Week 1 Report
Week 1 Report
Name of Industry:
Name of mentor:
Week1 - From (04/06/2024) To (10/06/2024)
Types of Threats:
1. Cyber Threats:
o Malware: Software designed to cause damage (e.g., viruses, ransomware).
o Phishing: Deceptive attempts to obtain sensitive information.
o Denial of Service (DoS): Attacks aimed at making systems unavailable.
o Hacking: Unauthorized access to systems and data.
2. Physical Threats:
o Theft: Stealing physical assets like hardware or documents.
o Vandalism: Intentional damage to property.
o Natural Disasters: Earthquakes, floods, and other events causing physical
damage.
3. Insider Threats:
o Malicious Insiders: Employees or contractors intentionally causing harm.
o Unintentional Insiders: Employees inadvertently causing security breaches
through mistakes or negligence.
4. Environmental Threats:
o Climate Change: Long-term changes affecting business operations.
o Resource Depletion: Shortages of essential resources like water and energy.
5. Operational Threats:
o Supply Chain Attacks: Compromising through third-party suppliers.
o Process Failures: Inefficiencies or breakdowns in operational processes.
6. Strategic Threats:
o Market Shifts: Changes in market conditions that could negatively impact
business.
o Regulatory Changes: New laws or regulations affecting operations.
Types of Attacks :
1.Malware Attack
9. Insider Attacks
Device Hijacking: Taking control of IoT devices to use them for malicious purposes.
Botnets: Networks of compromised IoT devices used for large-scale attacks like
DDoS.
What is Hacking?
Types of Hacking:
1. Phase 1: Reconnaissance
2. Phase 2: Scanning
Methods may range from SQL injection to cross-site scripting and other
techniques. An ethical hacker’s objective is to understand the potential
damage a malicious hacker could inflict by exploiting such a vulnerability.
In the final phase, the ethical hacker meticulously covers their tracks to
evade security system detection without leaving any evidence of the
hacking process. Understanding potential methods that attackers may
employ to avoid detection is crucial during this stage. This process aids in
enhancing a target system’s capabilities for identifying intrusions.
Key Concepts:
1. Authorization:
o Ethical hackers must have explicit permission from the system owner to
perform hacking activities. This authorization distinguishes ethical hacking
from illegal hacking.
2. Legitimacy:
o Ethical hacking is conducted in a lawful and legitimate manner, following a
code of conduct and ethical guidelines.
3. Scope Definition:
o Ethical hacking activities are confined to the defined scope set by the system
owner. This includes specifying which systems, networks, and applications
are to be tested.
4. Confidentiality:
o Ethical hackers must maintain the confidentiality of any sensitive information
they access during their activities. This includes not disclosing vulnerabilities
to unauthorized parties.
5. Reporting:
o Ethical hackers provide detailed reports on their findings, including identified
vulnerabilities, potential impacts, and recommendations for remediation.
6. Non-disruption:
o Ethical hackers aim to minimize disruption to systems and services while
conducting their tests.
Network Security:
Application Security:
Web Applications: Testing for issues like SQL injection and XSS.
Mobile Applications: Securing apps on platforms like iOS and Android.
API Security: Ensuring secure API interactions.
System Security:
Physical Security:
Cloud Security:
IoT Security: