This slide is kept blank intentionally
s
MOHAMMAD ASHFAQUR RAHMAN
ITIL-F, NCDA, HP-CSA, OCP-OSSA
ASHFAQ.SAPHAL@GMAIL.COM
Cyber Security
Road Map
Introduction
Attack & Methods
Break
Safeguard Practices
Discussion
Road Map
Introduction
 Definition
 Trends
Attack & Methods
Break
Safeguard Practices
Discussion
Definition : Cyber & Cyber Security
o Cyber
o Origin : cybernetics
o Science communication and control
o Cyber Security
o Synonyms : IT security, Computer security
o Protection of Computing System
o Focus : Hardware, Software, Information
o Outcome : Secured, Reliable, and Stable Computing
o The protection of information and its critical elements,
including systems and hardware that use, store, and transmit
that information
Definition : CIA
o CIA
o Confidentiality
o Integrity
o Availability
o Core idea of IT Security
o Design the policies
o Ensure the practice
Definition : Hacker
o Hacker
o Highly Technical Person
o Explore the system
o Asses the vulnerabilities
o Penetrate the security hole
o May person or group
Definition : Hacker
o White Hat Hacker
o Computer Security Specialist
o Protected Systems and Networks
o Test and asses security
o Black Hat Hacker
o Break the security
o Unauthorized
o Individual and/or Team
o Gray Hat Hacker
o Some time break security
o Don’t damage
Definition : Hacker
Trends : Motivation
o Profit
o Protest
o Challenge
o Enjoyment
o Improvement
Trends : Motivation
Trends : Type
Trends : Perspective Bangladesh
o ,
o
o -() -
() , ;
() , , , ;
Trends : Perspective Bangladesh
o Ransomeware
o Financial Institute
o Web Portal
o Telecom Operator
o ATM Fraud
o Site Defacement
o Group Indishell, Sil3nt Hack3r, My@nm@r H4acK3rs Unit
o Government sites were targeted (.gov.bd)
o Individual Facebook account
Trends : Perspective Bangladesh
Road Map
Introduction
Definition
Trends
Attack & Methods
 Steps
 Types
Break
Safeguard Practices
Discussion
Steps
System Individual Activity
Selection Identification Choice the target by
motivation
Foot Printing Profiling Start Study
Port Scanning Interaction Availability Check
Banner Grabbing Account Listing Identify Channel
Vulnerability Scan Weakness Identify Prepare the plan
Penetrating Account Break Grant the Access
Types : DoS & DDoS
o Machine or Network
resource unavailable
o Both in Network and
Application layer
o Popular with the HackTivist
Types : SPAM
o Send an unsolicited message
o Mail
o Messenger
o FAX
o SMS
o Technology
o SMTP
o SMPP
o BoT
Break

More Related Content

PPT
Cyber Security Awareness - file 2 of 2
PDF
Ransomware - Mark Chimely
PPTX
Browser security
PPT
WE16 - Cyber Security - Security is Everyone's Responsibility
PPTX
Password Attack
PPTX
computer viruses
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
PPTX
Cyber Security Awareness - file 2 of 2
Ransomware - Mark Chimely
Browser security
WE16 - Cyber Security - Security is Everyone's Responsibility
Password Attack
computer viruses
How to Use Open Source Intelligence (OSINT) in Investigations

What's hot (10)

PDF
Cybersecurity Awareness Training Presentation v1.1
PPTX
Information on Brute Force Attack
PPS
Internet
PPTX
Cybersecurity in communication
PPT
Anonymous internet
PPTX
Computer Security Workshop
DOCX
Cyber security tips
PPTX
EC-Council Hackway Workshop Presentation- Social Media Forensics
PDF
WHS-hackability-Index-083013
PPTX
How does Ransomware Works?
Cybersecurity Awareness Training Presentation v1.1
Information on Brute Force Attack
Internet
Cybersecurity in communication
Anonymous internet
Computer Security Workshop
Cyber security tips
EC-Council Hackway Workshop Presentation- Social Media Forensics
WHS-hackability-Index-083013
How does Ransomware Works?
Ad

Similar to Cyber Security Awareness - file 1 of 2 (20)

