0% found this document useful (0 votes)
52 views

Cyber Security

Cyber security is the practice of protecting computer systems, networks, and digital information from threats and attacks. It aims to ensure the confidentiality, integrity, and availability of data. The main goals of cyber security are to protect sensitive data, maintain system functionality, and prevent unauthorized access through measures like authentication, network security, information security, security awareness training, and security policies and disaster recovery plans. As technology and interconnection increases society's reliance on digital resources, cyber security plays a crucial role in safeguarding individuals, organizations, and critical infrastructure.

Uploaded by

shivashankarhr06
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Cyber Security

Cyber security is the practice of protecting computer systems, networks, and digital information from threats and attacks. It aims to ensure the confidentiality, integrity, and availability of data. The main goals of cyber security are to protect sensitive data, maintain system functionality, and prevent unauthorized access through measures like authentication, network security, information security, security awareness training, and security policies and disaster recovery plans. As technology and interconnection increases society's reliance on digital resources, cyber security plays a crucial role in safeguarding individuals, organizations, and critical infrastructure.

Uploaded by

shivashankarhr06
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

CYBER SECURITY

UNIT 1
INTRODUCTION TO CYBER SECURITY
---------------------------------------------------------------------------------------
“Cyber security is the practice of protecting computer systems, networks,
and digital information from various threats and attacks”.

In our increasingly digital and interconnected world, where data and information are critical
assets, cyber security plays a pivotal role in safeguarding the confidentiality, integrity, and
availability of these resources.

Cyber Security is a process that’s designed to protect networks and devices from
external threats.

Businesses typically employ Cyber Security professionals to protect their confidential


information, maintain employee productivity, and enhance customer confidence in products
and services.

The main element of Cyber Security is the use of Authentication Mechanisms.

For example, a user_name identifies an account that a user wants to access, while a
Password is a mechanism that proves the user is who he claims to be.(Authorised User)

“The technique of protecting internet-connected systems such as computers, servers,


mobile devices, electronic systems, networks, and data from malicious attacks is known
as cybersecurity”.

We can divide cybersecurity into two parts one is cyber, and the other is security.

Cyber refers to the technology that includes systems, networks, programs, and data. And
Security is concerned with the protection of systems, networks, applications, and
information.

"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."

TYPES OF CYBER SECURITY


SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY

Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.

It's also known as information technology security or electronic information security.

The term applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories.

 Network security is the practice of securing a computer network from intruders,


whether targeted attackers or opportunistic malware.
 Application security: focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.
 Information Security: protects the integrity and privacy of data, both in storage and
in transit.
 Operational Security: includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network and the
procedures that determine how and where data may be stored or shared all fall under
this umbrella.
 Disaster recovery and business continuity: define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event.
Business continuity is the plan the organization falls back on while trying to operate
without certain resources.
 End-user education: addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices.
Teaching users to delete suspicious email attachments, not plug in unidentified USB
drives, and various other important lessons is vital for the security of any organization

IMPORTANCE OF CYBER SECURITY

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

 Today we live in a digital era where all aspects of our lives depend on the network,
computer and other electronic devices, and software applications.
 All critical infrastructure such as the banking system, healthcare, financial institutions,
governments, and manufacturing industries use devices connected to the Internet as a
core part of their operations.
 Some of their information, such as intellectual property, financial data, and personal
data, can be sensitive for unauthorized access or exposure that could have negative
consequences.
 This information gives intruders and threat actors to infiltrate them for financial gain,
extortion, political or social motives, or just vandalism.
 Cyber-attack is now an international concern that hacks the system, and other security
attacks could endanger the global economy.
 Therefore, it is essential to have an excellent cybersecurity strategy to protect sensitive
information from high-profile security breaches.
 Furthermore, as the volume of cyber-attacks grows, companies and organizations,
especially those that deal with information related to national security, health, or
financial records, needs to use strong cybersecurity measures and processes to protect
their sensitive business and personal information.

The importance of cybersecurity cannot be overstated in today's digital world. As our


dependence on technology and the internet continues to grow, cybersecurity plays a crucial
role in safeguarding individuals, organizations, and society as a whole.

Here are some key reasons highlighting the importance of cybersecurity:

Protection of Sensitive Data:

Cybersecurity is essential for safeguarding sensitive information, including personal data,


financial records, trade secrets, and intellectual property. Without proper protection, this data
is at risk of theft, misuse, or exposure.

Prevention of Financial Loss:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Cyber-attacks can result in significant financial losses for individuals and organizations.
Ransomware, fraud, and data breaches can lead to direct monetary losses and damage an
organization's financial health and reputation.

Preservation of Privacy:

Cybersecurity helps maintain the privacy of individuals and organizations. In a world where
personal and business transactions occur online, protecting privacy is critical for maintaining
trust.

