SlideShare a Scribd company logo
Cybersecurity
Speaker: Dr Eng Hasan Shamroukh
Cybersecurity
Cybersecurity

It is the protection of computer
systems and networks from
information disclosure, theft of
or damage to their hardware,
software, or electronic data, as
well as from the disruption or
misdirection of the services they
provide
Cybersecurity Significance

1- Due to the continuously expanding reliance on computer systems, the
Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to
the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things".

2- Cybersecurity is also one of the significant challenges in the contemporary
world, due to its complexity, both in terms of political usage and technology.
Assets

It is any resource owned or controlled by a business or an economic entity

Assets Types:

Data Assets

Financial Assets
Data Types
According to data importance
From lower security level to higher
security level
Security Triad / Security Elements
Encryption

It is converting the original representation of the information (plaintext), into an
alternative form known as (cipher text).

Wireless Application

EEA: EPS Encryption Algorithm

Types

Symmetric: one key used in Encryption & Decryption

Asymmetric: a key used in Encryption and another in Decryption
Symmetric Key Encryption
Asymmetric Encryption Example
Diffie–Hellman key exchange
It is a method of securely exchanging
cryptographic keys over a public channel
and was one of the first public-key protocols
as conceived by Ralph Merkle and named
after Whitfield Diffie and Martin Hellman.
It establishes a shared secret between two
parties that can be used for secret
communication for exchanging data over a
public network. An analogy illustrates the
concept of public key exchange by using
colors instead of very large numbers:
Integrity
It is Checking that data is not altered or
modified during Tx.
MAC = HMAC Authentic
MAC = HMAC Not Authentic
Wireless Application
TKIP (Temporary Key Integrity Protocol)
EIA: EPS Integrity Algorithm
Authentication

Username and password Verification

Protocols

PAP: Password Authentication Protocol

CHAP: Challenge Handshaking Authentication Protocol

EAP: Extensible Authentication Protocol

PEAP: Protected Extensible Authentication Protocol

FEAP: Fast Extensible Authentication Protocol

LEAP: Lightweight Extensible Authentication Protocol
Authentication Factor Types

1-Knowledge factors: Something the user knows

(e.g., a password, partial password, pass phrase, personal identification number (PIN), challenge
response (the user must answer a question or pattern), security question).

2-Ownership factors: Something the user has

(e.g., wrist band, ID card, security token, implanted device, cell phone with built-in hardware token,
software token, or cell phone holding a software token).

3- Inherence factors: Something the user is or does

(e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient),
signature, face, voice, unique bio-electric signals, or other biometric identifier).
Authentication Types
According to factors used:

1- Single Factor Authentication

2- Multi Factor Authentication
According to use
DoD (Defense of Depth)
Onion Model: The best DoD Representation
Data is the center and the most important security level
It is a concept used in Information security in which
multiple layers of security controls (defense) are placed
throughout an information technology (IT) system
DoD Controls
Physical control
Anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like.
Technical controls

hardware or software whose purpose is to protect systems and resources.

Examples: disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical
controls in that they prevent access to the contents of a system, but not the physical systems themselves.
Administrative controls

Organization's policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to
security and that regulations are met. They include things such as hiring practices, data handling procedures, and security
requirements.
Information security culture

1-Pre-evaluation: To identify the awareness of information security within
employees and to analyze the current security policies.

2-Strategic planning: To come up with a better awareness program, clear targets
need to be set. Assembling a team of skilled professionals is helpful to achieve it.

3-Operative planning: A good security culture can be established based on
internal communication, management-buy-in, security awareness and a training
program.

4-Implementation: Four stages should be used to implement the information
security culture. They are:

A-Commitment of the management

B-Communication with organizational members

C-Courses for all organizational members

D-Commitment of the employees

5-Post-evaluation: To assess the success of the planning and implementation,
and to identify unresolved areas of concern.
Incident response planning

1-Preparation: Preparing stakeholders on the procedures for handling computer
security incidents or compromises

2-Detection and analysis: Identifying and investigating suspicious activity to confirm a
security incident, prioritizing the response based on impact and coordinating
notification of the incident

3-Containment, eradication and recovery: Isolating affected systems to prevent
escalation and limit impact, pinpointing the genesis of the incident, removing
malware, affected systems and bad actors from the environment and restoring
systems and data when a threat no longer remains

4-Post incident activity: Post mortem analysis of the incident, its root cause and the
organization's response with the intent of improving the incident response plan and
future response efforts
Digital Certificate

Called also public key certificate / identity certificate

It is an electronic document used to prove the ownership of a public key

The certificate includes:

1- Key Information

2- Subject: Information about the identity of its owner

3- Issuer: Digital signature of an entity that has verified the certificate's contents
Public key infrastructure (PKI)
It is a set of roles, policies, hardware, software and
procedures needed to create, manage, distribute, use,
store and revoke digital certificates and manage public-
key encryption.
CA: Certificate Authority
RA: Registration Authority
VA: Validation Authority
Digital Signature

It is a mathematical scheme for verifying the authenticity
of digital messages or documents.

