Intro to Cyber Security - Basics

Intro to Cyber Security - Basics

INTRO TO CYBER SECURITY - BASICS Easy Cyber Sec - The Best Cybersecurity Training in your language www.easycybersec.com Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 This book aims to introduce you to the basic concepts of ethical hacking & cybersecurity. As the title says, this is just an informational book, for more detailed contents and learning join us at Easy Cyber Sec. 1 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 Contents Introduction .................................................................................................................................................. 6 How Seriously Should You Take Threats to Network Security? ................................................................ 7 Threats, Vulnerability, Attacks .................................................................................................................. 9 Vulnerabilities ....................................................................................................................................... 9 Threats ................................................................................................................................................ 12 Exploits ................................................................................................................................................ 13 Pivoting ............................................................................................................................................... 14 Statistics .................................................................................................................................................. 15 Malwares..................................................................................................................................................... 17 Case Study ............................................................................................................................................... 17 Introduction ............................................................................................................................................ 23 Malware .................................................................................................................................................. 24 Why They Want Your Workstation ..................................................................................................... 25 Intent Is Hard To Detect ...................................................................................................................... 26 It’s A Business ...................................................................................................................................... 27 Elk Cloner ............................................................................................................................................ 29 A Brief History Of Malware ................................................................................................................. 31 Computer Virus ....................................................................................................................................... 35 Attack Phase ........................................................................................................................................ 37 Boot Sector Virus ................................................................................................................................ 38 Macro Virus ......................................................................................................................................... 40 Executable Infectors............................................................................................................................ 41 Multipartite Virus ................................................................................................................................ 43 Encrypted Virus ................................................................................................................................... 44 Polymorphic Viruses ........................................................................................................................... 44 Sparse Infector Virus ........................................................................................................................... 45 Spacefiller Virus................................................................................................................................... 45 Batch Files ........................................................................................................................................... 46 Worm ...................................................................................................................................................... 48 Trojan Horse ............................................................................................................................................ 54 Bots, Botnets and Zombies ..................................................................................................................... 68 2 www.easycybersec.com Join us today for the best hacking course Phone: +91 – 9597723169 WhatsApp: +91 – 9791956182 Logic bombs ............................................................................................................................................ 71 Adware .................................................................................................................................................... 73 Spyware ................................................................................................................................................... 74 Rogue Security Software ......................................................................................................................... 77 Keyloggers ............................................................................................................................................... 78 Form Grabbing ........................................................................................................................................ 81 Typosquatting ......................................................................................................................................... 82 Spoofing .................................................................................................................................................. 82 Phishing ................................................................................................................................................... 85 Spamming ............................................................................................................................................... 88 Sniffing .................................................................................................................................................... 89 Pharming ................................................................................................................................................. 89 Man-in-the-Middle.................................................................................................................................. 90 Repudiate ................................................................................................................................................ 90 Zero Day Vulnerability............................................................................................................................. 91 Ransomware ............................................................................................................................................... 92 Denial of service ........................................................................................................................................ 106 Ping Flood Attack .............................................................................................................................. 108 Smurf Attack ..................................................................................................................................... 109 Ping of Death ..................................................................................................................................... 110 SYN flood ........................................................................................................................................... 111 Distributed Denial of Service ............................................................................................................ 113 Advanced Persistent Threats .................................................................................................................... 114 What is an APT? .................................................................................................................................... 115 How relevant are APTs? ........................................................................................................................ 116 How do APT attacks work? ................................................................................................................... 116 Phase 1: Incursion ............................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    179 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us