CYBERSECURITY FOR BEGINNERS: Essential Skills and Best Practices to Safeguard Your Digital World (2024 Guide)
()
About this ebook
Enter the critical realm of cybersecurity with "Cybersecurity for Beginners." This comprehensive guide is tailored for those new to the field, providing you with the knowledge and tools needed to protect your digital assets from cyber threats. Whether you're a student, professional, or simply someone who wants to stay safe online, this book demy
CLIFFORD GILL
Clifford Gill is a seasoned cybersecurity professional with over 15 years of experience in the industry. Based in New York, he has worked with numerous Fortune 500 companies to enhance their cybersecurity measures and protect their digital assets. Gill is passionate about educating others and has authored several books and articles on cybersecurity, aiming to make the field accessible to beginners and experts alike.
Related to CYBERSECURITY FOR BEGINNERS
Related ebooks
Cybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment Rating: 0 out of 5 stars0 ratingsBlockChain Technology & Blueprint Ultimate Guide: Learn Everything You Need To Know For Beginners & Experienced Rating: 0 out of 5 stars0 ratingsETHICAL HACKING GUIDE-Part 2: Comprehensive Guide to Ethical Hacking world Rating: 0 out of 5 stars0 ratingsReal-World Cryptography Rating: 4 out of 5 stars4/5Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5CompTIA Security+: Securing Networks Rating: 0 out of 5 stars0 ratingsPractical Cryptography in Python: Learning Correct Cryptography by Example Rating: 0 out of 5 stars0 ratingsApplication and Implementation of DES Algorithm Based on FPGA Rating: 0 out of 5 stars0 ratingsImplementing Cryptography Using Python Rating: 0 out of 5 stars0 ratingsBeginning Ethereum Smart Contracts Programming: With Examples in Python, Solidity, and JavaScript Rating: 0 out of 5 stars0 ratingsAPI Security: A guide to building and securing APIs from the developer team at Okta Rating: 0 out of 5 stars0 ratingsCisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA Rating: 0 out of 5 stars0 ratingsMastering Kali Linux Wireless Pentesting Rating: 3 out of 5 stars3/5Tarsnap Mastery: IT Mastery, #6 Rating: 0 out of 5 stars0 ratingsSecurity+ Boot Camp Study Guide Rating: 5 out of 5 stars5/5BeagleBone for Secret Agents Rating: 5 out of 5 stars5/5Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Network Attacks Rating: 5 out of 5 stars5/5Wireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5Wireless Hacking Basics for Beginners Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5SOA Security Rating: 0 out of 5 stars0 ratingsA First Course In Ethical Hacking Rating: 0 out of 5 stars0 ratingsSSL/TLS Under Lock and Key: A Guide to Understanding SSL/TLS Cryptography Rating: 4 out of 5 stars4/5Hacking of Computer Networks: Full Course on Hacking of Computer Networks Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5MC Microsoft Certified Azure Data Fundamentals Study Guide: Exam DP-900 Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for CYBERSECURITY FOR BEGINNERS
0 ratings0 reviews
Book preview
CYBERSECURITY FOR BEGINNERS - CLIFFORD GILL
1
Chapter 1 Confidentiality
We shall refer to the combined concepts of secrecy, integrity, and availability as the CIA.
You may have heard the name CIA
used in a number of security plans. To explain privacy,honesty, availability, and let’s start discussing confidentiality.
The word confidentiality
is frequently associated with encryption, and when we discuss encryption, we’re discussing the capacity to conceal or privateize our data. Occasionally, we may refer to a virtual private network (VPN) network, with the intention of maintaining privacy. There are a number of encryption methods at our disposal.
We’ll discuss algorithms and other related topics when we get into cryptography principles, but for the time being, it would be helpful to discuss them in a little more detail now. We may utilise 56-bit encryption, often known as Data Encryption Standard, or DES.
Another encryption standard that we have access to is 3DES, which uses 168-bit encryption. Additionally, there is Advanced Encryption Standard, or AES. AES has encryption options of 128 bits, 192 bits, or 256 bits and we still adhere to those principles now.
These days, 3DES and AES are more suitable than DES. As DES has become less capable of providing high levels of security, you’re probably not going to want to use it anymore. Our data is hidden using various encryption techniques, and doing so requires the usage of a key.
