Computer Security pro english course

Preview:

Citation preview

Computer SecurityBy Abdo and Roberts

Professional English CommunicationNovember 2016 | DIN16SP

OAMK

Or Insecurity?

So you think you are secure?

Think again!

If you think like an attacker you can defend better...

You asking what is this colors?

Who is a hacker?

It’s not what you think it is!

Hackers are the good ones!

Crackers are the bad ones

But they keep calling bad guys “hacker” in general

because of media

And then there are colored hats!

What are their motivations?

“White hat” hacker

Operate with permission to improve security

“Grey hat” hacker

May violate ethical standards or laws, but without “bad” intentions

“Black hat” hacker

Operate with “bad” intentions, for example, personal financial gain

HacktivistsHacktivists

State sponsored hackers

Cyber warfare

Spy hackers

Security by obscurity...

How about NO?

BUT

Hackers are always one step ahead of you...

Get the mindset

Tools?

Kali linux (kali.org)

Areas?

1. Computer forensics2. Cryptography3. Reverse engineering and vulnerability analysis4. Social engineering5. Penetration testing6. Malware analysis7. Security management

Penetration testing

1. Information gathering (OSINT)2. Enumeration3. Exploit4. Report

Certifications?

1.OSCP (offensive-security.com)2.CEH3.Security+4.GIAC5.CISSPAnd ...

How to be secure?

1. password password password! 2. Updated antivirus3. Updated softwares4. Firewall5. There is no patch for human stupidity! :) lol

Brain food

1. defcon.org2. social-engineer.org3. The first book: Penetration testing By Georgia

Weidman ISBN: 978-1-59327-564-84. Vulnhub.com and other wargames and CTF5. My twitter @n3tg33k :D6. google.com

“TRY HARDER”-- offensive security

Th4nk y0u

Recommended