Intro
Basic cyber-security concepts
Confidentiality: Only the allowed people can access the information
Integrity: Data didn't change
Availability: The information is available at any time
Authentication:
Teams:
- Red team
- Attackers: Pen-testing, thread evaluation
- Blue team
- Defenders: Thread hunters, security analysts, firewalls
Hacking: Using computers skills to manipulate a computer system
Hats:
- Black
- White
- Red
- Suicide hackers
- Script kiddies
- Cyber terrorist
Attacker motives, goals and objectives
Motives
- Curiosity
- Look what I've done
- Hacktivist
- Cyber terrorist
Attack classification