Cyber Security
Introduction
Introduction
The term Cyber security consists of two terms:
Cyber: Related to computers, networks, and the internet.
Security: Protection against threats, attacks, and unauthorized access.
in a nutshell, Cybersecurity = protecting systems, networks, and data from unauthorized access, attacks, damage, or theft.
Cybersecurity began in the 1960s–70s with early concerns about securing time-sharing systems and ARPANET.
In the 1980s, the first computer viruses like "Elk Cloner" appeared, prompting the creation of antivirus software.
The 1990s saw the rise of the internet, leading to widespread threats such as:
Worm: a small hidden program for penetrating a network to cause slowness
Trojan: a small program that acts as a legal one for penetrating a network to cause slowness
Firewalls: a defensive model for the new trends
IDS: Intrusion detection systems were introduced to monitor and detect
In the 2000s, more sophisticated threats emerged, including phishing, botnets, and state-sponsored attacks like Stuxnet.
The 2010s marked a surge in ransomware, data breaches (e.g., Equifax), and Advanced Persistent Threats (APT). In the 2020s, cybersecurity focuses on Zero Trust architectures, cloud and IoT security, AI-powered threats, and global cyber warfare.
Standards like NIST, ISO 27001, and GDPR have played a crucial role in shaping cybersecurity frameworks and policies.
Cybersecurity's main goals are to secure organization assets(Computers, network, applications, and data
Hardware
Machine
Routers
Network
Applications
Databases
Files:
Assets
Database files
To achieve that, the organization should achieve the following objectives:
CIA in cybersecurity is not USA (Central Intelligence Agency): وكالة الاستخبارات المركزية
CIA is the triangle that represents the key security aspects, that any security solution should cover and consider:
Confidentiality: Data is secured
As per the authentication and authorization
There are three types of authentication:
Something you know: like a password (Should be known)
Something you have: like an access card(Should be stolen)
Something you are: like biometric fingerprint and face detection(Strongest)
How to secure:
Authentication/Authorization should take place
Encryption for sensitive data, so data should be classified
XSS: prevent cross-site scripting.
Integrity: Data not altered
No one can access it
No one can modify it
Sample: MITM(Man in the middle), can inspect the traffic, see the objects and calls, and update before submitting
`How to resolve:
OWASP
Zero trust approach
Availability: Can authorized users access it
DDoS: Hackers can send an unlimited number of requests to consume servers' resources
How to resolve
Rate Limitingtests
WAF solutions
Performance/regression testing that test the system under the highest volume of requests
Business rate limiting (Block after n Trials)
Defense in Depth is a cybersecurity strategy that uses multiple layers of protection to reduce the risk of a successful attack. The idea is: if one layer fails, others still stand.
So, since the hacker is cross-disciplined and skilled, you should consider that attacks can come from all different layers, and from all different types.
So, Strong authentication is not sufficient, and this is one of the myths.
The key layers of defense that should take place for hardening, monitoring, and testing:
Frontend
Communication
Gateway level
API level
Database level
Data-level
Infrastructure level
Security governance model
In order to move forward, the enterprise should do the following:
Architecture governance (Hardening): For all levels mentioned in Defense in depth
Security Audits (SAST)
Pen Testing(DAST)
Incident Management
Continuous improvement
Vulnerability is a weakness that makes a threat possible
Example: weak password, which leads to threats
Threat is any potential occurrence, malicious or otherwise, that could harm an asset. In other words, a threat is any bad thing that can happen to your assets
Example: Getting access to the payroll data despite the mentioned weak password
Attack is an action that exploits a vulnerability or enacts a threat
Hacker attack the system and use the weak password vulnerability
Countermeasure. A safeguard that addresses a threat and mitigates risk
Preventive: Like the zero trust principle
Detective: Like WAF
Corrective: After the occurrence
Hardening: a preventive approach that targets reducing the attack surface of a system by removing unnecessary services, permissions, and vulnerabilities, and enforcing secure configurations.
