Essential Knowledge
Essential Knowledge
• Data Breaches
• Approximately 1,400 data records are compromised every minute.
This highlights the ongoing challenges in protecting sensitive
information in an increasingly digital world.
Data exposure at Pegasus Airlines
due to employee negligence
https://cybersecurityventures.com/intrusion-daily-cyber-threat-alert/
https://www.ekransystem.com/en/blog/real-life-examples-insider-threat-caused-breaches
https://www.bluefin.com/bluefin-news/biggest-data-breaches-year-2024/
Mega Breach
• https://informationisbeautiful.net/visualizations/worlds-biggest-data-
breaches-hacks/
Google Play Hack
Data Breach Statistics
let’s examine few areas to help us gain
perspective on this industry and
profession, namely;
• 1. Legitimate professions open to hackers;
• 2. The history of hacking, to give you some appreciation and perspective of our
discipline;
• 3. The legal consequences of hacking, to help keep you out of the harm’s way.
• Professions for Hackers
• Earlier for fun, lulz or profit
• By 2019, it has become a legitimate profession widely sought-after by many
organizations and governments
• Here are just a few of the legitimate employment opportunities for master hackers
as you plan your future.
Careers in
Cybersecurity
While ethical hacking can be a rewarding career path, it's
essential to understand the ethical implications and legal
frameworks that govern cybersecurity. You must always
act responsibly and within the bounds of the law.
National Security
1 Protect Critical Infrastructure
National security professionals work to safeguard critical infrastructure
like power grids, communication networks, and government systems from
cyberattacks.
Vulnerability Assessment
They use specialized tools and techniques to discover
and analyze security weaknesses.
2 Report Vulnerabilities
They document their findings and submit detailed
reports to the program administrators.
3 Receive Rewards
Organizations often offer financial rewards to bug
bounty hunters for disclosing valid vulnerabilities.
Zero-Day Exploitation
Vulnerability Discovery
Zero-day exploit developers discover and exploit
vulnerabilities in software before the vendor is aware of them.
Exploit Development
They create specialized tools and techniques to leverage
these vulnerabilities for malicious purposes.
Ethical Use
Ethical zero-day exploit developers often work with security
researchers and vendors to help patch vulnerabilities before
they are exploited.
Information Security Engineers
Security Architecture Design and implement secure
network infrastructure and
security solutions.
Legal Compliance
Ethical hackers must adhere to all applicable laws and regulations, ensuring their
actions are legal and responsible.
• 📝 Recruited by governments
• Gain access to classified information of other governments
• Information source can be governments, individuals or corporations.
• Hacktivists
• 📝 Break into government and corporate systems out of protest.
• Promotes political or social agenda.
• E.g. steal and leak data on public domain
Essential Knowledge
• The OSI Reference Model
Layer Description Technologies Data Unit
3 Network IP Packet
ARP
Description Examples
Preventative authentication, alarm bells
Detective audits, backups
Corrective restore operations
Information Security
• Usability: The GUI components used to design the system for ease of
use (GUI).
Information Security Attacks
and Attack Vectors
• Attacks = Motive (Goal) + Method + Vulnerability
• A motive originates out of the notion that the target
system stores or process something valuable and this
leads to threat of an attack on the system
• Attackers try various tools and attacks techniques to
exploit vulnerabilities in a computer system or security
policy and controls to achieve their motives
Motives behind attacks:
• Disrupting business continuity
• Information theft and manipulating data
• Creating fear and chaos by disrupting critical infrastructures
• Financial loss to the target
• Propagating religious or political beliefs
• Achieving state's military objectives
• Demanding reputation of the target
• Taking revenge
• Demanding ransom
Top InfoSec Threats
• Botnet
• Insider Attack
• Phishing
• Web Application Threat
• IoT Threats
InfoSec Threats categories:
• Access Control - what resources are protected and who can access
them
• Information Security - what can systems be used for
• Information Protection - defines data sensitivity levels
• Password - all things about passwords (how long, characters required,
etc.)
• E-Mail - proper and allowable use of email systems
• Information Audit - defines the framework used for auditing
Policy Categorizations