PDF
Ceh v8-course-outline
PDF
Certified ethicalhacking classroom_1382954076
PDF
The importance of Cybersecurity
PDF
E security and payment 2013-1
PDF
Threat intelligence notes
PPTX
BEHAVIORAL FINANCE cyber security and threat actor
PPTX
Ethical Hacking
PDF
Ethical hacking and countermeasures
PPTX
Adversary Emulation - DerpCon
PDF
Evidence-Based Security: The New Top Five Controls
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PPTX
ShadyRAT: Anatomy of targeted attack
PDF
Cisel1 d
PPTX
Ethical hacking
PPTX
50 Shapes of Network & Information Security
PPTX
ITD BSides PDX Slides
PPTX
Ethical-Hacking-ppt.pptx
PPTX
Cyber Threat Hunting Workshop
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
Ceh v8-course-outline
Certified ethicalhacking classroom_1382954076
The importance of Cybersecurity
E security and payment 2013-1
Threat intelligence notes
BEHAVIORAL FINANCE cyber security and threat actor
Ethical Hacking
Ethical hacking and countermeasures
Adversary Emulation - DerpCon
Evidence-Based Security: The New Top Five Controls
Adversary Emulation and Red Team Exercises - EDUCAUSE
ShadyRAT: Anatomy of targeted attack
Cisel1 d
Ethical hacking
50 Shapes of Network & Information Security
ITD BSides PDX Slides
Ethical-Hacking-ppt.pptx
Cyber Threat Hunting Workshop
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
Ad

More from Mohammad Ashfaqur Rahman (20)

PDF
Cyber Security Considerations for 4IR in Bangladesh
PPTX
Cyber Security For E-commerce (Infrastructure) development
PPTX
Cyber Awareness : Perspective Bangladesh & Covid-19
PPT
009.itsecurity bcp v1
PPT
008.itsecurity bcp v1
PPT
007.itsecurity bcp v1
PPT
006.itsecurity bcp v1
PPT
005.itsecurity bcp v1
PPT
002.itsecurity bcp v1
PPT
001.itsecurity bcp v1
PPT
000.itsecurity bcp v1
PDF
Business Continuty Planning and Disester Recovry Planning
PPT
013.safetymanagement v3
DOC
013.safetymanagement v3
PPT
012.safetymanagement v3
DOC
012.safetymanagement v3
PPT
011.safetymanagement v3
DOC
011.safetymanagement v3
PPT
010.safetymanagement v3
DOC
010.safetymanagement v3
Cyber Security Considerations for 4IR in Bangladesh
Cyber Security For E-commerce (Infrastructure) development
Cyber Awareness : Perspective Bangladesh & Covid-19
009.itsecurity bcp v1
008.itsecurity bcp v1
007.itsecurity bcp v1
006.itsecurity bcp v1
005.itsecurity bcp v1
002.itsecurity bcp v1
001.itsecurity bcp v1
000.itsecurity bcp v1
Business Continuty Planning and Disester Recovry Planning
013.safetymanagement v3
013.safetymanagement v3
012.safetymanagement v3
012.safetymanagement v3
011.safetymanagement v3
011.safetymanagement v3
010.safetymanagement v3
010.safetymanagement v3

Recently uploaded (20)

