapter altogether. To help you crack the
Cybersecurity interview, we’ve compiled this list of top
Cybersecurity interview questions.
GUIDANCE
to prevent attacks by 'fixing' potential threats before they are exploited by
malicious users.
Cybersecurity Architects
Cybersecurity The job of Cybersecurity Architect
Specialists is a senior-level position
responsible for planning, designing,
testing, implementing and
By monitoring, detecting, maintaining an organization's
investigating, analyzing, and computer and network security
responding to security events, infrastructure.
Cybersecurity Specialists protect
systems from cybersecurity risks,
threats, and vulnerabilities.
Cybersecurity specialists work in Security Administrator
IT teams that are dedicated to
protecting the integrity of the A Security Administrator is the
business's network and data. point person for a cybersecurity
team. They are typically
responsible for installing,
administering and troubleshooting
an organization's security
Cybersecurity solutions. They also write up
security policies and training
Engineers
documents about security
procedures for colleagues.
Cybersecurity Engineers,
sometimes called information
security engineers, identify
threats and vulnerabilities in
Penetration Testers
systems and software, then
apply their skills to developing A Penetration Tester, often known
and implementing high-tech as an IT Pen Tester or Ethical
solutions to defend against Hacker, is responsible for probing
hacking, malware and and exploiting any IT security
ransomware, insider threats and vulnerabilities in a client's IT
all types of cybercrime. networks, systems and websites.
www.edureka.co/cybersecurity-certification-training
www.edureka.co/comptia-security-plus-certification-training
www.edureka.co/post-graduate/cybersecurity
LEARNER'S REVIEWS
Had great time at Classes. "Edureka aptly named, gives Detailed and extensive course
Cybersecurity is such a the students a Eureka" content, Harsha has depth of
complicated course. Moment during the course. knowledge of subject with practical
Learning is a world to explore experience, explaining the content
Instrcutor-Fahad is well-
and Edureka provides us with and demo, also the support team
resourced and Excellent
the navigation maps. I never are awesome providing necessary
communication which made for a minute felt that I am and support as and when needed,
the Learning Easier doing this course online away definitely recommend to some one,
from the faculty and the staff. who is looking forward to sharpen
skill set.
2500+ Technical
Blogs
3000+
Video Tutorials on
YouTube
30+
Active
Free Monthly
Community Webinars
WWW.EDUREKA.CO/CYBERSECURITY
About Us
There are countless online education marketplaces on the internet. And there’s us. We
are not the biggest. We are not the cheapest. But we are the fastest growing. We have
the highest course completion rate in the industry. We aim to become the largest
online learning ecosystem for continuing education, in partnership with corporates
and academia. To achieve that we remain ridiculously committed to our students. Be it
constant reminders, relentless masters or 24 x 7 online technical support - we will
absolutely make sure that you run out of excuses to not complete the course.