Introduction to
Cybersecurity lab
By Nayla Greige
What is Cybersecurity ?
•Definition:
Cybersecurity is the practice of protecting your digital information
from threats and attacks while you’re using the internet.
•Importance:
With more people going online, the number of security threats
that can cause harm is also growing.
COMMON CYBER ATTACKS
Ransomware
• Ransomware is harmful software that locks your files or makes them
unreadable. The hacker demands money to unlock them.
• Example: Your photos and documents are suddenly locked. You
receive a message asking for $500 in cryptocurrency to get a code to
unlock them.
Botnet Attacks
• A botnet is a group of infected computers controlled by a hacker.
These computers can be used to perform harmful actions.
• Example: Your computer is used to send out thousands of junk emails,
causing trouble for others.
Social Engineering
• Social engineering tricks people into giving away personal
information. It relies on manipulating people rather than using
technical methods.
• Example: You get a call from someone pretending to be from your
bank, asking for your account number and password.
Cryptocurrency Hijacking
• Cryptocurrency hijacking is when hackers secretly use your computer
to mine cryptocurrencies without your knowledge.
• Example: Your computer runs slowly and your power bill is higher.
Later, you discover malware was using your computer to mine
cryptocurrency.
Phishing
• Phishing is a scam where hackers trick you into giving them your
personal information by pretending to be someone you trust.
• Example: You receive an email that looks like it’s from your email
provider, asking you to click a link to 'verify your account.'
KEY CONCEPTS OF CYBER SECURITY
The CIA Triad
•Confidentiality: Ensures that only authorized individuals can access
specific information, keeping it secret from unauthorized users.
•Integrity: Ensures that the data remains accurate and unaltered during
storage or transmission, preventing unauthorized changes.
•Availability: Ensures that information and systems are accessible to
authorized users when needed, without interruptions.
IN THIS LAB ….
TOPICS YOU WILL LEARN :
•Experiment 1: Linux Security Basics
•Experiment 2: Environment Variable and Set-UID
• Experiment 3: Encryption
•Experiment 4:Bash vulnerability
•Experiment 5: Generate shell code
•Experiment 6: Buffer Overflow
•Experiment 7: Sniffing & Spoofing
•Experiment 8: ARP cache poisoning
•Experiment 9: TCP attack
GRADING :
• ATTENDANCE & CLASS PARTICIPATION: 10%
• REPORTS : 45%
• PROJECT: 30%
• QUIZZES : 15%