Business Continuity:

Cyber-attacks can disrupt business operations, resulting in downtime, loss of revenue, and
damage to a company's reputation. Effective cybersecurity measures ensure business
continuity and mitigate the impact of cyber incidents.

Safeguarding Critical Infrastructure:

Critical infrastructure, such as power grids, transportation networks, and healthcare systems,
relies on technology and connectivity. Cyberattacks on these systems can have far-reaching
consequences, affecting public safety and national security.

Prevention of Identity Theft:

Cybersecurity measures, such as strong authentication and encryption, help prevent identity
theft, which is often used for fraudulent activities and financial crimes.

Protection of Intellectual Property:

Businesses invest heavily in research and development. Cybersecurity safeguards intellectual


property, trade secrets, and proprietary information from theft and industrial espionage.

National Security:

Governments rely on secure communication and data protection to maintain national


security. cyber-attacks can disrupt military operations, intelligence gathering, and essential
government functions.

Data Breach Prevention:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Data breaches can result in reputational damage, legal liabilities, and a loss of customer trust.
Strong cybersecurity measures reduce the likelihood of data breaches and their associated
consequences.

Cyber terrorism:

Cyber terrorism poses a significant threat, as terrorists can exploit vulnerabilities to disrupt
critical services, damage infrastructure, and create fear and chaos.

Protection Against Malware and Phishing: Cybersecurity helps defend against malware
and phishing attacks, which are commonly used to deliver malicious payloads, steal
information, and compromise systems.

CYBER SECURITY GOALS

Cyber Security's main objective is to ensure data protection.

The security community provides a triangle of three related principles to protect the
data from cyber-attacks. This principle is called the CIA triad. The CIA model is designed
to guide policies for an organization's information security infrastructure. When any security
breaches are found, one or more of these principles has been violated.

We can break the CIA model into three parts: Confidentiality, Integrity, and
Availability. It is actually a security model that helps people to think about various parts of
IT security. Let us discuss each part in detail.

1. Confidentiality

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Confidentiality is equivalent to privacy that avoids unauthorized access of


information.

It involves ensuring the data is accessible by those who are allowed to use it and
blocking access to others.

It prevents essential information from reaching the wrong people. Data encryption is
an excellent example of ensuring confidentiality.

2. Integrity

This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification.

If any modifications occur, certain measures should be taken to protect the sensitive
data from corruption or loss and speedily recover from such an event.

It ensures that data has not been tampered with or altered in an unauthorized or
unintended manner. Maintaining data integrity is crucial for trust and reliability.
Techniques for ensuring integrity include data validation, checksums, and digital
signatures.

3. Availability

This principle makes the information to be available and useful for its authorized
people always.

It ensures that these accesses are not hindered by system malfunction or cyber-attacks

Availability guarantees that data and services are accessible when needed. It aims
to prevent disruptions, downtime, or unavailability of critical systems.

TYPES OF CYBER SECURITY THREATS:

A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or


steal data, gain access to a network, or disrupts digital life in general.

The cyber community defines the following threats available today:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

1. Malware:-

Malware means malicious software, which is the most common cyber attacking tool. It is
used by the cybercriminal or hacker to disrupt or damage a legitimate user's system.

The following are the important types of malware created by the hacker:

Virus: It is a malicious piece of code that spreads from one device to another. It can
clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.

Spyware: It is a software that secretly records information about user activities on


their system. For example, spyware could capture credit card details that can be used
by the cybercriminals for unauthorized shopping, money withdrawing, etc.

Trojans: It is a type of malware or code that appears as legitimate software or file to


fool us into downloading and running. Its primary purpose is to corrupt or steal data
from our device or do other harmful activities on our network.

Ransomware: It's a piece of software that encrypts a user's files and data on a device,
rendering them unusable or erasing. Then, a monetary ransom is demanded by
malicious actors for decryption.

Worms: It is a piece of software that spreads copies of itself from device to device
without human interaction. It does not require them to attach themselves to any
program to steal or damage the data.

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Adware: It is advertising software used to spread malware and displays


advertisements on our device. It is an unwanted program that is installed without the
user's permission. The main objective of this program is to generate revenue for its
developer by showing the ads on their browser.

Botnets: It is a collection of internet-connected malware-infected devices that allow


cybercriminals to control them. It enables cybercriminals to get credentials leaks,
unauthorized access, and data theft without the user's permission.

2. Phishing

 Phishing is a type of cybercrime in which a sender seems to come from a genuine


organization like PayPal, eBay, financial institutions, or friends and co-workers.
 They contact a target or targets via email, phone, or text message with a link to
persuade them to click on that links.
 This link will redirect them to fraudulent websites to provide sensitive data such as
personal information, banking and credit card information, social security numbers,
usernames, and passwords.
 Clicking on the link will also install malware on the target devices that allow hackers
to control devices remotely.