Hijacking: To steal something from the client or the server
Phishing
Fake emails or messages to steal credentials or sensitive info
User training, MFA, email filtering (SPF, DKIM, DMARC)
Malware
Malicious software (viruses, trojans, worms, etc.)
You should have Antivirus, EDR, software updates, restricted access
Ransomware: Encrypts data and demands ransom, you should have Backups, EDR, least privilege, behavior-based detection
Spyware is a type of malicious software that secretly monitors and collects data from a user's device without their knowledge or consent.
Spoofing: Impersonation (IP, email, DNS, etc.), you should have SSL/TLS, SPF/DKIM/DMARC, DNSSEC
Botnet: Network of compromised devices used for attacks, you should have Network monitoring, firewalls, and IoT security controls
Rootkit: Malware that hides in the system/root level, you should have Kernel-level protection, file integrity monitoring
Social Engineering: Manipulating people to leak confidential data, you should have Employee training, verification procedures, and phishing simulations
APT: Advanced Persistent Threat — long-term, stealthy attack, you should use Network segmentation, anomaly detection, threat hunting
Zero Day: Unknown vulnerabilities that developers or users are not aware, so defense is not effective.
Science: as it has well-known practices
Grounded in Mathematics & Logic: Cryptography, hashing, and formal verification use algorithms and proofs.
Repeatable Methods: Security assessments, penetration testing, and forensic analysis follow standardized methodologies (e.g., NIST, ISO 27001).
Risk Models: Uses probability, game theory, and threat modeling (e.g., STRIDE, DREAD).
Art: as it studies human behavior and simulates hacker's mindset
Creative Thinking: Attackers use unpredictable tactics (social engineering, zero-days), and defenders must think like hackers.
Human Behavior: Understanding user habits, psychology, and organizational culture is crucial.
Adaptive Responses: No system is 100% secure—security teams must improvise during incidents.
Continuous learning curve, to attack and defend, like chess game.
Identify: For assets
Classify
Threat modeling
Protect: The hardening of asset security
Potential threats
Hardening
Detect: Incidents
Continuous monitoring for the environment and solutions
Detection phase
Respond: With a plan
Short term
Long term
Defense in depth
Recover: Normal operations
Defensive Security: Goal: Protect systems, prevent, detect, and respond to attacks according to concrete threat modeling process
Network monitoring (SIEM, SOC)
Identity & Access Management (IAM, MFA)
Securing infrastructure (Firewalls, EDR, Microsegmentation)
Incident Response & Forensics
Blue team responsibility
Offensive Security: Goal: Simulate attackers, find and exploit vulnerabilities
Penetration Testing
Social Engineering (Phishing, Pretexting)
Exploit Development
Red team responsibility
Hardening: a preventive approach that targets reducing the attack surface of a system by removing unnecessary services, permissions, and vulnerabilities, and enforcing secure configurations.
In another meaning, Hardening = proactive security configuration & cleanup to reduce risk. It’s foundational to building secure systems and complements monitoring & response.