Prior to discussing keys, it is important to recognize that there are two distinct kinds of keys. We possess both an asymmetric and symmetric key. Symmetric keys refer to the usage of the same key for encryption as well as decoding. A symmetric key can be used for real-time exchange for specific algorithms since it can happen fast.
Assuming, for illustration, that we have a VPN tunnel, we should first set up a PC to reside behind our VPN gateway. We have some sort of link out on the internet, and the VPN gateway may be a Cisco firewall. On the other end, there can be an additional Cisco firewall, and On that side, we wish to communicate with a server using our PC.
Our plan is to have the firewalls construct encryption on our behalf. This will include creating a tunnel between them and encrypting our data in real time. That data will be sent in plain text or accurate data, but We will have encrypted data once it reaches the firewall’s interface.
The encrypted data is then transferred in real-time over the network. When it reaches the firewall on the other end, the symmetric key is used to decode the data, allowing us to communicate with the server with clear data once more. Usually, we utilize this.
If we are discussing asymmetric algorithms, we should be discussing the Rivest, Shamir, and Adleman algorithm (RSA) or simply the RSA algorithm. In this instance, we employ a public and private key pair. Public and private, and it’s critical to recognize the distinction because of this.
While asymmetric algorithms are useful for encrypting data and perhaps decrypting it at a later time, they are not always the best choice for real-time encryption. RSA algorithms are another option we have for authentication. This concludes our high-level summary of secrecy.
We may offer secrecy using various encryption techniques, and we’ll soon go deeper into the ideas of cryptography, but for now this is only a general summary of what secrecy offers for us.
2
Chapter 2 Integrity
Ensuring that data has not been altered is the goal of integrity, and more especially, data integrity. We must be able to confirm the accuracy of our data. Typically, we employ a hash function of some kind to confirm the accuracy of our data. Essentially, there are two key protocols that we would examine. We have Secure Hash Algorithm, or SHA, and Message Digest 5, or MD5. While SHA is a 160-bit hash if we’re using SHA-1, MD5 is a 128-bit hash; nevertheless, we have access to more SHA techniques.
Let’s say we have our data and we wish to confirm that it hasn’t been altered. We wish to confirm the data’s integrity. Thus, this is what we can accomplish. We take the information and duplicate it. We accept that a copy of the data, which we will then subject to a hash method.
It may be compared to a funnel, and the funnel could be MD5 or SHA. Following that, we run it through any hash technique we’re using, and when it’s finished, the date will appear with this huge jumbled collection of almost absurdity. This is due to the fact that it is a hash, which is unreadable. The actual data is now associated to the hash, allowing us to transfer it across the network. Next, we take that hash and attach it to the original data. They can confirm the data’s integrity there. We get data that comes across the network from the other side, and whether it is encrypted or not, it has a hash. The method we’ll be utilizing is known to the other party, therefore The key is already with them. For the purposes of this example, let’s assume that the other side already possesses those keys. We will talk about the specifics of the key exchange process later.
Our network use MD5 or SHA as well. What occurs is that they take the data, replicate it, and run the copy through the hash algorithm. Finally, they take the hash we supplied and see if it matches the hash that they produced. If so, we can confirm that no changes have been made to the data while it has been in transit.
Here’s another way we might explain how this operates. Consider that you are sending a pal a box. Let us imagine that we have this parcel, that we are going to package it and deliver it to our friend via a shipping firm. Transport mechanisms will exist regardless of the firm we select, and once we give the product to this mode of transportation, we have no control over it. Since we are unable to view the package, we are unaware of the state of the data. As a result, we grab the box and place it on the scale. We know how much it weighs when it departs since our scale indicates that it weighs 10 kg. We Print a shipping label that includes the weight and the TO
and FROM
addresses in addition to the other information.
We can now assume that this weight represents the integrity hash. I can determine that it weighs 10 kg since we have a scale. After applying a sticker on the exterior of our box, we fixed that. Next, our shipment guy arrives, and After he scoops it up, it is on its way. Now that it has reached the other side, this box is delivered. After I mailed this box to my buddy, he calls to let me know that it arrived, yet just getting there is insufficient. I have to be certain that integrity is still unbroken. How then do I go about doing that? My friend will examine the shipping label and see that the package weighs ten kilograms.
