Rakesh Jain Profile picture
Oct 25, 2021 33 tweets 8 min read Read on X
Cyber Security Basics!

#infosec

A Mega Thread 👇 PC: cyberoregon
What is Cyber Security?

Cybersecurity is a way of protecting the network, computers, and other electronic gadgets from cybercriminals. The Malicious attackers might delete, modify or leak confidential information posing a huge threat to a business or an individual. PC: abacustechnologies
What is Cyber Crime?

Here are some examples of Cyber Crime:

1. Identity Theft

2. Online Predators

3. BEC ("Business Email Compromise")

4. Ransomware

4. Stealing of sensitive intellectual property
Who are Cyber Criminals?

1. State-sponsored groups targeting organizations in other countries

2. Hacking Groups out to target companies to make them pay ransom

3. Kids in their rooms doing illegal hacking PC : travelers.com
Cyber Security Branches -

1. Network security
Network security refers to a set of rules and configurations to protect network traffic and data. They prevent data theft by monitoring network connections. PC: data-flair.com
2. System security
Safeguard d system & OS from malicious intrusion, modification, & Virus.

3. Application security
Protects apps from being hijacked.

4. Information security
Secures sensitive info from unauthorized access & prevents misuse, disclosure, or destruction of data.
5. Web security
Protects a web application from security breaches from unauthorized personnel.

6. Mobile security
Protection of all gadgets associated with wireless computing like smartphones tablets and laptops.
Cyber Criminals and their types -

1. Script kiddies
These are thrill-seekers and enthusiasts who want to be a hacker but lack technical expertise.

2. Spammers
These criminals spam your inbox with bulk messages. They try to steal your data and perform fraudulent activities.
3. Hacker groups
These are Informal communities that work anonymously with the same motive of breaking the security of a target.

4. Phishers
Phishers try to gain personal details like usernames and passwords. They present themselves as trustworthy entities to obtain this info.
5. Insiders
Disloyal individuals within an org who r willfully stealing, damaging or exposing internal data of an org.

6. Advanced Persistent Threat (APT) Agents
They perfectly execute organized crimes against a target by a longterm presence on a nw to mine highly sensitive data
7. Identity Thieves

They steal the identity of another person without their knowledge to commit fraud like making financial transactions.
Types of Cyber Threats/Attacks -

Based On the attacker’s motivation cyber attacks can be classified into two types.

A. Passive attack

The attacker’s motivation is to gain confidential information without affecting the system resources or threatening the victim. PC: techdifferences
B. Active attack

The attacker modifies the information and causes a threat to system resources causing damage to the integrity of the system. PC: techdifferences
Types/methods employed by cybercriminals to breach security -

1. Malware
Malware is malicious software made by the hacker to damage a genuine user’s system. It usually spreads when you install rogue software or click an infected link or email.
The different types of malware are:

A. Virus
A virus is a self-replicating computer program that spreads through the computer system infecting other clean files. PC: codeproject
B. Trojan horse

A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. PC: enterprise.comodo.com
C. Spyware

A code that secretly captures user activities like internet usage data and makes use of the tracked information for fraud purposes. PC: cheapsslsecurity
D. Ransomware

Ransomware is malware that employs encryption to hold a victim's information at ransom.

A user or organization's critical data is encrypted so that they cannot access files, databases, or applications.

A ransom is then demanded to provide access. PC: securityintelligence
E. Botnets

Botnets are devices connected over the internet. It is used for Launching Distributed Denial of Service (DDoS) on the user’s website or to steal data. PC: kasperskydaily
2. SQL injection

SQL injection runs a Structured Query Language code in the database of a website to access sensitive data like private customer details. PC: miro.medium.com
3. Phishing

Method where cybercriminals steal user data like login credentials and credit card numbers by duping like a trusted party. It is simply launched via email or a text message. PC: ozon.io
4. Man-in-the-middle attack

MitM attack is of eavesdropping nature, where the unauthorized third party secretly intercepts the communication between two parties. PC: wallstreetinv
5. Denial-of-service attack

The attacker cuts down all messages directed to a specific destination. This is done by disrupting a whole network or overloading it with messages to degrade performance. PC: 1tskcg39n5iu1jl9xp2ze2ma-wpengine.netdna-ssl.com
6. Scareware

D attacker scares d user & tricks him into purchasing an anti-virus. Once installed by d user, it starts throwing msgs on d screen that ur system is under fire & throws d victim into a panic. Den it redirects a victim to a bogus website to shop for an anti-virus. PC: academy.avast.com
7. Keylogger

Keylogger is a code that downloads the log of all the keystrokes of the system. It is sent to the hacker’s computer, to access sensitive information like user ids and passwords. PC: vpnoverview
What is RISK?

