Cyber Security
Cyber Security
UNIT 1
INTRODUCTION TO CYBER SECURITY
---------------------------------------------------------------------------------------
“Cyber security is the practice of protecting computer systems, networks,
and digital information from various threats and attacks”.
In our increasingly digital and interconnected world, where data and information are critical
assets, cyber security plays a pivotal role in safeguarding the confidentiality, integrity, and
availability of these resources.
Cyber Security is a process that’s designed to protect networks and devices from
external threats.
For example, a user_name identifies an account that a user wants to access, while a
Password is a mechanism that proves the user is who he claims to be.(Authorised User)
We can divide cybersecurity into two parts one is cyber, and the other is security.
Cyber refers to the technology that includes systems, networks, programs, and data. And
Security is concerned with the protection of systems, networks, applications, and
information.
"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
The term applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories.
Today we live in a digital era where all aspects of our lives depend on the network,
computer and other electronic devices, and software applications.
All critical infrastructure such as the banking system, healthcare, financial institutions,
governments, and manufacturing industries use devices connected to the Internet as a
core part of their operations.
Some of their information, such as intellectual property, financial data, and personal
data, can be sensitive for unauthorized access or exposure that could have negative
consequences.
This information gives intruders and threat actors to infiltrate them for financial gain,
extortion, political or social motives, or just vandalism.
Cyber-attack is now an international concern that hacks the system, and other security
attacks could endanger the global economy.
Therefore, it is essential to have an excellent cybersecurity strategy to protect sensitive
information from high-profile security breaches.
Furthermore, as the volume of cyber-attacks grows, companies and organizations,
especially those that deal with information related to national security, health, or
financial records, needs to use strong cybersecurity measures and processes to protect
their sensitive business and personal information.
Cyber-attacks can result in significant financial losses for individuals and organizations.
Ransomware, fraud, and data breaches can lead to direct monetary losses and damage an
organization's financial health and reputation.
Preservation of Privacy:
Cybersecurity helps maintain the privacy of individuals and organizations. In a world where
personal and business transactions occur online, protecting privacy is critical for maintaining
trust.
Business Continuity:
Cyber-attacks can disrupt business operations, resulting in downtime, loss of revenue, and
damage to a company's reputation. Effective cybersecurity measures ensure business
continuity and mitigate the impact of cyber incidents.
Critical infrastructure, such as power grids, transportation networks, and healthcare systems,
relies on technology and connectivity. Cyberattacks on these systems can have far-reaching
consequences, affecting public safety and national security.
Cybersecurity measures, such as strong authentication and encryption, help prevent identity
theft, which is often used for fraudulent activities and financial crimes.
National Security:
Data breaches can result in reputational damage, legal liabilities, and a loss of customer trust.
Strong cybersecurity measures reduce the likelihood of data breaches and their associated
consequences.
Cyber terrorism:
Cyber terrorism poses a significant threat, as terrorists can exploit vulnerabilities to disrupt
critical services, damage infrastructure, and create fear and chaos.
Protection Against Malware and Phishing: Cybersecurity helps defend against malware
and phishing attacks, which are commonly used to deliver malicious payloads, steal
information, and compromise systems.
The security community provides a triangle of three related principles to protect the
data from cyber-attacks. This principle is called the CIA triad. The CIA model is designed
to guide policies for an organization's information security infrastructure. When any security
breaches are found, one or more of these principles has been violated.
We can break the CIA model into three parts: Confidentiality, Integrity, and
Availability. It is actually a security model that helps people to think about various parts of
IT security. Let us discuss each part in detail.
1. Confidentiality
It involves ensuring the data is accessible by those who are allowed to use it and
blocking access to others.
It prevents essential information from reaching the wrong people. Data encryption is
an excellent example of ensuring confidentiality.
2. Integrity
This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification.
If any modifications occur, certain measures should be taken to protect the sensitive
data from corruption or loss and speedily recover from such an event.
It ensures that data has not been tampered with or altered in an unauthorized or
unintended manner. Maintaining data integrity is crucial for trust and reliability.
