Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
×
1 of 7

Introduction to cybersecurity

0

Share

Download to read offline

Cybersecurity II

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Introduction to cybersecurity

  1. 1. Introduction to Cybersecurity Gaurav Yadav IIITS
  2. 2. OS security System security (user level) System security (kernel level) Encryption explicitly Decryption explicitly Web Secuirty Browser Security Malware analyst (static / dynamic) Network security Wireless security Android security IoT security Forensics and incident response Fields of Cybersecurity
  3. 3. Type of Hackers Script Kiddies Suicide Hackers Black-Hat Hackers White-Hat Hackers Gray-Hat Hackers
  4. 4. The Hacking Process Footprinting > Scanning > Enumeration > System Hacking > Escalation of Privilege > Covering Tracks > Planting Backdoors Information Gathering
  5. 5. Types of Testing Black Box White Box Gray Box
  6. 6. Why Vulnerabilities Arise?
  7. 7. Requirements Computer Networking Cryptography Operating Systems Command Line Programming languages Hypervisors System Administration Personal Digital Security

×