A valid digital signature, where the prerequisites are
satisfied, gives a recipient very strong reason to believe
that the message was created by a known sender
(authenticity), and that the message was not altered in
transit (integrity)

Digital Signature Schemes
Hackers
Persons skilled in information technology who
uses their technical knowledge to achieve a goal
or overcome an obstacle, within a computerized
system by non-standard means.
Penetration Testing

It is an authorized simulated cyberattack on a computer system, performed to evaluate the security of
the system

Tools

BackBox

Nmap

Metasploit Project

Nessus
Penetration Testing Phases

1-Reconnaissance: The act of gathering important information on a target system. This information can
be used to better attack the target.

For example, open source search engines can be used to find data that can be used in a social
engineering attack.

2-Scanning: Uses technical tools to further the attacker's knowledge of the system.

For example, Nmap can be used to scan for open ports.

3-Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can
use a payload to exploit the targeted system.

For example, Metasploit can be used to automate attacks on known vulnerabilities.

4-Maintaining access: Maintaining access requires taking the steps involved in being able to be
persistently within the target environment in order to gather as much data as possible.

5-Covering tracks: The attacker must clear any trace of compromising the victim system, any type of
data gathered, log events, in order to remain anonymous.
SOC (Security Operation Center)

is a facility where enterprise information
systems (web sites, applications, databases,
data centers and servers, networks,
desktops and other endpoints) are
monitored, assessed, and defended.
SOC other names

Security Defense Center (SDC)

Security Analytics Center (SAC)

Network Security Operations Center (NSOC)

Security Intelligence Center

Cyber Security Center

Threat Defense Center,

Security Intelligence and Operations Center (SIOC)

Infrastructure Protection Center (IPC)
SOC Types

SNOC, Security Network Operations Center

ASOC, Advanced Security Operations Center

GSOC, Global Security Operations Center

vSOC, Virtual Security Operations Center

CSOC, Cloud Security Operations Center

SSOC, Smart Security Operations Center
Contact me

00962796061387 call / whatsapp / imo / telegram

Email: hasannaim@yahoo.com

https://www.facebook.com/DrEngHasanShamroukh

https://www.linkedin.com/in/eccie

https://www.slideshare.net/enghasanshamroukh

https://www.youtube.com/user/enghasanccie

More Related Content

PPTX
Cybersecurity
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Introduction to Cyber Security
PPTX
CyberSecurity
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Cybersecurity - Overview
PPTX
Cybersecurity Basics.pptx
PPTX
cyber security
Cybersecurity
Cybersecurity 1. intro to cybersecurity
Introduction to Cyber Security
CyberSecurity
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cybersecurity - Overview
Cybersecurity Basics.pptx
cyber security

What's hot (20)

PDF
Cyber Security Awareness
PDF
Overview of the Cyber Kill Chain [TM]
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Introduction to Cybersecurity
PPTX
Cyber Security Best Practices
PPTX
Introduction to cyber security amos
PPT
Information security management
PPT
Information security in todays world
PPTX
Introduction to cyber security
PDF
Information Security Awareness for everyone
PPTX
Cyber security
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Cyber Threat Intelligence.pptx
PPTX
Security Policies and Standards
PPT
Information security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cyber Security 03
PPSX
Next-Gen security operation center
PPTX
Cyber security
Cyber Security Awareness
Overview of the Cyber Kill Chain [TM]
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Introduction to Cybersecurity
Cyber Security Best Practices
Introduction to cyber security amos
Information security management
Information security in todays world
Introduction to cyber security
Information Security Awareness for everyone
Cyber security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cyber Threat Intelligence.pptx
Security Policies and Standards
Information security
Network security (vulnerabilities, threats, and attacks)
Cyber Security 03
Next-Gen security operation center
Cyber security
Ad

Similar to Cybersecurity (20)

