Académique Documents
Professionnel Documents
Culture Documents
The first step is to recognize the problem that is causing the security issue, for example,
we have to recognize whether there is a denial of service attack or a man in the middle
attack.
The next step is to evaluate and analyze the problem. We have to make sure we isolate all
the data and information that may have been compromised in the attack.
Finally, after evaluating and analyzing the problem, the last step is to develop a patch that
actually solves the problem and brings back the organization to a running state.
Cyber security penetration testing tools :
• Metasploit
• Nmap
• Wireshark
• Air crack-ng
• John the ripper
• Burp suite
Principles of cyber security
There are at least three main principles behind cyber security.
Confidentiality involves any information that is sensitive and should only be shared with a limited
number of people.
Integrity involves keeping information from being altered.
Availability involves ensuring those who rely on accurate information are able to access it. Availability
is often related to integrity, but can also involve things like a cyber attack preventing people from
accessing specific computers, or from accessing the internet.
Why cyber security affects everyone?
• Cyber security doesn’t involve just businesses and the government. Your
computer, tablet and cellphone probably contain information that hackers and
other criminals would love to have, like other people’s email addresses, names
and birthdates.
•Phishing
•Malware
•SQL injection
•Password Attack
Phishing
Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email. The
goal is to steal sensitive data like credit card and login information, or to
install malware on the victim’s machine.
Malware