Techniques for ensuring integrity include data validation, checksums, and digital
signatures.
3. Availability
This principle makes the information to be available and useful for its authorized
people always.
It ensures that these accesses are not hindered by system malfunction or cyber-attacks
Availability guarantees that data and services are accessible when needed. It aims
to prevent disruptions, downtime, or unavailability of critical systems.
1. Malware:-
Malware means malicious software, which is the most common cyber attacking tool. It is
used by the cybercriminal or hacker to disrupt or damage a legitimate user's system.
The following are the important types of malware created by the hacker:
Virus: It is a malicious piece of code that spreads from one device to another. It can
clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.
Ransomware: It's a piece of software that encrypts a user's files and data on a device,
rendering them unusable or erasing. Then, a monetary ransom is demanded by
malicious actors for decryption.
Worms: It is a piece of software that spreads copies of itself from device to device
without human interaction. It does not require them to attach themselves to any
program to steal or damage the data.
2. Phishing
5. Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to guess
all possible combinations until the correct information is discovered.
Cybercriminals usually use this attack to obtain personal information about targeted
passwords, login info, encryption keys, and Personal Identification Numbers (PINS).
CYBERSPACE:
Cyberspace is the dynamic and virtual space that such networks of machine-clones create. In
other words, cyberspace is the web of consumer electronics, computers, and communications
network which interconnect the world.
Cyberspace is a complex and abstract term used to describe the interconnected digital
environment created by computer networks, the internet, and the vast array of information,
data, and services they contain. It's essentially a virtual domain where digital interactions,
communications, and transactions take place.
Digital Realm:
Global Connectivity:
Information Exchange:
Computer and web technology are integral components of cyberspace. They underpin the
infrastructure and tools that make the digital world function. Here's an overview of computer
and web technology:
Computer Technology:
Hardware: Computers consist of physical components, including the central processing unit
(CPU), memory, storage devices, input and output devices (e.g., keyboard, monitor, mouse),
and more.
Software: Operating systems and applications provide the software framework for computer
functionality. This includes everything from the operating system (e.g., Windows, macOS,
Linux) to productivity software (e.g., Microsoft Office) and specialized applications.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY
Network Connectivity: Computers can connect to networks, whether wired (e.g., Ethernet)
or wireless (e.g., Wi-Fi), to access the internet and other networked resources.
WEB TECHNOLOGY:
Web Browsers:
Web browsers (e.g., Chrome, Firefox, Edge) enable users to access and interact with
web content, including websites and web applications.
Web Development:
Web developers use languages like HTML, CSS, and JavaScript to create websites
and web applications. Server-side scripting languages such as PHP and Python are also
common.
Web Servers:
Web servers host websites and web applications, serving content to users' browsers
upon request.
Web Standards:
The World Wide Web Consortium (W3C) establishes standards and recommendations
for web technologies, ensuring compatibility and accessibility.
Web Services and APIs: Web services enable applications to communicate and exchange
data over the web, while Application Programming Interfaces (APIs) allow integration
between different software systems.
Responsive Design: With the proliferation of mobile devices, responsive design ensures that
websites adapt to various screen sizes and resolutions.
Computer and web technology play a vital role in shaping our digital lives, from the
devices we use to access cyberspace to the websites and applications we rely on for
information, communication, entertainment, and business.
These technologies are continually evolving to meet the ever-growing demands of a
connected and digital world.
ARCHITECTURE OF CYBERSPACE
Cyberspace does not have a physical architecture like a building or a city; rather, it is a
conceptual and abstract space comprising interconnected computer networks, systems, and
data.
1. Network Infrastructure:
Internet:
2. Data Centers:
Data centers are facilities housing servers, storage systems, and networking
equipment. They store, process, and deliver the vast amounts of data and services that
are accessible via the internet.
3. Servers:
Servers are specialized computers that host websites, applications, and services.
Web servers, email servers, and database servers, among others, enable data and
information to be stored and accessed online.