Examples of Hardening:
OS: Disable unused accounts & services, patch vulnerabilities
Database: Remove default users, restrict permissions, enable encryption
Network: Close unused ports, configure firewalls & IDS/IPS
Applications: Remove debug code, enforce strong auth, validate input
Physical
Guards
Dogs
Access Cards
Face Detection
Technical
DAC: Dictionary access controls
MAC: Mandatory access controls
RBAC: Role-based access control
Rule-Based access control
ABAC: Attribute-based access control
Federated Identity: IAM
Administrative
Policies, Processes, and Procedures
Background checks
Job rotation
Mandatory vacations
Objective 1: Improve Incident Response
KR1: Reduce MTTR by 30%
KR3: Conduct 2 tabletop exercises this quarter
Objective 2: Strengthen System Hardening
KR1: Reach 95% patch compliance within 7 days
KR2: Disable unused ports/services on 100% of servers
KR3: Review 100% of privileged accounts by Q2
KR4: DB Hardening 85%
KR4: App Hardening 85%
KR4: Network & Infrastructure Hardening 85%
Objective 3: Enhance Access Control
KR1: Enforce MFA for all staff accounts
KR2: Apply RBAC across all business applications
KR3: Complete IAM audit of cloud services
Objective 4: Reduce Phishing Risks
KR1: Launch monthly phishing tests
KR2: Achieve <3% employee click rate
KR3: Ensure 100% staff complete security training
Objective 5: Strengthen Cloud Security Posture
KR1: Deploy a Cloud Security Posture Management (CSPM) tool
KR2: Remediate all critical cloud misconfigurations
KR3: Encrypt 100% of cloud storage buckets
Number of Vulnerabilities by Severity (Critical/High/M dium)
% of Data Encrypted (in transit and at rest)
Frequency of Firewall Rule Changes
Malware Detections per Endpoint
% of Users with Multi-Factor Authentication (MFA) Enabled
Average Patch Deployment Time
% of Third-Party Vendors Assessed for Risk
Number of Data Loss Prevention (DLP) Events Triggered
% of APIs Protected by API Gateway or WAF
Number of Security Alerts Triaged vs. Ignored
Mean Time to Detect (MTTD)
Mean Time to Respond (MTTR)
Number of Security Incidents per Month
% of Systems with Up-to-Date Security Patches
% of Employees Completing Security Awareness Training
Number of Clicks in Phishing Simulations
Endpoint Protection Coverage Rate
Number of Failed Login Attempts
Time to Revoke Access After Offboarding
Regulatory Compliance Score (e.g., NIST, ISO 27001)
1. “Hackers only target big companies”
Myth: Small businesses are safe.
Reality: Small organizations are often easier targets due to weaker defenses, because of revenge and reputation.
2. “Cyberattacks are always high-tech”
Myth: Hackers only use sophisticated coding attacks.
Reality: Most breaches start with simple human mistakes—phishing links, weak passwords, or unsecured devices.
3. “Once secure, always secure”
Myth: Security measures don’t need regular updates.
Reality: Threats evolve—security must be continuously monitored and improved.
4. “Hackers are all outsiders”
Myth: Only external attackers cause problems.
Reality: Insider threats (malicious or accidental) account for a large share of breaches.
5. “Developers only take the responsibility for securing solutions”
Myth: Only development team will be able to secure the solution.
Reality: it's shared responsibility across enterprise stakeholders, starting from physical security, to technology solutions, product owners, architects, DBAs, developers, should add the Hacker Persona to their model to apply defense in depth concepts.
5. “Cybersecurity is only an IT problem.”
Myth: Only the IT department needs to care.
Reality: Everyone is a target—phishing, social engineering, and weak passwords affect all employees.
7. “Strong passwords are enough.”
Myth: One complex password makes you safe.
Reality: Multi-factor authentication (MFA) is essential—passwords alone can be stolen.
8. “Antivirus is all you need.”
Myth: Installing antivirus software guarantees security.
Reality: Modern threats require layered defenses—firewalls, endpoint detection, patching, monitoring, and user training.
Beginners:
CompTIA Security+ : Core cybersecurity knowledge (ideal first cert)
GSEC – GIAC Security Essentials: Broader beginner/intermediate security understanding.
Intermediate:
CEH – Certified Ethical Hacker, Ethical hacking & penetration testing
CISA – Certified Information Systems Auditor, Security auditing & compliance
AWS Certified Security – Specialty, AWS-focused cloud security
CRISC – Risk and Information Systems Control,
Risk & control governance.
Expert level
CISM – Certified Information Security Manager, Enterprise security governance
CCSP – Certified Cloud Security Professional, Advanced cloud security across providers
OSCP – Offensive Security Certified Professional, Advanced hands-on penetration testing
CISSP – Certified Information Systems Security Professional, Enterprise security architecture, policies, leadership
Dr. Ghoniem Lawaty
Tech Evangelist @TechHuB Egypt