3. Man-in-the-middle (MITM) attack:

 A man-in-the-middle attack is a type of cyber threat (a form of eavesdropping attack)


in which a cybercriminal intercepts a conversation or data transfer between two
individuals.
 Once the cybercriminal places themselves in the middle of a two-party
communication, they seem like genuine participants and can get sensitive information
and return different responses.
 The main objective of this type of attack is to gain access to our business or customer
data. For example, a cybercriminal could intercept data passing between the target
device and the network on an unprotected Wi-Fi network.

4. Distributed denial of service (DDoS):

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

 It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted


servers, services, or network's regular traffic by fulfilling legitimate requests to the
target or its surrounding infrastructure with Internet traffic.
 Here the requests come from several IP addresses that can make the system unusable,
overload their servers, slowing down significantly or temporarily taking them offline,
or preventing an organization from carrying out its vital functions.

5. Brute Force

 A brute force attack is a cryptographic hack that uses a trial-and-error method to guess
all possible combinations until the correct information is discovered.
 Cybercriminals usually use this attack to obtain personal information about targeted
passwords, login info, encryption keys, and Personal Identification Numbers (PINS).

6. Domain Name System (DNS) attack

 A DNS attack is a type of cyber-attack in which cyber criminals take advantage of


flaws in the Domain Name System to redirect site users to malicious websites (DNS
hijacking) and steal data from affected computers.
 It is a severe cybersecurity risk because the DNS system is an essential element of the
internet infrastructure.

CYBERSPACE:

Cyberspace is the dynamic and virtual space that such networks of machine-clones create. In
other words, cyberspace is the web of consumer electronics, computers, and communications
network which interconnect the world.

Cyberspace is a complex and abstract term used to describe the interconnected digital
environment created by computer networks, the internet, and the vast array of information,
data, and services they contain. It's essentially a virtual domain where digital interactions,
communications, and transactions take place.

Here are some key aspects of cyberspace:

Digital Realm:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Cyberspace is entirely digital, composed of data and information stored and


transmitted electronically. It encompasses everything from websites and social media
platforms to online databases and cloud services.

Global Connectivity:

It is a worldwide network that connects people, organizations, and devices,


transcending geographical boundaries. The internet is the primary infrastructure that supports
this global connectivity.

Information Exchange:

Cyberspace is a space for the exchange of information, ideas, and communication,


enabling a wide range of activities, from social networking to e-commerce.

Evolving and Expanding:

Cyberspace is continually evolving, with new technologies, applications, and services


being developed to meet the changing needs and demands of users.

Challenges and Security Concerns:

As cyberspace has grown, so have the challenges related to cybersecurity. Protecting


digital assets and privacy from cyber threats is a critical concern.

OVERVIEW OF COMPUTER AND WEB TECHNOLOGY:

Computer and web technology are integral components of cyberspace. They underpin the
infrastructure and tools that make the digital world function. Here's an overview of computer
and web technology:

Computer Technology:

Hardware: Computers consist of physical components, including the central processing unit
(CPU), memory, storage devices, input and output devices (e.g., keyboard, monitor, mouse),
and more.

Software: Operating systems and applications provide the software framework for computer
functionality. This includes everything from the operating system (e.g., Windows, macOS,
Linux) to productivity software (e.g., Microsoft Office) and specialized applications.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY

Network Connectivity: Computers can connect to networks, whether wired (e.g., Ethernet)
or wireless (e.g., Wi-Fi), to access the internet and other networked resources.

Virtualization and Cloud Computing: Virtualization technologies allow the creation of


virtual machines, while cloud computing provides on-demand access to computing resources
over the internet.

Security: Computer technology encompasses security measures such as firewalls, antivirus


software, encryption, and user authentication to protect systems and data from cyber threats.

WEB TECHNOLOGY:

Web Browsers:

Web browsers (e.g., Chrome, Firefox, Edge) enable users to access and interact with
web content, including websites and web applications.

Web Development:

Web developers use languages like HTML, CSS, and JavaScript to create websites
and web applications. Server-side scripting languages such as PHP and Python are also
common.

Web Servers:

Web servers host websites and web applications, serving content to users' browsers
upon request.

Web Standards:

The World Wide Web Consortium (W3C) establishes standards and recommendations
for web technologies, ensuring compatibility and accessibility.

Web Services and APIs: Web services enable applications to communicate and exchange
data over the web, while Application Programming Interfaces (APIs) allow integration
between different software systems.

Responsive Design: With the proliferation of mobile devices, responsive design ensures that
websites adapt to various screen sizes and resolutions.