PPT
2.4.1 - Intro to Cyber Security for students.ppt
PPTX
informations_security_presentations.pptx
PPTX
Cryptography and network Security--MOD-1.pptx
PPTX
ITT408_Unit#1_InformationSecurity_Fundamentals_STUDENTS.pptx
PDF
1 info sec+risk-mgmt
PPTX
CH01-CompSec4e.pptx
PPTX
Lecture one Network Security Introduction.pptx
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Unit 1.pptx
PDF
information security introduction for campus students.pdf
PPTX
Information Security Bachelor in Information technology unit 1
PPTX
Week 01 - Cryptography and Network Security.pptx
PPTX
Ethical Hacking and Network Defence 1.pptx
PPTX
Computer security ppt for computer science student.pptx
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Information Security introduction and management.pptx
PPTX
unit -ii security1.pptx for Information system management
PDF
Chapter 1 - Introduction.pdf
PPT
M.Florence Dayana/Cryptography and Network security
PPTX
Information Security
2.4.1 - Intro to Cyber Security for students.ppt
informations_security_presentations.pptx
Cryptography and network Security--MOD-1.pptx
ITT408_Unit#1_InformationSecurity_Fundamentals_STUDENTS.pptx
1 info sec+risk-mgmt
CH01-CompSec4e.pptx
Lecture one Network Security Introduction.pptx
Cyber-Security-Unit-1.pptx
Unit 1.pptx
information security introduction for campus students.pdf
Information Security Bachelor in Information technology unit 1
Week 01 - Cryptography and Network Security.pptx
Ethical Hacking and Network Defence 1.pptx
Computer security ppt for computer science student.pptx
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Information Security introduction and management.pptx
unit -ii security1.pptx for Information system management
Chapter 1 - Introduction.pdf
M.Florence Dayana/Cryptography and Network security
Information Security
Ad

More from Eng Hasan Shamroukh CISCO Exams Author (13)

PPTX
Public Artificial Intelligence الذكاء الاصطناعي الحكومي
PPTX
Big data البيانات الضخمة
PPSX
الاستثمار الأمثل للهواتف الذكية

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...

