Skip to main content

Intro

Basic cyber-security concepts

Confidentiality: Only the allowed people can access the information

Integrity: Data didn't change

Availability: The information is available at any time

 

Authorization:

Authentication: 

Teams:

  • Red team
    • Attackers: Pen-testing, thread evaluation
  • Blue team
    • Defenders: Thread  hunters, security analysts, firewalls

Hacking: Using computers skills to manipulate a computer system

Hats:

  • Black
  • White
  • Red
  • Suicide hackers
  • Script kiddies
  • Cyber terrorist

Attacker motives, goals and objectives

Motives

  • Curiosity
  • Look what I've done
  • Hacktivist
  • Cyber terrorist

Attack classification