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

 Computer and web technology play a vital role in shaping our digital lives, from the
devices we use to access cyberspace to the websites and applications we rely on for
information, communication, entertainment, and business.
 These technologies are continually evolving to meet the ever-growing demands of a
connected and digital world.

ARCHITECTURE OF CYBERSPACE

Cyberspace does not have a physical architecture like a building or a city; rather, it is a
conceptual and abstract space comprising interconnected computer networks, systems, and
data.

The architecture of cyberspace primarily consists of the following key components:

1. Network Infrastructure:

Internet:

The internet serves as the backbone of cyberspace, connecting billions of


devices, networks, and systems worldwide. It is a global network of interconnected
networks, each with its own infrastructure.

2. Data Centers:

Data centers are facilities housing servers, storage systems, and networking
equipment. They store, process, and deliver the vast amounts of data and services that
are accessible via the internet.

3. Servers:

Servers are specialized computers that host websites, applications, and services.
Web servers, email servers, and database servers, among others, enable data and
information to be stored and accessed online.

4. Protocols and Standards:

Cyberspace relies on a set of standardized communication protocols and


technologies, such as TCP/IP (Transmission Control Protocol/Internet Protocol),

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

HTTP (Hypertext Transfer Protocol), and DNS (Domain Name System), to enable the
exchange of data between devices.

5. Software and Applications:

Various software and applications, from web browsers and email clients to
social media platforms and cloud services, allow users to access and interact with the
resources within cyberspace.

6. Web Services and APIs:

Web services and Application Programming Interfaces (APIs) enable


interoperability and data exchange between different software systems and
applications. They play a significant role in integrating and expanding cyberspace.

7. Content and Data:

Cyberspace is filled with a vast array of content, including text, images, videos,
and more, as well as structured data stored in databases and repositories.

8. Cybersecurity Measures:

Security elements, such as firewalls, encryption protocols, intrusion detection


systems, and access controls, are vital components of the architecture to protect
against cyber threats and vulnerabilities.

9. Cloud Computing:

Cloud infrastructure provides scalable and on-demand computing resources and


services, allowing organizations to host applications, store data, and perform various
tasks without the need for extensive on-premises infrastructure.

10. IoT Devices: The Internet of Things (IoT) adds a new dimension to cyberspace by
incorporating a wide range of connected devices, from smart appliances and wearable
technology to industrial sensors.
11. Network Devices and Hardware:

Routers, switches, modems, and other network hardware play a role in managing the
flow of data within cyberspace.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY

12. User Devices:

User devices, including computers, smartphones, tablets, and IoT devices, serve as
endpoints for accessing and interacting with cyberspace.

The architecture of cyberspace is dynamic, constantly evolving as new technologies


and standards emerge. The interconnectivity and complexity of these components enable the
functioning of cyberspace, allowing users to access information, communicate, conduct
transactions, and interact with digital services in a global and virtual environment.

COMMUNICATION AND WEB TECHNOLOGY

Communication and web technology are integral components of the digital world,
enabling the exchange of information and facilitating online interactions. They play a
significant role in connecting people, devices, and organizations in cyberspace. Here's an
overview of communication and web technology:

1. COMMUNICATION TECHNOLOGY:

Email:

Email technology allows individuals and organizations to send and receive electronic
messages, documents, and multimedia content. SMTP (Simple Mail Transfer Protocol) and
IMAP (Internet Message Access Protocol) are common email protocols.

Instant Messaging (IM):

IM applications and platforms enable real-time text-based communication between


individuals or groups. Examples include WhatsApp, Slack, and Microsoft Teams.

Voice over IP (VoIP):

VoIP technology allows voice communication over the internet. Services like Skype,
Zoom, and VoIP phone systems use this technology.

Video Conferencing:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Video conferencing technology enables real-time video and audio communication for
virtual meetings, webinars, and remote collaboration. Platforms like Zoom, Microsoft
Teams, and Google Meet are popular examples.

Unified Communications (UC):

UC integrates various communication channels, such as voice, video, messaging, and


email, into a single platform for seamless and efficient communication within organizations.

Social Media:

Social media platforms, like Facebook, Twitter, Instagram, and LinkedIn, provide a
space for users to connect, share content, and engage with others.

Collaboration Tools:

Tools like Microsoft 365 and Google Workspace facilitate collaborative work,
allowing users to share documents, conduct video meetings, and collaborate in real time.

2. WEB TECHNOLOGY:

Web Browsers:

Web browsers (e.g., Chrome, Firefox, Edge) allow users to access and interact with
web content, such as websites, web applications, and multimedia.

HTML (Hypertext Markup Language):

HTML is the standard markup language used to create web pages. It structures content
and defines its layout on the web.

CSS (Cascading Style Sheets): CSS is used to control the visual presentation of web
content, including fonts, colors, and layout.

JavaScript:

JavaScript is a scripting language used to add interactivity and dynamic behavior to


web pages. It enables client-side scripting in web development.

WEB DEVELOPMENT FRAMEWORKS:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Frameworks like React, Angular, and Vue.js simplify web development by providing
pre-built components and tools for creating responsive and interactive web applications.

Web Servers:

Web servers, such as Apache, Nginx, and Microsoft IIS, host websites and web
applications, serving content to users' browsers upon request.

Content Management Systems (CMS):

CMS platforms like WordPress, Joomla, and Drupal allow users to create, manage,
and publish web content without extensive coding skills.

Responsive Web Design:

Responsive design techniques ensure that websites adapt to various screen sizes and
resolutions, providing a consistent user experience on desktops, tablets, and mobile devices.

Web Services and APIs:

Web services enable applications to communicate and exchange data over the web.
APIs allow integration between different software systems and services.

Web Standards and Accessibility:

Organizations like the World Wide Web Consortium (W3C) establish standards and
guidelines for web technologies, ensuring compatibility, accessibility, and usability.

Communication and web technology are continually evolving to meet the demands of a
connected and digital world. They play a crucial role in enabling online communication,
collaboration, and access to information, services, and applications, both for individuals and
businesses.

THE INTERNET:

The internet, short for "interconnected networks," is a vast and global network of computer
networks. It's a fundamental component of cyberspace and plays a central role in modern
communication, information sharing, and access to online resources.

Here's an overview of the internet:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Network of Networks:

The internet is made up of countless interconnected networks, including local area


networks (LANs), wide area networks (WANs), and global networks. These networks use a
variety of technologies to connect and exchange data.

Protocols:

The internet relies on a set of communication protocols, the most important of which
is the Internet Protocol (IP). IP provides the addressing and routing framework necessary for
data packets to travel across the network.

Worldwide Reach:

The internet spans the globe, connecting millions of devices, computers, servers, and
other endpoints. It transcends geographical boundaries and enables communication and data
exchange across international borders.

Web:

The World Wide Web (WWW) is a prominent part of the internet, consisting of
websites and web pages linked together via hyperlinks. Web browsers, like Chrome and
Firefox, allow users to access and interact with web content.

Email:

Email is a widely used internet service that enables users to send and receive
electronic messages, documents, and multimedia content. It operates using email servers and
protocols like SMTP and IMAP.

Search Engines:

Search engines, like Google, Bing, and Yahoo, help users find information on the web
by indexing and organizing vast amounts of web content.

Online Services:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

The internet provides various online services, including social media platforms, video
streaming services, e-commerce websites, cloud storage, and more.

Cloud Computing:

Cloud computing allows users and organizations to access and use computing
resources, such as servers, storage, and software, over the internet. Popular cloud service
providers include Amazon Web Services (AWS) and Microsoft Azure.

Security:

The internet poses various security challenges, leading to the development of


cybersecurity measures like firewalls, encryption, intrusion detection systems, and user
authentication.

Evolving Technologies:

The internet continually evolves, with new technologies such as the Internet of Things
(IoT), 5G networks, and artificial intelligence (AI) having a significant impact on its
capabilities and applications.

Privacy and Regulation:

Concerns about online privacy and data protection have led to the development of
regulations like the General Data Protection Regulation (GDPR) and the Children's Online
Privacy Protection Act (COPPA).

The internet has transformed the way we communicate, work, access information,
conduct business, and entertain ourselves. Its decentralized and open architecture has made it
a fundamental tool for individuals, businesses, governments, and organizations worldwide.
Its continued evolution and expansion will shape the digital landscape for years to come.

WORLD WIDE WEB:

The World Wide Web (WWW), commonly referred to as the web, is a system of
interconnected documents and resources linked together via hyperlinks and URLs (Uniform
Resource Locators).

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

It is a fundamental component of the internet, allowing people to access and share


information, communicate, and interact with various types of content online.

ADVENT OF INTERNET

The advent of the internet is a pivotal moment in the history of technology and
communication. It has transformed the way we connect, share information, and conduct
various aspects of our lives.

Here are the key milestones in the development and history of the internet:

Origins (1950s-1960s):

The concept of a global network of interconnected computers, which would later


become the internet, had its origins in the early 1960s. The idea was to create a robust and
decentralized communication system that could withstand nuclear attacks during the Cold
War.

ARPANET (1969):

The first practical schematics for the internet came from the Advanced Research
Projects Agency (ARPA) of the U.S. Department of Defense. In 1969, ARPANET, the
precursor to the internet, was created. It linked four major U.S. universities.

Email (1971):

Ray Tomlinson, an engineer working on ARPANET, sent the first email in 1971.
Email quickly became one of the most widely used communication tools on the internet.

TCP/IP Protocol Suite (1970s):

The development of the Transmission Control Protocol (TCP) and the Internet
Protocol (IP) in the 1970s laid the foundation for modern internet communication. TCP/IP
became the standard for how data would be transmitted between multiple networks.

World Wide Web (1989):

British computer scientist Sir Tim Berners-Lee invented the World Wide Web in
1989. He introduced the concept of using hypertext to access and share information through
a graphical interface. The first website and web browser were created in 1990.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY

Commercialization (1990s):

The 1990s saw the internet's rapid expansion and commercialization. The introduction
of web browsers like Mosaic and later Netscape Navigator made the internet accessible to
the general public. E-commerce and online services started to emerge.

Dot-Com Boom (late 1990s):

The late 1990s witnessed the dot-com boom, characterized by the proliferation of
internet-based companies and the rapid rise and fall of many dot-com startups. This period
marked a significant increase in internet usage and investment.

Broadband and High-Speed Internet (2000s):

The 2000s saw widespread adoption of broadband internet, which greatly improved
internet speed and accessibility. This enabled the growth of streaming media, online gaming,
and other data-intensive applications.

Social Media and Web 2.0 (mid-2000s):

The mid-2000s brought the rise of social media platforms like Facebook, YouTube,
and Twitter. Web 2.0, a term coined to describe more interactive and user-driven websites,
became a defining characteristic of the internet.

Mobile Internet and IoT (2010s):

The 2010s saw the proliferation of smartphones and the mobile internet. This decade
also witnessed the growth of the Internet of Things (IoT), connecting everyday objects to the
internet for various applications.

Global Connectivity (Present): The internet has become an integral part of daily life,
connecting people around the world, facilitating e-commerce, online education,
telecommuting, and more. It has played a vital role in communication, information sharing,
and business development.

The advent of the internet has revolutionized virtually every aspect of modern life,
from communication and education to commerce and entertainment. Its ongoing
development and expansion continue to shape the way we live and work in the digital age.

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

INTERNET INFRACTURE FOR DATA TRANSFER AND GOVERNANCE

 Internet infrastructure for data transfer and governance plays a critical role in
managing and ensuring the secure and efficient flow of data on the internet.
 This infrastructure encompasses various components and practices that are essential
for data transfer, compliance with regulations, and the protection of user data.

Here are key elements related to internet infrastructure for data transfer and
governance:

Data Centers and Cloud Services:

Data centers and cloud platforms are central to storing, processing, and transferring
data. These facilities must adhere to strict security standards and compliance regulations to
protect data and ensure its integrity.

Encryption:

The use of encryption protocols such as SSL/TLS (for web traffic) and IPsec (for
network traffic) ensures the confidentiality and integrity of data in transit. These protocols
are essential for securing data transfers.

Privacy Regulations:

Governments and regulatory bodies enforce privacy regulations like GDPR (General
Data Protection Regulation) in the EU and CCPA (California Consumer Privacy Act) in
California. Internet infrastructure must be designed to comply with these regulations to
protect user data.

Cyber security Measures: Robust cyber security measures, including firewalls, intrusion
detection systems, and security patches, are essential for safeguarding data and protecting
against cyber threats.

Data Governance Frameworks:

Organizations implement data governance frameworks to manage data assets


effectively. This includes data classification, access controls, and data lifecycle management

Network Security:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Network security solutions, such as firewalls, VPNs (Virtual Private Networks), and
intrusion prevention systems, are critical for securing data transfer across the internet

Content Filtering and Monitoring:

Organizations and governments may implement content filtering and monitoring


solutions to ensure that data transfers comply with legal requirements and policies.

Domain Name System Security (DNSSEC):

DNSSEC is an extension of the DNS that adds a layer of security by digitally signing
DNS data. This helps protect users from DNS-related attacks and ensures data integrity.

End-to-End Encryption:

Implementing end-to-end encryption ensures that data is encrypted from the sender to
the recipient, preventing unauthorized access even by service providers.

Data Auditing and Logging:

Comprehensive data auditing and logging practices help organizations track data
transfers, access, and usage to ensure compliance and detect potential security incidents.

 Internet infrastructure for data transfer and governance is an evolving field that must
adapt to emerging regulations and cyber security threats.
 It plays a critical role in maintaining the privacy and security of data as it moves
across the internet, while also facilitating compliance with legal and regulatory
requirements.

INTERNET SECURITY

Internet security is a crucial aspect of using the internet safely and protecting your personal
and sensitive information from various threats. Here are some key points about internet
security:

Passwords:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Use strong, unique passwords for your online accounts. A strong password typically
includes a combination of letters, numbers, and special characters. Consider using a
password manager to help you generate and store complex passwords securely.

Two-Factor Authentication (2FA):

Enable 2FA wherever possible. This adds an extra layer of security by requiring a
second form of verification, such as a text message code or a biometric scan, in addition to
your password.

Secure Websites (HTTPS):

Look for the "https://" prefix in the website's address, which indicates that the
connection is encrypted. This is particularly important when sharing sensitive information or
making online transactions.

Beware of Phishing:

Be cautious of emails, messages, or websites that ask for your personal information or
financial details. Phishing attempts often mimic legitimate sources. Verify the sender's
identity and the website's authenticity.

Regular Software Updates:

Keep your operating system, web browsers, and software up to date. Updates often
include security patches that fix known vulnerabilities.

Firewalls and Antivirus Software:

Install and regularly update firewall and antivirus software to protect your device from
malware, viruses, and other online threats.

Wi-Fi Security:

Secure your home Wi-Fi network with a strong password, and consider using
encryption (WPA3) to prevent unauthorized access. Avoid using public Wi-Fi for sensitive
activities like online banking.

Data Backups:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Regularly back up your important files and data to an external drive or a cloud service.
This can help you recover your data in case of data loss due to cyberattacks or hardware
failures.

Privacy Settings:

Review and adjust the privacy settings on your social media accounts and apps to
control the information you share with others.

Email Security: Be cautious when opening email attachments or clicking on links,

REGULATION OF CYBEER SPACE

Regulating cyberspace, which includes the internet and all digital activities, is a complex and
multifaceted challenge.

Governments, international organizations, and various stakeholders have taken steps to


create rules, laws, and agreements to manage and govern activities in cyberspace.

Here are some key aspects of regulating cyberspace:

National Legislation:

Many countries have enacted laws and regulations that pertain to various aspects of
cyberspace, such as data protection, cyber security, online content, and digital commerce.
These laws vary widely from one country to another.

International Agreements: International organizations like the United Nations, the


European Union, and others have created agreements and treaties to address global cyber
issues. For example, the Budapest Convention on Cybercrime is an international treaty
focused on combating cybercrime.

Data Protection and Privacy Laws:

Many countries have introduced data protection and privacy laws, such as the
European Union's General Data Protection Regulation (GDPR). These laws aim to protect
individuals' personal information and ensure that it is handled responsibly by organizations.

Cybersecurity Standards:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Various organizations, such as the International Organization for Standardization


(ISO), develop cybersecurity standards and best practices to guide organizations and
governments in securing their digital environments.

Internet Governance:

Internet governance is the process by which policies and rules for the internet are
developed and implemented. Organizations like the Internet Corporation for Assigned
Names and Numbers (ICANN) oversee aspects of the internet's technical infrastructure and
domain name system.

Cybercrime Laws:

Many countries have laws to combat cybercrime, including hacking, identity theft, and
online fraud. These laws often address issues related to jurisdiction when crimes are
committed across borders.

Education and Awareness:

Governments and organizations often prioritize educating the public and businesses about
online safety, responsible online behavior, and cybersecurity best practices.

 Balancing regulation with the openness and innovation that make the internet valuable
is a continual challenge.
 Striking the right balance is essential to ensure that cyberspace remains a safe, secure,
and accessible environment for all users while protecting individual rights and
freedoms.
 The landscape of cyberspace regulation is dynamic and continues to evolve as
technology and digital challenges change.

CONCEPT OF CYBER SECURITY

 Cybersecurity is the practice of protecting computer systems, networks, and digital


information from theft, damage, or unauthorized access.
 It encompasses a wide range of technologies, processes, and practices designed to
safeguard digital data, systems, and infrastructure from various cyber threats.
 Here are the key concepts in cybersecurity:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Confidentiality:

Confidentiality ensures that data is only accessible to authorized individuals or


systems. This concept includes the protection of sensitive information from being viewed or
accessed by unauthorized users.

Integrity:

Data integrity ensures that information is accurate and has not been tampered with.
This involves preventing unauthorized changes, modifications, or alterations to data.

Availability:

Availability ensures that systems, data, and services are accessible and usable when
needed. Cybersecurity measures aim to prevent or mitigate disruptions that could lead to
downtime or unavailability.

Authentication:

Authentication verifies the identity of users or systems trying to access resources.


Common methods include passwords, biometrics, and multi-factor authentication (MFA).

Authorization:

Authorization defines the permissions and privileges granted to authenticated users or


systems. It restricts access to only the resources and data that a user is allowed to use.

Firewalls:

Firewalls are network security devices that monitor and control incoming and
outgoing network traffic. They act as barriers between a trusted internal network and an
untrusted external network, such as the internet.

Intrusion Detection and Prevention Systems (IDS/IPS):

IDS monitors network traffic for signs of malicious activity, while IPS can actively
block or prevent such activity.

