Загрузка...

Introduction to CyberSecurity

Here's a summary of the cybersecurity seminar conducted by Farukh Nizami from CTTC:
Key Topics Covered:
1. Cybersecurity Fundamentals
• CIA Triad: The foundation of cybersecurity
o Confidentiality: Protecting data from unauthorized access
o Integrity: Ensuring data isn't modified during transmission
o Availability: Keeping systems and services accessible (like bank ATMs)
2. Threat Landscape
• Threat Actors: Proper terminology instead of "hackers"
o Organized crime groups
o State-sponsored actors (North Korea, Iran)
o APT (Advanced Persistent Threat): Advanced, persistent, and targeted attacks
• Attack Vectors: Multiple entry points including internet, WiFi, and internal networks
• Common Attacks:
o DOS/DDOS: Denial of Service attacks
o Malware: Malicious software installation
o Phishing: Email attacks with malicious attachments
o Spear Phishing: Targeted phishing attacks
3. Technical Concepts
• TCP/IP Protocol: Foundation of internet communication
o TCP: Reliable transmission
o UDP: Fast transmission (used for voice)
• Vulnerabilities: System weaknesses that can be exploited
• Zero Trust: "Never trust, always verify" security model
4. Career Opportunities
• Entry-level roles: SOC Analyst, Security Analyst
• Specialized areas:
o Network Security
o Vulnerability Assessment
o Identity and Access Management (IAM)
o Incident Response
o GRC (Governance, Risk, and Compliance)
5. Certifications Pathway
• Entry-level: Security+ (CompTIA)
• Advanced: CISSP (for management roles)
• Career goal: CISO (Chief Information Security Officer)
6. Key Statistics Mentioned
• Pakistan ranks 47th in most attacked countries
• Historical note: First computer virus "Brain Virus" was created in Karachi
• Recent arrests: 29 people caught in Pakistan for cybercrime activities
• Attack data takes 17-18 minutes to destroy but can remain hidden for 6 months
7. Course Launch Announcement
CTTC announced an upcoming cybersecurity engineering course launching the following week, emphasizing practical skills over theoretical knowledge and noting that extensive programming knowledge isn't required for most cybersecurity roles.
The seminar emphasized the defensive aspect of cybersecurity rather than offensive hacking, focusing on protecting organizations from cyber threats.

Видео Introduction to CyberSecurity канала farrukh nizami
Страницу в закладки Мои закладки
Все заметки Новая заметка Страницу в заметки