Cybersecurity

  • 2. Speaker: Dr Eng Hasan Shamroukh
  • 4. Cybersecurity  It is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide
  • 5. Cybersecurity Significance  1- Due to the continuously expanding reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things".  2- Cybersecurity is also one of the significant challenges in the contemporary world, due to its complexity, both in terms of political usage and technology.
  • 6. Assets  It is any resource owned or controlled by a business or an economic entity  Assets Types:  Data Assets  Financial Assets
  • 7. Data Types According to data importance From lower security level to higher security level
  • 8. Security Triad / Security Elements
  • 9. Encryption  It is converting the original representation of the information (plaintext), into an alternative form known as (cipher text).  Wireless Application  EEA: EPS Encryption Algorithm  Types  Symmetric: one key used in Encryption & Decryption  Asymmetric: a key used in Encryption and another in Decryption
  • 11. Asymmetric Encryption Example Diffie–Hellman key exchange It is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman. It establishes a shared secret between two parties that can be used for secret communication for exchanging data over a public network. An analogy illustrates the concept of public key exchange by using colors instead of very large numbers:
  • 12. Integrity It is Checking that data is not altered or modified during Tx. MAC = HMAC Authentic MAC = HMAC Not Authentic Wireless Application TKIP (Temporary Key Integrity Protocol) EIA: EPS Integrity Algorithm
  • 13. Authentication  Username and password Verification  Protocols  PAP: Password Authentication Protocol  CHAP: Challenge Handshaking Authentication Protocol  EAP: Extensible Authentication Protocol  PEAP: Protected Extensible Authentication Protocol  FEAP: Fast Extensible Authentication Protocol  LEAP: Lightweight Extensible Authentication Protocol
  • 14. Authentication Factor Types  1-Knowledge factors: Something the user knows  (e.g., a password, partial password, pass phrase, personal identification number (PIN), challenge response (the user must answer a question or pattern), security question).  2-Ownership factors: Something the user has  (e.g., wrist band, ID card, security token, implanted device, cell phone with built-in hardware token, software token, or cell phone holding a software token).  3- Inherence factors: Something the user is or does  (e.g., fingerprint, retinal pattern, DNA sequence (there are assorted definitions of what is sufficient), signature, face, voice, unique bio-electric signals, or other biometric identifier).
  • 15. Authentication Types According to factors used:  1- Single Factor Authentication  2- Multi Factor Authentication According to use
  • 16. DoD (Defense of Depth) Onion Model: The best DoD Representation Data is the center and the most important security level It is a concept used in Information security in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system
  • 17. DoD Controls Physical control Anything that physically limits or prevents access to IT systems. Fences, guards, dogs, and CCTV systems and the like. Technical controls  hardware or software whose purpose is to protect systems and resources.  Examples: disk encryption, File integrity software, and authentication. Hardware technical controls differ from physical controls in that they prevent access to the contents of a system, but not the physical systems themselves. Administrative controls  Organization's policies and procedures. Their purpose is to ensure that there is proper guidance available in regard to security and that regulations are met. They include things such as hiring practices, data handling procedures, and security requirements.
  • 18. Information security culture  1-Pre-evaluation: To identify the awareness of information security within employees and to analyze the current security policies.  2-Strategic planning: To come up with a better awareness program, clear targets need to be set. Assembling a team of skilled professionals is helpful to achieve it.  3-Operative planning: A good security culture can be established based on internal communication, management-buy-in, security awareness and a training program.
  • 19.  4-Implementation: Four stages should be used to implement the information security culture. They are:  A-Commitment of the management  B-Communication with organizational members  C-Courses for all organizational members  D-Commitment of the employees  5-Post-evaluation: To assess the success of the planning and implementation, and to identify unresolved areas of concern.
  • 20. Incident response planning  1-Preparation: Preparing stakeholders on the procedures for handling computer security incidents or compromises  2-Detection and analysis: Identifying and investigating suspicious activity to confirm a security incident, prioritizing the response based on impact and coordinating notification of the incident  3-Containment, eradication and recovery: Isolating affected systems to prevent escalation and limit impact, pinpointing the genesis of the incident, removing malware, affected systems and bad actors from the environment and restoring systems and data when a threat no longer remains  4-Post incident activity: Post mortem analysis of the incident, its root cause and the organization's response with the intent of improving the incident response plan and future response efforts
  • 21. Digital Certificate  Called also public key certificate / identity certificate  It is an electronic document used to prove the ownership of a public key  The certificate includes:  1- Key Information  2- Subject: Information about the identity of its owner  3- Issuer: Digital signature of an entity that has verified the certificate's contents
  • 22. Public key infrastructure (PKI) It is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public- key encryption. CA: Certificate Authority RA: Registration Authority VA: Validation Authority
  • 23. Digital Signature  It is a mathematical scheme for verifying the authenticity of digital messages or documents.  A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authenticity), and that the message was not altered in transit (integrity)  Digital Signature Schemes
  • 24. Hackers Persons skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
  • 25. Penetration Testing  It is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system  Tools  BackBox  Nmap  Metasploit Project  Nessus
  • 26. Penetration Testing Phases  1-Reconnaissance: The act of gathering important information on a target system. This information can be used to better attack the target.  For example, open source search engines can be used to find data that can be used in a social engineering attack.  2-Scanning: Uses technical tools to further the attacker's knowledge of the system.  For example, Nmap can be used to scan for open ports.
  • 27.  3-Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can use a payload to exploit the targeted system.  For example, Metasploit can be used to automate attacks on known vulnerabilities.  4-Maintaining access: Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible.  5-Covering tracks: The attacker must clear any trace of compromising the victim system, any type of data gathered, log events, in order to remain anonymous.
  • 28. SOC (Security Operation Center)  is a facility where enterprise information systems (web sites, applications, databases, data centers and servers, networks, desktops and other endpoints) are monitored, assessed, and defended.
  • 29. SOC other names  Security Defense Center (SDC)  Security Analytics Center (SAC)  Network Security Operations Center (NSOC)  Security Intelligence Center  Cyber Security Center  Threat Defense Center,  Security Intelligence and Operations Center (SIOC)  Infrastructure Protection Center (IPC)
  • 30. SOC Types  SNOC, Security Network Operations Center  ASOC, Advanced Security Operations Center  GSOC, Global Security Operations Center  vSOC, Virtual Security Operations Center  CSOC, Cloud Security Operations Center  SSOC, Smart Security Operations Center
  • 31. Contact me  00962796061387 call / whatsapp / imo / telegram  Email: hasannaim@yahoo.com  https://www.facebook.com/DrEngHasanShamroukh  https://www.linkedin.com/in/eccie  https://www.slideshare.net/enghasanshamroukh  https://www.youtube.com/user/enghasanccie