HTTP (Hypertext Transfer Protocol), and DNS (Domain Name System), to enable the
exchange of data between devices.
Various software and applications, from web browsers and email clients to
social media platforms and cloud services, allow users to access and interact with the
resources within cyberspace.
Cyberspace is filled with a vast array of content, including text, images, videos,
and more, as well as structured data stored in databases and repositories.
8. Cybersecurity Measures:
9. Cloud Computing:
10. IoT Devices: The Internet of Things (IoT) adds a new dimension to cyberspace by
incorporating a wide range of connected devices, from smart appliances and wearable
technology to industrial sensors.
11. Network Devices and Hardware:
Routers, switches, modems, and other network hardware play a role in managing the
flow of data within cyberspace.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY
User devices, including computers, smartphones, tablets, and IoT devices, serve as
endpoints for accessing and interacting with cyberspace.
Communication and web technology are integral components of the digital world,
enabling the exchange of information and facilitating online interactions. They play a
significant role in connecting people, devices, and organizations in cyberspace. Here's an
overview of communication and web technology:
1. COMMUNICATION TECHNOLOGY:
Email:
Email technology allows individuals and organizations to send and receive electronic
messages, documents, and multimedia content. SMTP (Simple Mail Transfer Protocol) and
IMAP (Internet Message Access Protocol) are common email protocols.
VoIP technology allows voice communication over the internet. Services like Skype,
Zoom, and VoIP phone systems use this technology.
Video Conferencing:
Video conferencing technology enables real-time video and audio communication for
virtual meetings, webinars, and remote collaboration. Platforms like Zoom, Microsoft
Teams, and Google Meet are popular examples.
Social Media:
Social media platforms, like Facebook, Twitter, Instagram, and LinkedIn, provide a
space for users to connect, share content, and engage with others.
Collaboration Tools:
Tools like Microsoft 365 and Google Workspace facilitate collaborative work,
allowing users to share documents, conduct video meetings, and collaborate in real time.
2. WEB TECHNOLOGY:
Web Browsers:
Web browsers (e.g., Chrome, Firefox, Edge) allow users to access and interact with
web content, such as websites, web applications, and multimedia.
HTML is the standard markup language used to create web pages. It structures content
and defines its layout on the web.
CSS (Cascading Style Sheets): CSS is used to control the visual presentation of web
content, including fonts, colors, and layout.
JavaScript:
Frameworks like React, Angular, and Vue.js simplify web development by providing
pre-built components and tools for creating responsive and interactive web applications.
Web Servers:
Web servers, such as Apache, Nginx, and Microsoft IIS, host websites and web
applications, serving content to users' browsers upon request.
CMS platforms like WordPress, Joomla, and Drupal allow users to create, manage,
and publish web content without extensive coding skills.
Responsive design techniques ensure that websites adapt to various screen sizes and
resolutions, providing a consistent user experience on desktops, tablets, and mobile devices.
Web services enable applications to communicate and exchange data over the web.
APIs allow integration between different software systems and services.
Organizations like the World Wide Web Consortium (W3C) establish standards and
guidelines for web technologies, ensuring compatibility, accessibility, and usability.
Communication and web technology are continually evolving to meet the demands of a
connected and digital world. They play a crucial role in enabling online communication,
collaboration, and access to information, services, and applications, both for individuals and
businesses.
THE INTERNET:
The internet, short for "interconnected networks," is a vast and global network of computer
networks. It's a fundamental component of cyberspace and plays a central role in modern
communication, information sharing, and access to online resources.
Network of Networks:
Protocols:
The internet relies on a set of communication protocols, the most important of which
is the Internet Protocol (IP). IP provides the addressing and routing framework necessary for
data packets to travel across the network.
Worldwide Reach:
The internet spans the globe, connecting millions of devices, computers, servers, and
other endpoints. It transcends geographical boundaries and enables communication and data
exchange across international borders.