PPT
Enhancing Laboratory Quality Through ISO 15189 Compliance
PPTX
Thyroid disorders presentation for MBBS.pptx
PDF
Communicating Health Policies to Diverse Populations (www.kiu.ac.ug)
PPTX
02_OpenStax_Chemistry_Slides_20180406 copy.pptx
PPTX
LIPID & AMINO ACID METABOLISM UNIT-III, B PHARM II SEMESTER
PDF
CuO Nps photocatalysts 15156456551564161
PDF
Micro 4 New.ppt.pdf thesis main microbio
PDF
Packaging materials of fruits and vegetables
PDF
Traditional Healing Practices: A Model for Integrative Care in Diabetes Mana...
PPTX
ELISA(Enzyme linked immunosorbent assay)
PPTX
Preformulation.pptx Preformulation studies-Including all parameter
PDF
2019UpdateAHAASAAISGuidelineSlideDeckrevisedADL12919.pdf
PPTX
limit test definition and all limit tests
PPTX
Understanding the Circulatory System……..
PDF
Science Form five needed shit SCIENEce so
PPTX
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
PPTX
Introduction to Immunology (Unit-1).pptx
PDF
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
PDF
final prehhhejjehehhehehehebesentation.pdf
PPTX
Platelet disorders - thrombocytopenia.pptx
Enhancing Laboratory Quality Through ISO 15189 Compliance
Thyroid disorders presentation for MBBS.pptx
Communicating Health Policies to Diverse Populations (www.kiu.ac.ug)
02_OpenStax_Chemistry_Slides_20180406 copy.pptx
LIPID & AMINO ACID METABOLISM UNIT-III, B PHARM II SEMESTER
CuO Nps photocatalysts 15156456551564161
Micro 4 New.ppt.pdf thesis main microbio
Packaging materials of fruits and vegetables
Traditional Healing Practices: A Model for Integrative Care in Diabetes Mana...
ELISA(Enzyme linked immunosorbent assay)
Preformulation.pptx Preformulation studies-Including all parameter
2019UpdateAHAASAAISGuidelineSlideDeckrevisedADL12919.pdf
limit test definition and all limit tests
Understanding the Circulatory System……..
Science Form five needed shit SCIENEce so
Cells and Organs of the Immune System (Unit-2) - Majesh Sir.pptx
Introduction to Immunology (Unit-1).pptx
Integrative Oncology: Merging Conventional and Alternative Approaches (www.k...
final prehhhejjehehhehehehebesentation.pdf
Platelet disorders - thrombocytopenia.pptx

Cyber Security Awareness - file 1 of 2

  • 1. This slide is kept blank intentionally
  • 2. s
  • 3. MOHAMMAD ASHFAQUR RAHMAN ITIL-F, NCDA, HP-CSA, OCP-OSSA [email protected] Cyber Security
  • 4. Road Map Introduction Attack & Methods Break Safeguard Practices Discussion
  • 5. Road Map Introduction  Definition  Trends Attack & Methods Break Safeguard Practices Discussion
  • 6. Definition : Cyber & Cyber Security o Cyber o Origin : cybernetics o Science communication and control o Cyber Security o Synonyms : IT security, Computer security o Protection of Computing System o Focus : Hardware, Software, Information o Outcome : Secured, Reliable, and Stable Computing o The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information
  • 7. Definition : CIA o CIA o Confidentiality o Integrity o Availability o Core idea of IT Security o Design the policies o Ensure the practice
  • 8. Definition : Hacker o Hacker o Highly Technical Person o Explore the system o Asses the vulnerabilities o Penetrate the security hole o May person or group
  • 9. Definition : Hacker o White Hat Hacker o Computer Security Specialist o Protected Systems and Networks o Test and asses security o Black Hat Hacker o Break the security o Unauthorized o Individual and/or Team o Gray Hat Hacker o Some time break security o Don’t damage
  • 11. Trends : Motivation o Profit o Protest o Challenge o Enjoyment o Improvement
  • 14. Trends : Perspective Bangladesh o , o o -() - () , ; () , , , ;
  • 15. Trends : Perspective Bangladesh o Ransomeware o Financial Institute o Web Portal o Telecom Operator o ATM Fraud o Site Defacement o Group Indishell, Sil3nt Hack3r, My@nm@r H4acK3rs Unit o Government sites were targeted (.gov.bd) o Individual Facebook account
  • 16. Trends : Perspective Bangladesh
  • 17. Road Map Introduction Definition Trends Attack & Methods  Steps  Types Break Safeguard Practices Discussion
  • 18. Steps System Individual Activity Selection Identification Choice the target by motivation Foot Printing Profiling Start Study Port Scanning Interaction Availability Check Banner Grabbing Account Listing Identify Channel Vulnerability Scan Weakness Identify Prepare the plan Penetrating Account Break Grant the Access
  • 19. Types : DoS & DDoS o Machine or Network resource unavailable o Both in Network and Application layer o Popular with the HackTivist
  • 20. Types : SPAM o Send an unsolicited message o Mail o Messenger o FAX o SMS o Technology o SMTP o SMPP o BoT
  • 21. Break