Encryption:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Encryption transforms data into a coded format that can only be deciphered with the
appropriate decryption key. It is used to protect data during transmission and storage.

Vulnerability Assessment:

This process involves identifying and assessing potential vulnerabilities in a system or


network to proactively address security weaknesses.

Patch Management:

Regularly updating and patching software and operating systems to fix known
vulnerabilities is critical to keeping systems secure.

Phishing Prevention:

Phishing is a common social engineering attack. Preventing phishing involves user


education, email filtering, and other security measures.

Malware Protection:

Protecting against malware (malicious software) involves using antivirus software,


anti-malware tools, and safe online behaviour.

Incident Response:

Developing an incident response plan to address security breaches and cyber attacks
effectively is crucial for minimizing damage and downtime.

Cybersecurity Awareness: Education and training for employees and users are essential to
instill good security practices and behaviours.

Access Control:

Access control mechanisms, such as role-based access control (RBAC), restrict access
to systems and data based on a user's role or responsibilities.

Security Policies and Procedures:

Establishing and enforcing security policies and procedures provides a framework for
maintaining cybersecurity within an organization.

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Cyber Hygiene:

Practicing good cyber hygiene involves routine tasks like updating passwords,
applying software patches, and being cautious when clicking on links or downloading
attachments.

Security Audits and Testing:

Regular security audits, vulnerability assessments, and penetration testing are


conducted to identify and address security weaknesses.

Cyber Insurance:

Organizations may invest in cyber insurance to mitigate financial losses resulting from
data breaches and cyber incidents.

 Cybersecurity is a dynamic field that evolves to meet the ever-changing threat


landscape.
 It plays a critical role in protecting individuals, organizations, and governments from
the growing array of cyber threats and attacks.

ISSUES AND CHALLENGES OF CYBER SECURITY

Cyber security faces a wide range of issues and challenges due to the evolving nature of
technology Cybersecurity faces a wide range of issues and challenges due to the evolving
nature of, the growing sophistication of cyber threats, and the increasing reliance on digital
systems and the internet.

Some of the key issues and challenges in the field of cyber security include:

Cyber Threats:

The landscape of cyber threats is constantly evolving. New types of threats, such as
zero-day vulnerabilities, advanced persistent threats (APTs), and ransom ware, continue to
emerge, making it challenging to stay ahead of attackers.

Data Breaches:

High-profile data breaches expose sensitive information, leading to financial losses,


identity theft, and reputational damage for organizations and individuals.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY

Lack of Awareness:

Many individuals and businesses are not adequately aware of cybersecurity risks and
best practices, making them vulnerable to common threats like phishing and social
engineering.

Resource Constraints:

Many organizations, especially small and medium-sized enterprises (SMEs), have


limited resources to invest in cybersecurity, making them attractive targets for
cybercriminals.

Vulnerability Management:

Identifying and patching software vulnerabilities in a timely manner can be


challenging, leaving systems exposed to exploitation.

Internet of Things (IoT) Security:

The proliferation of IoT devices introduces new security challenges, as many of these
devices have weak security controls and can be used as entry points for cyber-attacks.

Cybersecurity Skills Gap:

There is a shortage of skilled cybersecurity professionals, making it difficult for


organizations to find and retain qualified experts to defend against cyber threats.

Ransomware:

Ransomware attacks have become increasingly common and can result in data
encryption and extortion. Paying ransoms is discouraged, but recovery can be costly.

Cloud Security:

Organizations are adopting cloud services, which require robust security measures to
protect data stored and processed in the cloud. Misconfigurations can lead to data exposure.

Supply Chain Attacks:

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

Attackers may target an organization's suppliers or service providers to gain access to


the target's systems. This challenges organizations to assess and secure their supply chain.

Artificial Intelligence and Machine Learning Threats:

Cybercriminals are using AI and machine learning for attacks, making detection and
prevention more challenging.

Privacy Concerns:

Protecting individuals' privacy is a significant challenge, given the increasing amount


of personal data collected and the potential for abuse.

Cybersecurity for Mobile Devices:

As mobile devices become ubiquitous, ensuring the security of smartphones and


tablets is essential to protect personal and corporate data.

Emerging Technologies:

New technologies like quantum computing and 5G networks may pose both
opportunities and challenges for cybersecurity.

International Cooperation:

Cyber threats often cross international boundaries, necessitating international


cooperation to combat cybercrime and cyber terrorism effectively.

Addressing these issues and challenges in cybersecurity requires a multifaceted


approach involving technology, education, policy, and collaboration among governments,
organizations, and individuals.

Cyber Security must adapt and evolve to meet the ever-changing threat landscape in
our increasingly digital and interconnected world.

****************************

SHIVASHANKAR H R Dept. of BCA


CYBER SECURITY

SHIVASHANKAR H R Dept. of BCA

You might also like