Web:
The World Wide Web (WWW) is a prominent part of the internet, consisting of
websites and web pages linked together via hyperlinks. Web browsers, like Chrome and
Firefox, allow users to access and interact with web content.
Email:
Email is a widely used internet service that enables users to send and receive
electronic messages, documents, and multimedia content. It operates using email servers and
protocols like SMTP and IMAP.
Search Engines:
Search engines, like Google, Bing, and Yahoo, help users find information on the web
by indexing and organizing vast amounts of web content.
Online Services:
The internet provides various online services, including social media platforms, video
streaming services, e-commerce websites, cloud storage, and more.
Cloud Computing:
Cloud computing allows users and organizations to access and use computing
resources, such as servers, storage, and software, over the internet. Popular cloud service
providers include Amazon Web Services (AWS) and Microsoft Azure.
Security:
Evolving Technologies:
The internet continually evolves, with new technologies such as the Internet of Things
(IoT), 5G networks, and artificial intelligence (AI) having a significant impact on its
capabilities and applications.
Concerns about online privacy and data protection have led to the development of
regulations like the General Data Protection Regulation (GDPR) and the Children's Online
Privacy Protection Act (COPPA).
The internet has transformed the way we communicate, work, access information,
conduct business, and entertain ourselves. Its decentralized and open architecture has made it
a fundamental tool for individuals, businesses, governments, and organizations worldwide.
Its continued evolution and expansion will shape the digital landscape for years to come.
The World Wide Web (WWW), commonly referred to as the web, is a system of
interconnected documents and resources linked together via hyperlinks and URLs (Uniform
Resource Locators).
ADVENT OF INTERNET
The advent of the internet is a pivotal moment in the history of technology and
communication. It has transformed the way we connect, share information, and conduct
various aspects of our lives.
Here are the key milestones in the development and history of the internet:
Origins (1950s-1960s):
ARPANET (1969):
The first practical schematics for the internet came from the Advanced Research
Projects Agency (ARPA) of the U.S. Department of Defense. In 1969, ARPANET, the
precursor to the internet, was created. It linked four major U.S. universities.
Email (1971):
Ray Tomlinson, an engineer working on ARPANET, sent the first email in 1971.
Email quickly became one of the most widely used communication tools on the internet.
The development of the Transmission Control Protocol (TCP) and the Internet
Protocol (IP) in the 1970s laid the foundation for modern internet communication. TCP/IP
became the standard for how data would be transmitted between multiple networks.
British computer scientist Sir Tim Berners-Lee invented the World Wide Web in
1989. He introduced the concept of using hypertext to access and share information through
a graphical interface. The first website and web browser were created in 1990.
SHIVASHANKAR H R Dept. of BCA
CYBER SECURITY
Commercialization (1990s):
The 1990s saw the internet's rapid expansion and commercialization. The introduction
of web browsers like Mosaic and later Netscape Navigator made the internet accessible to
the general public. E-commerce and online services started to emerge.
The late 1990s witnessed the dot-com boom, characterized by the proliferation of
internet-based companies and the rapid rise and fall of many dot-com startups. This period
marked a significant increase in internet usage and investment.
The 2000s saw widespread adoption of broadband internet, which greatly improved
internet speed and accessibility. This enabled the growth of streaming media, online gaming,
and other data-intensive applications.
The mid-2000s brought the rise of social media platforms like Facebook, YouTube,
and Twitter. Web 2.0, a term coined to describe more interactive and user-driven websites,
became a defining characteristic of the internet.
The 2010s saw the proliferation of smartphones and the mobile internet. This decade
also witnessed the growth of the Internet of Things (IoT), connecting everyday objects to the
internet for various applications.
Global Connectivity (Present): The internet has become an integral part of daily life,
connecting people around the world, facilitating e-commerce, online education,
telecommuting, and more. It has played a vital role in communication, information sharing,
and business development.
The advent of the internet has revolutionized virtually every aspect of modern life,
from communication and education to commerce and entertainment. Its ongoing
development and expansion continue to shape the way we live and work in the digital age.
