$ Cyber Security: Practices and Types of Hackers
$ Ransomware Attack: WannaCry Case Study
$ Ethical Hacking: Importance and Process
Cyber Security: Practices and Types of Hackers
============================================= Table of Contents ----------------- -
[De nition and Importance of Cyber Security](#de nition) - [Best Practices for Cyber Security]
(#practices) - [Types of Hackers](#hackers) De nition and Importance of Cyber Security
-------------------------------------------- Cyber security is the practice of protecting internet-
connected systems, including hardware, software, and data, from theft, damage, or unauthorized
access. It is important to protect sensitive information and prevent nancial loss. Best Practices
for Cyber Security --------------------------------- * Install and update anti-virus and anti-malware
software * Use strong, unique passwords and enable two-factor authentication * Regularly backup
important data * Keep software and operating systems up-to-date * Use a rewall and encrypt
sensitive data * Educate employees about security best practices * Implement access controls
and user permissions * Use a virtual private network (VPN) when accessing public Wi-Fi Types of
Hackers --------------- * **Black Hat Hackers:** also known as crackers, are malicious hackers
who break into systems with the intent to steal or damage information. * **White Hat Hackers:**
also known as ethical hackers, are hackers who are hired to nd and x security vulnerabilities. *
**Grey Hat Hackers:** are hackers who operate in a legal grey area, often breaking into systems
without permission but with good intentions. * **Script Kiddies:** are inexperienced hackers who
use pre-packaged hacking tools without fully understanding how they work. * **Hacktivists:** are
hackers who use their skills to promote a social or political agenda. * **Nation-State Hackers:**
are hackers who are supported by a national government and use their skills to steal sensitive
information or disrupt critical infrastructure. It is important to be aware of these di erent types of
hackers and the threats they pose in order to implement e ective cyber security measures
Ransomware Attack: WannaCry Case Study
WannaCry Ransomware Attack Case Study
Ethical Hacking: Importance and Process (this topic will not be covered in this notes)
Cyber Security: Practices and Types of Hackers (this topic will not be covered in this notes)
WannaCry Ransomware Attack
• WannaCry is a ransomware attack that emerged in May 2017
• It spread rapidly, infecting over 230,000 computers in 150 countries in just a few days
• The attack exploited a vulnerability in the Windows operating system, speci cally in the Server
Message Block (SMB) protocol
Impact of WannaCry Attack
• Financial losses estimated to be in the hundreds of millions of dollars
• Disrupted critical services in hospitals, government agencies, and businesses
• Highlighted the importance of cyber security and the need for regular software updates and
patching
Characteristics of WannaCry Attack
• Used an exploit leaked from the NSA, known as EternalBlue
• Encrypted les on the infected computer and demanded a ransom to decrypt them
• Spread quickly using the SMB protocol to infect other computers on the same network
Prevention and Mitigation
• Regularly updating and patching software
• Implementing rewalls and access controls
• Backing up critical data and testing backup systems
fi
fi fi fi fi ff fi fi fi fifi ff