Cyber Security Unit 1 Full
Cyber Security Unit 1 Full
Data : Data is a information that has been translated into a from that is efficient for
movement or processing.
MODULES
INTRODUCTION TO CYBER SECURITY
CYBER CRIME AND CYBER LAW
SOCIAL MEDIA OVERVIEW AND SECURITY
How it works ? Is this msg is secure ?
No, Because The problem is hacker will misuse our data / damage it.
Therefore Security purpose, we use cyber Security.
Computer : A computer is a electronic device capable of performing various tasks.
Components : Hardware and Software
It is relating to internet, networks, Information, technology, data, Applications and
computer The protection of computer Systems and information from harm, theft,
and unauthorized use.
Cyber Security
Cyber Security is the application of technologies, processes, and controls to protect
systems, networks, programs, devices and data from cyber
Types of Cyber Security
1.Network Security :
Network security is the practice of security a computer network from
intruders, whether targeted attackers or opportunistic malware.
a) Access Control
Network security involves implementing access control mechanisms to
regulate who has access to Specific resources, systems, and data.
b) Firewalls
Firewalls are security devices or software that filter incoming and
outgoing network traffic. They Block unauthorized access while permitting
legitimate communication.Firewalls can be configured to block certain ports,
protocols.
c) Intrusion Detection and Prevention Systems (IDS/IPS)
IDS monitors network traffic for suspicious activity and alerts administration
when potential threats
are detected.IPS goes a step further by automatically taking action to prevent
or mitigate threats.
d) Virtual Private Networks(VPNs)
VPNs enable secure communication over untrusted networks, such as the
internet. They encrypt data and create secure tunnels for remote users and branch
offices to connect to the organization's network.
e) Network Segmentation
Dividing a network into smaller, isolated segments to contain potential threat
and limit lateral movement in case of a breach. Segmentation can enhance security
by separating critical systems from less sensitive ones.
f) Security Policies
Establishing and enforcing network security policies and procedures that guide
users
and administrators in maintaining a secure environment..
g) Network Monitoring
Continuously monitoring network traffic and systems for anomalies, securit
incidents, and performance
issues.
h) Patch Management
Keeping network devices, software, and systems up to date with the lates security
patches to address
known vulnerabilities.
i) Encryption
The use of encryption protocols to protect data in transit, such as SSL/TLS for
secure web communication,
and to safeguard sensitive data stored on network devices.
j) Wireless Network Security
Securing wireless networks with encryption, strong authentication, and
monitoring to prevent unauthorized
access.
2. Application security
Application security focuses on keeping software and devices free of threats.
A compromised
5. Web Hosting
Services and providers that store and make websites accessible on the internet
6. Web Security
Techniques and practices for safeguarding websites and web applications from
security threats, vulnerabilities, and attacks.
7. Web Services and APIs (Application Programming Interfaces)
Mechanisms for allowing different software systems to communicate and share
data over the web.
CLASSIFICATION OF WEB-TECHNOLOGY
2. Web Browser
This application software helps explore the World Wide Web (WWW). It provide
the user interface between the client and the server. The web browser also require
the server for web documents and services
3. Web Server
It is a program that sets upon the network request of the user and serves the with
the files that help open the web page. The exchange of files takes place with the
help of the Hypertext Transfer Protocol (HTTP).
4. Web Pages
A web page is the digital document's front-end linked to the World Wide Web. can
be viewed by anyone having an internet connected web browser.
5. Web Development
Web development is everything about building and maintaining websites. It
contains web services, including web programming, web publishing, web design,
and database management.
ARCHITECTURE OF CYBERSPACE
1. Physical Infrastructure
At the foundational level, the architecture of cyberspace relies on a physical
infrastructure composed of network cables, data centers, and various network
devices. This infrastructure supports the transmission of data across the globe.
2. Internet Backbone
The internet backbone consists of a vast network of high-capacity data
transmission lines and fiber-optic cables. It serves as the core of the internet,
providing the necessary bandwidth for global data transmission.
3. Protocols and Standards
Various protocols and standards govern data transmission and communication on
the internet, including:
e) FTP (File Transfer Protocol): A protocol for transferring files over the internet.
4. Social Media
Social media networks like Facebook, Twitter, and Instagram are built on web
technology. They allow users to share text, images, videos, and links, and engage
in online conversations through web-based interfaces.
There is no single, generally agreed upon answer to this question, because the
Internet is different for each of us:
1.It is a set of computers talking over fiber optics, phone lines, satellite links, and
other media
2.It is a place where you can talk to your friends and family around the world.
6.It is a place where "crackers" and other shady characters lurk, waiting to wreak
havoc
9.It is a gold mine of professionals in all fields sharing information about their
work.
10.It is hundreds of libraries and archives that will open to your fingertips.
11.It is the ultimate time-waster.
12.It is the technology of the future that will help make our lives and those of our
children, brighter.
The Web or World Wide Web, is basically a system of Internet servers that
support specially formatted documents. The documents are formatted in a
markup language called HTML (Hyper Text Markup Language) that
supports links to other documents, as well as graphics, audio and video files.
Users can jump from one document to another simply by clicking on hot
spots. User never need to know where the information is located or to learn
any obscure commands to access it. A WWW hypertext document is usually
called a web page. Operations on the WWW is based on a client/server
model.
ADVENT OF INTERNET
The advent of the internet marked a revolutionary turning point in the way
humanity communicates, accesses information, conducts business, and
interacts with the world. The origins of the internet can be traced back to
various developments and milestones:
2. ARPANET (1969)
The Advanced Research Projects Agency Network (ARPANET) was the first
wide-area packet-switching network, funded by the U.S. Department of
Defense's ARPA. It became operational in 1969 and is considered a
precursor to the modern internet.
3. Email and File Sharing (1970s)
Ray Tomlinson sent the first networked email in 1971, using the "@" symbol
to designate sending messages between users on different machines. File
Transfer Protocol (FTP) was introduced in 1971 for efficient file sharing.
6. DNS (1983)
The Domain Name System (DNS) was introduced to convert human-
readable domain names into numerical IP addresses, making it easier to
access websites.
a) Submarine Cables
Fiber-optic cables laid on the ocean floor that connect continents and
regions, We forming the primary backbone of international internet
connectivity.
b) Terrestrial Cables
Fiber-optic or copper cables that traverse land, connecting cities, towns, and
regions. These cables form the backbone of national and regional internet
networks.
c) Data Centers
Facilities that house network servers and other computing equipment. Data
centers are critical for storing, processing, and managing vast amounts of
data and services.
d) Network Servers
High-powered computers within data centers that store and serve data and
applications to users across the internet.
Network devices that direct data packets to their intended destinations within
a network or across networks. Routers operate at the network layer, making
routing decisions based on IP addresses.
f) Firewalls and Security Appliances
Data transmission protocols are a set of rules and conventions that govern
the format, timing, sequencing, and error control during the exchange of data
between devices over a network. These protocols ensure that data can be
sent and received accurately and efficiently. Here are some important data
transmission protocols:
UDP is a connectionless protocol that offers a faster but less reliable way to
send data. It does not establish a connection and does not guarantee delivery,
making it suitable for real-time application
c) Internet Protocol (IP)