Risk refers to the calculated assessment of potential threats to an organization’s security and vulnerabilities within its network and information systems.
What is THREAT ?

Threat is what an organization is defending itself against.

Few examples - malware that plants dangerous executables in your software and ransomware that locks up your systems to specially targeted hacker attacks.
What is Vulnerability?

Vulnerabilities are the gaps or weaknesses that undermine an organization’s IT security efforts, e.g. a firewall flaw that lets hackers into a network.
How to safeguard against all this ?

Cyber Security Methods -

1. Data Loss Prevention (DLP)
DLP software spots data breaches by ensuring end users do not send sensitive information outside the corporate network.
2. Cloud Security
Protection of data stored in cloud platforms.

3. Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS)
Monitors the network to identify potentially malicious activity and reports to the management.
4. Identity and Access Management (IAM)
Set of policies for managing the access privileges for the individual users in the network.

5. Encryption
Process of encoding raw data into unreadable form to prevent theft in transit.
6. Antivirus/anti-malware
Software that finds and removes viruses and malware from the system.

7. Proxies
It is a hub between the user and the internet. It allows the user to conceal the network id by hiding the user’s IP address.
8. Firewall
Uses a set of predefined rules to set barriers against untrusted networks.

9. Cyber Liability Insurance
Covers financial losses and operational liability from data theft or breaching.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Rakesh Jain

Rakesh Jain Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @devops_tech

Nov 21
Platform Engineer vs. SRE vs. DevOps Engineer!

A Thread 🧵
1/ What’s the difference? 🤔
All these roles focus on improving software delivery and reliability but have different goals. Here’s a quick breakdown:
2/ Platform Engineer 👷
👉 Goal: Make life easier for developers.
• Build tools & platforms (e.g. CI/CD pipelines, Kubernetes)
• Standardize workflows for efficiency
• Create self-service systems so developers can work faster

🛠️ They focus on improving developer productivity.
Read 9 tweets
Sep 12
AWS service limitations to keep in mind!

A List of critical #AWS services and their limitations 👇 Image
1. EC2 – Instance limits by region, instance type restrictions.
2. RDS – Max database storage limits, instance size restrictions.
3. S3 – Max object size is 5TB, bucket policies can limit access.
4. EBS – Volume size max of 64TB, 20,000 IOPS for io1/io2 volumes.
5. IAM – Max 5,000 roles per account, policy size limits.
6. Lambda – Max execution timeout of 15 minutes, memory max 10GB.
7. DynamoDB – Partition throughput limits, item size max of 400KB.
8. CloudFormation – 200 resources limit per stack.
Read 13 tweets
Sep 9
Mastering Ansible command line!

A Thread of 10 key #Ansible commands and concepts all #DevOps and #Linux Administrators should focus on 👇👇 Image
1️⃣ Check Ansible Version

Command:
ansible --version

Explanation:
Verify your Ansible installation and check version details.
2️⃣ Ping All Hosts

Command:
ansible all -m ping

Explanation:
Ping all hosts in your inventory to ensure they are reachable.
Read 18 tweets
Sep 5
🧵 Mastering Docker Troubleshooting: 15 Key Tips for Developers and DevOps Engineers!

A Thread 👇👇 Image
1/ 🐳 Check Container Status
Use docker ps -a to view all containers and their statuses. A container may have exited unexpectedly.
Look at STATUS and RESTART policies to identify potential issues.
2/ 🔍 Inspect Logs
Run docker logs <container_name> to see the container logs.
This helps troubleshoot crashes, errors, or other issues within the app or service.
Read 18 tweets
Sep 3
🧵 Mastering Dockerfile: A Breakdown of 15 most important Parameters!

A thread 👇👇 Image
1️⃣ FROM:
The first instruction in any Dockerfile. It defines the base image for subsequent instructions.

FROM ubuntu:20.04 - Starts with an Ubuntu 20.04 image.
2️⃣ LABEL:
Adds metadata to the image, such as author or version.

LABEL maintainer="you@example.com" - Tags the image with your contact info.
Read 18 tweets
Aug 30
🧵 Kubernetes Security Master Guide! 🔐 Image
1️⃣ Role-Based Access Control (RBAC)

📜 Limit access with RBAC! Define who can do what in your cluster by setting up roles and bindings. Keep permissions tight!

Example:
kubectl create rolebinding developer --clusterrole=edit --user=dev@example.com -n dev-namespace
2️⃣ Network Policies

🌐 Control traffic flow between pods using Network Policies. Limit communication to what's needed, reducing the attack surface.
Example: A policy that only allows inbound traffic from specific pods: Image
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(