Internet infrastructure for data transfer and governance plays a critical role in
managing and ensuring the secure and efficient flow of data on the internet.
This infrastructure encompasses various components and practices that are essential
for data transfer, compliance with regulations, and the protection of user data.
Here are key elements related to internet infrastructure for data transfer and
governance:
Data centers and cloud platforms are central to storing, processing, and transferring
data. These facilities must adhere to strict security standards and compliance regulations to
protect data and ensure its integrity.
Encryption:
The use of encryption protocols such as SSL/TLS (for web traffic) and IPsec (for
network traffic) ensures the confidentiality and integrity of data in transit. These protocols
are essential for securing data transfers.
Privacy Regulations:
Governments and regulatory bodies enforce privacy regulations like GDPR (General
Data Protection Regulation) in the EU and CCPA (California Consumer Privacy Act) in
California. Internet infrastructure must be designed to comply with these regulations to
protect user data.
Cyber security Measures: Robust cyber security measures, including firewalls, intrusion
detection systems, and security patches, are essential for safeguarding data and protecting
against cyber threats.
Network Security:
Network security solutions, such as firewalls, VPNs (Virtual Private Networks), and
intrusion prevention systems, are critical for securing data transfer across the internet
DNSSEC is an extension of the DNS that adds a layer of security by digitally signing
DNS data. This helps protect users from DNS-related attacks and ensures data integrity.
End-to-End Encryption:
Implementing end-to-end encryption ensures that data is encrypted from the sender to
the recipient, preventing unauthorized access even by service providers.
Comprehensive data auditing and logging practices help organizations track data
transfers, access, and usage to ensure compliance and detect potential security incidents.
Internet infrastructure for data transfer and governance is an evolving field that must
adapt to emerging regulations and cyber security threats.
It plays a critical role in maintaining the privacy and security of data as it moves
across the internet, while also facilitating compliance with legal and regulatory
requirements.
INTERNET SECURITY
Internet security is a crucial aspect of using the internet safely and protecting your personal
and sensitive information from various threats. Here are some key points about internet
security:
Passwords:
Use strong, unique passwords for your online accounts. A strong password typically
includes a combination of letters, numbers, and special characters. Consider using a
password manager to help you generate and store complex passwords securely.
Enable 2FA wherever possible. This adds an extra layer of security by requiring a
second form of verification, such as a text message code or a biometric scan, in addition to
your password.
Look for the "https://" prefix in the website's address, which indicates that the
connection is encrypted. This is particularly important when sharing sensitive information or
making online transactions.
Beware of Phishing:
Be cautious of emails, messages, or websites that ask for your personal information or
financial details. Phishing attempts often mimic legitimate sources. Verify the sender's
identity and the website's authenticity.
Keep your operating system, web browsers, and software up to date. Updates often
include security patches that fix known vulnerabilities.
Install and regularly update firewall and antivirus software to protect your device from
malware, viruses, and other online threats.
Wi-Fi Security:
Secure your home Wi-Fi network with a strong password, and consider using
encryption (WPA3) to prevent unauthorized access. Avoid using public Wi-Fi for sensitive
activities like online banking.
Data Backups:
Regularly back up your important files and data to an external drive or a cloud service.
This can help you recover your data in case of data loss due to cyberattacks or hardware
failures.
Privacy Settings:
Review and adjust the privacy settings on your social media accounts and apps to
control the information you share with others.
Regulating cyberspace, which includes the internet and all digital activities, is a complex and
multifaceted challenge.
National Legislation:
Many countries have enacted laws and regulations that pertain to various aspects of
cyberspace, such as data protection, cyber security, online content, and digital commerce.
These laws vary widely from one country to another.
Many countries have introduced data protection and privacy laws, such as the
European Union's General Data Protection Regulation (GDPR). These laws aim to protect
individuals' personal information and ensure that it is handled responsibly by organizations.
Cybersecurity Standards:
Internet Governance:
Internet governance is the process by which policies and rules for the internet are
developed and implemented. Organizations like the Internet Corporation for Assigned
Names and Numbers (ICANN) oversee aspects of the internet's technical infrastructure and
domain name system.