He is going to take the box that I just delivered, weigh it on his scale, and determine whether it weighs 10 kg. If not, he will be aware that something went wrong with this box while it was in route. Now let’s
claim that the crate weights just 5 kg when it arrives. That certainly is a serious issue. We would now realize that there was some sort of difficulty during transportation and that the shipment is no longer legitimate because we lost 5 kg along the route.
In the context of data networking, if the integrity hash fails and the package is a VPN, we will discard it. We’re not going to read it and we don’t want to interact with it because it’s not what we anticipated that it would be. That’s what we call integrity. Ensuring data integrity simply involves having a mechanism of confirming that the data hasn’t been altered.
3
Chapter 3 Availability
Availability, To put it simply, the business cannot function if our systems are unavailable. That’s how easy it is. Ensuring that our devices are accessible within the network is the essence of availability. That implies Because in order to offer redundancy for high availability, we must both maintain our hardware and have a strategy in place for a partial failover.
A variety of factors are related to availability. In order to ensure that we are utilizing reliable software without any related hazards, it is imperative that we do tasks such as upgrades and adhere to a vendor’s upgrade route.
Cisco, for instance, does a great job of informing us about risks that are now active or when a certain software version needs to be updated. Consequently, ensuring that we implement system upgrades as necessary.
Ensuring that a network has the necessary bandwidth also contributes to its availability. even essential to confirm that bottlenecks are being avoided. The overabundance of data can also cause issues if it causes a decline in traffic causing the network to go down.
To put it plainly, availability refers to the fact that we ensure the network is available since without it, we are unable to carry out operations. When we discuss some of the network dangers later on, some of these threats will focus on a network’s availability.
A denial of service attack is one instance of it. An attempt to stop the network or devices on it from offering the required services would be known as a denial of service attack. Now that we have a solid understanding of availability, confidentiality, and integrity, let’s go on and examine SIEM technology.
4
Chapter 4 Security Incident Events and Monitoring
Before we talk about SIEM, or Security Incident Events, and monitoring technologies, let’s talk about logging for a moment. A secure network must include logs as they are essential for recording information for troubleshooting or for Auditing policy compliance has advantages.
There will always be some kind of policy in place in a secure network, and we must audit it to make sure we’re adhering to its requirements. Logging, then, is what makes this possible for us. The majority of our security devices include logging, so we can utilize the data we collect to identify attacks that are ongoing and determine when they began. Let’s take an example where we have a firewall that can transmit log data to many locations. It can communicate it by console cable, TELNET, or SSH, often known as secure shell, to our CLI, or command-line interface.
We receive logging notifications, but unless we’re in the thick of troubleshooting, we usually don’t want that. Additionally, logs can be sent to the buffer, which is an internal storage area. Should we provide information to the internal storage location, our available storage space is one factor to take into account. Some of the older logs will need to be overwritten if that buffer fills up. We can also transmit data to Flash, another site for storage, although storage issues still arise there as well. The other two possibilities available to us are distant options.
utilizing a Syslog server is one method; utilizing SNMP, or Simple Network Management Protocol, is the other. These would be distant choices where we would transmit the data to a server, and we frequently Give them the name log collector server.
Your data may be being collected by a log collector and displayed on a particular Syslog server. We also have our firewall, which has data-sending capabilities. However, we also have more networking hardware, such switches, routers, and security hardware like Cisco ACS and Cisco ISE.
Although Cisco ACS is no longer maintained, many businesses are still utilizing the ACS server, as far as I can tell. In any case, we have a large number of devices, but the majority of them often have the same kind of logging capabilities. However, One thing to keep in mind while using these logging features is that while the structure is same, the log messages are typically not. Thus, for instance, the logging messages you receive from the Cisco ASA Firewall, a Cisco ASR router, or a Cisco 9300 switch will differ significantly from those from the Cisco ISE. This implies that this Log collection server will include several files, or at the very least, a wide variety of message kinds.
Rather than categorizing all those distinct output types, we may utilize SIEM technology to gather all that information from separate SNMP or Syslog services. The SIEM system will then correlate the information to provide us with the capacity to use such knowledge. With SIEM technology, we could log all of the data in one place and take appropriate action from there. SIEM is able to aggregate data and issue alerts for specific purposes. Generally speaking, we may configure various