Cybercrime Laws:
Many countries have laws to combat cybercrime, including hacking, identity theft, and
online fraud. These laws often address issues related to jurisdiction when crimes are
committed across borders.
Governments and organizations often prioritize educating the public and businesses about
online safety, responsible online behavior, and cybersecurity best practices.
Balancing regulation with the openness and innovation that make the internet valuable
is a continual challenge.
Striking the right balance is essential to ensure that cyberspace remains a safe, secure,
and accessible environment for all users while protecting individual rights and
freedoms.
The landscape of cyberspace regulation is dynamic and continues to evolve as
technology and digital challenges change.
Confidentiality:
Integrity:
Data integrity ensures that information is accurate and has not been tampered with.
This involves preventing unauthorized changes, modifications, or alterations to data.
Availability:
Availability ensures that systems, data, and services are accessible and usable when
needed. Cybersecurity measures aim to prevent or mitigate disruptions that could lead to
downtime or unavailability.
Authentication:
Authorization:
Firewalls:
Firewalls are network security devices that monitor and control incoming and
outgoing network traffic. They act as barriers between a trusted internal network and an
untrusted external network, such as the internet.
IDS monitors network traffic for signs of malicious activity, while IPS can actively
block or prevent such activity.
Encryption:
Encryption transforms data into a coded format that can only be deciphered with the
appropriate decryption key. It is used to protect data during transmission and storage.
Vulnerability Assessment:
Patch Management:
Regularly updating and patching software and operating systems to fix known
vulnerabilities is critical to keeping systems secure.
Phishing Prevention:
Malware Protection:
Incident Response:
Developing an incident response plan to address security breaches and cyber attacks
effectively is crucial for minimizing damage and downtime.
Cybersecurity Awareness: Education and training for employees and users are essential to
instill good security practices and behaviours.
Access Control:
Access control mechanisms, such as role-based access control (RBAC), restrict access
to systems and data based on a user's role or responsibilities.
Establishing and enforcing security policies and procedures provides a framework for
maintaining cybersecurity within an organization.
Cyber Hygiene:
Practicing good cyber hygiene involves routine tasks like updating passwords,
applying software patches, and being cautious when clicking on links or downloading
attachments.
Cyber Insurance:
Organizations may invest in cyber insurance to mitigate financial losses resulting from
data breaches and cyber incidents.
Cyber security faces a wide range of issues and challenges due to the evolving nature of
technology Cybersecurity faces a wide range of issues and challenges due to the evolving
nature of, the growing sophistication of cyber threats, and the increasing reliance on digital
systems and the internet.
Some of the key issues and challenges in the field of cyber security include:
Cyber Threats:
The landscape of cyber threats is constantly evolving. New types of threats, such as
zero-day vulnerabilities, advanced persistent threats (APTs), and ransom ware, continue to
emerge, making it challenging to stay ahead of attackers.
Data Breaches:
Lack of Awareness:
Many individuals and businesses are not adequately aware of cybersecurity risks and
best practices, making them vulnerable to common threats like phishing and social
engineering.
Resource Constraints:
Vulnerability Management:
The proliferation of IoT devices introduces new security challenges, as many of these
devices have weak security controls and can be used as entry points for cyber-attacks.
Ransomware:
Ransomware attacks have become increasingly common and can result in data
encryption and extortion. Paying ransoms is discouraged, but recovery can be costly.
Cloud Security:
Organizations are adopting cloud services, which require robust security measures to
protect data stored and processed in the cloud. Misconfigurations can lead to data exposure.
Cybercriminals are using AI and machine learning for attacks, making detection and
prevention more challenging.
Privacy Concerns:
Emerging Technologies:
New technologies like quantum computing and 5G networks may pose both
opportunities and challenges for cybersecurity.
International Cooperation:
Cyber Security must adapt and evolve to meet the ever-changing threat landscape in
our increasingly digital and interconnected world.
****************************